Sorush Fathi, Zahra Dadgarfard, Parvin Dadandish, Zahra Zare,
Volume 11, Issue 4 (1-2025)
Abstract
Introduction
The present study aims to qualitatively examine the lived experience of economically empowered female heads of households in order to extract a local pattern or model from their lived process that other female heads of households can also benefit from.
Methods and Materoal
Snowball sampling method was used to conduct the interviews. The interviews were conducted in person by the researcher until saturation point was reached. Therefore, the researcher interviewed 13 economically capable female heads of households until theoretical saturation.
Resultss and Discussion
Overall, 157 open codes, 42 axial codes, 15 selected codes, and one axial category were extracted from the interviews. The results showed that the causal category of financial need, lack of basic needs, and family disorder had a significant impact. The existence of support organizations and charities, laws protecting female heads of households, and receiving facilities from support organizations are among the intervening categories. Also, heavy family obligations and lack of social and family support were identified as underlying factors. In the meantime, there are strategies for female heads of households, including taking advantage of support services and facilities from government organizations and charities, receiving economic and social skills training, and using facilities, programs, and services. This has led to effects and consequences, including increased income and employment, improved social and economic status, and reduced family and social tensions. The central issue is the need for economic empowerment. Women heads of economically empowered households initially lacked sufficient economic experience and skills, or even the necessary preparation, to become heads. Economic empowerment has reduced deprivation and social exclusion and has enabled them to integrate into society and social groups
Conclusion
The results of the present study, which examined the lived experience of economically empowered female heads of households, showed that female heads of households initially had circumstances in which they had lost their husbands or had separated from their husbands, and most of them were not in a good financial situation.
They have also experienced family tensions, infidelity and violence from their spouse, poor financial conditions, and overwhelming obligations and responsibilities.
In addition, during the absence of a spouse or separation from a spouse, the responsibility for children and providing for the family's livelihood needs, as well as the conditions of society and their sense of need, played an important role in achieving economic empowerment. Therefore, family disorganization, financial need, and failure to meet basic needs were considered as causal factors.
The presence of support organizations can be considered an effective element in this regard. The optimal use of services has played an effective role in improving their conditions, and it can be said that these women used services and employment in a way that was appropriate and purposeful. This shows that intervening factors, including the existence of support organizations and charities, laws supporting female heads of households, receiving facilities from the support organization, and personality traits in line with empowerment (desire for social and economic independence) were also influential. Overall, it can be concluded that these women did not have sufficient experience and skills from the beginning, and were not even prepared to become caregivers. However, as they became economically empowered, their deprivation and social exclusion decreased, and their integration into society and social groups expanded. Their capacity to improve their personal and social status will also increase. Therefore, a process was undertaken to transform a woman who was a head of household in need of support into an economically empowered woman.
Elham Askarian Kakh, Somaye Sadat Akhshik, Abdolhossein Farajpahlou, Reza Rajabali Beglou,
Volume 11, Issue 4 (1-2025)
Abstract
Information poverty has a wide-ranging negative impact on people’s health and socio-economic well-being. Over the past twenty years, researchers have used Chatman’s information poverty theory as a guide to understanding information behaviors in diverse contexts and situations, and it continues to be useful in advancing our understanding of the social dynamics and cultural contexts of information behaviors.
Information poverty is a condition in which individuals and groups in a particular context lack the skills, abilities, and tools necessary to access information appropriately, or to transform and use it optimally. The marginalization of information through institutional and contextual processes such as economic and racial inequalities, as well as information overload, negatively affects an individual’s information behavior. Marginalized groups find limited resources to meet their information needs, have limited economic and social capital, are suspicious of outside information, and engage in self-protective behaviors to reduce marginalization. Chatman (1996) proposed the information poverty theory. According to him, people who do not believe that external information can help them are inclined to engage in self-protective behaviors such as deception and secrecy, which ultimately make them unable to obtain richer information. The theory he proposed makes the following six propositions:
1. The information poor perceive themselves to be devoid of any sources that might help them.;
2. Information poverty is partially associated with class distinction;
3. Information poverty is determined by self-protective behaviors which are used in response to social norms;
4. Both secrecy and deception are self-protecting mechanisms due to a sense of mistrust regarding the interest or ability of others to provide useful information;
5. A decision to risk exposure about our true feelings is often not taken due to a perception that negative consequences outweigh benefits;
6. New knowledge will be selectively introduced into the information world of poor people. A condition that influences this process is the relevance of that information in response to everyday problems and concerns.
The components associated with Chatman's information poverty theory are: Secrecy, deception, risk-taking, and situational relevance. Risk-taking refers to a person’s perception of the value of a particular type of information and the perception of the risk involved in seeking or sharing this information. Secrecy is the intentional protection of oneself from revealing information. In contrast, deception involves the intentional presentation of a false reality, as the person shares meaningless information, and the information received is irrelevant. Situational relevance refers to the fact that, to be useful, information sources must be meaningful to the individual and accepted by others in the group. Lack of knowledge about issues leads people to resort to rumors and superstitions, to feel helpless, and to avoid actively seeking information. One area that has been particularly affected by information poverty has been the field of medicine, especially infectious diseases. The experience of illness is a phenomenon that evokes suffering, intense emotions, and a desire to talk to others. The desire to talk to others is shaped by the perception that other people who do not suffer from the disease are unable to understand the world of patients, so relevant information should only be obtained from insiders who share their experiences. One of the social concerns about pandemics is fatalism. Some attribute the information poverty during the COVID-19 outbreak to the spread of fake news through social media, and believe that fake news, conspiracy theories, poverty and hunger, a shortage of doctors for patients, and social ignorance have created challenges in combating the pandemic. A combination of fear, social stigma, criminalization, and narrow-minded laws prevent marginalized individuals and social groups from volunteering for information when they need health and medical care. Stigma has always been a social challenge in social studies of health. Social stigma caused by infectious diseases causes psychosocial stress and other social barriers. Stigma can hinder health information-seeking behaviors and delay diagnosis and treatment; and can also lead to poverty and ignorance through social marginalization, resistance to health institutions, and mistrust of information and information sources. One of the main challenges for health policymakers is to develop effective measures to reduce stigma associated with illness, which requires further research. Since Chatman's theory has been used for many years to assess information poverty, it is expected to be useful for investigating the subject of the present study.
The problem is that in such circumstances, when the level of trust between individuals (patients and non-patients) and medical staff decreases, the role of people such as healthcare workers as a bridge between specialists and non-specialists can be necessary. Healthcare workers also play the role of transferring information between these two groups. Therefore, measuring the level of information poverty of healthcare workers in relation to epidemic diseases is so important. On the other hand, if the factors affecting the information poverty of different groups of individuals, including medical staff, in the field of infectious diseases are identified, the results can also be extended to possible epidemic conditions in the future and help in appropriate interventions at different stages of managing and controlling public health emergencies as quickly as possible. Identifying the challenges and problems of information behavior of healthcare workers who face epidemic diseases and appropriate and timely planning for their management can lead to the design of effective strategies for the prevention, treatment, and recovery of affected communities.
The aim of the study was to show how the small world of Tehran healthcare workers fits into Chatman's information poverty theory. The main question of this research was to investigate their information poverty situation based on the components of Chatman's information poverty theory.
The sub-questions were as follows:
1. What is the situation of the secrecy component in healthcare workers?
2. What is the situation of the deception component in healthcare workers?
3. What is the situation of the risk-taking component in healthcare workers?
4. What is the situation of the situational relevance component in healthcare workers?
5. What is the grouping of healthcare workers based on the components of Chatman's information poverty theory?
Methods and Materoal
The method of this survey study included the identification and analysis of the key components of information poverty of healthcare workers who were working in health homes in Tehran during the Covid-19 pandemic. Because due to their direct contact with the community, they had valuable information about their health situation and health needs, and the information poverty of healthcare workers in this field could be extended to the community.
Data collection was conducted using a researcher-made questionnaire based on Chatman's information poverty theory. The reliability of the questionnaire was assessed using Cronbach's alpha formula, and the content validity ratio was used to examine the validity of the questionnaire.
A stratified random sampling method was used and 125 questionnaires were collected. In order to ensure better diversity and representation, the population was divided into subgroups, and the categories were identified based on the supervising universities, and a sample was selected from each category to ensure the necessary statistical sample size.
Results and Discussion
The findings related to the main components showed that deception had the highest mean with a value of 3.85. This indicates a conscious effort to present a false social reality. After that, the mean of secrecy, protecting oneself from revealing information, is in second place with a value of 3.728. The mean of situational relevance is also in third place with a value of 3.687. This index indicates that the healthcare workers selectively received information about their daily lives. In addition, the mean of risk-taking (3.615) also indicates the healthcare workers' fear of the consequences of seeking information in complex health conditions.The findings related to the secrecy show that the highest mean (3.924) belonged to the component of "Coping with a lack of information processing skills". This was followed by “mistrust”, “privacy protection”, “adherence to one’s own in-group culture”, “welcoming cyberspace to exchange information”, “hiding one’s position, feeling or opinion”, “establishing and maintaining superiority over unwell individuals”, “lack of information and information assets”, and “avoiding negative consequences” and finally, “adherence to a unique personal attitude”.Findings related to the risk-taking showed that “usefulness and value of information” had the highest mean of 3.752. After that, "privacy protection" with an average of 3.74, "adherence to one's own in-group culture" with an average of 3.645, "welcoming cyberspace for information exchange" with an average of 3.642, "emotional and cognitive effort to choose between true and false information" with an average of 3.64, "mistrust" with an average of 3.58, "avoidance of possible negative consequences".
The situation of the situational relevance shows that the "usefulness and value of information" component with an average of 3.726 has the highest score. This was followed by “using insider information” with an average of 3.725, “adherence to one’s own in-group culture” with an average of 3.688, “lack of information and information assets” with an average of 3.616, and the “mistrust” with the lowest average.
Analysis of the situation of the deception showed that the “risk avoidance” had the highest average (3.988). This was followed by “mistrust” with an average of 3.884, “lack of information and information assets” with an average of 3.876, “maintaining privacy” with an average of 3.876, and “failing to present the true reality, situation, or feeling” with an average of 3.828, respectively. Finally, the lowest average (3.796) was related to the “establishing and maintaining superiority over unwell individuals” component.
