<?xml version="1.0" encoding="utf-8"?>
<XML>
		<JOURNAL>
<YEAR>2018</YEAR>
<VOL>2</VOL>
<NO>1</NO>
<MOSALSAL>0</MOSALSAL>
<PAGE_NO>144</PAGE_NO>
<ARTICLES>


				<ARTICLE>
                <LANGUAGE_ID>1</LANGUAGE_ID>
				<TitleF>-</TitleF>
				<TitleE>A Comparative Study of Regulating the Filtering of Cyberspace in the US, the EU and China; Proposals for Policymaking in Iran</TitleE>
                <URL>https://jcss.ut.ac.ir/article_64638.html</URL>
                <DOI>10.22059/jcss.2017.238999.1008</DOI>
                <DOR></DOR>
				<ABSTRACTS>
					<ABSTRACT>
						<LANGUAGE_ID>1</LANGUAGE_ID>
						<CONTENT>The crucial role of cyberspace attracted the special attention of the governments in different countries, which consider it both as a challenge and an opportunity. One of the key policies and preventive measures adopted concerning the challenges posed by the cyberspace is it regulation. In fact, there are only a few states have not taken any steps in regulating their cyberspace. This paper seeks to demonstrate a set of policy proposals for the Islamic Republic of Iran through the study of three leading but different precedents in regulating the cyberspace, including the United States, the European Union, and China. This study employs a descriptive-analytical model, which recommends placing the main investment in and concentration on the final user, employing economic strategies, special attention to governmental and public institutions, prioritizing content removal over blocking, negotiating an agreement with foreign service providers, drafting a content rating system, and using international capacities for cooperation. Accordingly, the final policy proposals for the Islamic Republic of Iran would be decentralization, user-oriented decisions, prioritizing removal over blocking, and monitoring over filtering.</CONTENT>
					</ABSTRACT>
					<ABSTRACT>
						<LANGUAGE_ID>0</LANGUAGE_ID>
						<CONTENT>-</CONTENT>
					</ABSTRACT>
				</ABSTRACTS>
				<PAGES>
					<PAGE>
						<FPAGE>1</FPAGE>
						<TPAGE>28</TPAGE>
					</PAGE>
				</PAGES>
	
