Thursday, February 12, 2009

The Internet and Mental Health

When psychologist Andrew Campbell began his doctoral studies in 1997, a faculty member strongly urged him to rethink his interest in pursuing how the Internet impacts adolescent health. The Internet is a passing fad, the professor said. It would be dead by 2001.

Needless to say, the faculty member was a little off the mark, and what Campbell began researching has become a booming field of study—cyberpsychology, or the influence of the Internet on human behavior.
Campbell, director of Prometheus and lecturer in psychology at the University of Sydney Faculty of Health Sciences, shared his experiences as a cyberpsychologist during the closing plenary, “The Impact of Information Science and Technology and Mental Health,” at the 2009 iConference.


During his presentation, he touched on how the Internet has become a tool for delivering educational and preventive information to patients, a supportive network for patients to interact with each other, a tool to provide telemedical services to people around the globe, a venue for medical counseling and advising, and a simulated environment that can be used for healing a variety of afflictions, to name a few.


He also described the social and physiological changes occurring in Generation X and Y, including a sharp increase in depression and emotion disorders. “They are highly susceptible to depression and mental illness,” Campbell said. “It had increased four-fold in teen-agers and adolescents in the past decade.”

He stopped short of directly relating their use of technology and online socializing to these increases, but he said it is being studied.

Campbell also said he sees great potential for new uses of social networking and Web 2.0 technologies in therapies and treatments. He presented one such case of a child diagnosed with attention deficit/hyperactivity disorder, who used a relaxing virtual world game that responded to the child’s breathing patterns to treat the illness and then could avoid having to take medicines with possible harmful side effects.


Serious games are also being used to conduct preventive medicine trainings, and researchers are trying to find new ways to incorporate more gaming and virtual environments in cyber-medicine. These methods, researchers are discovering, are effective not only for children and teens, but also adults and aging populations.

Wednesday, February 11, 2009

What can IT do to be green?

Syracuse Ph.D. student Shuyuan Mary Ho and professional performance systems developer Conrad F. Metcalfe challenged attendees to move toward life-cycle thinking in IT development, use, and implementation.

They outlined three fundamental problems:
· use of fossil fuels growing, but supplies are declining
· environmental degradation—cost to environment for producing toxins
· climate change—human activities are changing the climate

In terms of green IT, they said there were several areas where the field can contribute to solutions. The first was designing from “cradle to cradle” rather than “cradle to grave,” which also could include extending the average two-year life expectancy of laptops, cell phone, and mobile devices.

Other areas where IT can assist in becoming greener is by adapting wireless grid technologies to redirect access energy from one item to another, using software in place of hardware when possible, and creating innovative modeling software to reduce energy waste.

“While there are many factors to consider, the IT community plays a critical role in creating a sustainable, green future,” Ho said.

Developing a Joint EU-US Digital Library Curriculum

Scholars from both sides of the Atlantic, including panelist Syracuse Professor Jian Qin,
met Wednesday morning to talk about developing a joint European Union-United State digital library curriculum.

The Bologna Project, which was created in Europe and is dedicated to improving graduate education programs internationally, has started taking steps toward building these collaborative partnerships.

For example, in the past language and the variation of meaning in the same academic discipline even prevented joint courses from being taught in European countries. Now, they have changed the framework to focus more on learning outcomes so that people are clear what the objectives are and what skills will be taught, which translates across national borders.

In the United States, however, collaborative digital library courses often occur around common topics and among American Library Association accredited schools.

Also, digital libraries in the United States focus more on the cyberinfrastructure and information management related issues, while Europe is more interested in cultural heritage issues.

The panelists provided an update on the status of the efforts to develop joint EU-US Digital Library Curriculum, and invited others to become active with a group of the 10 American and European universities and institutions to help move this process forward.

Online Teaching Experiences

Many college students—whether campus based or distance learning—today have taken at least one course online and most are very familiar with online learning environment. A group of faculty and Ph.D. students, led by panelist Syracuse Professor Kevin Crowston, gathered Wednesday morning to discuss how online courses have changed the teaching experience for faculty and learning for students.

The group raised a variety of issues including the impact to content, social interactions, assessment, privacy, plagiarism, and learning styles.

