Theory Bibliography

In Uncategorized

School of Information and Library Science
University of North Carolina at Chapel Hill

INLS 887, Seminar in Theory Development
Spring 2013

Examples of Theories in Information Science

Schedule (today) / Assignments / Sakai site for class

The readings listed here are intended as starting points for learning about particular theories in information and library science, rather than a complete list of the relevant literature. The list of theories included is similarly suggestive, rather than comprehensive.

Information as a concept/construct

  • Belkin, N.J. (1978). Information concepts for information science. Journal of Documentation, 34(1), 55-85. [SILS Library]
  • Buckland, M.K. (1991). Information as thing. Journal of the American Society for Information Science, 42(5), 351-360. [UNC libraries]
  • Collins, A. (2007). From H = log s^n to conceptual framework: A short history of information. History of Psychology, 10(1), 44-72. [Available in UNC libraries]
  • Bates, M. (2005). Information and knowledge: An evolutionary framework for information science. Information Research, 10(4). http://informationr.net/ir/10-4/paper239.html.
  • Bates, M.J. (2006). Fundamental forms of information. Journal of the American Society for Information Science & Technology, 57(8), 1033-1045. [Available in UNC libraries]
  • Bawden, D. (2007). Organised complexity, meaning and understanding: An approach to a unified view of information for information science. Aslib Proceedings, 59(4/5), 307-327. [Available in UNC libraries]
  • Marchionini, G. (2010). The many meanings of information. In Information Concepts: From Books to Cyberspace Identities. Synthesis Lectures on Information Concepts, Retrieval, and Services, Lecture #16. Morgan & Claypool, 1-10. [Available in Sakai resources]
  • Losee, R.M. (2010). Information from Processes: The Science of Information. Electronic book, http://ils.unc.edu/~losee/ifp/. (See especially, sections 1.1 and 1.2, pages 13-19.)

A general model of information behavior (Wilson)

  • Wilson, T. (1997). Information behaviour: An inter-disciplinary perspective. In Vakkari, P., Savolainen, R., & Dervin, B. (eds.), Information Seeking in Context: Proceedings of an International Conference on Research in Information Needs, Seeking and Use in Different Contexts (August 14-16, 1996, Tampere, Finland). Taylor Graham, 39-50.
  • Wilson, T. (1999). Exploring models of information behaviour: The "Uncertainty" Project. Information Processing & Management, 35(6), 839-850.
  • Wilson, T.D. (1999). Models in information behaviour research. Journal of Documentation, 55(3), 249-270.
  • Wilson, T.D. (2005). Evolution in information behavior modeling: Wilson's model. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 31-36. [SILS Library - ZA3075 .T465 2005]

User-centered perspective vs. system-centered perspective (Dervin)

  • Dervin, B. (1977). Useful theory for librarianship: Communication, not information. Drexel Library Quarterly, 13, 16-32.[SILS Library]
  • Dervin, B., & Nilan, M. (1986). Information needs and uses. Annual Review of Information Science & Technology, 21, 3-33. [SILS Library Reference and in stacks - Z699 .A1 A65]
  • Talja, S., & Hartel, J. (2007). Revising the user-centred turn in information science research: An intellectual history perspective. Information Research, 12(4), paper colis04. http://informationr.net/ir/12-4/colis/colis04.html.

Models of interactive information retrieval (Saracevic, Spink)

  • Saracevic, T. (1997). The stratified model of information retrieval interaction: Extension and applications. ASIS '97: Proceedings of the 60th ASIS Annual Meeting, 34, 313-327.
  • Spink, A., Wilson, T.D., Ford, N., Foster, A., & Ellis, D. (2002). Information seeking and mediated searching. Part 1. Theoretical framework and research design. Journal of the American Society for Information Science & Technology, 53(9), 695-703.

Information search process (ISP) model (Kuhlthau)

  • Kuhlthau, C.C. (1991). Inside the search process: Information seeking from the user's perspective. Journal of the American Society for Information Science, 42(5), 361-371. [UNC libraries]
  • Kuhlthau, C.C. (1993). Seeking Meaning: A Process Approach to Library and Information Services. Norwood, NJ: Ablex. [SILS Library - Z711 .Z84 1993]
  • Kuhlthau, C. (1998). Investigating patterns in information seeking: Concepts in context. In Wilson, T.D., & Allen, D.K. (eds.), Exploring the contexts of information behaviour : proceedings of the Second International Conference on Research in Information Needs. Seeking and Use in Different Contexts (August13-15, 1998, Sheffield, UK). Taylor Graham. [SILS Library - Z674.2 .I558 1998]
  • Kuhlthau, C.C. (2005). Kuhlthau's information search process. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 230-234. [SILS Library - ZA3075 .T465 2005]
  • Kuhlthau, C.C., Heinström, J., & Todd, R.J. (2008). The 'information search process' revisited: Is the model still useful? Information Research, 13(4). http://informationr.net/ir/13-4/paper355.html.

Berrypicking (Bates); Information foraging theory (Pirolli et al.)

  • Bates, M.J. (1989). The design of browsing and berrypicking techniques for the online search interface. Online Review, 13(5), 407-424.
  • Bates, M.J. (2005). Berrypicking. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 58-62. [SILS Library - ZA3075 .T465 2005]
  • Bates, M.J. (2007). What is browsing--really? A model drawing from behavioural science research. Information Research, 12(4). http://informationr.net/ir/12-4/paper330.html.Pirolli, P., & Card, S. (1999). Information foraging. Psychological Review, 106(4), 643-675.
  • Sandstrom, P.E. (1994). An optimal foraging approach to information seeking and use. Library Quarterly, 64(4), 414-449.
  • Pirolli, P., & Card, S. (1999). Information foraging. Psychological Review, 106(4), 643-675.
  • Chi, E.H., Pirolli, P., & Pitkow, J. (2000). The scent of a site: A system for analyzing and predicting information scent, usage, and usability of a Web site. CHI 2000 Conference Proceedings: Conference on Human Factors in Computing Systems, 161-168.
  • Pirolli, P. (2003). Exploring and finding information. In Carroll, J.M. (ed.), HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science. Amsterdam: Moran Kaufmann, 157-192. [SILS Library - QA76.9.H85 C367 2003]
  • Withrow, J. (2002). Do your links stink? Techniques for good web information scent. Bulletin of the American Society for Information Science & Technology, 28(5), 7-9.
  • Hjorland, B. (2011). The importance of theories of knowledge: Browsing as an example. Journal of the American Society for Information Science & Technology, 62(3), 594-603.

Sense-Making Theory and Methodology (SSTM; Dervin)

  • Dervin, B. (1992). From the mind's eye of the user: The sense-making qualitative-quantitative methodology. In Glazier, J.D., & Powell, R.R. (eds.), Qualitative Research in Information Management. Englewood, CO: Libraries Unlimited, 61-84. [SILS Library - Z669.7 .Q35 1992]
  • Savolainen, R. (1993). The sense-making theory: Reviewing the interests of a user-centered approach to information seeking and use. Information Processing & Management, 29(1), 13-28. [UNC libraries]
  • Dervin, B. (1998). Sense-making theory and practice: An overview of user interests in knowledge seeking and use. JOurnal of Knowledge Management, 2(2), 36-46.
  • Devin, B. (1999). On studying information seeking methodologically: The implications of connecting metatheory to method. Information Processing & Management, 35(6), 727-750.
  • Dervin, B.; Frenette, M. (2001). Sense-Making Methodology: Communicating communicatively with campaign audiences. In Rice, R.; Atkin, C. K. (eds.), Public Communication Campaigns. Thousand Oaks, CA: Sage, 69-87. [Davis Library - HM1226 .P83 2001]
  • Dervin, B., & Foreman-Wernet, L. (with Lauterbach, E.) (eds.). (2003). Sense-Making Methodology Reader: Selected Writings of Brenda Dervin. Cresskill, NJ: Hampton Press. [Davis Library - P90 .D466 2003]
  • Savolainen, R. (2006). Information use as gap-bridging: The viewpoint of sense-making methodology. Journal of the American Society for Information Science & Technology, 57(8), 1116-1125.
  • Tidline, T.J. (2005). Dervin's sense-making. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 113-117. [SILS Library - ZA3075 .T465 2005]

Information seeking model (Ellis)

  • Ellis, D. (1993). Modelling the information seeking patterns of academic researchers: A grounded theory approach. Library Quarterly, 63(4), 469-486.
  • Ellis, D., Cox, D., & Hall, K. (1993). A comparison of the information seeking patterns of researchers in the physical and social sciences. Journal of Documentation, 49(4), 356-369.
  • Ellis, D., & Haugan, M. (1997). Modelling the information seeking patterns of engineers and research scientists in an industrial environment. Journal of Documentation, 53(4), 384-403.
  • Meho, L.I, & Tibbo, H.R. (2003). Modeling the information-seeking behavior of social scientists: Ellis's study revisited. Journal of the American Society for Information Science & Technology, 54(6), 570-587.
  • Ellis, D. (2005). Ellis's model of information-seeking behavior. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 138-142. [SILS Library - ZA3075 .T465 2005]
  • Leckie, G.J. (2005). General model of the information seeking of professionals. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 158-163. [SILS Library - ZA3075 .T465 2005]

Information use environments (Taylor)

  • Taylor, R.S. (1991). Information use environments. In Dervin, B., & Voigt, M.J. (eds.), Progress in Communication Sciences, Volume X. Norwood, NJ: Ablex, 217-255. [Davis Library - P87 .P74; in-library use only]
  • Rosenbaum, H. (1993). Information use environments and structuration: Towards an integration of Taylor and Giddens. ASIS '93: Proceedings of the 56th ASIS Annual Meeting, 235-245.
  • Rosenbaum, H. (1996). Structure and action: Towards a new concept of the information use environment. ASIS '96: Proceedings of the 59th ASIS Annual Meeting, 33, 152-156.
  • Palmquist, R.A. (2005). Taylor's information use environments. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 354-357. [SILS Library - ZA3075 .T465 2005]

Cognitive models of information seeking and retrieval (Ingwersen et al.)