The findings related to the grouping of healthcare workers showed that the deception component had the highest number of observations and the situational relevance component was in second place after the deception. Also, the number of observations of secrecy was higher compared to risk-taking.
Conclusion
The results indicate the complex behaviors of healthcare workers in interacting with information and information sources, and "deception" was prominent as the main strategy among these components, while situational relevance, risk-taking, and secrecy acted as complementary behaviors.
The most effective factor on healthcare workers' secrecy was coping with the lack of information processing skills. This is while mistrust of information sources and information also played a prominent role in the process of not presenting facts, feelings, and thoughts of healthcare workers. While the most important factor on risk-taking was ignoring information that did not match their conditions, because they were afraid of its consequences and possible risks. The second factor affecting risk-taking was due to the preservation of information and personal and group privacy. Also the most effective factor on "situational relevance" was that they assessed the usefulness and value of information from the perspective of their own needs and limited information. Another factor was that the healthcare workers prioritized the use of inside information because they considered it relevant to their position. Finally the most influential factor in the deception of the healthcare workers was that they reduced the risks of seeking information. Another factor was that they did not trust the information and the sources from which it was disseminated.
The grouping of healthcare workers showed that the largest number of them was in the deceptive group. A smaller number of them also assessed the relevance and usefulness of the information to their current situation and were placed in the second group. The third group, with a smaller number, belongs to the secretive group, while the number of risk-averse individuals was lower compared to secretive healthcare workers. There are signs in the findings that place people in two groups at the same time. This phenomenon can be caused by psychological and social complexities and the effects of various factors on information poverty. On the other hand, all four components can be involved in an individual's information-seeking behavior at the same time. It is also possible for one component to have an effect on the other. For example, the concept of secrecy is closely related to risk-taking. This highlights the depth of information poverty and the complexity of human behavior, which can be influenced by multiple factors, including social and cultural contexts. It also allows us to understand that individuals do not simply fit into a particular pattern and may act differently in different situations. Overall, these findings emphasize the need to develop training programs and create safe spaces for information exchange so that healthcare workers can more confidently access and utilize new information.
The analyses lead us to conclude that in order to reduce information poverty, we need to strengthen educational infrastructure, improve access to information, and create a culture of transparency and trust. Finally, the findings provide new insights into the constraints experienced by healthcare workers in health homes, and provide evidence of systematic marginalization and classification of access to and use of information, indicating that protective, secretive, and deceptive measures were employed by healthcare workers not only to cope with living in a small world, but also to circumvent socio-cultural boundaries. The results provide further insight into the role of health professionals and policymakers in supporting the information needs of healthcare workers and guiding their information behaviors.
Keywords: Information Poverty, Chatman's theory, Primary healthcare worker.
Kimiya Taghizadeh Milani, Masoumeh Karbala Aghaei Kamran, Amir Ghaebi,
Volume 11, Issue 4 (1-2025)
Abstract
The rapid proliferation of digital data in the research landscape has underscored the critical need for sustainable data curation strategies, especially regarding the long-term preservation of valuable datasets. Research data repositories, as key infrastructures for data stewardship, face mounting challenges in determining which datasets should be preserved for future reuse, validation, and scientific advancement. Given the constraints of storage, funding, and technical resources, not all data generated by research activities can or should be preserved indefinitely. Consequently, defining rigorous, transparent, and contextually appropriate evaluation and selection criteria has emerged as a vital concern within the broader scope of research data management (RDM) and digital curation.
This study aims to identify and categorize the key criteria used to evaluate and select research data for long-term preservation in repositories. By conducting a systematic review of existing literature and practices, it seeks to offer a conceptual framework that supports repository managers, librarians, archivists, and data stewards in making informed and consistent decisions about what data to retain. The research further addresses the implications of these criteria on policy development, data sharing, and FAIR data principles (Findable, Accessible, Interoperable, and Reusable). Ultimately, the study contributes to improving data lifecycle management strategies and ensuring that preserved data retains its scientific, legal, ethical, and cultural value.
Methods and Material
This research adopted a qualitative content analysis approach based on a systematic literature review. The primary goal was to identify, classify, and synthesize the evaluation and selection criteria applied by data repositories in preserving research data. The review focused on peer-reviewed journal articles, white papers, policy documents, and institutional guidelines published between 2000 and 2024. Major databases such as Scopus, Web of Science, ScienceDirect, and Google Scholar were searched using combinations of keywords including "research data preservation," "data selection criteria," "data curation," and "digital repositories."
Inclusion criteria for the literature involved the presence of explicit or implicit discussion on the assessment or selection of research data for long-term storage, including frameworks, models, or institutional case studies. A total of 67 relevant documents were identified and analyzed. Through iterative coding and constant comparison, the evaluation criteria were distilled into several thematic clusters, such as scientific value, legal and ethical considerations, technical characteristics, economic feasibility, data usability, and policy alignment.
Resultss and Discussion
The findings of this study, based on a systematic review of the literature and a meta-synthesis of previous studies, identify a comprehensive set of criteria and components for evaluating and selecting research data for retention in data repositories. These criteria are categorized into eight main components: data preparation, data quality, physical conditions and technical features, metadata management and features, ethical principles of data, document-related criteria, compliance with FAIR principles, and repository policies and issues.
In the “Data Preparation” component, indicators such as data cleaning, data scale, presence of missing data, and evaluation of survey biases are highlighted. This component emphasizes the necessity of eliminating errors and inconsistencies, assessing the scale of data, and addressing missing values. It also stresses the importance of identifying and evaluating biases in survey data, such as sampling errors, non-response, and other confounding factors.
The “Data Quality” component includes indicators such as accuracy, reliability, completeness, validity, documentation of limitations, and timeliness of data. Accuracy and correctness of information must be carefully assessed, and data reliability should be evaluated based on how the data was produced and analyzed. Completeness refers to the presence of all necessary elements in the dataset, and validity relates to the soundness of data collection tools and the extent to which findings reflect reality. Acknowledging study limitations helps clarify weaknesses, and up-to-date data are valued for their relevance in terms of collection time.
The remaining components and their indicators are as follows:
- Physical Conditions and Technical Features of Data: Includes data formats, future readability, required software for access, and compatibility with technical standards.
- Metadata Management and Features: Covers the presence of sufficient metadata, use of standardized structures for data description, supplementary documentation, and necessary information for data reuse.
- Ethical Principles of Data: Encompasses protection of participants' privacy, anonymization or encryption of sensitive information, obtaining informed consent, and respect for intellectual property rights.
- Document-Related Criteria: Includes the association of data with specific research projects, traceability of data to published scholarly articles, and documentation of data collection methods.
- Compliance with FAIR Principles: Covers Findability, Accessibility, Interoperability, and Reusability of the data.
- Repository Policies and Issues: Involves adherence to legal requirements and repository policies, access licenses, data sharing conditions, and security considerations for data storage.
These eight components and their corresponding indicators provide a comprehensive and evidence-based framework for evaluating and selecting suitable research data for long-term retention in data repositories.
Discussion and Conclusion
The discussion and conclusion of this paper emphasize the importance of various components in the evaluation and selection of research data for storage in data repositories. In the data preparation phase, accuracy in data cleaning and screening, particularly in quantitative research, is crucial. Challenges such as missing data and potential biases, such as sampling errors, can complicate analyses and reduce the quality of the data. Therefore, adherence to precise standards in cleaning and verifying data is essential.
In evaluating data quality, accuracy and precision of information, reliability, and completeness of the data are key criteria. Data that is properly collected and analyzed can facilitate more effective research and reuse of data. Especially in both qualitative and quantitative data, the use of standardized formats and compatibility with various systems are significant technical issues that impact storage quality.
Metadata documentation also plays a critical role in data evaluation. Metadata provides essential information about the data, enhancing transparency, collaboration, and trust. Furthermore, adhering to ethical principles, such as obtaining informed consent from participants and ensuring their privacy during the use of data, is crucial. These actions help maintain public trust and prevent misuse of data.
The paper also emphasizes the importance of alignment with the FAIR principles (Findability, Accessibility, Interoperability, and Reusability) in data evaluation. Adherence to these principles ensures that data will be more effective and accessible for future use. Additionally, policies related to data repositories must consider user needs and technical limitations, preserving high-value research data for future use.
The conclusion reveals that the evaluation and selection of research data for storage should be conducted with care and adherence to standardized criteria to improve the quality and effectiveness of data utilization in future research. Furthermore, practical recommendations such as developing data evaluation guidelines, training data specialists, and implementing technological tools to enhance the data evaluation and storage processes are proposed.
Masoud Bakhtiari, Saeed Ghaffari,
Volume 11, Issue 4 (1-2025)
Abstract
Advances in information technology and media evolution have impacted many different areas under the influence of related technologies. Social media and information centers have transformed the face of libraries and information providers, especially creating new opportunities for librarians and university libraries (Kamani, 2015). Given the development of social media in the necessity of librarians in information centers and libraries, awareness of librarians' views on media literacy in the category of social media literacy seems to be an interesting topic that can be effective in providing the desired solutions for the promotion and goal of social media literacy. This study seeks to investigate the relationship between media literacy and the use of cyberspace and the acceptance of media news among librarians. The use of cyberspace and the acceptance of media news are issues that are of greater importance among librarians today; therefore, the present study attempts to answer the question of whether there is a relationship between media literacy and the use of cyberspace and the acceptance of media news among librarians in public libraries in Qom province?
Accordingly, the research hypotheses are stated as follows:
Main hypotheses:
1- There is a significant relationship between media literacy and its dimensions (cognitive, emotional, aesthetic, and moral) and the use of cyberspace among librarians in public libraries in Qom province.
2- There is a significant relationship between media literacy and its dimensions (cognitive, emotional, aesthetic and ethical) and media news acceptance among librarians of public libraries in Qom province.
Sub-hypotheses:
1- Media literacy, the amount of use of cyberspace and the acceptance of media news differ based on the age of librarians.
2- Media literacy, the amount of use of cyberspace and the acceptance of media news differ based on the field of study of librarians.
3- Media literacy, the amount of use of cyberspace and the acceptance of media news differ based on the type of social media of librarians.