Participants varied in their experiences when it came to campus-based students’ enjoyment and involvement in taking courses online. One school reported that its graduation rates were highest among students who both took campus-based and distance-learning courses.

Online learning works well in skill development courses and in stretching the amount of time for interactions among students and teacher beyond the traditional scheduled “class hours.”

Sharing work in a public online forum also tended to raise the bar for students. “If you know your peers will be checking your work, maybe you’ll try it a little harder,” Crowston said.

Participants that they had to find new ways of assessment as all quizzes and tests had to be “open book,” and most had done away with timed exams, opting instead for final projects that showcased the application of the knowledge acquired over the course of the semester.

Questions were raised about the definition of learning and knowledge. Is it mean being able to apply what you learn or be able to recall the information from memory?

“In the courses I teach, knowledge means being able to use tools,” Crowston said.

The group also discussed tools to detect plagiarism, which is easy to do with so much information available online.

"It's easier today for us to catch plagiarism than it is for students to do it," one participant concluded.

Tuesday, February 10, 2009

Ph.D posters

ICTs for Syngery: A Case Study of Scientific Knowledge and Local Farmers' Innovative Activities in Ghana

Benjamin Addom
Winner of the Best Poster Award




Automated Detection of Subject Area for Question Triage in Digital Reference


Keisuke Inoue





Computational Community Interest and Comments Centric Analysis Ranking

Xiaozhung Liu, Vadim Brzeski







Image-Enabled Discourse: A Preliminary Descriptive Investigation

Jaime Snyder




Group Maintenance Behaviors in the Decision-Making Styles of Self-Organizing Distributed Teams

Michael Scialdone (with Qing Li, Kevin Crowston, Robert Heckman)







Exploring Impacts on Older Adults' E-Services Usage

Johanna Birkland







The Value of Public Sector Information As a Strategic Resource to Civil Society Organizations' in South Africa: Evidence from the Fight to Eradicate Poverty

Raed M. Sharif




The Classification of Religion Topics in Wikipedia: Examining an Evolution

David M. Pimental






Interdisciplinary Diversity in the iSchool Community

Andrea Wiggins







The Impact of National Culture on Knowledge Sharing Activities in Global Virtual Collaboration: The Chinese Case

Kangning Wei






Exploring the Use of Ontological Relations in Information Retrieval

Miao Chen






Two Cans on a String: Technical, Social, and Legal Barriers to Effective Information Sharing Among Federal, Tribal, State, and Local Law Enforcement

Joseph Treglia





  • How Does Web Advertising Affect Users' Information Seeking, Website Evaluation, and Source Evaluation?

Youngseek Kim

  • The Theory of Trustworthiness Attribution for Countering Insider Threats for Virtual Organizations

Shuyuan Mary Ho

Insider threats and trustworthiness


Insider threats—security risks posed by people from within an organization—accounted for 37 percent of the $57 million in losses to fraud last year. Employees maliciously stealing information or carelessly handling sensitive information is a serious issue in a variety of industries, government agencies, and other organizations.

Syracuse Ph.D. Shuayan Mary Ho seeks to understand this phenomenon and describe trustworthiness in a way that can be quantified.

Unfortunately, no company is willing to open itself up to share this type of data so Ho created her own environment to study this behavior.

Using student volunteers, she created a game within the Syracuse iSchool learning management system that tested the students’ perceptions of the trustworthiness of their team leader. The leader of each team had an extra 200 imaginary cash (MerryBux), and the game involved whether the leader shared the money or pocketed it.

A mole was planted to influence the teams’ behaviors, including wearing away people’s suspicions of their leader to see if they follow a predictive model. They did.

Leaders who showed an inconsistency between words and behavior received low scores from team members on trustworthiness. Over the course of the five-day scenario, some team members started planning to stage uprisings and oust the team leader.

Ho hopes to expand on this study and apply to other environments.

iSchools responding to man made catastrophes


What are iSchools doing to help prepare for and respond to man made disasters such as a terrorist attack? That was the topic of a panel Tuesday morning that featured Syracuse iSchool Dean Elizabeth D. Liddy.