  • Ingwersen, P. (1982). Search procedures in the library--Analyzed from the cognitive point of view. Journal of Documentation, 38(3), 165-191.
  • Daniels, P.J. (1986). Cognitive models in information retrieval: An evaluative review. Journal of Documentation, 42(4), 272-304.
  • Belkin, N.J. (1990). The cognitive viewpoint in information science. Journal of Information Science, 16(1), 11-15.
  • Ingwersen, P. (1996). Cognitive perspectives of information retrieval interaction: Elements of a cognitive IR theory. Journal of Documentation, 52(1), 3-50.
  • Sutcliffe, A., & Ennis,MD. (1998). Towards a cognitive theory of information retrieval. Interacting with Computers, 10(3), 321-351.
  • Ford, N. (2004). Modeling cognitive processes in information seeking: from Popper to Pask. Journal of the American Society for Information Science & Technology, 55(9), 769-782. [Available in UNC libraries]
  • Järvelin, K., & Ingwersen, P. (2005). The integrated IS&R research framework. In The Turn :Integration of Information Seeking and Retrieval in Context. Dordrecht: Springer, 259-312. [SILS Library - Z699 .I54 2005]
  • Ingwersen, P. (2005). Integrative framework for information seeking and interactive information retrieval. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 215-220. [SILS Library - ZA3075 .T465 2005]

Everyday life information seeking (ELIS; Savolainen)

  • Savolainen, R. (1995). Everyday life information seeking: Approaching information seeking in the context of "way of life". Library & Information Science Research, 17(3), 259-294.
  • Savolainen, R. (2005). Everyday life information seeking. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 143-148. [SILS Library - ZA3075 .T465 2005]
  • Agosto, D.E., & Hughes-Hassell, S. (2006). Toward a model of the everyday life information needs of urban teenagers, Part 1: Theoretical model. Journal of the American Society for Information Science & Technology, 57(10), 1394-1403.
  • Savolainen, R. (2008). Everyday Information Practices: A Social Phenomenological Perspective. Lanham, MD: Scarecrow Press. [SILS Library - ZA3075 .S38 2008]

An integrated social-biological model (Nahl)

  • Nahl, D. (2007). Social-biological information technology: An integrated conceptual framework. Journal of the American Society for Information Science & Technology, 58(13), 2021-2046. [Available in UNC libraries]
  • Nahl, D. (2001). A conceptual framework for explaining information behavior. SIMILE: Studies in Media & Information Literacy Education, 1(2). www.utpjournals.com.

Anomalous states of knowledge (Belkin)

  • Brooks, H., Oddy, R.N., & Belkin, N.J. (1979). Representing and classifying anomalous states of knowledge. In MacCafferty, M., & Gray, K. (eds.), The Analysis of Meaning. Informatics 5: Proceedings of a Conference Held by the Aslib Informatics Group and the BCS Information Retrieval Specialist Group (March 26-28, 1979, Queen's College, Oxford). London: Aslib, 227-238. [SILS Libary folio - P325.5.D38 A5]
  • Belkin, N.J. (1980). Anomalous states of knowledge as a basis for information retrieval. Canadian Journal of Information Science, 5, 133-143.
  • Belkin, N.J., Oddy, R.N., & Brooks, H.M. (1982). ASK for information retrieval: Part I. Background and theory. Journal of Documentation, 38(2), 61-71.
  • Oddy, R.N., Palmquist, R.A., & Crawford, M.A. (1986). Representation of anomalous states of knowledge in information retrieval. ASIS '86: Proceedings of the 49th ASIS Annual Meeting, 23, 248-254.
  • Belkin, N.J. (2005). Anomalous state of knowledge. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 44-48. [SILS Library - ZA3075 .T465 2005]

Relevance as a theoretical construct

  • Saracevic, T. (1970). The concept of "relevance" in information science: A historical review. In Saracevic, T. (comp.), Introduction to Information Science. New York: Bowker, 111-151. [SILS Library - Z1001 .S24]
  • Cooper, W.S. (1971). A definition of relevance for information retrieval. Information Storage & Retrieval, 7, 19-37.
  • Wilson, P. (1973). Situational relevance. Information Storage & Retrieval, 9(8), 457-471.
  • Saracevic, T. (1975). Relevance: A review of and a framework for the thinking on the notion in information science. Journal of the American Society for Information Science, 26(6), 321-343.
  • Swanson, D.R. (1986). Subjective versus objective relevance in bibliographic retrieval systems. LIbrary Quarterly, 56,389-398.
  • Schamber, L., Eisenberg, M.B., & Nilan, M.S. (1990). A re-examination of relevance: Toward a dynamic, situational definition. Information Processing & Management, 26(6), 755-776.
  • Harter, S.P. (1992). Psychological relevance and information science. Journal of the American Society for Information Science, 43(9), 602-615.
  • Park, T.K. (1993). The nature of relevance in information retrieval: An empirical study. Library Quarterly, 63(3), 318-351.
  • Park, T.K. (1994). Toward a theory of user-based relevance: A call for a new paradigm of inquiry. Journal of the American Society for Information Science, 45(3), 135-141.
  • Barry, C.L. (1994). User-defined relevance criteria: An exploratory study. Journal of the American Society for Information Science, 45(3), 149-159.
  • Mizzaro, S. (1997). Relevance: The whole history. Journal of the American Society for Information Science, 48(9), 810-832.
  • Wang, P., & White, M.D. (1999). A cognitive model of document use during a research project. Study II: Decisions at the reading and citing stages. Journal of the American Society for Information Science, 50(2), 98-114.
  • Cosijn, E., & Ingwersen, P. (2000). Dimensions of relevance. Information Processing & Management, 36(4), 533-550.
  • Borlund, P. (2003). The concept of relevance in IR. Journal of the American Society for Information Science & Technology, 54(10), 913-925.
  • Toms, E.G., O'Brien, H.L., Kopak, R., & Freund, L. (2005). Searching for relevance in relevance of search. Lecture Notes in Computer Science, 3507, 59-78.
  • Saracevic, T. (2007). Relevance: A review of the literature and a framework for thinking on the notion in information science. Part II: Nature and manifestations of relevance. Journal of the American Society for Information Science & Technology, 58(13), 1915-1933.
  • Saracevic, T. (2007). Relevance: A review of the literature and a framework for thinking on the notion in information science. Part III: Behavior and effects of relevance. Journal of the American Society for Information Science & Technology, 58(13), 2126-2144.
  • Hjorland, B. (2010). The foundation of the concept of relevance. Journal of the American Society for Information Science & Technology, 61(2), 217-237.
  • Huang, X., & Soergel, D. (2013). Relevance: An improved framework for explicating the notion. Journal of the American Society for Information Science & Technology, 64(1), 18-35.

Principle of least effort

  • Zipf, G.K. (1949). Human Behavior and the Principle of Least Effort: An Introduction to Human Ecology. Cambridge, MA: Addison-Wesley. [Davis Library - H91 .Z5]
  • Case, D.O. (2005). Principle of least effort. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 289-292. [SILS Library - ZA3075 .T465 2005]
  • Lafouge, T., & Prime-Claverie, C. (2005). Production and use of information. Characterization of informetric distributions using effort function and density function: Exponential informetric process. Information Processing & Management, 41(6), 1387-1394.
  • Bronstein, J., & Baruchson-Arbib, S. (2008). The application of cost-benefit and least effort theories in studies of information seeking behavior of humanities scholars: the case of Jewish studies scholars in Israel. Journal of Information Science, 34(2), 131-144.

Information povery (Chatman)

  • Chatman, E.A., & Pendleton, E.M. (1995). Knowledge gap, information seeking and the poor. Reference Librarian, 49/50, 135-145.
  • Chatman, E.A. (1996). The impoverished life-world of outsiders. Journal of the American Society for Information Science, 47(3), 193-206.
  • Hersberger, J. (2003). Are the economically poor information poor? Does the digital divide affect the homeless and access to information? Canadian Journal of Information and Library Science, 27(3), 45-63.
  • Britz, J.J. (2004). To know or not to know: A moral reflection on information poverty. Journal of Information Science, 30(3), 192-204.
  • Hersberger, J. (2005). Chatman's information poverty. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 75-78. [SILS Library - ZA3075 .T465 2005]
  • Haider, J., & Bawden, D. (2007). Conceptions of 'information poverty' in LIS: A discourse analysis. Journal of Documentation, 63(4), 534-557.
  • Thompson, K.M. (2009). Remembering Elfreda Chatman, a champion of theory development in library and information science education. Journal of Education for Library and Information Science, 50(2), 119-126.
  • Fulton, C. (2010). An ordinary life in the round: Elfreda Annmary Chatman. Libraries & the Cultural Record, 45(2), 238-259.