The second section discusses the background of the research. The third section explains the research method. The fourth section presents and discusses the research findings. Finally, the fifth section discusses conclusions and suggestions.
Methods and Materoal
The type of research method in this study is applied in terms of purpose and descriptive-correlational in terms of method, it is a survey type that was implemented by field method. The statistical population of the study is all librarians of public libraries in Qom province, whose number is 112 people, and the sample size is 80 people selected by available sampling method. This study used the library method to develop the theoretical foundations of the research and the following tools were used to collect field information. Demographic information: This information includes age, field of study, and type of media, which was measured through a questionnaire.
Questionnaire on the use of cyberspace: A researcher-made questionnaire was used to measure the use of cyberspace. This questionnaire has 20 questions and its aim is to assess the extent to which individuals use cyberspace (social networks and the Internet). The response range is a five-point Likert scale (1=very little to 5=very much). To obtain the overall score of the questionnaire, the scores for each question were added together. This score will range from 20 to 100. To interpret the overall score obtained, it is done as follows. 20 to 40 is low use of cyberspace 41 to 60 is moderate use of cyberspace 61 to 80 is high use of cyberspace 81 to 100 is very high use of cyberspace.
Media News Acceptance Questionnaire: The questionnaire by Lee and Suh (2015) was used to measure media news acceptance. This questionnaire was translated, validated, and used for the first time by the researcher. This questionnaire has 5 items and is designed based on a five-point Likert scale (from completely disagree to completely agree). The response range is from 1 to 5, with a score of 1 indicating low credibility and a score of 5 indicating high credibility. Also, all items have direct (positive) scoring.
Resultss and Discussion
First main hypothesis: There is a significant relationship between media literacy and its dimensions (cognitive, emotional, aesthetic and ethical) and the level of use of cyberspace among librarians in public libraries in Qom province.
The results of the first main hypothesis show that there is no significant relationship between media literacy and its dimensions and the level of use of cyberspace, therefore the first hypothesis of the research is rejected. The results of this hypothesis are consistent with the results of the research of Ghanetati et al. (2018) and inconsistent with the results of the research of Bolboli and Tarbiati (2014), Miri and Bani Hashem (2019) and Asadi (2020).
Second main hypothesis: There is a significant relationship between media literacy and its dimensions (cognitive, emotional, aesthetic, and ethical) and the acceptance of media news among librarians in public libraries in Qom province.
The results of the second main hypothesis show that there is a negative and significant relationship between media literacy and media news acceptance (r= -0.300, p= 0.000). There is also a negative and significant relationship between all components of media literacy and media news acceptance. For example, the negative relationship between cognitive literacy and media news acceptance (r= -0.335, p= 0.000). While confirming the second main hypothesis of the study, it can be concluded that media news acceptance among librarians is related to their level of media literacy, which is completely consistent with the results of the research of Taghipour et al. (1400), Anthony (2009). Sub-hypothesis 1: Media literacy, the level of use of cyberspace and the acceptance of media news differ based on the age of librarians
To examine this hypothesis, one-way ANOVA analysis of variance test was used, the results of which are reported in the tables below.
According to the ANOVA test, given that the significance level of the test error for all three variables is greater than 0.05, therefore, the lack of difference in the means is confirmed and the difference in the means of the research variables among the three groups is not statistically significant (P > 0.05). Therefore, while rejecting the hypothesis, it can be said that media literacy, the amount of use of cyberspace, and the acceptance of media news do not differ based on the age of librarians. The findings of the present study regarding the lack of relationship between age and media literacy are consistent with the results of the study by Salemi et al. (1400). Esmaili et al. (1398) also showed that among the demographic variables, only age is related to the variable of
ability to detect fake news, which results of the present study are somewhat inconsistent with this study.
Second Sub-Hypothesis: Media literacy, the amount of use of cyberspace, and the acceptance of media news differ based on the field of study of librarians.
One-way analysis of variance test was used to examine this hypothesis.
According to the results of the second sub-hypothesis, given that the significance level of the test error for the amount of use of cyberspace is greater than 0.05, therefore, the lack of difference in the mean is confirmed and the difference in the mean of the use of cyberspace between the three groups is not statistically significant (P<0.05). On the other hand, the significance level of the test error for media literacy and acceptance of media news is less than 0.05, therefore, the difference in the mean in these two variables is confirmed and the difference in the mean of media literacy and acceptance of media news between the two groups of subjects is statistically significant (P<0.05). The results of this hypothesis are in agreement with the results of the study by Esmaili et al. (2019) on the relationship between the field of study and the variable of information literacy in a way. is not linear.
Third Sub-Hypothesis: Media literacy, the amount of use of cyberspace and the acceptance of media news differ based on the type of social media of librarians.
To examine this hypothesis, a one-way analysis of variance test was used.
According to the results of the third sub-hypothesis, given that the significance level of the test error for media literacy is greater than 0.05, therefore, the lack of difference in the mean is confirmed and the difference in the mean of media literacy based on the type of social media of the subjects is not statistically significant (P > 0.05). On the other hand, the significance level of the test error for the amount of use of cyberspace and the acceptance of media news is less than 0.05, therefore, the difference in the mean in these two variables is confirmed and the difference The average amount of use of cyberspace and acceptance of media news by the type of social media used by the subjects is statistically significant (P<0.05). A pairwise comparison of the types of social media used by the subjects in terms of the amount of use of cyberspace and acceptance of media news shows that the difference in the average amount of use of cyberspace on Instagram and others is greater and positive (0.798). Given the significance of the difference, it can be concluded that subjects who prioritize Instagram use have the highest and subjects who use other media (Twitter and Facebook) have the lowest amount of use of cyberspace. According to the table above, the difference in the average acceptance of media news on Instagram and WhatsApp is greater and negative (-0.367), and given the significance of the difference, it can be concluded that subjects who prioritize Instagram use have the lowest and subjects who use WhatsApp have the highest acceptance of media news. The results of this hypothesis are completely consistent with the results of Anthony's (2009) research.
Conclusion:
The turning of users to the Internet due to the lack of sufficient time to visit libraries was one of the reasons for the creation of digital libraries. Digital libraries have facilitated and accelerated users' access to the required information by providing various facilities; but what achieves this goal is a suitable architecture and design in creating a digital library. If the needs of users, the type of society and other factors are taken into account in the design of digital libraries, it can be said that the library will come closer to the intended goals. Considering that in the design of digital libraries, the discussion of the user interface is very important in order to eliminate human factors, digital
libraries must consider the characteristics related to the user interface in their design. Due to the importance of this discussion, the user interfaces of various digital libraries need to be evaluated continuously. The present study also aimed to investigate this issue by evaluating the user interface on the English web pages of selected national digital libraries based on the criteria available in the texts and sources. Conducting the study required criteria through which the evaluation could be conducted. After reviewing the relevant research backgrounds in the field of digital libraries and user interface, it was observed that despite the studies conducted in the field of user interface, these studies had not been conducted completely and comprehensively, and different researchers had each examined only one or a limited number of criteria in the field of different information systems. The present study aimed to investigate the relationship between media literacy and the use of cyberspace and the acceptance of media news among librarians of public libraries in Qom province, and the research hypotheses were tested. A review of domestic and foreign empirical records shows that researchers have addressed aspects of media literacy among different media in accordance with their subject of study, and what has been their focus in most of these studies is the study of media literacy as a dependent variable that is influenced by other factors, and in that all the records have discussed media literacy, they are similar to the present study; however, the present study is distinct from the research record in that it has examined the relationship between media literacy and its dimensions with the use of cyberspace and acceptance of media news among librarians of public libraries in Qom province. In fact, the variables of media literacy and its dimensions, use of cyberspace and acceptance of news from cyberspace are measured together for the first time, so in this respect it has a new nature that will lead to its theoretical expansion and development; In addition to theoretical benefits, it offers solutions to prevent the spread of cyberspace harms among librarians through interventions on these two structures (the Internet and social networks). In summary, it can be said that in order to escape the trap of cyberspace rumors, social media users must equip themselves with media literacy tools to become members of pages and channels and obtain news and information through channels whose main goal is, first, to disseminate news correctly, and second, to disseminate news that is religiously, legally, and morally correct, thus recognizing the truth from Nazareth. Therefore, in today's virtual world, only those who are equipped with the weapon of media literacy can avoid falling prey to the rumor-spreading of news agencies that seek to mentally deceive members of the global community.
The results of one-way analysis of variance of the first sub-hypothesis showed that media literacy, the amount of use of cyberspace, and the acceptance of media news do not differ based on the age of librarians. Therefore, while rejecting the hypothesis, it can be concluded that increasing or decreasing age is not related to media literacy, the amount of use of cyberspace, and the acceptance of media news by librarians. The findings of the present study regarding the lack of relationship between age and media literacy are consistent with the results of the study by Salemi et al. (1400). However, this study found that age has no relationship with media literacy, the amount of use of cyberspace, and the acceptance of media news. Perhaps the most important possible reason for this is the close age gap between librarians, which does not expect much change in media literacy, the amount of use of cyberspace, and the acceptance of media news.
The results of the one-way analysis of variance of the second sub-hypothesis showed that the amount of use of cyberspace does not differ based on the field of study (librarianship and non-librarianship) of librarians, but there is a significant difference between the two groups based on media literacy and acceptance of media news. Based on the results, media literacy among librarians in the library field is higher than in other fields, and acceptance of media news among librarians in the library field is lower than in other fields, which is somewhat inconsistent with the results of the study by Esmaili et al. (2019) based on the relationship between the field of study and the variable of information literacy. However, no consistency or inconsistency was found in the variable of acceptance of media news.
The results of the one-way analysis of variance of the third sub-hypothesis showed that media literacy does not differ based on the type of social media used by librarians, but there is a significant difference based on the amount of use of cyberspace and acceptance of media news. According to the results, the amount of use of cyberspace is higher among librarians who use Instagram more and lower among librarians whose media priority is Twitter and Facebook. Also, the acceptance of media news is lower among librarians who use Instagram more and higher among librarians whose media priority is WhatsApp. Based on these findings, it can be said that the Instagram platform has the highest media consumption among librarians and librarians also accept WhatsApp media news more than other media. Although there is no similar finding in this regard, it can be said that many Iranian users have turned to Instagram after the restrictions imposed on Telegram, and this platform has seen increasing growth among Iranian users after Telegram was filtered. According to published reports, about 49 percent of Iranians are members of Instagram, and it is one of the most popular platforms for businesses; as 90 percent of Instagram users follow at least one business page. The report also believes that 60 percent of Instagram users have announced that they have become familiar with new products on this network. Instagram also plays a role in the world. The results of this hypothesis are completely consistent with the results of Anthony's (2009) research.
