Egyptian and American Internet-Based Cross-Cultural Information Seeking Behavior. Part I: Research Instrument
Journal Title: Webology - Year 2006, Vol 3, Issue 4
Abstract
This article is the first of three in an exploratory study of the cross-cultural, cross-language information-seeking (IS) behavior of a group of eighty-four academic and public reference librarians from Egypt and the USA. The present article describes the design of the cross-cultural research instrument used to record the behavior of participants when presented with a choice of information resources in several languages unfamiliar to them. A review of literature demonstrates the need in cross-cultural investigations for a multi-tiered approach that allows analysis from different perspectives. A detailed description of the design rationale for the interview model is given, which includes a cultural background questionnaire providing data designed to enable comparative analysis of the search performance of sub-groups. Instructions on how to manage cross-language searches complete the interview. A discussion of the usefulness of the methodology in discerning cultural universals, differences, and the IS needs of cross-cultural researchers is followed by conclusions and suggestions for further research.
Authors and Affiliations
Paul L. Hover
International Actions against Cybercrime: Networking Legal Systems in the Networked Crime Scene
This article reviews the international impetus of criminal law reform in combating cybercrime. This article classifies actions of international harmonization into professional, regional, multinational and global actions,...
Information Society: Analyzing Problems and Prospects of Using Information Technologies, Computers and Communication Networks
The study is devoted to actual issues of using information technologies, computers and communication networks by the Russian citizens and companies. World experience shows that the competitiveness of the national economy...
Distributed Denial of Service Attack Detection in Application Layer Based on User Behavior
Distributed Denial of Service (DDoS) attacks are a threat to the security of red. In recent years, these attacks have been directed especially towards the application layer. This phenomenon is mainly due to the large num...
A study of journal publication attributes: Some considerations for academics in the information systems discipline
This paper reports on research that examined the publication attributes of highly rated information systems journals. Publishing attributes investigated include journal age and size, circulation, number of articles publ...
The impact of information and communication technologies on book challenge trends in the United States: An analysis
The rapid growth of information and communication technologies (ICT), such as personal computing, the explosive proliferation of computing devices, and widespread availability of the Internet, has led to a sea change in...