Life in the round (Chatman)

  • Chatman, E.A. (1999). A theory of life in the round. Journal of the American Society for Information Science, 50(3), 207-217.
  • Solomon, P. (1999). Information mosaics: Patterns of action that structure. In Wilson, T.D., & Allen, D.K. (eds.), Exploring the Contexts of Information Behaviour. Proceedings of the Second International Conference on Research in Information Needs, Seeking and Use in Different Contexts (Sheffield, UK, 1998). London: Taylor Graham, 150-175. [SILS Library - Z674.2 .I558 1998]
  • Fulton, C. (2005). Chatman's life in the round. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 79-82. [SILS Library - ZA3075 .T465 2005]
  • Thompson, K.M. (2009). Remembering Elfreda Chatman, a champion of theory development in library and information science education. Journal of Education for Library and Information Science, 50(2), 119-126.
  • Fulton, C. (2010). An ordinary life in the round: Elfreda Annmary Chatman. Libraries & the Cultural Record, 45(2), 238-259.

Information encountering (Erdelez)

  • Erdelez, S. (1996). Information encountering: A conceptual framework for accidental information discovery. In Vakkari, P., Savolainen, R., & Dervin, B. (eds.), Information Seeking in Context. Proceedings of an International Conference on Research in Information Needs, Seeking and Use in Different Contexts. London: Taylor Graham, 412-421. [SILS Library - Z674.2 .I558 1996]
  • Erdelez, S. (1999). Information encountering: It's more than just bumping into information. Bulletin of ASIST, 25(3), 25-29.
  • Erdelez, S., & Rioux, K. (2000). Sharing information encountered for others on the Web. New Review of Information Behaviour Research, 1, 219-233.
  • Erdelez, S. (2004). Investigation of information encountering in the controlled research environment. Information Processing & Management, 40(6), 1013-1025.
  • Erdelez, S. (2005). Information encountering. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 179-184. [SILS Library - ZA3075 .T465 2005]
  • Heinström, J. (2006). Psychological factors behind incidental information acquisition. Library & Information Science Research, 28(4), 579-594.
  • Pasldottir, A. (2010). The connection between purposive information seeking and information encountering: A study of Icelanders' health and lifestyle information seeking. Journal of Documentation, 66(2), 224-244.

Information grounds (Fisher)

  • Fisher, K.E., Durrance, J.C., & Hinton, M.B. (2004). Information grounds and the use of need-based services by immigrants in Queens, New York: A context-based, outcome evaluation approach. Journal of the American Society for Information Science & Technology, 55(8), 754-766.
  • Fisher, K.E., & Naumer, C.M. (2006). Information grounds: Theoretical basis and empirical findings on information flow in social settings. In Spink, A., & Cole, C. (eds.), New Directions in Human Information Behavior. Springer, 93-111. [SILS Library - ZA3075 .N93 2006]
  • Counts, S., & Fisher, K.E. (2010). Mobile social networking as information ground: A case study. Library & Information Science Research, 32(2), 98-115.
  • Savolainen, R. (2009). Small world and information grounds as contexts of information seeking and sharing. Library & Information Science Research, 31(1), 38-45.
  • Fisher, K.E. (2005). Information grounds. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 185-191. [SILS Library - ZA3075 .T465 2005]
  • Fisher, K.E., & Naumer, C.M. (2006). Information grounds: Theoretical basis and empirical findings on information flow in social settings. In Spink, A., & Cole, C. (eds.), New Directions in Human Information Behavior. Springer, 93-111.

Bibliometrics; Scholarly communication (see also, Social Network Theory)

  • Crane, D. (1972). Invisible Colleges: Diffusion of Knowledge in Scientific Communities. Chicago: University of Chicago Press.
  • Narin, F., & Moll, J.K. (1977). Bibliometrics. Annual Review of Information Science & Technology, 12, 35-58.
  • Lawani, S.M. (1981). Bibliometrics: Its theoretical foundations, method and applications. Libri, 31(4), 294-315.
  • Smith, L.C. (1981). Citation analysis. Library Trends, 30(1), 83-106.
  • Fedorowicz, H. (1982). The theoretical foundations of Zipf's Law and its application to the bibliographic database environment. Journal of the American Society for Information Science, 33(5), 285-293.
  • Cronin, B. (1984). The Citation Process: The Role and Significance of Citations in Scientific Communication. Taylor Graham.
  • Price, D.J.deS. (1986). Little Science, Big Science... and Beyond. New York: Columbia University Press.
  • Lievrouw, L.A. (1988). Bibliometrics and invisible colleges: At the intersection of communication research and information science. ASIS '88: Proceedings, 25, 54-58.
  • Borgman, C.L. (1990). Scholarly Communication and Bibliometrics. Sage.
  • Tague-Sutcliffe, J. (1992). An introduction to informetrics. Information Processing & Management, 28(1), 1-4.
  • Larson, R.R. (1996). Bibliometrics of the World Wide Web: An exploratory analysis of the intellectual structure of cyberspace. Proceedings of the 59th Annual Meeting of the American Society for Information Science, 71-78.
  • Oluic-Vukovic, V. (1997). Bradford's distribution: From the classical bibliometric "law" to the more general stochastic models. Journal of the American Society for Information Science, 48(9), 833-842.
  • Todd, R. J. (1999). Back to our beginnings: information utilization, Bertram Brookes and the fundamental equation of information science. Information Processing & Management, 35(6), 851-870.
  • Small, H. (1999). Visualizing science by citation mapping. Journal of the American Society for Information Science, 50(9), 799-813.
  • Losee, R.M. (2001). Term dependence: a basis for Luhn and Zipf models. Journal of the American Society for Information Science & Technology, 52(12), 1019-1025.
  • Thelwall, M. (2002). Conceptualizing documentation on the Web: an evaluation of different heuristic-based models for counting links between university Web sites. Journal of the American Society for Information Science & Technology, 53(12), 995-1005.
  • Park, H.W., & Thelwall, M. (2003). Hyperlink analyses of the World Wide Web: a review. Journal of Computer Mediated Communication, 8(4). http://www.ascusc.org/jcmc/vol8/issue4/park.html.
  • Vaughan, L., & Shaw, D. (2003). Bibliographic and Web citations: What is the difference? Journal of the American Society for Information Science & Technology, 54(14), 1313-1324.
  • Björneborn, L., & Ingwersen, P. (2004). Toward a basic framework for webometrics. Journal of the American Society for Information Science & Technology, 55(14), 1216-1227.
  • Zuccala, A. (2006). Modeling the invisible college. Journal of the American Society for Information Science & Technology, 57(2), 152-168.
  • Zuccala, A. (2006). Author cocitation analysis is to intellectual structure as web colink analysis is to...? Journal of the American Society for Information Science & Technology, 57(11), 1487-1502.
  • Priem, J., & Hemminger, B.M. (2010). Scientometrics 2.0: Toward new metrics of scholarly impact on the social Web. First Monday, 15(7). http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2874/2570.

Back to top

From other fields

School of Information and Library Science
University of North Carolina at Chapel Hill

INLS 887, Seminar in Theory Development
Spring 2013

Theories Adapted to IS from Other Disciplines

Schedule (today) / Assignments / Sakai site for class

The readings listed here are intended as starting points for learning about particular theories developed in fields/disciplines other than information and library science; they are not intended to be a complete list of the relevant literature. The list of theories included is similarly suggestive, rather than comprehensive.

Social cognitive theory (Bandura)

  • Bandura, A. (1977). Social Learning Theory. Englewood Cliffs, NJ: Prentice-Hall. [Undergraduate Library - LB1084 .B357 1976]
  • Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191-215.
  • Bandura, A. (1986). Social Foundations of Thought and Action: A Social Cognitive Theory. Englewood Cliffs, NJ: Prentice-Hall. [Davis Library - HM251 .B433 1986]
  • Gist, M.E., & Mitchell, T.R. (1992). Self-efficacy: A theoretical analysis of its determinants and malleability. Academy of Management Review, 17(2), 183-211.
  • Compeau, D.R., & Higgins, C.A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189-211.
  • Bandura, A. (1997). Self-Efficacy: The Exercise of Control. New York: W.H. Freeman. [Davis Library - BF637.S38 B36 1997]
  • Marakas, G.M., Yi, M.Y., & Johnson, R.D. (1998). The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information Systems Research, 9(2), 126-163.
  • Compeau, D., Higgins, C.A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145-158.
  • Ren, W.-H. (2000). Library instruction and college student self-efficacy in electronic information searching. Journal of Academic Librarianship, 26(5), 323-328.
  • Debowski, S., Wood, R.E., & Bandura, A. (2001). Impact of guided exploration and enactive exploration on self-regulatory mechanisms and information acquisition through electronic search. Journal of Applied Psychology, 86(6), 1129-1141.
  • Miwa, M. (2005). Bandura's social cognition. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 54-57. [SILS Library - ZA3075 .T465 2005]

Sensemaking (Weick)

  • Bantz, C.R., & Smith, D.H. (1977). A critique and experimental test of Weick's model of organizing. Communication Monographs, 44(3):171-184.
  • Weick, K. (1995). Sensemaking in Organizations. Sage, Thousand Oaks.
  • MacIntosh-Murray, A. (2005). Organizational sense making and information use. In Theories of Information Behavior. Information Today, Inc., 265-269.
  • Maitlis, S. (2005). The social processes of organizational sensemaking. Academy of Management Journal, 48(1):21-49.
  • Weick, K.E., Sutcliffe, K.M., & Obstfeld, D. (2005). Organizing and the process of sensemaking. Organization Science, 16(4), 409-421.

