放逐某人 发表于 2025-3-25 03:44:04

http://reply.papertrans.cn/32/3195/319476/319476_21.png

脱离 发表于 2025-3-25 11:11:34

Mapping the Conceptual Space of Context,e raised at the end of the last chapter. This chapter will address: What does context really mean? How do we map the conceptual space of context? What are the boundaries of context? What are the variables that make up context in information behavior and that can be incorporated into research studies?

Gentry 发表于 2025-3-25 15:15:16

Discussion,reotyped context and the movement between stereotyped and shared contexts. Here, I bring in the discussion from social phenomenology and the seminal work of Alfred Schütz in social science. Finally, we will also look at context overlap and the continuous reshaping of context.

puzzle 发表于 2025-3-25 19:43:18

Literature Review: The Influence of Context on Information Behavior,traints, context as life world/information world, context as common ground and ordinariness, context as discourse, context as information ground, context as assigned meanings during interaction, context as proximity and relevance, context as time, place, embodiment and portability, and context as legacy and determinant.

小步舞 发表于 2025-3-25 22:07:54

http://reply.papertrans.cn/32/3195/319476/319476_25.png

endocardium 发表于 2025-3-26 01:16:40

http://reply.papertrans.cn/32/3195/319476/319476_26.png

paltry 发表于 2025-3-26 06:57:11

Book 2018t to agree on what context really means. While there have been various research studies incorporating context, and biennial conferences on context in information behavior, there lacks a clear definition of what context is, what its boundaries are, and what elements and variables comprise context...I

狗舍 发表于 2025-3-26 09:56:04

http://reply.papertrans.cn/32/3195/319476/319476_28.png

谁在削木头 发表于 2025-3-26 13:31:44

https://doi.org/10.1007/978-3-319-28862-8r, to a search engine such as Google or a site such as Wikipedia, social media such as Facebook or Twitter, or ask Siri, Cortana, or Alexa. You might decide to email or to text a friend or colleague using SMS, iMessage, WhatsApp, Facebook Messenger, SnapChat, Allo, etc. so as to reach out without co

AVANT 发表于 2025-3-26 18:10:47

Anticipating Sovereign Debt Crises,s relatively weak. Section 4.3 demonstrates that sovereign debtors must overcome seven types of risk in order to preserve their creditworthiness: natural disaster, geopolitical risk, institutional and political risk, economic risk, monetary and exchange rate risk, fiscal and tax-system risk, and debt-related risk.
页: 1 2 [3] 4
查看完整版本: Titlebook: Exploring Context in Information Behavior; Seeker, Situation, S Naresh Kumar Agarwal Book 2018 Springer Nature Switzerland AG 2018