The panelists outlined the areas in which they felt iSchools could contribute to dealing with these major catastrophes: modeling scenarios, prediction, mitigation, response, real-time synthesis, and human performance and training.

Pittsburgh iSchool Dean Ron Larsen described a project he worked on for the Department of Defense that sought to detect underground nuclear facilities. His role was to collect what he called second-order information—not using ground penetration radar, but rather tracking heavy equipment shipments or materials delivery. He stressed the iSchool’s holistic approach to problems—combining technical information with social and psychological information.

Liddy focused much of her comments on the role iSchools play in predicting and preventing these catastrophes by analyzing communications, such as e-mails, text messaging, and blogs through natural language processing.

“In these man-made extreme event scenarios, the police, defense, and intelligence communities frequently do have some means to anticipate such events, and thereby make them more predictable and therefore potentially more preventable,” Liddy said.

She talked about how researchers can develop and apply predictable models to this data to weed through the massive amounts of information to find the “needle in the haystack,” or expressions about a planned attack.

Natural language processing has gotten good at mining words with their denotative meanings, and now researchers are focusing on developing automated process to examine the connotative meaning of words and emotive words, Liddy said.

To do this, Liddy said researchers have to find public data from which they can study and build these models and technologies. The data from such cases as Enron are being used, as are data from open source developers who are building archives of e-mail exchanges, papers, and other communications relating to the development of that field.

Other panelists talked about the role psychology and international context can play in these extreme events. Panelists agreed that iSchools are the optimal source of research and solutions in these extreme events because iSchools excel in human-driven technology, information that needs to be processed by both humans and machines, and evaluating the usefulness/effectiveness of technology for humans.

Gaming in iSchools


The diversity of participants in the gaming discussion Tuesday morning at the iConference paralleled the broad range of research interests related to gaming.

Gaming enthusiasts and researchers representing geographic areas from Croatia to China to State College, Pennsylvania, gathered together to discover what others are doing in advancing gaming as increasingly significant field within iSchools.

Syracuse Professor Scott Nicholson and Associate Dean for Academic Affairs Ian MacInnes led the discussion and described their recent research interests as they relate to gaming.

Nicholson heads a $1 million project that is examining the use of gaming in libraries to attract new patrons, mainly teen-agers and adults without children, and create a community hub. He and his research team are creating tools to assess the use of games in libraries and will make those assessment tools available to librarians across the globe through an online form.

Their responses will feed the data pool, which then can be analyzed and returned to game developers and others about the demographics of gamers in libraries.

Nicholson reported how a local Syracuse library instituted 14 new gaming events over the course of a year and how that activity not only attracted teens to the library, but also how those young people formed relationships with senior citizens who also took up gaming at the library.

MacInnes said his interest in gaming stemmed from the monetization of virtual worlds and the business model that was developing for companies to participate in these new spaces. One such idea was the development of paid advertising within virtual worlds—avatars drinking Coca-Cola or wearing Ralph Lauren, for example.

Others, such Ph.D. student Joey Lee from Penn State were interested in designing games for education use. One of his projects involved creating a game that would educate people about Asian American identities and fighting stereotypes.

Another researcher created serious games about health issues, such as getting college bound students to get their shots by showing a dorm filled with creepy crawlers ready to infect them. The idea, she said, was to ridicule the gamers who had not gotten their shots and creating peer pressure to do so.

The group also brainstormed ways in which the iSchools could bring something unique to gaming that other disciplines might not be able to do. Ideas ranged from educational uses to collaborative design to influencing game development and other areas that bring together multiple disciplines and perspectives.

Are blogs and social networking sites fair game for researchers?


For researchers, virtual environments and social networking sites are full of rich data that can be used in a number of ways—to better understand how communities/groups develop, how technology is being adopted to reach a variety of goals, and a host of other interdisciplinary research topics.

But what are the issues of ethics, privacy, and ownership that arise in harvesting this data?

People post information about themselves to sites like Facebook, LinkedIn, SecondLife, Twitter, and blogs—public sites with limited restrictions on access. So if people are willing to publish this information openly, can’t researchers use it?