Mahdieh Mirzabeigi, Reihaneh Bahri,
Volume 12, Issue 1 (5-2025)
Abstract
Introduction
Given the important impact of information literacy in today's societies and in line with the efficiency of individuals, especially students, information literacy can be predicted and planned for its management through indicators. Therefore, the present study aims to examine the relationships between the variables of cognitive flexibility and openness to experience with the level of information literacy by examining students of Shiraz University, a university that enjoys a distinguished scientific position in the country and the results of this study may contribute to its scientific growth through further understanding of the factors affecting the information literacy of its students, and to test the extent of the impact of the two variables in predicting the level of information literacy of the said society, if a relationship exists.
Methods and Materoal
This research is descriptive in terms of data collection and quantitative in terms of data nature. The statistical population also includes students of Shiraz University in the academic year 1400-1401, about 17,000 people, and the sample size was calculated as 375 people using the Cochran formula. The members of the research sample were selected using convenience sampling. Data collection was carried out through a questionnaire. To measure the level of information literacy, the research questionnaires of Seng et al. (2020), Pinto et al. (2020), and Lee et al. (2020) were used, based on the classification of the Information Literacy Framework for Higher Education (2016). To measure face and content validity, the questionnaire was sent to seven information science and knowledge experts, and the final version was obtained based on their opinions. The reliability of the research tool was obtained using Cronbach's alpha coefficient of 0.937. To measure cognitive flexibility, the cognitive flexibility questionnaire developed by Dennis & Vander Wal (2010) was used, whose validity was measured by these researchers, and its convergent validity with the cognitive flexibility scale of Martin and Robin (1995) was 0.75. The reliability of this questionnaire was also obtained using Cronbach's alpha, which was 0.787. To measure openness to experience, the Big Five Personality Factors questionnaire by Goldberg (1999) was used, whose validity was proven in the Khormai study (2006) using factor analysis. The reliability of this questionnaire was obtained using Cronbach's alpha, which was 0.788. Pearson correlation tests, linear regression, and stepwise regression were also used to analyze the data.
Resultss and Discussion
in order to examine the power of each variable in predicting the level of information literacy, the correlation between the variables was first calculated through the Pearson correlation test, and the results showed that cognitive flexibility, openness to experience, and information literacy have a positive and significant relationship with each other.
Then, a simple linear regression test was used to examine the role of cognitive flexibility in predicting the level of information literacy of the subjects, and the cognitive flexibility variable was entered as a predictor variable and information literacy as a criterion variable in the regression equation. The findings showed that the regression model of the predictive power of the cognitive flexibility variable on information literacy (F(1/278)=(43/682 p=0/000) with a coefficient of determination R2=/136 is significant. For each unit increase in cognitive flexibility, the information literacy score increases by 58/567 units. In other words, according to the calculated standard regression coefficient, cognitive flexibility explains 36/8 percent of the variance in information literacy (Table 2). Then, a simple linear regression test was used to examine the role of openness to experience in predicting the level of information literacy of the subjects, and the openness to experience variable as a predictor variable and information literacy as a criterion variable was entered into the regression equation and the findings showed that the regression model of the predictive power of the variable of openness to experience on information literacy is significant F(1/ 298) = (97/167 p = 0/000) with a coefficient of determination R2 = /246. For each unit increase in openness to experience, the information literacy score increases by 112/313 units. In other words, according to the calculated standard regression coefficient, openness to experience explains 49/6 percent of the variance in information literacy (Table 3). Finally, the stepwise regression test was used to predict the level of information literacy of users based on the variables of cognitive flexibility and openness to experience. The results of the stepwise regression test showed that among the predictor variables in the first step, the component of openness to experience was able to be the strongest The variable was significantly able to predict the level of information literacy of the subjects (p= /000). This variable alone was able to explain about 50/9 percent of the variance in the level of information literacy. In the second step, the variable of openness to experience explained about 43/1 percent of the variance in the level of information literacy, and cognitive flexibility was able to enter the model and explained 19/5 percent of the variance in the level of information literacy (p= /000). Accordingly, in total, the two variables of openness to experience and cognitive flexibility were able to explain 62/6 percent of the variance in information literacy (Table 4).
Conclusion
The results of this study can be an effort to improve the existing knowledge about information literacy and identify more factors that influence it. Also, the results of this study can help universities, with the help of information literacy experts, design curricula and training workshops to strengthen these components and improve the level of information literacy and to develop students who have higher information literacy and are prepared for future life and careers. Students, also aware of the important role of openness to experience and cognitive flexibility, can overcome the potential problems associated with their lack of information literacy by improving their level of openness to experience and cognitive flexibility by participating in workshops related to these components and also by increasing their information literacy skills by participating in workshops and information literacy training courses.
Soheila Shirezhian, Seyed Mehdi Mirmehdi,
Volume 12, Issue 1 (5-2025)
Abstract
Introduction
In recent years, advancements in technology, particularly in artificial intelligence, have significantly transformed how customers interact with businesses. One of the most prominent manifestations of this transformation is the emergence of chatbots as intelligent digital agents in marketing and customer service. Chatbots are AI-powered programs capable of responding to user inquiries through text or voice interactions, playing a crucial role in enhancing the efficiency of customer-organization communication. These tools enable companies to provide 24/7 services, reduce response times, increase customer loyalty, and save human resources. Unlike human agents, chatbots are unaffected by factors such as fatigue or holidays, ensuring constant availability. However, traditional customer service channels like email, websites, or phone calls remain popular among some customers.
In the retail sector, chatbots facilitate effective customer-brand interactions by offering convenience, flexibility, and easy access. They streamline the online shopping process by providing quick responses and guiding users, creating a seamless and satisfying experience while addressing the impersonal nature of e-commerce. Recent advancements in natural language processing have enabled chatbots to perform complex tasks, such as analyzing customer preferences and delivering personalized responses. These capabilities, combined with the widespread use of messaging platforms, have driven the growth of the chatbot industry. Nevertheless, concerns like data security and privacy pose significant barriers to widespread adoption, requiring careful consideration from system designers. This study, grounded in the Technology Acceptance Model, examines factors such as trust, personal innovativeness, ease of use, social influence, and hedonic motivation to understand the reasons behind users’ acceptance or rejection of chatbots.
Methods and Materoal
This study adopts a quantitative approach with an applied objective, utilizing a descriptive-survey design. The target population consists of Iranian users with experience using AI-based chatbots in online customer service platforms, such as websites, apps, or messaging services. Inclusion criteria required participants to have used at least one service-oriented chatbot and to be familiar with digital tools. Exclusion criteria included incomplete questionnaires, lack of actual chatbot experience, or use of chatbots for non-customer-service purposes (e.g., entertainment or language learning). To enhance accuracy and minimize bias, the influence of the chatbot’s application domain (e.g., retail, banking, education, or healthcare) was analyzed using variance analysis and control of contextual variables.
Data were collected through three primary methods: documentary studies, electronic resources, and field research. The data collection tool was a questionnaire based on a 5-point Likert scale (ranging from “strongly disagree” to “strongly agree”), measuring variables such as trust, hedonic motivation, social influence, personal innovativeness, perceived usefulness, ease of use, attitude, and intention to use. The questionnaire was designed based on standardized scales from prior research, and its content validity was confirmed by experts.
Resultss and Discussion
The findings indicate that trust, personal innovativeness, and ease of use significantly influence the perceived usefulness of chatbots. Trust enhances perceived usefulness by providing accurate and prompt responses. Personal innovativeness strengthens this perception by aligning chatbots with users’ needs, while ease of use, by simplifying interactions, positively affects both perceived usefulness and users’ attitudes. Both perceived usefulness and positive attitudes directly increase the intention to use chatbots. However, social influence and hedonic motivation did not show a significant impact on perceived usefulness, possibly due to customers’ preference for traditional channels or the functional focus of chatbots over entertainment.
Conclusion
This study reveals that trust, personal innovativeness, and ease of use are critical drivers of chatbot adoption. Trust, fostered through reliable and swift responses, enhances the perception of chatbots’ usefulness. Personal innovativeness aligns chatbot functionalities with users’ creative needs, further boosting this perception. Ease of use simplifies interactions, fostering positive attitudes and increasing the intention to use chatbots. The lack of significant impact from social influence may stem from customers’ preference for traditional channels like email or phone calls. Similarly, hedonic motivation’s limited effect could be attributed to the service-oriented nature of chatbots, which prioritizes efficiency over enjoyment.
Chatbots, by automating routine tasks, offering predictive analytics, and enhancing customer experiences, serve as innovative tools in digital services. However, challenges such as data security and privacy concerns remain barriers to broader adoption. Designing user-friendly and trustworthy chatbots can enhance their acceptance and improve the digital customer experience. This study recommends further research on non-users and environmental factors that may hinder the impact of social influence and hedonic motivation to better understand adoption barriers.
Ali Saatchi, Hadiseh Ghnbari, Anis Miri,
Volume 12, Issue 1 (5-2025)
Abstract
Introduction
The quantitative and qualitative increase in digital libraries is a phenomenon that has emerged in response to the growing need of society to access information. Therefore, digital libraries are facing a major challenge of copyright. This issue can prevent them from providing effective and needed services to the user community.