Theory of Reasoned Action (TRA); Technology Acceptance Model (TAM)

  • Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley. [Davis Library - BF323.C5 F48]
  • Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. Kuhl, J., & Beckmann, J. (eds.), Action Control: From Cognition to Behavior. Berlin: Springer-Verlag, 11-39. [Davis Library - BF611 .A27 1985]
  • Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179-211.
  • Venkatesh, V., & Davis, F.D. (1996). A model of the antecedents of perceived ease of use: Development and test. Decision Sciences, 27(3), 451-481.
  • Venkatesh, V., & Davis, F.D. (2000). A theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Management Science, 46(2), 186-204.
  • Moon, J.W., & Kim, Y.J. (2001). Extending the TAM for a World Wide Web context. Information & Management, 38(4), 217-230.
  • Venkatesh, V., Morris, M.G., Davis, G.B., &Davis, F.D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.
  • DeLone, W.H., & McLean, E.R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9-30.
  • Lee, Y., Kozar, K.A., & Larsen, K.R.T. (2003). The technology acceptance model: past, present, and future. Communications of the AIS, 12(50), 752-780.
  • Legris, P., Ingham, J., & Collerette, P. (2003). Why do people use information technology? A critical review of the Technology Acceptance Model. Information & Management, 40(3), 191-204.
  • King, W.R., & He, J. (2006). A meta-analysis of the technology acceptance model. Information & Management, 43(6), 740-755.
  • Chan, H.C., & Teo, H.-H. (2007). Evaluating the boundary conditions of the technology acceptance model: An exploratory investigation. ACM Transactions on Computer-Human Interaction, 14(2), Article 9.
  • Mathieson, K. (1991). Predicting user intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior. Information Systems Research, 2(3), 173-191.

Diffusion theory (Rogers)

  • Rogers, E.M. (1962). Diffusion of Innovations. New York: Free Press. [Davis Library -HM101 .R57]
  • Downs, G.W., Jr., & Mohr, L.B. (1976). Conceptual issues in the study of innovation. Administrative Science Quarterly, 21, 700-714.
  • Lucas, H.C., &Sutton, J.A. (1977). The stage hypothesis s-curve: Some contradictory evidence. Communications of the ACM, 20(4), 254-259.
  • Rice, R.E., & Rogers, E.M. (1980). Reinvention in the innovation process. Knowledge: Creation, Diffusion, Utilization, 1(4), 499-514.
  • Damanpour, F., & Childers, T. (1985). The adoption of innovations in public libraries. Library & Information Science Research, 7, 231-246.
  • Chatman, E.A. (1986). Diffusion theory: A review and test of a conceptual model in information diffusion. Journal of the American Society for Information Science, 37(6), 377-386.
  • Eveland, J.D. (1986). Diffusion, technology transfer, and implementation: Thinking and talking about change. Knowledge: Creation, Diffusion, Utilization, 8(2), 303-322.
  • Marshall, J.G. (1990). Diffusion of innovation theory and end-user searching. Library and Information Science Research, 12(1), 55-69.
  • Cooper, R.B., & Zmud, R.W. (1990). Information technology implementation research: A technological diffusion approach. Management Science, 36(2), 123-139.
  • Moore, G.C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222.
  • Damanpour, F. (1991). Organizational innovation: A metaanalysis of effects of determinants and moderators. Academy of Managemet Journal, 34(3), 555-590.
  • Zmud, R.W., & Apple, L.E. (1992). Measuring technology incorporation/infusion. Journal of Product Innovation and Management, 9, 148-155.
  • Taylor, S., & Todd, P.A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176.
  • Rogers, E.M. (2003). Diffusion of Innovations. 5th ed. New York: Free Press. [Davis Library - HM621 .R57 2003]
  • Venkatesh, V., Morris, M.G., Davis, G.B., & Davis, F.D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.
  • Lajoie-Paquette, D. (2005). Diffusion theory. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 118-122. [SILS Library - ZA3075 .T465 2005]
  • Jeyaraj, A., Rottman, J.W., & Lacity, M.C. (2006). A review of the predictors, linkages, and biases in IT innovation adoption research. Journal of Information Technology, 21(1), 1-23.

Social network theory

  • Mitchell, J.C. (1969). The concept and use of social networks. In Social Networks in Urban Situations: Analyses of Personal Relationships in Central African Towns. Manchester University Press, for the Institute for African Studies, University of Zambia, 1-50. [Davis Library - HN800 .Z32 S6]
  • Granovetter, Mark S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360-1380.
  • Pool, I.D., & Kochen, M. (1978). Contacts and influence. Social Networks, 1(1), 5-51.
  • Burt, R.S. (1980). Models of network structure. Annual Review of Sociology, 6, 79-141. [Available via UNC libraries/JSTOR]
  • Monge, P. (1987). The network level of analysis. In Berger, C.R., & Chaffee, S.H. (eds.), Handbook of Communication Science. Newbury Park, CA: Sage, 239-270. [Davis Library - P90 .H294 1987]
  • Marsden, P.V. (1990). Network data and measurement. Annual Review of Sociology, 16, 435-463.
  • Haythornthwaite, C. (1996). Social network analysis: An approach and technique for the study of information exchange. Library & Information Science Research, 18(4), 323-342. [UNC libraries]
  • Hansen, M.T. (2002). Knowledge networks: Explaining effective knowledge sharing in multiunit companies. Organization Science, 13(3), 232-248.
  • Dixon, C.M. (2005). Strength of weak ties. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 344-348. [SILS Library - ZA3075 .T465 2005]
  • Morris, S.A., & Goldstein, M.L. (2007). Manifestation of research teams in journal literature: A growth model of papers, coauthorship, weak ties, authors, collaboration, and Lotka's law. Journal of the American Society for Information Science & Technology, 58(12), 1764-1782.
  • Morris, S.A., & Van der Veer Martens, B. (2008). Mapping research specialties. Annual Review of Information Science & Technology, 42, 213-295.
  • Oh, J.-S. (2010). Network analysis of shared interests represented by social bookmarking behaviors. Ph.D. dissertation, University of North Carolina at Chapel Hill. [UNC libraries]

Structuration theory (Giddens)

  • Orlikowski, W.J., & Robey, D. (1991). Information technology and the structuring of organizations. Information Systems Research, 2(2), 143-169. [UNC libraries]
  • Jones, M.R., & Karsten, H. (2008). Giddens's structuration theory and information systems research. MIS Quarterly, 32(1), 127-157. [UNC libraries]
  • Rosenbaum, H. (1997). Notes on a structurational view of digital information in organizations. ASIS '97: Proceedings of the 60th ASIS Annual Meeting, 34, 328-334. [UNC libraries]
  • Rosenbaum, H. (1993). Information use environments and structuration: Towards an integration of Taylor and Giddens. ASIS '93: Proceedings of the 56th ASIS Annual Meeting, 235-245. [UNC libraries]

Transtheoretical model of behavior change

  • Petty, R.E., & Wegener, D.T. (1999). The elaboration likelihood model: Current status and controversies. In Chaiken, Shelly; Trope, Yaacov (eds.), Dual-Process Theories in Social Psychology. New York Guilford Press, 41-72. [Davis Library - HM291 .D76 1999, with viewing on Google Books]
  • Wathen, C.N., & Harris, R.M. (2005). Transtheoretical model of the health behavior change. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 363-367. [SILS Library - ZA3075 .T465 2005]

Reader response theory

  • Ross, C.S. (2005). Reader response theory. In Fisher, K.E., Erdelez, S., & McKechnie, L. (E.F.) (eds.), Theories of Information Behavior. Medford, NJ: Information Today, for ASIST, 303-307. [SILS Library - ZA3075 .T465 2005]

Activity theory

  • Engestrom, Y. (2000). Activity theory as a framework for analyzing and redesigning work. Ergonomics, 43(7), 960-974. [UNC libraries]
  • Kuutti, K. (1996). Activity theory as a potential framework for human-computer interaction research. In Nardi, B.A. (ed.), Context and Consciousness: Activity Theory and Human-Computer Interaction. Cambridge, MA: MIT Press, 17-44. [SILS Library - QA76.9 .H85 C68 1996]
  • Kaptelinin, V. (1996). Activity theory: implications for human-computer interaction. In Nardi, B.A. (ed.), Context and Consciousness: Activity Theory and Human-Computer Interaction. Cambridge, MA: MIT Press, 103-116. [SILS Library - QA76.9 .H85 C68 1996]
  • Bertelsen, O.W., & Bodker, S. (2003). Activity theory. In Carroll, J.M. (ed.), HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science. Amsterdam: Moran Kaufmann, 291-324. [SILS Library - QA76.9.H85 C367 2003]
  • Bedny, G.Z., & Harris, S.R. (2005). The systemic-structural theory of activity: Applications to the study of human work. Mind, Culture, and Activity, 12(2), 128-147. [Available in UNC libraries]
  • Bedny, G.Z., & Karwowski, W. (2004). Activity theory as a basis for the study of work. Ergonomics, 47(2), 134-153. [Available in UNC libraries]
  • Wilson, T.D. (2006). A re-examination of information seeking behaviour in the context of activity theory. Information Research, 11(4). http://informationr.net/ir/11-4/paper260.html.