It depends, according to participants involved in a session on online survey-based data collection led by Syracuse Associate Dean Jeff Stanton and Ph.D. student Aggie Kwiatkowska.

Several regulations, including the Family Educational Rights and Privacy Act (FERPA) and institutional review board (IRB) guidelines, limits the use of data—particularly qualitative information—that can be traced back to a specific individual.

Some researchers said they try to develop their own online communities with volunteers who are willing to participate, but the work and resources that go into building the community takes away from the research they hope to conduct in this space. It’s also a controlled environment as opposed to the more natural environments such as Facebook.

Another researcher raised the issue of why blogs can’t be quoted like any other published article or book, and another wondered if student work that is posted on a public space such as blog or web site can be used in research or if that violates IRB or FERPA rules.

Panelists said these questions are currently being answered on a case-by-case basis, and that there is no black and white when it comes to these emerging social networking spaces.

Can Internet access reduce corruption worldwide?


Syracuse Professor Martha Garcia-Murillo wants to know if access and use of the Internet can reduce corruption globally. She presented preliminary findings of data collected from 180 countries that clearly identified political and economic factors, which directly correlated to corruption.

The more politically unstable a country, the more incidents of corruption there are, she said. As a country’s wealth increases, corruption decreases. As press within a country becomes more empowered and free, the incidents of corruption within that country decrease.

But when it came to Internet use, the results weren’t as clear. The results were all over the map. But why?

Garcia-Murillo suggested that in developing countries, the Internet is not considered a credible source. Many of these countries also have low rates of Internet use. Also, people are being overwhelmed with information, including information from governments. This information overload can distract people from noticing what information is missing or from finding the information that might show incongruities.

Illegal downloading among college students study


College students today are savvy and know how to find what they want online including copyrighted music, music, and software downloads. But just how pervasive is this problem and how are accessing these file?

Syracuse iSchool Associate Dean for Research Jeff Stanton and Ph.D. student Isabelle Fagnot led a study at Syracuse University to find out. They interviewed a small sample of nine undergraduates to do some preliminary information gathering, and then conducted a larger anonymous paper survey of 164 students, and an even larger web-based survey of 404 students.

They asked students a series of questions hoping to determine whether they were downloading copyrighted material, uploading this material, or sharing files only with friends on an individual basis.

They discovered that about 3/4 of students were participating in peer-to-peer downloading, about ½ were downloading software, 1/3 were sharing with friends, and about 13 percent were uploading copyrighted content for others to download.

One of the most interesting findings of his study was that students who were most aware of the illegal nature of downloading copyrighted materials were also the most likely to engage in the behavior. Also, the better educated a student that he was in information security, the more likely he was to share files with his peers.

Stanton also asked students to suggest ways that the university can help prevent students from doing this, and passed that information along to university.

Attendees at the iConference also suggested ways that universities can prevent this, including following the library model, of licensing music that students could access.

Monday, February 9, 2009

Little eScience, Big eScience


eScience goes by many names, including cyberinfrastructure, but its basic meaning is the same: It is the use of information and communications technology (ICT) to support scientific work. ICTs enable research progress by providing access to data, resources, and people. Science is changing and becoming more reliant on digital resources.

Many people are familiar with “big eScience”—these are large, well-funded projects with many researchers that are all working toward the same goal, such as the human genome project to map and identify human genes or the physicists who work on the Large Hadron Collider at CERN in Switzerland.

“Big eScience” researchers share data with each other, use the same tools, and are consistent in building repositories of their work. They get large, sometimes international grants to support their work.

Little eScience, on the other hand, involves perhaps only a couple researchers—a professor and a graduate assistant, and explore issues and new theories. The ICT issues for “Little eScience” researchers are different. These people generally are more protective of their data, and the tools and metadata they use vary from researcher to researcher.

Syracuse professors Steve Sawyer and Kevin Crowston and Ph.D. student Andrea Wiggins examined the differences between little and big eScience access to data, resources, and people, and suggested ways in which little eScience researchers could take steps to build their digital support systems.

For example, Wiggins suggested little eScientists create metadata standards, use analysis workflows, and build preprint repositories of their research. But she also said that there needs to be incentives and input of funding and human resources for these changes to occur.