Methods and Materoal
The present study, while examining the factors affecting copyright in digital libraries, has presented a model in the field of copyright in digital libraries.The present study was qualitative in terms of its applied purpose and type of data collection and was conducted using the meta-synthesis method. Also, the data and information collection tool was scientific research articles published in reputable Persian and English journals in the last 12 years. From 342 articles extracted during the meta-synthesis stages, 58 articles were selected using the Persian keywords "copyright", "intellectual property", "digital libraries" and the English keywords "Copyright, intellectual property, digital libraries" in the databases Normags, Magiran, SID, Science Direct, Emerald, Springer EBSCO, SEVIER, Wiley. Due to the qualitative nature of the data (text), open coding was used to analyze the data. In this coding method, codes are extracted from the text of the article (first-order coding), and then these extracted codes are recoded to form concepts (second-order coding), and finally, concepts are recoded to form categories (text-code-concept-category). In this study, first a code was considered for all the factors extracted from previous studies and then, considering the meaning of each code, they were categorized into a similar concept. Two coders were used to control the extracted codes and categories, and the index in question in this field is the "Kappa" index.
Resultss and Discussion
: Based on the proposed research model, policy-making, the nature of content, the development of technologies, support for users, support for creators, content producers, culture-building, and the nature of use are the most important factors influencing the application of copyright laws to make information accessible to users of digital libraries. Policymaking: In general, policymakers, governments, and national officials play a key role in the policymaking and enforcement of copyright regulations. Copyright laws are usually developed by high-level national authorities and legislators, and digital library managers and operators do not have much involvement in the development of laws, and this can be one of the challenges of legislating copyright in digital libraries. Nature of content: Unlike traditional libraries, digital libraries use different sources to provide information services. These sources do not have the same content and range from software programs to traditional books. Type of use: In terms of type of use, the purpose of the user, the type of library, the status of digitization, and electronic lending are effective components. The provisions of the laws indicate that digital libraries are only able to provide digitized works in the form of digital lending. Protection of authors' rights: Digital libraries can create the possibility of reproducing copyrighted works for themselves by developing legal contracts with publishers and authors. In this case, creating clear legal procedures helps to protect the rights of authors. Protecting the rights of users: The main goal of copyright law is to protect the material and moral rights of creators and to ensure that society has access to the information it needs. With the advancement of information technology, legal challenges in the field of copyright are inevitable, and overcoming copyright infringements through file sharing requires finding preventive solutions and using technology, such as metadata standards, to create a balance between the rights of copyright holders and the use of scientific innovations. Content producers: Digital libraries use the method of digitization (Reproduction) to temporarily reproduce first-class works and make them available to users through electronic lending. It is necessary to pay attention to the credibility of the systems and databases and the laws of the countries providing this content in digital libraries. Culture building: In this dimension, three components have been identified: public awareness, transparency of laws, awareness of managers, and determination of civil responsibilities. Transparency of laws is related to cases where copyright laws have been ambiguously worded and have caused misunderstandings by users and managers of digital libraries. Friedman test was used to rank the factors. The test results showed that in this test, the highest mean value is 12.84, thus the factor "Development of technologies" has the highest degree of importance and the first rank. Also, the factors "Nature of use" and "Support for creators" are ranked as the second and third most important. On the other hand, the factors "Nature of content", "Content producers" and "Support for users" have the lowest degree of importance, respectively.
Conclusion
This research shows that copyright laws in digital libraries are very different from traditional libraries. According to the research results, digital libraries need to take a deeper look at copyright laws in order to provide services to their users, with the aim of respecting the rights of producers and users of information resources.
Rahman Marefat, Mahmood Sangari,
Volume 12, Issue 1 (5-2025)
Abstract
Background and purpose: The present study was conducted with the aim of identifying methods of validating methods of resources among sports science students of Birjand University. In numerous classes involving students from various disciplines, a recurring challenge reported by students was their unfamiliarity with source validation methods. Students, consistently indicated a lack of knowledge on how to assess the credibility of sources. When provided with examples of valid and invalid sources, many students struggled to properly evaluate them. Some students even expressed the belief that source validation was unnecessary, emphasizing merely the importance of using sources rather than verifying their validity. The researchers focused on a specific group—sports science students at Birjand University—to investigate how these students evaluate the sources they need and what challenges they encounter in the process.
Studies suggest that students often lack the skills to assess the credibility of articles found in databases or general websites like Wikipedia and online encyclopedias (Marefat, 1401; Azarang, 1399). For printed sources, students typically consider the author's credibility, organizational affiliation, and the publisher’s reputation as indicators of source reliability (Moradi, 1384). Marefat identified ten main categories related to evaluating sources, including institutional credibility, author credibility, content accuracy, observational reliability, referential validation, publication date, information distortion, credibility doubts, recognition of source credibility, and citation rate, particularly from psychology students’ perspectives (Marefat, 1396).
Research by Keshavarz, Vasfi, and Sha'bani (1393) examined the credibility of internet health information and how personality traits like conscientiousness influence evaluation methods among health-medical professionals. They found that many struggle to assess quality, relying mainly on impartiality, timeliness, and author credibility. Similarly, Roozbahani and Riahi-nia (1395) highlighted that faculty members prioritize content accuracy, data reliability, logical consistency, and relevance in determining source credibility. Kader’s study (Kader, 2013) on nurses identified a six-stage process for evaluating online health information, depending on skills, time, and website quality. Liu and Huang’s research (2005) among Chinese students revealed that current students often base their judgments on author name, affiliation, and website reputation, whereas graduates focus more on the information’s accuracy and quality.
Despite many evaluation efforts, challenges remain: first, understanding how users process unobservable information is difficult; second, differing information needs lead to varied processing approaches; and third, establishing a universal criterion for correct information processing is often impossible outside controlled environments. These issues highlight the complexity of assessing information credibility and the ongoing need for effective evaluation strategies (Liu, 2000).The main questions of the present study are:
1. What are the challenges faced by sports science students at Birjand University in evaluating their required resources?
2. How do sports science students at Birjand University evaluate their required resources?
Method:The statistical population of the present study consisted of 67 sports science students at Birjand University at the time of the research. Given the effort to collect maximum data, all 67 individuals were considered part of the research population, and no sampling was performed. Semi-structured interviews were used for data collection. In total, twenty master's students in sports science were interviewed. The interview process continued until saturation was reached, after interviewing sixteen students. From the sixteenth to the twentieth interview, the data obtained were repetitive, and based on this, the researchers decided to stop data collection. The initial codes were placed under sub-categories and main categories. In the present study, member checking was used to determine the research's credibility. In the present study, the constructivist approach in grounded theory, as proposed by Charmaz (2014), was adopted as the basis for the work, therefore, there is no need to present a paradigmatic model. Data analysis was also performed using MAXQDA 2020 software.
Findings: Among the 67 members of the research population, a total of 20 sports science students from Birjand University were interviewed. A totoal of 50% of the interviewees were women (10 people), and 10 (50%) were men. Categorizes and presents the concepts and codes extracted from the interviews related to the research questions. In the axial coding of the data, a total of 6 main challenges related to the validation methods of resources of sports students present in the interviews were found, such as lack of familiarity with investigating research violations, lack of familiarity with plagiarism, lack of familiarity with plagiarism software, etc. Also, 15 core codes related to the second research question, how to accredit sports students, were obtained.
Conclusion: Interviews with the research population revealed that students in the research population face certain challenges in validating sources. They highlighted "unfamiliarity with examining research misconduct, unfamiliarity with plagiarism, unfamiliarity with plagiarism software, unfamiliarity with citation styles and citation management software, disregard for the author's academic rank, and unfamiliarity with the credibility of open-access articles" in their conversations with researchers.
These points were derived from the overall final concepts identified during the interviews, which included "unfamiliarity with how to examine research misconduct, unfamiliarity with examining research misconduct, unfamiliarity with examining plagiarism, unfamiliarity with plagiarism software, unfamiliarity with citation styles, unfamiliarity with EndNote, disregard for the author's academic rank, and unfamiliarity with the credibility of open-access articles." The findings of the present study emphasize the need for serious attention from all students, including sports science students and other students, to the issue of information credibility and quality, and the necessity of sufficient and continuous training and skills in this area. Skill training in determining the quality and credibility of sources, based on specific and strong criteria, in the form of training courses, workshops, laboratories, projects, and research, are among the immediate actions in this field.
Especially, It is suggested that to better understand the problems and provide better solutions, other qualitative and mixed methods such as foresight and videography with highly standardized checklists be conducted in more extensive and broader research to achieve more generalizable and broader results. It seems that training in source validation methods is needed for the sports science students participating in the research, and their training can reduce the challenges of source validation among students and improve their source validation methods. It is suggested that the data from this research be measured as a quantitative study among students of Birjand University and other various universities across the country.
Yaghoub Norouzi, , ,
Volume 12, Issue 2 (9-2025)
Abstract
Introduction
In the digital publishing environment, the websites of international scientific publishers function as critical interfaces between content providers—such as researchers, academics, and students—and their intended audiences. The effectiveness of these platforms is closely linked to the quality of their user interface (UI), which directly affects usability, accessibility, and the overall user experience. Within the framework of the Business-to-Consumer (B2C) model, particularly in subscription-based and digitally delivered content, UI design plays a pivotal role in facilitating efficient content discovery, streamlining access, and enabling personalized services. Employing the B2C model as an analytical lens allows for a systematic evaluation of the design elements that influence user engagement, retention, and trust. This study evaluates the user interfaces of the top 100 international scientific publishing websites, identifies recurring design strengths and shortcomings, and provides evidence-based recommendations to enhance user experience and align design practices with innovative B2C principles.
Methods and Materoal
This study employed an applied, descriptive–analytical survey design aimed at assessing the user interface (UI) of the top 100 international scientific publishing websites, drawing upon the Innovative B2C Business Model framework. The approach integrated systematic observation and content analysis to examine functional, structural, and experiential aspects of these platforms.
The primary research instrument was a researcher-developed checklist, conceptualized in accordance with the Innovative B2C Model for e-commerce and grounded in Nielsen’s (1993) heuristic principles of usability.
The checklist construction followed a multi-step process:
1.Item Generation – An extensive literature review was conducted to identify UI and UX indicators relevant to scientific publishing and digital commerce. This included studies on usability, digital publishing business models, and user engagement frameworks.
2.Content Validation – A panel of four academic experts in information science and interface evaluation reviewed the initial checklist draft for relevance, clarity, and comprehensiveness. Their feedback led to item refinement, deletion of redundancies, and the inclusion of additional critical elements.
3.Final Structure – The validated checklist encompassed three core dimensions:
Website Visual Appeal – 9 components evaluating aesthetic quality, clarity, and visual consistency.
