Research explorer tool

4 results

Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory

Journal Article
Hall, H., Widen, G., & Paterson, L. (2010)
Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory. Libri, 60(2), 117-128. https://doi.org/10.1515/libr.2010.011
This paper focuses on the extent to which online information sharing practice is socially motivated. A key interest is how knowledge of the existing social connections between...

When social means business: the potential of social computing tools to support collaborative work as part of the organisational information infrastructure.

Presentation / Conference
Hall, H. (2009, June)
When social means business: the potential of social computing tools to support collaborative work as part of the organisational information infrastructure. Presented at Innovation in e-information, Manchester, UK
Based on the results of a study conducted jointly by Edinburgh Napier University and TFPL, this paper will discuss the main risks and opportunities of the adoption of social c...

Opportunity and risks offered by social computing tools as perceived by information and knowledge managers

Presentation / Conference
Hall, H. (2009, April)
Opportunity and risks offered by social computing tools as perceived by information and knowledge managers. Paper presented at SLA Eastern Canada Members' Day, McGill University, Montreal, Canada
No abstract available.

Realising the potential of technology tools: expecting the unexpected.

Conference Proceeding
Hall, H. (2007)
Realising the potential of technology tools: expecting the unexpected. In Turner, C. (Ed.). Proceedings of Online Information 2008, 23-25. ISBN 1900239906
With reference to the domain of sociotechnical studies, this paper establishes reasons why expectations of technology implementations are often misguided. Examples from a numb...