The Pros and Cons of Automating the Tracking of Suspicious Behavior Online


Technology can be used to help track and catch criminals, ranging from terrorists and organized criminals to those who commit credit card fraud. But a national platform would be a more comprehensive solution to flagging suspicious behavior and preventing crimes as well as apprehending criminals.

Similar technology is currently being used to track Internet-users behavior online—what sites they visit, what they purchase, what they search for, and sometimes even where they’re located when using the Internet. But what is the feasibility of developing a national platform to flag suspicious behavior? What would be the social implications of such a technological solution?

Moderating by Syracuse doctoral students Joe Treglia and Shuyuan Mary Ho, a panel of intelligence, fraud detection, and academic experts discussed this notion of a national behavioral anomaly detection platform.

Treglia and Ho explained that the platform would provide a “statistical firewall” by creating a system of automated analysis of data indicating incidents of malicious behavior, patterns, or activities across a wide variety of industries. The system would employ spider technologies and data mining to pull relevant information from such sources as banks, telephone companies, airlines, and Internet service providers.


Much of the discussion focused on the public perception of such a tool and the threat it posed to individual privacy. Although some retailers currently track people’s behaviors online to better target their marketing without too much resistance from the public, participant doubted the public would be as permissive with law enforcement agencies collecting similar information.

For the information to be useful to a law enforcement agency, the data has to be tracked to a specific individual. The public would have to be aware and approve of such tracking, and even then, some question the ethics of doing so.

“I told my children that I would read their text logs, so they knew I’d be checking up on them,” Treglia said. “But I think halfway through the day, they forget about that. I think the same thing could happen here.”

Medical Informatics in iSchools

For children who have chronic diseases, the transition to adulthood brings a range of information management issues. Until this point, the parents have considered themselves the owner of their child’s complete medical history—pulling together all of their personal observations as well as the treatments by numerous doctors and specialists over the span of their child’s life.

Transferring medical history information from pediatricians to adult-care physicians as well as from the parents to the patient presents medical informatics challenges. This example, presented by Syracuse Professor Carsten Osterlund, is one of many discussed in a roundtable discussion, iSchool Health and Medical Research Initiatives and Opportunities, on February 9.

With U.S. President Barack Obama pledging to fund projects in medical informatics and transferring paper records into electronic medical records, iSchool faculty and students were interested in sharing information and building relationships to support their research in this area.

Genetics, patient perception, collaborative information behavior in health care teams, aging, emergency medical management, community health information, pharmaceutical connections, accessibility and access technology, and social networking and gaming in medicine were all topics of interest to those in attendance.

Professor Ellen Detlefsen of the University of Pittsburgh outlined what she considered to be “success factors” in building medical informatics research projects, including:
· One or more full-time faculty members focused on health information
· A medical or health science faculty nearby, preferably within a medical school
· Access to large academic health sciences library
· Other medical informatics research underway within the same university
· Personal, professional, and electronic links among the previous four factors

Associate Dean of Rutger’s iSchool Hartmut Mokros and Professor Madhu Reddy of Penn State said one of the challenges is understanding the language used in health information and finding the parallels to your research interests. Each discipline or field of medicine has its own language, so Mokros suggested focusing on the problem to find collaborations, rather than the discipline.

“I noticed there’s a lot of interest at the dean’s level and maybe a few Ph.D. students,” Osterlund said. “I bet there’s a lot of faculty here that didn’t come because they don’t see themselves in ‘medical informatics.’”

Faculty avoid labeling themselves, so the field within the iSchool needs to define itself as something broader than medicine, presenters said. These medical informatics projects pull together security, sociotechnology, information retrieval, information architecture, and information management, among many others of interest to iSchool faculty members.

Osterlund suggested that the iSchools create some form of formal connection around this topic—whether that is themed around funding proposals, or social networking on Facebook or elsewhere. It was then suggested to include medical informatics programs that are not located within iSchools, or making joint appointments with these individuals to iSchool faculties.

UNC Chancellor Holden Thorp examines the way universities select faculty


University of North Carolina Chancellor Holden Thorp (blog at http://holden.unc.edu) delivered the opening keynote at the 2009 iConference and challenged universities to rethink the way they hire faculty and to support goals that will make graduates successful in the global 21st century.