Content Structure Enhancement – 17 components assessing navigability, resource organization, and accessibility.
Trust and Loyalty – 26 components covering credibility signals, personalization, and retention-oriented features.
Operational definitions were provided for each component to ensure scoring consistency across evaluators.
The study population comprised 100 international publishers listed in the authoritative meta-analysis by Nishikawa-Pacher (2022), recognized for its comprehensive coverage of global scientific publishing entities. A census sampling approach was adopted, meaning all publishers in the list were included in the evaluation.
Two independent evaluators—both experienced university librarians with over a decade of professional practice and scholarly work in UI/UX evaluation—conducted systematic assessments.
Prior to full-scale data collection, a pilot test was performed on a subset of 10 randomly selected publisher websites to ensure clarity of checklist items and to standardize scoring criteria.
Each website was evaluated on both desktop and mobile versions to capture platform-specific design variations. Compliance with each checklist component was scored as follows:
Yes (2) – Fully meets the criterion.
Partial (1) – Partially meets the criterion, with noticeable limitations.
No (0) – Does not meet the criterion.
Evaluator discrepancies were resolved through consensus discussions, ensuring inter-rater reliability.
Data were coded numerically and processed using SPSS and Microsoft Excel. The analysis included:
Descriptive statistics (frequencies, percentages, means, standard deviations, and variances) to summarize compliance patterns.
One-Sample T-Test to assess whether the mean compliance scores for each dimension significantly exceeded a predefined acceptable threshold.
Friedman Test to rank dimensions according to overall compliance levels.
Duncan’s Multiple Range Test for post-hoc pairwise comparisons to detect significant differences among dimensions.
Findings were visualized using bar charts and comparative graphs, enabling clear identification of strengths, weaknesses, and priority areas for improvement in UI design based on the Innovative B2C framework.
Through this rigorous methodology, the study ensured validity, reliability, and practical applicability of results for digital publishing stakeholders aiming to optimize user interface performance and enhance user trust, engagement, and retention.
Resultss and Discussion
Based on the findings, the ease of font readability component was identified as the most prominent, with 91% of the evaluated websites meeting this criterion. Furthermore, 83% of the evaluated websites lacked non-text audio symbols, and 53% lacked non-text video symbols—making these the weakest elements within the visual attractiveness index. This deficiency in incorporating non-text symbols (audio and video) into the user interface may significantly undermine the digital business performance of international publishers.
In the context of the structure strengthening index (content), the components of having the necessary function and the possibility of returning to the first page on each page were recognized as the most important with a compliance rate of 95% and the component of active and valid links with a compliance rate of 94%, so compliance with it plays an important role in creating trust and social credibility of publishers. 69% of the statistical community did not have a sales agency or bookstore portal. The sales portal allows the collection of user purchase, interest, visit and behavior data, which is very key for marketing, content production and business decisions. Without it, the publisher is deprived of this data.
Among the trust and loyalty indicators, the contact us component and the same site design in different browsers were recognized as the most important with 98% compliance, and the ability to write a review for each book was recognized as the least important with 75% of the statistical population not doing so.
Brill, Dovepress and IOS Press with an average compliance of 1.89; Oxford University Press and Bentham with an average compliance of 1.80; De Gruyter, Medcrave and Penn University Press State with an average compliance of 1.89 were recognized as the top publishers in the three areas of visual appeal, structural reinforcement (content), and continuity (customer loyalty and trust), respectively.
A significant difference was observed between the statistical population rankings in compliance with the components of these three indicators. By confirming the first hypothesis of the study, it was concluded that the score obtained from the websites under study in the user interface evaluation is significantly lower than the maximum score, i.e. the full evaluation score. By confirming the second hypothesis of the study, it was found that the average total score obtained from the evaluations in the three areas of visual appeal, structural reinforcement (content), and continuity (customer loyalty and trust) are not the same.
Conclusion
The assessment revealed that none of the top 100 international scientific publication websites fully met the needs of disabled or handicapped audiences, which is a fundamental flaw in the accessibility index of user interface design. To address this weakness, it is recommended that the websites studied comply with WCAG (Web Content Accessibility Guidelines). Multimedia content is one of the important SEO factors. Its lack of use by the community may reduce visibility in search results. Today's users, especially the younger generations, are accustomed to multimedia content. The lack of audio and visual elements, including videos and podcasts, and the lack of diversity in the type of content presentation may cause this range of audiences to be lost. It is recommended to present book introductions, interviews with authors, or database usage guides in the form of several-minute videos. The use of simple animations, audio and video icons, and responsive designs can increase the sense of modernity and attractiveness on publishers' sites.
Dr Seifallah Andayesh, Dr Zahra Kianrad,
Volume 12, Issue 2 (9-2025)
Abstract
Introduction
This study examines the relationship between artificial intelligence (AI) utilization and organizational creativity, with knowledge sharing as a mediating variable, among librarians working in medical sciences university libraries in Tehran. AI, as a transformative technology of the Fourth Industrial Revolution, plays a growing role in enhancing organizational performance through automation, decision support, and improved information management. Literature indicates that AI positively influences creativity and that knowledge sharing reinforces this effect by facilitating exchange, collaboration, and innovative behaviors. Despite increasing global attention to AI capabilities, research in knowledge-intensive environments such as academic libraries remains limited. Addressing this gap, the present study uses a structural equation modeling approach to explore how AI adoption contributes to creativity and how knowledge sharing fully mediates this relationship within library settings.
Methods and Materoal
This applied and quantitative study examines the relationship between artificial intelligence and organizational creativity, considering the mediating role of knowledge sharing among librarians in medical sciences universities in Tehran. Using a census sampling approach, data were collected from 214 librarians between October and December 2024. Validated instruments were employed to assess AI utilization, organizational creativity, and knowledge sharing. Reliability and validity were confirmed through Cronbach’s alpha and convergent/discriminant validity analyses. Structural equation modeling (SEM) using SmartPLS was applied to test the conceptual model and hypotheses, enabling simultaneous evaluation of latent variables, path coefficients, and model fit indices.
Resultss and Discussion
Based on the statistical evidence, the Z-value exceeded the threshold of 1.96, confirming with 95% confidence that knowledge sharing plays a significant mediating role between artificial intelligence (AI) and organizational creativity (P ≤ 0.05). The Variance Accounted For (VAF) index, used to assess the strength of the mediation effect, was calculated as 0.894, indicating full mediation. Structural Equation Modeling (SEM) results further demonstrated that AI has a positive and significant effect on organizational creativity (β = 0.501, t = 11.909, P ≤ 0.05), meaning that a one-unit increase in AI utilization results in an average increase of 0.501 standard deviations in creativity. Additionally, AI positively influences knowledge sharing (β = 0.537, t = 9.672, P ≤ 0.05), implying that higher AI adoption leads to improved knowledge sharing. Finally, knowledge sharing itself positively and significantly impacts organizational creativity (β = 0.618, t = 9.853, P ≤ 0.05), suggesting that a one-unit increase in knowledge sharing contributes to a 0.618 standard deviation growth in creativity.
Conclusion
The study highlights the strategic role of artificial intelligence (AI) in enhancing organizational creativity through the mediating effect of knowledge sharing among librarians in medical sciences university libraries. The findings indicate that AI capabilities positively influence both knowledge sharing and organizational creativity, reinforcing previous research and demonstrating that AI functions not only as a technological tool but also as a cognitive and cultural infrastructure that strengthens communication, decision-making, and innovation. Knowledge sharing also significantly promotes creativity by fostering the exchange of experiences, ideas, and expertise, thereby enabling collaborative problem-solving and the generation of novel solutions. Despite its contributions, the research is limited by its focus on a specific population, the use of self-reported data, and its cross-sectional design. The study recommends investing in AI infrastructure, cultivating a strong knowledge-sharing culture, and implementing supportive managerial practices to promote innovation, enhance learning, and achieve sustainable organizational competitiveness.
Faezeh Sadat Bahrololoumi Tabatabai, Nosrat Riahinia, Davoud Haseli, Fatemeh Pazooki,
Volume 12, Issue 2 (9-2025)
Abstract
Purpose: The aim of this study was to identify health information services for older adults provided in public libraries through a systematic literature review.
Methods: This research employed a systematic review approach based on the framework proposed by Kitchenham and Charters (2007). Relevant documents were retrieved from three citation databases—PubMed, Scopus, and Web of Science—covering the period from 2010 to 2024. Appropriate keywords were used, and references and citations of the retrieved documents were examined to ensure maximum coverage. Inclusion criteria comprised research studies addressing health information services for older adults within the context of public libraries. Ultimately, 54 English-language documents were selected and analyzed. Data were qualitatively coded and categorized.
Findings: The results revealed that health information services for older adults in public libraries can be classified into three major categories: 1) Health information functions, including individual health information services, public health information services, and digital resources; 2) Health education and informational empowerment functions, encompassing digital and health literacy training, library-based learning and skill development, and support for lifelong learning and empowerment; and 3) Social and cultural support functions, including cultural and social participation services, strengthening communication and reducing isolation, and ensuring physical and service accessibility.
Conclusion: The public libraries can play a significant role in improving the health and quality of life of older adults by providing accessible and reliable resources, promoting health and digital literacy, fostering social support, and facilitating referrals to health services. Achieving this role requires adequate library infrastructure, enhanced professional skills among librarians, and collaboration with health institutions. Overall, this study offers an evidence-based framework for developing health education services in public libraries and highlights their role in addressing the needs of aging communities.
Mis Shahla Bouazzar, Dr Alireza Ghorbani, Dr Nazmohammad Ounagh,
Volume 12, Issue 2 (9-2025)
Abstract
Introduction
In the 21st century, digital media has evolved into a fundamental and constitutive element of modern social existence, permeating all spheres of human activity, including social relations, political discourse, economic transactions, educational processes, and cultural consumption (Moradi, 2015). The current cohort of digital natives, having been socialized within hyper-connected media ecologies since birth, demonstrates a pronounced dependence on digital platforms for the acquisition of cultural schemas, value systems, and normative behavioral patterns (Wang, 2017). Empirical evidence indicates that social networking platforms have achieved near-universal penetration across demographic groups, fundamentally restructuring patterns of human interaction and information consumption (Bennett, 2015).