Distributed cognition

  • Perry, M. (2003). Distributed cognition.In Carroll, J.M. (ed.), HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science. Amsterdam: Moran Kaufmann, 193-224. [SILS Library - QA76.9.H85 C367 2003]

Human information processor model (Card, Moran, & Newell)

  • MacKenzie, I.S. (2003). Motor behavior models for human-computer interaction. In Carroll, J.M. (ed.), HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science. Amsterdam: Moran Kaufmann, 27-54. [SILS Library - QA76.9.H85 C367 2003]
  • John, B.E. (2003). Information processing and skilled behavior. In Carroll, J.M. (ed.), HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science. Amsterdam: Moran Kaufmann, 55-102. [SILS Library - QA76.9.H85 C367 2003]

Back to top


Syllabus / Schedule / Assignments / Sakai class site


Creative Commons LicenseThe INLS 887 website, UNC-CH, 2011, is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. Address all comments and questions to Barbara M. Wildemuth at [email protected]. This page was last modified on January 4, 2013, by Barbara M. Wildemuth.

 


Syllabus / Schedule / Assignments / Sakai class site


Creative Commons LicenseThe INLS 887 website, UNC-CH, 2011, is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. Address all comments and questions to Barbara M. Wildemuth at [email protected]. This page was last modified on January 4, 2013, by Barbara M. Wildemuth.

 

School of Information and Library Science
University of North Carolina at Chapel Hill

INLS 887, Seminar in Theory Development
Spring 2013

Schedule

Syllabus / Schedule (today) / Assignments / Sakai site for class


Introduction

Session 1, January 11: Frameworks, models, and theories; Scope of this course

  • Jaccard, J., & Jacoby, J. (2010). Reading and writing about theories. In Theory Construction and Model-Building Skills: A Practical Guide for Social Scientists. New York: Guilford Press, 331-346. (Read only pages 331-337.) [Davis - H62 .J29 2010 (soon to be on reserve in SILS Library); copy in Sakai resources]
    • This part of this chapter provides some guidance on how to read about theories in two distinct styles of research, one that emphasizes hypothesis/theory testing and one that emphasizes grounded/emergent theory. This should be a review, so you can skim it quickly.
  • Jaccard, J., & Jacoby, J. (2010). The nature of understanding. In Theory Construction and Model-Building Skills: A Practical Guide for Social Scientists. New York: Guilford Press, 6-21 [Davis - H62 .J29 2010 (soon to be on reserve in SILS Library); copy in Sakai resources]
    • This chapter is probably the most important reading for today's class session. It introduces the ideas of "concepts" and the relationships among them - the building blocks of any theory.
  • Gregor, S. (2006). The nature of theory in information systems. MIS Quarterly, 30(3), 611-642. [Available in UNC libraries]
    • This article follows up on the previous reading by categorizing theories based on the purposes that they can serve, with a focus on theories in the field of information systems (closely related to information science, with a number of overlapping theoretical underpinnings). It's a pretty long article, but read it through; you'll want to return to it as we move through the semester, also.
  • Poole, H.L. (1985). Introduction: A problem of long standing. In Theories of the Middle Range. Norwood, NJ: Ablex, 1-12. [SILS Library - Z669.7 .P66 1985 (soon to be on reserve in SILS Library); copy in Sakai resources]
    • Most of the theories that use in information and library science might be described as theories of the middle range. In the Poole book, skim through the first sections (about defining information science, p1-6) and focus more of your attention on the discussion of the role of theory in claims about information science being a science (p6-12).
  • Additional readings of interest

Session 2, January 18: Scientific reasoning; The role of theory in science

  • Jaccard, J., & Jacoby, J. (2010). Science as an approach to understanding. In Theory Construction and Model-Building Skills: A Practical Guide for Social Scientists. New York: Guilford Press, 22-36 [Davis - H62 .J29 2010; copy in Sakai resources]
    • This textbook chapter provides an overview of many of the concepts you'll also read about in some of the original sources from Hempel, Popper, and Kuhn, as well as others.
  • Hempel, C. (1962). Two models of scientific explanation. In Colodny, R.G. (ed.), Frontiers of Science and Philosophy. Pittsburgh, PA: University of PIttsburgh Press, 9-19. [Davis Library - Q175 .C627 1963]
    • Reprinted in Balashov, Y., & Rosenberg, A. (eds.) (2002). Philosophy of Science: Contemporary Readings. London: Routledge, 45-55. [Davis Library - Q175.3 .P49 2002; copy in Sakai resources]
    • Much of ILS research (and social science research in general) relies on the probabilistics explanations that Hempel describes in section 2.2. Skim sections 2.1 and 2.3, but focus your attention on section 2.2
  • Popper, K. (1959). The problem of induction. In Conjectures and Refutations. London: Routledge & Kegan Paul, 33-39.
    • Reprinted in Balashov, Y., & Rosenberg, A. (eds.) (2002). Philosophy of Science: Contemporary Readings. London: Routledge, 294-301. [Davis Library - Q175.3 .P49 2002; copy in Sakai resources]
    • The problem of induction, as discussed by Popper, is "whether inductive inferences are justified, or under what conditions". In the social sciences, where interpretive approaches often involve induction at some point in the process, this problem is particularly acute.
  • Kuhn, T. (1962). Paradigms. In McErlean, J. (2000). Philosophies of Science: From Foundations to Contemporary Issues. Wadsworth, 159-165. Excerpt from Kuhn, T.S. (1962). The Structure of Scientific Revolutions. University of Chicago Press, 10-22, 43-51. [Davis Library - Q175 .M4167 2000; copy in Sakai resources]
    • In "normal" science, new discoveries build very directly on previous discoveries and theories. Kuhn is most known for his work on scientific revoluations, or paradigm shifts (as discussed at length in his book). This brief excerpt will give you a flavor of his thinking on this topic, and we'll consider whether ILS has experienced any paradigm shifts during its relatively short history.

Applying a Theory in a Particular Study

Session 3, January 25: Dangers and pitfalls when applying an existing theory

  • Sutton, R.I., & Staw, B.M. (1995). What theory is not. Administrative Science Quarterly, 40, 371-384. [UNC libraries]
  • Weick, K.E. (1995). What theory is not, theorizing is. Administrative Science Quarterly, 40, 385-390. [UNC libraries]
  • DiMaggio, P.J. (1995). Comments on "What theory is not". Administrative Science Quarterly, 40, 391-397. [UNC libraries]
    • These three articles are a conversation among the authors, about what theory is and what theory is not. Sutton and Staw provide examples of abstractions that some might consider to be theory, but they do not. Weick sees these as "approximations" of theory, and urges us to focus on the process of theorizing. Dimaggio goes on to identify three things to consider when theorizing. While from the field of information systems (in business), these authors' ideas apply equally well to information science theory.
  • Truex, D., Holmstrom, J., & Keil, M. (2006). Theorizing in information systems research: A reflexive analysis of the adaptation of theory in information systems research. Journal of the AIS, 7(12), 797-821. [UNC libraries]
    • This article moves us directly into this first section of the course, where we'll focus on applying existing theories in new empirical studies. They propose some best practices for this type of endeavor.
  • Rogers, E.M. (1983). Diffusion of Innovations. 3rd edition. Free Press. [Davis Library - HM101 .R57 1983]
    • Chapter 5, The innovation-decision process [In Sakai resources]
    • Chapter 10, Innovation in organizations [In Sakai resources]
    • We'll spend the second half of this session on an example of a theory that has often been applied in information and library science studies: diffusion theory, originally developed by Everett Rogers. To get a general sense of the theory itself, skim these two chapters of his book, paying special attention to Figure 5-1 and Table 10-1.
  • Chatman, E.A. (1986). Diffusion theory: A review and test of a conceptual model in information diffusion. Journal of the American Society for Information Science, 37(6), 377-386. (Skim.) [UNC libraries]
  • Marshall, J.G. (1990). Diffusion of innovation theory and end-user searching. Library & Information Science Research, 12(1), 55-69. (Skim.) [SILS Library; copy in Sakai resources]
  • Wildemuth, B.M. (1992). An empirically grounded model of the adoption of intellectual technologies. Journal of the American Society for Information Science, 43(3), 210-224. (Skim.) [UNC libraries]
    • These three studies all drew/built on diffusion theory in some way. Look at each study's findings. Consider what the study contributed to the development of diffusion theory.

Session 4, February 1: Applying existing theories

  • Amanda: Hofstede's cultural dimensions
    • Callahan, E. (2005). Cultural similarities and differences in the design of university web sites. Journal of Computer-Mediated Communication, 11(1), 239-273. [UNC libraries]
      • This article, from our own field, provides an overview of the theory and shows how it can be formed into specific hypotheses to be tested. Please read pages 239-250.
  • Nina: Weick, Sensemaking
    • Weick, K. (2001). Sensemaking as an organizational dimension of global change. In Making Sense of the Organization, p458-472. [Sakai resources]
      • In particular, focus on the sections "The Phenomenon of Sensemaking" and "The Seven Properties of Sensemaking," pages 459-463.
  • John: Social cognitive theory applied to technology adoption
    • Straub, E.T. (2009). Understanding technology adoption: Theory and future directions for informal learning. Review of Educational Research, 79(2), 625-649. doi: 10.3102/0034654308325896 [UNC Libraries]
      • Straub discusses existing adoption-diffusion theories (Roger's IDT, Hall's CBAM, TAM and UTAUT) using social-cognitive theory as a lens and suggests a synthesis. The article is an overview of how adoption-diffusion theories can and are being reformulated to incorporate fundamental aspects of social-cognitive theory (social learning, self-efficacy, etc.). Focus your reading on pages 625-629 and 641-646.