Thorp suggests that leadership, entrepreneurial thinking, and an institutional mindset are three key ingredients that makeup the 21st century knowledge worker.

He outlined his definition of leadership to include:


  • being able to articulate the problem you’re interested in studying or the field you’ll be leading, why it’s worthwhile, and why it’s challenging

  • getting resources to succeed

  • being able to help people in and out of organization

  • keeping your head in crisis

Then we went on to explain what he means by "entrepreneurial thinking." This doesn't necessarily mean creating new businesses, rather Thorp says it means being more committed to an idea than the process, looking for the next problem to solve, breaking through academic silos, and taking advantage of opportunities to pursue an idea.


Thorp said another necessary trait of a 21st century knowledge worker involves the ability to create an institutional mindset. To do this, one must put the common good in front of protecting personal interests, have a diverse decision-making teams, and promote people based on their ability to work "between the silos" or between divisions in the organization.


In the current economy of tightening state budgets and with venture capitalists retracting from new projects, Thorp said he sees a silver lining. Universities, particularly their graduate programs, are seeing increases in the application pools and the millennial generation filling classrooms are more committed to creativity and public service. President Obama has promised new funding for science, health care, energy, and higher education.


"I'm extremely optimistic about what our students will do when they graduate."


He concluded by questioning the current criteria most universities use to select its faculty members, and suggested that they need to value other characteristics, including teamwork, crisis management, perserverance, people skills, institutional mindset, and compassion.


Following his presentation, he answered questions ranging from how to promote interdisciplinary work to discussing the value of liberals arts education versus job preparation programs.


Most great leaders--from UNC and others--are mostly liberal arts majors, Thorp said. Liberal arts education is American, and some would argue it is the reason why the country is most of the most innovative in the world, he said.

Monday, February 2, 2009

Syracuse iSchool faculty and students are well represented at the 2009 iConference

Syracuse University School of Information Studies faculty and students will share their expertise at the fourth annual iConference at the University of North Carolina (UNC) at Chapel Hill, February 8 through 11. This year’s iConference theme is iSociety: research, education, engagement.

Syracuse University iSchool members will be presenting on a range of topics in 15 sessions throughout the conference. Their papers and presentations will explore such subjects as gaming, privacy and trust, intellectual property, international information issues, green IT, and national security, among other areas.

Thirteen Syracuse iSchool doctoral students will be among the 77 selected to present posters this year. The posters showcase the students’ groundbreaking research on a variety of issues, including national culture and knowledge sharing, older adults and e-literacy, web advertising and impact on information seeking, online collaboration and group dynamics, search engine technologies, information sharing among law enforcement agencies, and information access and government.

The 2009 iConference opens with a Doctoral Colloquium that brings together Ph.D. students from of iSchool-related disciplines and iSchool faculty to gather feedback and generate discussions about their current research projects or thesis work. At the same time, the conference is sponsoring a Junior Faculty Mentoring Session for tenure-track faculty to meet with senior iSchool faculty, including Syracuse’s Martha Garcia-Murillo and Ping Zhang, and have informal dialogue about emerging intellectual communities within the information field.

The following day, participants will hear from Jose-Marie Griffiths, dean of the School of Information and Library Science at UNC, and UNC Chancellor Holden Thorp, who will deliver the opening plenary presentation. The closing plenary presentation features Edward Seidel, director of the National Science Foundation’s Office of Cyberinfrastructure and Floating Point Systems Professor in Louisiana State University’s Department of Physics.

At the conclusion of the conference, Syracuse Professor Steve Sawyer and his co-organizers will lead a four-hour workshop on “The Science of Socio-Technical Systems in iSchools.” The workshop hopes to explore and begin to frame a future research agenda based on socio-technical research in the information field.

The 2009 iConference is sponsored by the National Science Foundation and organized by the iCaucus, a group of information schools from the United States and Canada dedicated to exploring the relationship of information, technology, and people, and to advancing the understanding of the role of information in human endeavors. For more information, visit http://www.ischools.org/iconferences/2009index/.