This paradigmatic shift in communicative practices has precipitated significant transformations in social behavior, manifesting in both constructive and problematic outcomes. The present investigation employs Bourdieu's capital theory to examine the tripartite relationship between virtual social network engagement, cultural capital accumulation, and social capital formation among adolescent populations in Ahvaz, Iran. The study addresses the primary research question: To what extent does a statistically significant correlation exist between virtual social network usage patterns, cultural capital assets, and social capital reserves among secondary education students in this regional context?
Methods and Materials
This study employs a quantitative, descriptive research design utilizing a cross-sectional survey approach. As an applied research project, it aims to generate practical insights for educational policy and the development of digital literacy. The target population consists of all high school students (N = 42,507) enrolled in Ahvaz public schools during the 2022-2023 academic year, as documented by the Ahvaz Education Department. A representative sample of 320 participants was determined using Morgan's sampling table, with proportional sampling techniques employed to ensure demographic representation.
Measurement Instruments: Three standardized instruments were administered: the Social Capital Assessment Scale (Jafari, 2021). 18-item Likert-type scale (1-5 range). Measures five dimensions. Cultural Capital Inventory (Sharepour et al., 2019). 18-item Likert-scale measure.Digital Network Engagement Index (Lee, 2005). 21-item psychometric tool.
Results and Discussion
The first hypothesis of the study showed that there is a significant relationship between the use of virtual social networks and cultural capital with social capital in high school students in Ahvaz. The results are consistent with the findings of Soleimani et al. (2012), Adlipour et al. (2015), Tavasli and Amoli-Kalarijani (2012), Rekuro et al. (2019), Ansari et al. (2016), McEwan et al. (2015), and Arampatzi et al. (2018), confirming the effect of using virtual social networks on social capital. It is also consistent with the findings of the study by Kalkohi-Moghaddam et al. (2012), Kohi et al. (2015), and McEwan et al. (2015), confirming the role of virtual social networks in the cultural capital of individuals.
The second hypothesis of the study showed that there is a significant relationship between the use of virtual social networks and cultural capital in high school students in Ahvaz. This finding is consistent with the results of the study by Kalkohi Moghadam et al. (1401), which confirmed the relationship between network relationships and lifestyle and cultural capital in Iran. It is also consistent with the findings of the study by Kohi et al. (1400) confirming the role of cyberspace in individuals' cultural capital. The results of this study also confirm and are consistent with the findings of McEwan et al. (2015), who found that social and virtual media have a significant impact on the transfer of cultural capital.Examining the third hypothesis of the study showed that there is a significant relationship between the use of virtual social networks and social capital in high school students in Ahvaz. This finding is consistent with the results of the study by Soleimani et al. (1401), which confirms the effect of social networks on social capital. It is also consistent with the findings of Adlipour et al. (2015), and Tavasli and Amoli-Klarijani (2012), who showed that the quality and quantity of using virtual space had a significant effect on social capital. This result confirms and is consistent with the findings of McEwan et al. (2015), Rekuro et al. (2019), and Arampatzi et al. (2018), who found that virtual networks have a significant effect on the transfer of social capital.The fourth hypothesis of the study showed that the use of virtual social networks and cultural capital can predict the amount of social capital in high school students in Ahvaz. The results are consistent with the findings of Kalkohi-Moghaddam et al. (1401), Kohi et al. (1400), McEwan et al. (2015) confirming the role of virtual social networks in the cultural capital of individuals, as well as the findings of the studies of Soleimani et al. (1401), Adlipour et al. (2015), Tavassoli and Amoli-Kalarijani (2012), Rekuro et al. (2019), Ansari et al. (2016), McEwan et al. (2015), and Arampatzi et al. (2018) confirming the effect of using virtual social networks on social capital. In explaining the results of this study, it can be stated that virtual social networks can provide a basis for learning many behaviors by providing informal educational experiences. On the other hand, these social networks themselves are effective in changing subcultures and dominating dominant cultures, and their manifestation can be observed in the behaviors of individuals imitating famous people. Cultural capital also increases people's understanding of life and increases their level of activism in various activities, making them superior and prominent. In addition, when a person is active in virtual networks, they have more connections and cooperation between this person and other people who are members of virtual networks and their participation in virtual programs and campaigns leads to the expansion of mutual support relationships, and along with the association with the values and norms belonging to these groups, it leads to further strengthening of social capital. Also, the longer a person is a member of social networks, the more relationships, familiarity, and mutual acceptance between him and the people he is in contact with are strengthened, and this in itself can lead to strengthening of social capital among people with a long history of membership in social networks. Thus, the conclusion of the present study regarding the significance of the relationship between the use of virtual social networks and cultural capital with social capital seems logical.
Conclusion
Virtual social networks can serve as effective tools for enhancing students' social capital through the reinforcement of their cultural capital. It is recommended that these networks be targeted for application within educational environments.
Mohammad Hossein Marzban, Rahman Sharifzadeh, ,
Volume 12, Issue 2 (9-2025)
Abstract
Introduction
This study tries to find out the human and non-human things that affect how information security culture is formed. It uses the Actor-Network Theory (ANT) to look at this. Today, information is very important for businesses, and there are more cyber threats than ever. Because of this, organizations are spending a lot on security tools. But more than 90% of big security problems come from human errors. This shows that having a strong information security culture is very important, and it works well with technical tools.
Most of the traditional ways of looking at information security culture, like the ones from Schein and Hofstede, focus mainly on people and don't consider non-human factors like technology, rules, or systems. This is a gap in the theory, so using a more complete framework like ANT helps understand how all these factors work together.
ANT looks at how humans and non-humans, such as technology, policies, and infrastructure, are treated equally in networks. It also looks at how ideas and actions change as they move through these networks. This helps understand how information security culture develops over time. The main questions this study looks at are:
What are the important human factors that help create information security culture?
What are the important non-human factors?
What role do hybrid actors—those that mix humans and technology—play in building security culture?
This research is new in theory, method, and practice. It gives a more full picture of how information security culture works by bringing together different kinds of factors.
Methods and Materoal
This study used a qualitative method based on the interpretivist viewpoint. In this approach, there isn’t one true reality—instead, reality is shaped by people’s experiences and how they see things, and it changes depending on the situation. The researcher isn’t just watching from the side; they help build understanding together with the people involved.
The research focused on the Central Bank of the Islamic Republic of Iran because it was seen as the best place to study information security culture. This is because this organisation plays a key role in setting cybersecurity rules for the banking system, faces many complex security threats, and handles highly sensitive financial information. Within this organization, the ongoing balance between strong security policies and the need for new technology created a good setting to look at how people and technology work together.
Data for this study was gathered using semi-structured interviews with 25 managers, experts, and important users. These people were chosen through purposive and snowball sampling until no new ideas were coming up. They were picked because they had at least five years of work experience and were directly involved with security matters in big projects within the organization. The interview questions were based on five main topics, looking through the idea of actor-network theory. These topics covered roles, how people interact with technology, things that influence the culture, current problems, and how policies and technology affect how employees behave.
To make the data more complete and credible, we also observed employees' actual behavior on the job and studied documents like security policies, internal reports, and guidelines. Using multiple sources of data in this way helped compare information and cut down on possible biases. The data was analyzed in six steps using the Brown and Clarke content analysis method and the MAXQDA version 2024 software. To make sure the results were accurate and reliable, we also used the participant review technique. The study followed ethical guidelines, including getting informed consent and keeping participants' information private.
Results and Discussion
This study shows that information security culture comes from the ongoing interaction between people and other factors. Among the people involved, three main groups were found: senior managers, who make important decisions, set standards, and allocate resources; regular employees, who carry out daily tasks and are the first line of defense in security, and whose responsibility and quick reporting affect how well security policies work; and technical teams, who help turn policies into action, handle security problems, and provide ongoing training to users.
Among the human challenges, there were several key issues like the mismatch between security rules and how work is done, high work pressure, people not wanting to change their habits, and the balance between user comfort and system security. Also, psychological factors such as the need for trust, being open and honest, and having a personal drive to do the right thing were important in building a security culture. These learning and culture-building efforts were supported by ongoing training, encouraging people to report problems without fear of being punished, and sharing responsibility as a team.
In the section about non-human actors, five main groups were found: policies and standards like ISO 27001 that set rules and guidelines; security tools such as SIEM, DLP, and multi-factor authentication that help watch over systems and influence how people behave; technical systems like networks and hardware; written guides and rules that explain how humans and technology work together; and organizational steps like reporting and feedback processes.
A major part of this study found that there are hybrid actors that exist between humans and non-human elements. These actors include things like multi-factor authentication systems that slowly become part of how people work; policies that use technology to control actions, like automatic limits on copying data; and processes within organizations that help learn about security, such as using attack simulation tools. These hybrid actors show that the line between people and technology in information security culture is not fixed. To improve security culture, it's important to focus on both human and technological aspects at the same time.
When we compare these findings to traditional models, we see that traditional models are mostly focused on humans and see technology as just a tool. However, the actor-network approach treats both humans and non-humans as equal parts of a network. This gives a more connected and changing view of information security culture. In this view, culture isn't something fixed—it comes from the ongoing interactions and discussions between all the different actors involved.
Conclusion
This study finds that information security culture is formed by the dynamic interaction of human and non-human actors.
Key Human Actors:
- Senior Managers: Make decisions and allocate resources.
- Employees: The first line of defense; their responsibility and reporting are crucial.
- Technical Teams: Implement policies and provide training.
Key Non-Human Actors:
- Policies and standards (e.g., ISO 27001).
- Security tools (e.g., SIEM, DLP, multi-factor authentication).
- Technical infrastructure and written guides.
Crucial Finding: Hybrid Actors
The study highlights "hybrid actors" that blur the line between people and technology, such as:
- Multi-factor authentication becoming a routine part of work.
- Automated policies that enforce rules.
- Attack simulation tools used for training.
So, unlike traditional human-focused models, this study uses an actor-network approach, treating humans and non-humans as equal partners. In this view, security culture is not fixed but is constantly created through the interactions between all these actors. Therefore, improving it requires addressing both human and technological aspects simultaneously.
