You are previewing Information Seeking Behavior and Technology Adoption.
O'Reilly logo
Information Seeking Behavior and Technology Adoption

Book Description

With the increasingly complex and ubiquitous data available through modern technology, digital information is being utilized daily by academics and professionals of all disciplines and career paths. Information Seeking Behavior and Technology Adoption: Theories and Trends brings together the many theories and meta-theories that make information science relevant across different disciplines. Highlighting theories that had their base in the early days of text-based information and expanding to the digitization of the Internet, this book is an essential reference source for those involved in the education and training of the next-generation of information science professionals, as well as those who are currently working on the design and development of our current information products, systems, and services.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. List of Reviewers
    1. List of Reviewers
  6. Preface
    1. BACKGROUND AND PURPOSE OF THE BOOK
    2. REFERENCES
  7. Acknowledgment
  8. Section 1: Metatheories
    1. Chapter 1: Theory of Cognitive Constructivism
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THEORY OF COGNITIVE CONSTRUCTIVISM
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Social Constructionism
      1. ABSTRACT
      2. INTRODUCTION
      3. WHAT IS SOCIAL CONSTRUCTIONISM?
      4. A BRIEF SURVEY OF THE HISTORY OF SOCIAL CONSTRUCTIONISM
      5. PROPAGATION OF SOCIAL CONSTRUCTIONIST PERSPECTIVES
      6. SOCIAL CONSTRUCTIONISM AS A META THEORY IN INFORMATION SCIENCE
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    3. Chapter 3: Activity Theory
      1. ABSTRACT
      2. BACKGROUND
      3. OVERVIEW
      4. EMPIRICAL USE OF ACTIVITY THEORY
      5. LIMITATIONS AND FUTURE RESEARCH
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    4. Chapter 4: Dervin's Sense-Making Theory
      1. ABSTRACT
      2. INTRODUCTION
      3. SENSE-MAKING AND ITS HISTORIAL ORIGIN
      4. THE RISE OF AN EMPHASIS ON SENSEMAKING/SENSE-MAKING
      5. SMM AS META-THEORY: PHILOSOPHIC SOURCES AND PREMISES
      6. HOW SMM IMPLEMENTS META-THEORY IN INTERVIEWING PRACTICE
      7. SMM RESEARCH EXEMPLARS
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
  9. Section 2: Information Needs and Information Seeking Behavior Theories and Models
    1. Chapter 5: Krikelas' Model of Information Seeking Behavior (1983)
      1. ABSTRACT
      2. INTRODUCTION
      3. KRIKELAS MODEL (1983)
      4. STRENGTHS AND WEAKNESSES OF THE KRIKELAS MODEL
      5. LITERATURE REVIEW
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    2. Chapter 6: Wilson's Information-Seeking Behavior Models (1981, 1996, 1999)
      1. ABSTRACT
      2. INTRODUCTION
      3. EVOLUTION IN WILSON’S INFORMATION BEHAVIOR MODELS
      4. CONTEXT OF INFORMATION NEEDS AND DEVELOPING NATIONS
      5. CONCLUSION
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
    3. Chapter 7: Bates' Berrypicking Model (1989, 2002, 2005)
      1. ABSTRACT
      2. INTRODUCTION
      3. RESEARCH USING THE BERRYPICKING MODEL
      4. NATURE OF OVERALL SEARCH PROCESS
      5. RANGE OF SEARCH TECHNIQUES USE
      6. DOMAIN SEARCHED
      7. RESEARCH THAT EXPANDED AND APPLIED BATES’ MODEL TO NEW MODEL
      8. DESIGN GUIDELINES BASED ON THE BERRYPICKING MODEL
      9. EXTENSION OF THE BERRYPICKING MODEL AND BEYOND
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    4. Chapter 8: Towards the General Theory of Information Asymmetry
      1. ABSTRACT
      2. INFORMATION ASYMMETRY
      3. IMPORTANT CONCEPTS
      4. TYPES OF INFORMATION ASYMMETRY
      5. DISTURBANCE AND INFORMATION ASYMMETRY
      6. EFFECTS OF INFORMATION ASYMMETRY
      7. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    5. Chapter 9: Chatman's Theories of Information Behavior (1996, 1999, 2000)
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATIONSHIPS BETWEEN THE THREE THEORIES
      4. PREVIOUS STUDIES OF CHATMAN’S THEORIES
      5. CONCLUSION
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
    6. Chapter 10: Information Grounds Theory (1999, 2004)
      1. ABSTRACT
      2. INTRODUCTION
      3. THE INFORMATION GROUNDS
      4. PREVIOUS STUDIES
      5. CONCLUSION AND FUTURE DIRECTIONS
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
    7. Chapter 11: Soft Systems Model (SSM)
      1. ABSTRACT
      2. INTRODUCTION
      3. THE PHILOSOPHY OF SSM
      4. DESCRIPTION OF SSM
      5. SSM IN LIS
      6. LIMITATION OF SSM
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
  10. Section 3: Technology Adoption Theories
    1. Chapter 12: Ajzen and Fishbein's Theory of Reasoned Action (TRA) (1980)
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW OF THE THEORY
      4. CRITICISMS AND LIMITATIONS OF THE TRA
      5. REFINEMENTS AND VARIATIONS
      6. EMPIRICAL USE AND TESTS OF THE TRA
      7. IMPLICATIONS FOR LIBRARY AND INFORMATION SCIENCE
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    2. Chapter 13: Davis' Technology Acceptance Model (TAM) (1989)
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORIES ABOUT ACCEPTANCE OF TECHNOLOGY
      4. TECHNOLOGY ACCEPTANCE MODEL (TAM)
      5. THE IMPORTANCE OF NATIONAL CULTURE IN TECHNOLOGICAL ACCEPTANCE AND FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    3. Chapter 14: Venkatesh et al.'s Unified Theory of Acceptance and Use of Technology (UTAUT) (2003)
      1. ABSTRACT
      2. INTRODUCTION
      3. EVOLUTION OF UTAUT
      4. BACKGROUND
      5. UTAUT RELATED STUDIES
      6. APPLICATIONS OF THE THEORY
      7. SOLUTIONS AND RECOMMENDATIONS
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    4. Chapter 15: Theory of Planned Behavior (TPB) Ajzen (1988)
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORY OF PLANNED BEHAVIOR (TPB)
      4. LIMITATIONS OF THE THEORY OF PLANNED BEHAVIOR
      5. EMPIRICAL USE OF THE TPB
      6. SOLUTIONS AND RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    5. Chapter 16: Rogers' Innovation Diffusion Theory (1962, 1995)
      1. ABSTRACT
      2. INTRODUCTION
      3. EVERETT M. ROGERS
      4. BRIEF HISTORY OF THE DEVELOPMENT OF THE THEORY
      5. DESCRIPTION OF THE THEORY’S COMPONENTS
      6. RELATED CONCEPTS
      7. STRENGTHS AND LIMITATIONS OF THE THEORY
      8. CONTRIBUTION TO INFORMATION SCIENCE
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
  11. Compilation of References
  12. About the Contributors