Session 5, February 8: Applying existing theories, continued

  • Ashlee: Cognitive load theory
    • Sweller, J. (1994). Cognitive load theory, learning difficulty, and instructional design. Learning and Instruction, 4(4), 295-312. [UNC libraries]
      • Focus your reading on pages 295-303.
    • Paas, F., Tuovinen, J.E., Tabbers, H., & Van Gerven, P.W.M. (2003). Cognitive load measurement as a means to advance cognitive load theory. Educational Psychologist, 38(1), 63-71. [UNC libraries]
      • Focus your reading on pages 66-70.
  • Emily: Zipf, Principle of least effort
    • Liu, Z., & Yang, Z.Y.L. (2004). factors influencing distance-education graduate students' use of information sources: A user study. Journal of Academic Librarianship, 30(1), 24-35. [UNC libraries]

Session 6, February 15: Applying existing theories, continued; Discussion of plans for paper

  • Angela: Social exchange theory applied to data sharing
    • Emerson, R. M. (1976). Social Exchange Theory. (J. Delamater, Ed.)Annual Review of Sociology, 2(1), 335–362. [UNC libraries]
      • Read pages 335-350.
  • Elliott: Wilson, Cognitive authority
    • Sundin, O., & Johannisson, J. (2005). Pragmatism, neo-pragmatism and sociocultural theory: Communicative participation as a perspective in LIS. Journal of Documentation, 61(1), 23-43. [UNC libraries]
      • Pages 31-33 are of particular interest as they deal with pragmatism in ILS, esp. Wilson.
    • Optional: Mai, J.-E. (2010). Classification in a social world: bias and trust. Journal of Documentation, 66(5), 627-642. [UNC libraries]
      • You may find it interesting to skim this one.
  • Emily: Big 6 Skills for Information Literacy
    • Eisenberg, M. (2003). Implementing information skills: Lessons learned from the Big6 approach to information problem-solving. School Libraries in Canada, 22(4), 20-23. [UNC libraries]
  • Jaccard, J., & Jacoby, J. (2010). Reading and writing about theories. In Theory Construction and Model-Building Skills: A Practical Guide for Social Scientists. New York: Guilford Press, 331-346. (Read only pages 337-345.) [Davis - H62 .J29 2010; copy in Sakai resources].

Session 7, February 22: Testing/validating a theory

  • Anita: Byström & Hansen, Information activities in work tasks
    • Byström, K., & Hansen, P. (2005). Conceptual framework for tasks in information studies. Journal of the American Society for Information Science and Technology, 56(10), 1050-1061. [UNC libraries]
  • Popper, K. (1963). Science: Conjectures and refutations. In Conjectures and Refutations: The Growth of Scientific Knowledge. London: Routledge and Kegan Paul, 33-39. [SILS LIbrary - BD241 .P65 2002]. Reprinted in Balashov, Y., & Rosenberg, A. (eds.) (2002). Philosophy of Science: Contemporary Readings. London: Routledge, 294-301. [Davis Library - Q175.3 .P49 2002; copy in Sakai resources]
  • Lakatos, I. (1970). Falsification and the methodology of scientific research programmes. In Lakatos, I., & Musgrave, A. (eds.), Criticism and the Growth of Knowledge. Cambridge University Press, 173-177. Reprinted in Delanty, G., & Strydom, P. (eds.), Philosophies of Social Science: The Classic and Contemporary Readings. Maidenhead, UK: Open University Press, 78-80. [SILS Library - H61.15 .P48 2003; copy in Sakai resources]
  • Two examples of theory validation (Read ONE; we'll briefly discuss both)
    • Fisher, K. E., Durrance, J. C., & Hinton, M. B. (2004). Information grounds and the use of need-based services by immigrants in Queens, New York: A context based, outcome evaluation approach. Journal of the American Society for Information Science and Technology, 55(8), 754-766. [UNC libraries]
    • Hyldegard, J. (2006). Collaborative information behaviour -- Exploring Kuhlthau's Information Search Process model in a group-based educational setting. Information Processing & Management, 42(1), 276-298. [UNC libraries]
  • Two examples of experimental theory testing (Read ONE; we'll briefly discuss both)
    • Harrison, A.W., Rainer, R.K., Jr., Hochwarter, W.A., & Thompson, K.R. (1997). Testing the self-efficacy - performance linkage of social-cognitive theory. Journal of Social Psychology, 137(1), 79-87. [UNC libraries]
    • Sundar, S.S., Knobloch-Westerwick, S., & Hastall, M.R. (2007). News cues: Information scent and cognitive heuristics. Journal of the American Society for Information Science & Technology, 58(3), 366-378. [UNC libraries]

Development of Grounded Theory

Session 8, March 1: Inducing theory from observation

  • Charmaz, K. (2006). An invitation to grounded theory. In Constructing Grounded Theory: A Practical Guide through Qualitative Analysis. London: Sage Publications, 1-12. [Textbook]
    • Charmaz provides a general overview of grounded theory methods, and also tells you what will be covered in the book.
  • Matavire, R., & Brown, I. (2013). Profiling grounded theory approaches in information systems research. European Journal of Information Systems, 22, 119-129. [UNC libraries]
    • You may be interested in the findings of this study of the different approaches to grounded theory methods that have been used in the information systems field, but focus your attention primarily on the authors' overview of the different approaches (p119-124).
  • Creswell, J.W. (2007). Five qualitative approaches to inquiry. In Qualitative Inquiry and Research Design: Choosing Among Five Traditions. 2nd ed. Thousand Oaks, CA: Sage, 53-84. [Copy in Sakai resources]
    • All five of these approaches have been used in ILS research. This chapter provides a useful comparison between them.

Session 9, March 8: Data collection

  • Charmaz, K. (2006). Gathering rich data. In Constructing Grounded Theory: A Practical Guide through Qualitative Analysis. London: Sage Publications, 13-41. [Textbook]
    • Charmaz covers several different data gathering methods (ethnographic methods, interviewing, textual analysis). The data set we'll be working with in class relies primarily on interviews, with a few observation notes sprinkled in.
  • Janesick, V.J. (2000). The choreography of qualitative reserach design. In Denzin, N.K., & Lincoln, Y.S. (eds.), Handbook of Qualitative Research. 2nd ed. Thousand Oaks, CA: Sage, 379-399. [SILS Reference - H62 .H2455 2000; copy in Sakai resources]
    • Janesick uses choreography to discuss how you can approach the design of a qualitative research study. She covers both your preparation for the study and the design decisions to be made during the course of the study. She also briefly discusses the criteria by which a design might be judged to be of high quality (or not). The relevance of her chapter for our purposes starts to drop off on page 390; so if you get that far and are running low on time, go right to Coyne.
  • Coyne, I.T. (1997). Sampling in qualitative research; Purposeful and theoretical sampling; merging or clear boundaries? Journal of Advanced Nursing, 26(3), 623-630. [UNC libraries]
    • In this article, Coyne untangles purposeful sampling and theoretical sampling.

March 15, Spring Break: No class meeting

Session 10, March 22: Coding and memo writing

  • Charmaz, K. (2006). Coding in grounded theory practice [and] Memo-writing. In Constructing Grounded Theory: A Practical Guide through Qualitative Analysis. London: Sage Publications, 42-95. [Textbook]
    • Chapter 3 is a really nice overview of coding practices. She first discusses and gives advice on how to do initial coding, focused coding, axial coding, and theoretical coding. Then she goes on to discuss some of the problems you may encounter with coding. She provides a few paragraphs on the logic of transforming data into codes, but read the Kelle chapter, described in the class wiki, for a fuller discussion of how to move from your data to your theoretical concepts.
    • Chapter 4 provides some examples of memos that Charmaz has written in her work, as well as tips on the memo-writing process. Very practical.

March 29, Holiday: No class meeting

Session 11, April 5: Theoretical sampling

  • Charmaz, K. (2006). Theoretical sampling, saturation, and sorting. In Constructing Grounded Theory: A Practical Guide through Qualitative Analysis. London: Sage, 96-122. [Textbook]
    • This chapter covers three topics, as its title indicates. Theoretical sampling is concerned with the augmentation of your initial sample, and is motivated by your data analysis. At some point, you need to stop collecting data; theoretical saturation is the guiding principle for that stopping decision. Throughout your analysis, you will need to sort and integrate your memos and data.