Zahra Azimi, Marjan Kian, Yousef Mahdavinesab, Magid Aliasgari,
Volume 12, Issue 2 (9-2025)
Abstract
Introduction
In the digital age, Information and Communication Technology (ICT) has evolved from a supplementary tool to a fundamental element reshaping educational systems worldwide. The COVID-19 pandemic accelerated this transformation, making virtual education not just an alternative but a necessity (UNESCO, 2020). However, rather than reducing educational inequalities, this technological shift often exacerbated them — particularly in elementary education, where children’s cognitive, emotional, and social foundations are formed. The concept of the “digital divide” has thus emerged as one of the most critical challenges in contemporary curriculum design — a multidimensional phenomenon encompassing not only physical access to technology but also digital skills, cultural attitudes, and policy infrastructures (van Dijk, 2020; Helsper, 2021). This study aims to comprehensively analyze the digital divide in the elementary school curriculum of Isfahan Province, Iran, focusing on identifying its root causes, educational and social consequences, and proposing practical, evidence-based solutions.
Methods and Materoal
This research employed a mixed-methods (qualitative-quantitative) approach with a descriptive-survey design. In the qualitative phase, semi-structured interviews were conducted with nine educational experts (university professors, school principals, teachers, and ICT specialists), and data were analyzed using thematic analysis. In the quantitative phase, the statistical population included 220 individuals teachers, students, and manager from second-grade elementary schools across advantaged, semi-advantaged, and disadvantaged areas of Isfahan Province. A sample of 140 participants was selected via stratified random sampling. Data were collected using a researcher-developed 58-item questionnaire, whose content and face validity were confirmed by experts, and reliability was verified using Cronbach’s alpha (α > 0.79 for all constructs). Quantitative data were analyzed using SPSS v.26 and SmartPLS v.3, employing Structural Equation Modeling (SEM). Model fit and construct validity were assessed using indices such as SRMR, NFI, GOF, AVE, and composite reliability.
Resultss and Discussion
Qualitative analysis identified six axial codes for causes (27 sub-codes), five for consequences (16 sub-codes), and five for solutions (15 sub-codes). Quantitative SEM results revealed that individual factors — particularly “lack of awareness and knowledge” (factor loading = 0.942) and “resistance to digital systems” — were the strongest predictors of the digital divide (path coefficient = 0.889), indicating that attitudinal and skill-based barriers outweigh technological shortages. Economic factors (path coefficient = 0.928, R² = 0.861) and cultural factors (path coefficient = 0.872) followed closely, highlighting the role of household income, school budgets, and traditional mindsets. Key consequences included reduced educational quality (path coefficient = 0.813) and educational inequality (path coefficient = 0.881), directly undermining the core mission of equitable, high-quality learning. Other significant impacts were diminished critical thinking and creativity, and weakened social interactions and collaboration. Among solutions, promoting educational equity and reducing disparities (R² = 0.884) emerged as the most critical, reflecting stakeholders’ deep awareness that resource distribution must precede technological interventions. Other key strategies included enhancing digital skills for teachers and students, promoting a culture of responsible technology use, improving access to devices and internet, and upgrading school technological infrastructures. All 58 identified components were statistically significant at the 95% confidence level (P-Value = 0.000, T-Value > 1.96), and model fit indices (GOF=0.68, SRMR=0.071, NFI=0.924) confirmed excellent model validity and reliability.
Conclusion
The digital divide in Isfahan’s elementary curriculum is a systemic crisis rooted in structural, cultural, and economic inequalities. Without coordinated, multi-level interventions, any single-dimensional effort such as device distribution or teacher training alone is destined to fail. This study demonstrates that an effective solution requires a tripartite strategy: equity in access (needs-based resource allocation), human empowerment (teacher training and attitude transformation), and infrastructure and content enhancement (high-speed internet, localized digital content). We recommend the development and implementation of a provincial “Digital Equity in Education Strategy for Isfahan,” co-designed with stakeholders, supported by sustainable funding, continuous monitoring mechanisms, and targeted support programs for low-income families. This framework not only offers a localized solution for Isfahan but can also serve as a national model for other provinces. The findings provide policymakers and curriculum designers with a scientifically grounded, practical, and culturally responsive roadmap to bridge the digital divide, ensure educational justice, and enhance learning quality during the most formative stage of a child’s education
Mohadeseh Tahririfard, Mahdieh Mirzabeigi, Tahereh Jowkar,
Volume 12, Issue 3 (12-2025)
Abstract
Objective: Collaborative information-seeking behavior has become a hot topic among researchers, as it is essential to meet the complex and challenging information needs of people. This study aims to investigate the impact of six personality factors of the HEXACO model on the tendency of Shiraz University students towards collaborative information-seeking behavior.
Methods: The research tools included the Zares Questionnaire (2021) that its reliability was obtained from Cronbach's alpha coefficient (α=0.908) and The personality questionnaire of HEXACO di Veriza (2013) that it’s validity has been evaluated from the point of view of content, face, and criteria, and its reliability coefficient has been calculated above 0.7 for this research.
Results: The results showed that among the personality factors, the honesty-humility (H) factor (B=0.237) had the most significant positive effect on the tendency towards collaborative information-seeking behavior.
originality / value: Considering the existing research gap in the of identifying factors affecting collaborative information seeking behavior, identifying one of the important individual factors affecting this behavior can be considered an attempt to understand this scientific field. In addition, the results of this study will help all individuals, including researchers, professors, and managers, to take steps to strengthen and improve the honesty-humility dimension by recognizing and investing in it, in order to facilitate the movement towards collaborative information seeking behaviors. Also, laying the groundwork for improving the performance of collaborative information systems by considering psychological variables in the spaces governing collaborative information seeking is one of the important issues derived from this study.
Mr Mohammad Sadegh Torkaman, Dr Yaghoob Farjami, Dr Mohammad Reza Sanaei,
Volume 12, Issue 3 (12-2025)
Abstract
Objective:
Supplier selection is one of the key challenges in construction projects, where access to accurate and timely data plays a vital role in improving this process. This study seeks to explore and analyze the sources and methods employed for data collection and management in the supplier selection process within the construction industry, aiming to identify existing challenges in current practices and assess the potential of modern technologies to optimize this process.
Methodology:
This is an applied research study that employed a survey methodology. The data collection instrument was a researcher-developed questionnaire consisting of both closed-ended and open-ended questions, primarily using a five-point Likert scale. The survey was distributed to 328 contractors who were certified by the Iranian Plan and Budget Organization.
Findings:
The research findings indicated that traditional information sources such as former customer feedback (87%) and project staff interviews (83%), which rely heavily on individual judgment, continue to be the most commonly used methods for supplier evaluation. The analysis of data collection methods showed that although electronic forms (63%) are becoming more prevalent, traditional methods like telephone calls (84%) and paper-based forms (52%) still dominate. A significant portion of respondents highlighted challenges such as low data accuracy (42%), untimely information (54%), distrust in supplier-provided data (59%), insufficient access to supplier performance records (44%), public databases (85%), and modern information tools (79%).
Conclusion:
The results of this study revealed that modern information tools, despite their potential impact on decision-making, are not widely used due to limited accessibility and the lack of adequate infrastructure. However, the utilization of digital forms and the growing attention to modern information sources, such as company profiles on online platforms, indicate a promising trend toward embracing digital information resources and modern data collection methods. The findings also emphasize the necessity of establishing independent mechanisms for data validation and enhancing access to historical information about suppliers.
Reza Naserijahromi, Mehdi Mohammadi, Marzieh Abdolvahabi, Solmaz Khademi, Majid Kowsari, Sedigheh Shadi,
Volume 12, Issue 3 (12-2025)
Abstract
Objective: This research was a synthesis research approach to the concept of critical information literacy.
Methodology: This research was a qualitative method using a five-stage interpretive-critical approach. The statistical population of this research focused on primary sources close to the field of the present study. The criterion for selecting the studies under study was alignment and coherence with the purpose, title, and variables of the present study. In this regard, the search for sources was carried out according to the research question and based on the knowledge gained from reviewing the theoretical background. The keywords entered in scientific search engines and databases such as Web of Science, Google Scholar, Science Direct, Elsevier, Scopus were: synthesis research approach, media literacy, critical literacy, critical information literacy, and information news. After the collected data reached a saturation point and the need to select studies was no longer needed, the review and interpretation process began. The findings obtained from the analysis and synthesis of research reports related to critical information literacy were categorized into three main themes: "Scientometrics of Information Literacy", "Correlation of Information Literacy and Critical Thinking", and "Media Information Literacy".
Conclusion: In fact, a necessary knowledge, awareness, and skills with a standard framework of information and critical literacy can independently provide a suitable infrastructure and foundation for the interaction of information literacy and critical literacy, which will create a balance and interaction between the capacities and abilities of curiosity, creativity, and judgment in individuals.
Sara Heydarian, Mohammad Hadi Zahedi, Amir Asghari, Narges Jafari,
Volume 12, Issue 3 (12-2025)
Abstract
Mostafa Mohseni Sani, Athena Akbari Birjandi,
Volume 12, Issue 3 (12-2025)
Abstract
Background and Objective: The present study was conducted with the aim of investigating the role of new technologies in improving data governance and enhancing information security in the country's Land and Property Registration Organization. The increasing importance of data in institutional decision-making and the need to harmonize with international standards double the need to address this issue.
Research Method: This study was qualitative and conducted with a grounded theory approach. The statistical population included managers and experts of the Land and Property Registration Organization, and data were collected through semi-structured interviews with 12 people. The coding process was carried out in three stages: open, axial, and selective, and participant review and comparison with international research were used to validate the data.
Findings: Data analysis showed that the main challenges include weak technological infrastructure, fragmentation of systems, legal gaps, security concerns, and cultural resistance of employees. In contrast, opportunities such as increasing transparency, reducing document forgery, promoting public trust, and improving service efficiency were identified. The findings were consistent with international studies, including the OECD’s emphasis on the link between technology and organizational culture, and the experiences of Sweden and Georgia in using blockchain in the registration system.
Conclusion: The Iranian Document Registration Organization has taken steps such as digitization and piloting blockchain, but it still faces legal, security, and institutional shortcomings. Achieving data-driven governance and increasing security requires a combination of institutional reforms, technological investment, and promoting a data-driven culture.