Session 12, April 12: Constructing grounded theory

  • Guest speaker at 10:45: Kaitlin Costello, Investigating information seeking and disclosure in online support groups for chronic kidney disease
  • Charmaz, K. (2006). Reconstructing theory in grounded theory studies [and] Writing the draft. In Constructing Grounded Theory: A Practical Guide through Qualitative Analysis. London: Sage, 123-176. [Textbook]
    • Charmaz sees the writing of your draft as an extension of your data analysis activities. In this chapter (on writing), she includes discussions of the construction of your argument, re-examining your conceptual categories, incorporation of the "disputed" literature review, and actually writing the theoretical framework.
  • Glaser, B.G., & Strauss, A. (1967). Insight and theory development. In The Discovery of Grounded Theory: Strategies for qualitative Research. New York: Aldine de Gruyter, 251-257. [Copy in Sakai resources]

Session 13, April 19: Presentations

  • Brief oral presentations for each seminar participant's study proposal

Session 14, April 26: Recap on role of theory in science

  • Charmaz, K. (2006). Reflecting on the research process. In Constructing Grounded Theory: A Practical Guide through Qualitative Analysis. London: Sage Publications, 177-185. [Textbook]
  • Vakkari, P., & Kuokkanen, M. (1997). Theory growth in information science: Applications of the theory of science to a theory of information seeking. Journal of Documentation, 53(5), 497-519. [UNC libraries]
  • Additional readings of interest

Monday, May 6, 8am (Final exam period)


Syllabus / Schedule / Assignments / Sakai class site


Creative Commons LicenseThe INLS 887 website, UNC-CH, 2011, is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. Address all comments and questions to Barbara M. Wildemuth at [email protected]. This page was last modified on April 11, 2013, by Barbara M. Wildemuth.

table { }td { padding-top: 1px; padding-right: 1px; padding-left: 1px; color: black; font-size: 12pt; font-weight: 400; font-style: normal; text-decoration: none; font-family: Calibri,sans-serif; vertical-align: bottom; border: medium none; white-space: nowrap; }.xl65 { color: black; font-family: Calibri,sans-serif; }

Faculty Last Name Institution Reading List
Lievrouw UCLA Bronner, S.E. (2011). Critical Theory: A Very Short Introduction. Oxford and New York: Oxford University Press.
Day, R.E. (2001). The Modern Invention of Information: Discourse, History and Power. Carbondale and Edwardsville: Southern Illinois University Press.
Said, E.W. (1994). Representations of the Intellectual. New York: Vintage. (Links to podcasts of the 1993 lecture series also available on the course website.)
Sherratt, Y. (2006). Continental Philosophy of Social Science: Hermeneutics, Geneaology and Critical Theory from Greece to the Twenty-­‐First Century. Cambridge and New York: Cambridge University Press.
Said, Edward W. (1994). Representations of the Intellectual. New York: Vintage Books.
Dick, A.L. (1999). Epistemological positions and library and information science. Library Quarterly 69(3), 305-­‐323
Capurro, R. (1992). What is information science for? A philosophical reflection. In Conceptions of Library and Information Science: Historical, Empirical and Theoretical Perspectives, P. Vakkari and B. Cronin (Eds.), pp. 82-­‐96. London: Taylor Graham.
Fallis, D. (2008). Toward an epistemology of Wikipedia. Journal of the American Society for Information Science and Technology, 59(10), 1662-­‐1674.
Goldman, A. (1999). Epistemology and postmodern resistance. In Knowledge in a Social World, pp. 3-­‐40. Oxford: Oxford University Press.
Anderson, J.A. (1996). The nature of the phenomenal world. In Communication Theory: Epistemological Foundations, pp. 13-­‐46. New York: Guilford.
Fallis, D. (2006). Social epistemology and information science. Annual Review of Information Science & Technology (ARIST), 40, 475-­‐519.
Zandonade, T. (2004). Social epistemology from Jesse Shera to Steve Fuller. Library Trends, 52(4), spring, 810-­‐832.
Matthews, P. and Simon, J. (2012). Evaluating and enriching online knowledge exchange: A socio-­‐ epistemological perspective. In A.A. Lazakidou (Ed.), Virtual Communities, Social Networks and Collaboration: Annals of Information Systems 15, 35-­‐59. New York: Springer.
Kitcher, P. (1994). Contrasting conceptions of social epistemology. In F.F. Schmitt (Ed.), Socializing Epistemology: The Social Dimensions of Knowledge, pp. 111-­‐134. Lanham, MD: Rowman & Littlefield.
Shera, J.H. and Egan, M.E. (1952). Foundations of a theory of bibliography. Library Quarterly 22(2), April: 125-­‐137.
Fuller, S. (1996). Recent work in social epistemology. American Philosophical Quarterly 33(2), April: 149-­‐166.
Gillies, D. (1993). Philosophy of Science in the 20th Century: Four Central Themes. Oxford: Blackwell. Chapter 2, Popper’s Critique of Inductivism. His Theory of Conjectures and Refutations (or Falsificationism), pp. 26-­‐53.
Gillies, D. (1993). Philosophy of Science in the 20th Century: Four Central Themes. Oxford: Blackwell. Chapter 1, Some Historical Background: Inductivism, Russell and the Cambridge School, the Vienna Circle and Popper, pp. 3-­‐25.
McGinn, C. (2002). Looking for a black swan. New York Review of Books, 49(18), November 21, 46-­‐50. Popper, K.R. (1968). Epistemology without a knowing subject. In Proceedings of the Third International Conference for Logic, Methodology and Philosophy of Science (Amsterdam, August 25-­‐September 2, 1967), B. van Rootselaar and J.F. Staal (Eds.), pp. 333-­‐373. Amsterdam: North-­‐Holland.
BBC Podcasts, In Our Time: “Popper” (8 February 2007; audio, 45:00). Available for download via iTunes or from the BBC: http://www.bbc.co.uk/programmes/b00773y4 .
BBC Podcasts, In Our Time: “The Scientific Method” (26 January 2012; audio, 45:00). Available for download via iTunes or from the BBC:  http://www.bbc.co.uk/programmes/b01b1ljm .
Bloor, D. (1991). Knowledge and social imagery: A case study. In Knowledge and Social Imagery (2nd ed.), pp. 55-­‐83. Chicago, IL: University of Chicago Press.
BBC Podcast, In Our Time: “Baconian Science” (2 April 2009); audio, 21:30). Available for download via iTunes or from the BBC:  http://www.bbc.co.uk/programmes/b00jdb6c .
Brookes, B.C. (1980). The foundations of information science, Part I: Philosophical aspects. Journal of Information Science, 2, 125-­‐133.
Davies, R. (1989). The creation of new knowledge by information retrieval and classification. Journal of Documentation, 45(4), December, 273-­‐301.
Cronin, B. (2008). The sociological turn in information science. Journal of Information Science, 34(4), 465-­‐475
Hjørland, B. (2005). Empiricism, rationalism, and positivism in library and information science. Journal of Documentation, 61(1), 130-­‐156.
Sherratt, Y. (2006). Continental Philosophy of Social Science: Hermeneutics, Genealogy and Critical Theory from Greece to the Twenty-­‐First Century. Cambridge and New York: Cambridge University Press. Introduction to Part I, The tradition of hermeneutics, pp. 17-­‐22. German philosophical hermeneutics: Phenomenology and existentialism, pp. 74-­‐84. Continental philosophical hermeneutics post war, pp. 85-­‐118.
Rabinow, P. and Sullivan, W.M. (1987). The interpretive turn: A second look. In P. Rabinow and W.M. Sullivan (Eds.), Interpretive Social Science: A Reader, pp. 1-­‐30. Berkeley: University of California Press.
Hacking, I. (1999). Why ask what? In The Social Construction of What?, pp. 1-­‐35. Cambridge, MA: Harvard University Press. 65(3): 295-­‐318.
Cornelius, I. (1996). Meaning and Method in Information Studies. Norwood, NJ: Ablex. Chapter 5, Interpretation in library and information studies, pp. 85-­‐96. Chapter 6, Objections to the interpretive position, pp. 97-­‐120.
Harris, M.H. (1986). The dialectics of defeat: Antinomies in research in library and information science. Library Trends, 34, Winter, 515-­‐531.
Mink, L.O. (1966). The autonomy of historical understanding. History and Theory, 5(1), 24-­‐47.
White, H. (1987). The question of narrative in contemporary historical theory. In The Content of the Form: Narrative Discourse and Historical Representation, pp. 26-­‐57. Baltimore, MD: Johns Hopkins University Press.
MacRaild, D.M. and Taylor, A. (2004). Social Theory and Social History. Basingstoke and New York: Palgrave Macmillan. Introduction, pp. 1-­‐8, Chapter 1, “Cinderella gets her prince? The development of social history,” pp. 9-­‐32.
Rayward, W.B. (1998). The history and historiography of information science: Some reflections. In T. Bellardo Hahn and M. Buckland (Eds.), Historical Studies in Information Science, pp. 7-­‐21. ASIS Monograph Series. Medford, NJ: Information Today, for the American Society for Information Science.
Black, A. (2006). Information history. Annual Review of Information Science & Technology (ARIST), 40, 441-­‐473
Sherratt, Y. (2006). Continental Philosophy of Social Science: Hermeneutics, Genealogy and Critical Theory from Greece to the Twenty-­‐First Century. Cambridge and New York: Cambridge University Press. Part III: Critical theory, pp. 175-­‐221.
Bronner, S.E. (2011). Critical Theory: A Very Short Introduction. Oxford and New York: Oxford University, Press. (whole book recommended; last three chapters required); Chapter 6: The happy consciousness, pp. 77-­‐88, Chapter 7: The great refusal, pp. 89-­‐99, Chapter 8: From resignation to renewal, pp. 100-­‐116.
Ryan, A. (2003). The power of positive thinking. New York Review of Books, 50(1), 43-­‐46.
BBC Podcast, In Our Time:  “The Frankfurt School” (14 January 2010; audio, 45:00). Available for download via iTunes or from the BBC:  http://www.bbc.co.uk/programmes/b00pr54s .
Comstock, D.E. (1994, 1982). A method for critical research. In M. Martin and L.C. McIntyre (Eds.), Readings in the philosophy of social science, pp. 625-­‐639. Cambridge, MA: MIT Press. (Reprinted from E. Bredo and W. Feinberg [Eds.], Knowledge and values in social and educational research, pp. 370-­‐390. Philadelphia, PA: Temple University Press.)
Lunenfeld, P. (2008). Gidget on the couch. The Believer, June.
Kellner, D. (n.d.) Theorizing New Technologies. Manuscript available from the author.
Budd, J.M. (2001). Instances of ideology in discursive practice: Implications for library and information science. Library Quarterly, 71(4), October, 498-­‐517.
Day, R.E. (2001). The Modern Invention of Information: Discourse, History and Power. Carbondale and Edwardsville: Southern Illinois University Press (whole book recommended; three chapters required): Introduction, pp. 1-­‐6. Chapter 5, Heidegger and Benjamin: The metaphysics and fetish of information, pp. 91-­‐113. Chapter 6, Conclusion: ‘Information’ and the role of critical theory, pp. 114-­‐120
Warner, J. (2001). W(h)ither information science?/! Library Quarterly, 71(2), April 243-­‐255.
Day, R.E. (2005). Poststructuralism  and information studies. Annual Review of Information Science & Technology (ARIST), 39, 575-­‐609.
Latour, B. (1993). Crisis. In We Have Never Been Modern, pp. 1-­‐12. Translated by C. Porter. Cambridge, MA: Harvard University Press.
Latour, B. (2004). Why has critique run out of steam? From matters of fact to matters of concern. Critical Inquiry, Winter, 225-­‐248.
Cusset, F. (2008). French Theory: How Foucault, Derrida, Deleuze, & Co. Transformed the Intellectual Life of the United States. (Trans. J. Fort, with J. Berganza and M. Jones). Minneapolis and London: University of Minnesota Press. (Originally published in French as French Theory: Foucault, Derrida, Deleuze & Cie et les mutations de la vie intellectuelle aux États-­‐Unis. Éditions La Découverte, 2003). Chapter 4: Literature and Theory, pp. 76-­‐106. Chapter 6: The Politics of Identity, pp. 131-­‐165.
Calhoun, C. (1995). Critical Social Theory: Culture, History and the Challenge of Difference. Oxford and Cambridge, MA: Blackwell. Introduction, pp. 1-­‐12. Rethinking critical theory, pp. 13-­‐54.
Blanchette JF Lorraine Daston & Peter Galison, Objectivity. Zone Books, 2007.
Ron Eglash, African Fractals: Modern Computing and Indigenous Design. Rutgers University Press, 1999.
James Gleick, The Information: A History, A Theory, A Flood. Pantheon, 2011.
Bruno Latour, Aramis, or the Love of Technology. Harvard University Press, 1996.
• Andrew Pickering, The Cybernetic Brain: Sketches of Another Future. University of Chicago Press, 2010.
• Sergio Sismondo, An Introduction to Science and Technology Studies, 2nd ed.
Wiley-Blackwell, 2009.
• Jonathan Sterne, MP3: The Meaning of a Format. Duke University Press, 2012.
• Derek de Solla Price, Little Science, Big Science, Columbia University Press,
1963. (out of print and hard to find, photocopy available from the instructor).
Schedule of readings
Week 1 (January 7)
Sismondo, An Introduction to Science and Technology Studies.
Each participant will present one of the (randomly assigned) 17 chapters during class, for about 5-7 minutes. No written essay required.
Week 2 (January 14)
Latour,  Aramis.
Week 3 (January 21)
No class, Martin Luther King, Jr. holiday.
Week 4 (January 28)
Daston & Galison, Objectivity.
Week 5 (February 4)
de Solla Price, Little Science, Big Science.
Jonathan Furner, Little book, big book: Before and after Little science, big science: A
review article, Part I. Journal of Librarianship and Information Science 35 (2003): 115-
125
Jonathan Furner, Little book, big book: Before and after Little science, big science: A
review article, Part II. Journal of Librarianship and Information Science 35 (2003):
189-201.
Michel Callon, John Law and Arie Rip, “Qualitative Scientometrics,” in Callon, Law and Rip (eds) Mapping the Dynamics of Science and Technology, MacMillan Press, 1986.
Jason Priem, Dario Taraborelli, Paul Groth, Cameron Neylon, “Altmetrics: a manifesto,” http://altmetrics.org/manifesto/, 2010 (read comments as well).
Week 6 (February 11)
Eglash, African Fractals.
Week 7 (February 18)
No class, President’s Day holiday.
Week 8 (February 25)
Pickering, The Cybernetic Brain.
Week 9 (March 4)
Sterne, MP3.
Week 10 (March 11)
Gleick, The Information.
Srinivasan 291C Week 1  Introduction to Course / Initial Material Discussion
Week 2  A World of Uncanny Networks and Global Flows
1.     Poster, M. – Global Media and Culture
2.     Appadurai – Difference and Disjuncture in the Global Cultural Economy
3.     Manovich, L. – What is New Media, 8 Propositions
4.     Lovink et al – The Digital Given: 10 Web 2.0 Theses - http://fourteen.fibreculturejournal.org/fcj-096-the-digital-given-10-web-2-0-theses/
5.     Coleman – Ethnographic Approaches Toward Digital Media
6.     Kevin Kelly @TED
7.     Lessig @Google
Week  3  Citizenship, Power and the Cosmopolitan Subject
1.     Ginsburg, F – Re-thinking the Digital Age
2.     Shome - Thinking through the diaspora: Call centers, India, and a new politics of hybridity- International Journal of Cultural Studies.2006; 9: 105-124
3.     Zuckerman, E. – Media Tracking And The Quantified Self - http://www.ethanzuckerman.com/blog/2010/09/09/media-tracking-and-the-quantified-self/
4.     Foran, J. – Global Affinities: The New Cultures of Resistance behind the Arab Spring.
5.     Srinivasan, R. – Bridges Between Digital And Cultural Worlds in Revolutionary Egypt
6.     Srinivasan, R. – Taking Power Through Technology in the Arab Spring – Al Jazeera English - http://www.aljazeera.com/indepth/opinion/2012/09/2012919115344299848.html
7.     Zuckerman@TED
8.     Al Jazeera’s The Stream – Egypt’s Digital Battle
9.     30 Days
Week  4  Ways of Seeing and Ways of Being: The Question Concerning Technology
1.     Turnbull, D. - Messy Assemblages, Emergent Protocols, and Emergent Knowledges: Complex Adaptive Systems and the Possibilities of Sustaining Multiple Ontologies and the Cultural Commons in New Ways of Assembling and Creating Knowledge.
2.     Popper, K. – Epistemology without a Knowing Subject
3.     Clifford, J. – Museums as Contact Zones
4.     Foucault, M. – The Discourse on Language
5.     Verran, H. – A Postcolonial Moment in Science Studies – Alternative Firing Regimes of Environmental Scientists and Aboriginal Land Owners.
6.     Transcendent Man (Kurzweil)
7.     Latour @ANN
Week 5  The Digital and Ontological: An Indigenous Touch
1.     Srinivasan, R. – Re-thinking the Cultural Codes of Global New Media, New Media and Society, 2012.
2.     Srinivasan, R., Boast, R. et al – “Diverse Knowledges and Contact Zones in the Digital Museum”, Science Technology and Human Values, in press. (2009).
3.     Geismar, H. – “Social relationships and Digital relationships: Re-thinking the Database at the Vanuatu Cultural Center”, 2011.
4.     Philip et. al – Postcolonial Computing: A Tactical Survey – Science, Technology and Human Values. 2010.
5.     Eglash@TED
6.     The Fast Runner
7.     WE ARE LEGION: THE STORY OF THE HACKTIVISTS
IS Colloquium with Rina Bliss (Brown University)
Week 6  The Internet: Who made that? Who hacked That?
1.     Boast, R. – Ghost in Machine, Reaktion Book Proposal
2.     Fish, A. – The Internet: Who Built That?
3.     Turner, F. – Where The Counterculture Met The New Economy: The Well and the Origins of the Virtual Economy., Technology and Culture. 2005.
4.     Coleman, G. and Golub, A. “Hacker practice: Moral genres and the cultural articulation of liberalism”: Anthropological Theory, 2008.
5.     All Watched Over By Machines Of Loving Grace (Adam Curtis)
6.     Das Netz (Dammbeck)
Week 7  Network Analyses and Cultures
1.     Granovetter, M. – The Strength of Weak Ties.
2.     Emirbayer and Goodwin – Network Analysis, Culture, and the Problem of Agency
3.     Sawhney and Suri - Lateral Connectivity at the Margins: Ritual Communication and Liminality on Aboriginal Networks
4.     Papacharissi, Z. – The Virtual Sphere: the Internet as Public Sphere
5.     Granovetter @Yahoo!
Week 8  Appropriation and Subversion
1.     Christie, M. and Verran, H. – Computer Databases As Aboriginal Knowledge
2.     Srinivasan, R. – Re-thinking Cultures and Divides: The Case For Reflective Media. The Information Society. 2012.
3.     Burrell, J. – User Agency and the Reinvention of the Internet in Ghana - Science, Technology and Human Values, forthcoming.
4.     Wallack, J.S, and Srinivasan, R. – Bridging the Digital Divide Through Mismatched Ontologies. 2008. HICSS Proceedings.
5.     Witness Videos/Burma VJ
6.     OLPC (Negroponte)
7.     Digital Divide/Uganda/DNC
Week 9  No Class
Week 10  Some Final Bridges and Lenses
1.     Josh Kun (start of talk)
2.     Parks – Animating Archives
3.     Explore Kiva, World of Good, Samasource (social enterprise sites)
4.     Ivatury, G. and Pickens, M. – Mobile Phones for Microfinance Handbook.
5.     Parks, L. – Exploring Satellite Awareness – An Interview with Geert Lovink - http://networkcultures.org/wpmu/weblog/2005/11/01/out-there-exploring-satellite-awareness/
6.     DJ/Rupture – Blog Entry
7.     McChesney, R. - Global media, neoliberalism & imperialism - http://www.thirdworldtraveler.com/McChesney/GlobalMedia_Neoliberalism.html