				<AUTHORS><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Hassan</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Bashir</FamilyE>
						<Organizations>
							<Organization>Professor, Imam Sadiq University, Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>bashir@isu.ac.ir</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Mohammad Sadegh</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Nasrollahi</FamilyE>
						<Organizations>
							<Organization>Assistant Professor, Imam Sadiq University, Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>m.nasrollahi@isu.ac.ir</Email>			
						</EMAILS>
					</AUTHOR></AUTHORS>
				<KEYWORDS>
					<KEYWORD>
						<KeyText>cyberspace</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Filtering</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Internet</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>monitoring</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>regulating</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Regulation</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Surveillance</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>virtual space</KeyText>
					</KEYWORD></KEYWORDS>
				<REFRENCES>
				<REFRENCE>
				<REF>Ameli, S.R. (2011) Rooykarde dofazaei be asibha, jarayem, ghavanin va siasathaye fazaye majazi [dual-spacization approach toward harms, offences, laws and policies of Iran’s cyberspace]. Tehran: Amirkabir Publications.##Amn Afzar Gostar Sharif Service Provider (2008a). [Comparative studies in other countries’ approach toward internet regulation] (Phase 1, Vol. 1, Report 2). Tehran: Iran Telecommunications Research Center.##Amn Afzar Gostar Sharif Service Provider (2008b). [Legal status and challenges regulating the internet in national and international levels] (Phase 1, Vol. 2, Report 2). Tehran: Iran Telecommunications Research Center.##Ansari, B. (2011). Hoghoghe ertebate jamei [Mass Communications Law]. Tehran: Samt Publication. ##Balkin, J.M., Noveck, B.S., &amp; Roosevelt, K. (1999). Filtering the internet: A best practices model. The Information Society Project at Yale Law School.##Child Online Protection Act (COPA) (H.R.3783). (1998). Retrieved from Library of Congress website: https://www.congress.gov/bill/105th-congress/house-bill/3783.##Children&#039;s Internet Protection Act (CIPA). (2000). Retrieved from https://www.fcc.gov/consumers/guides/childrens-internet-protection-act.##Costello, R.B. (1992). Random House Webster&#039;s college dictionary. New York, NY: Random House.##Deibert, R., Palfrey, J., Rohozinski, R., Zittrain, J., &amp; Stein, J.G. (2008). Access denied: The practice and policy of global internet filtering. Mit Press.##Digital Millennium Copyright Act (DMCA). (1998). Retrieved from https://www.copyright.gov/legislation/dmca.pdf##Electronic Commerce Directive. (2000). Retrieved from http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32000L0031##Frybman, B., Hennebel, L., &amp; Lewkowicz, G. (2008). Rahbordhay dolati baray samandehi moshtarake internet dar Amrika, Oroopa va Chin. [Public Strategies for Internet Co-regulation in the United States, Europe and China]. (M. A. Nouri, Trans.). Law Information Journal, 6(14), pp. 171-188.##Illegal and harmful content on the Internet. (1996). Retrieved from http://aei.pitt.edu/5895/1/5895.pdf##Jalali Farahani, A.H. (2007). [Taamoli bar filtering (motaleye tatbighi sayer keshvarha). A Review of Filtering (A comparative study on other countries)] (8442 Vol. 2). Tehran: Iran Parliament Research Center. “Studies on Communications and New Technologies”. Retrieved from http://rc.majlis.ir/fa/report/show/734106.##Rouzbahani, M.R. (2014). Jaygahe feghhi va hoghooghie filtering (mahdoodiat) dar rasanehaye majazi az didgahe mazahebe khamse [Filtering in Virtual Media from Legal and Jurisprudence Perspectives]. Tehran: Ketab Ava.##Summers, D. (2003). Longman dictionary of contemporary English. Essex: Pearson.##USA Patriot Act. (2001). Retrieved from https://www.justice.gov/archive/ll/highlights.htm##Wehmeier, S. (Ed.). (2005). Oxford Advanced Learner&#039;s Dictionary of Current English: AS Hornby. Oxford University.##The voluntary Public Pledge of Self-Discipline for the China Internet Industry. Communications Decency Act (CDA). (1996). Retrieved from https://internetlaw.uslegal.com/free-speech/the-communications-decency-act-of-1996/.##</REF>
						</REFRENCE>
					</REFRENCES>
			</ARTICLE>
				<ARTICLE>
                <LANGUAGE_ID>1</LANGUAGE_ID>
				<TitleF>-</TitleF>
				<TitleE>Rearticulating Internet Literacy</TitleE>
                <URL>https://jcss.ut.ac.ir/article_64646.html</URL>
                <DOI>10.22059/jcss.2018.245833.1012</DOI>
                <DOR></DOR>
				<ABSTRACTS>
					<ABSTRACT>
						<LANGUAGE_ID>1</LANGUAGE_ID>
						<CONTENT>As a simple explanation, Internet literacy is a capability constitutive to utilizing the advantages of the Internet. But, due to the constant changes of digital technologies, what kinds of necessary capabilities are required to gain the advantages? In fact, more than focusing on the essential capabilities to benefit users from the Internet advantages, existing perceptions of Internet literacy have caused the misuse of large digital companies from users’ abilities. Due to the increasing importance of data economics, privacy, and cybersecurity, a critical review of Internet literacy has become a necessity. Based on the emerging of such new critical features of internet environment, this paper proposes a new articulation of Internet literacy. Following a review and analysis of the existing notions and classifications of Internet literacy and using grounded theory method, the article concludes by suggesting a rearticulated version of Internet literacy. The new classification is established based on the 3 main components including responsibility, productivity, and interactivity; 9 main categories, and 43 subcategories. The four critical, analytical, operational, and informational crossover components are also taken into account.</CONTENT>
					</ABSTRACT>
					<ABSTRACT>
						<LANGUAGE_ID>0</LANGUAGE_ID>
						<CONTENT>-</CONTENT>
					</ABSTRACT>
				</ABSTRACTS>
				<PAGES>
					<PAGE>
						<FPAGE>29</FPAGE>
						<TPAGE>53</TPAGE>
					</PAGE>
				</PAGES>
	
				<AUTHORS><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Alfred Thomas</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Bauer</FamilyE>
						<Organizations>
							<Organization>Institut fuer Publizistik und Kommunikationswissenschaft, Universität Wien, Österreich</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>thomas.bauer@univie.ac.at</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Ebrahim</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Mohseni Ahooei</FamilyE>
						<Organizations>
							<Organization>PhD Student, Department of Communication, University of Vienna, Austria and Senior Researcher at Cyberspace Research Policy Center, University of Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>emohseni@ut.ac.ir</Email>			
						</EMAILS>
					</AUTHOR></AUTHORS>
				<KEYWORDS>
					<KEYWORD>
						<KeyText>Internet literacy</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>responsibility</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>productivity</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>interactivity</KeyText>
					</KEYWORD></KEYWORDS>
				<REFRENCES>
				<REFRENCE>
				<REF>Acquisti, A.; John, L. &amp; Loewenstein, G. (2013). What Is Privacy Worth? The Journal of Legal Studies, 42(2), 249-274.##Association of College and Research Libraries (2000). Information Literacy Competency Standards for Higher Education. Chicago: American Library Association.##Aufderheide, P. (1993). Media literacy: a report of the national leadership conference on media literacy. Aspen, CO: Aspen Institute.##Banta, T. W. &amp; Mzumara, H. R. (2004). Assessing information literacy and technological competency. Assessment Update, 16 (5): 3–14.##Barbara R. &amp; Suzanne L. (2006). Flannigan: Connecting the Digital Dots: Literacy of the 21st Century. Educause Quarterly, 2: 8-10.##Bauduin, J. L.; Audouin, J.L.; Jobin, P. G. &amp; N. Vezina, N. (2005). Les Obligations, 6th ed. Cowansville: Éditions Yvon Blais.##Bhaskar, R. (1975). A realist theory of science. Leeds, UK: Leeds Books Ltd.##Bukingham, D. (2007). Beyond Technology: Children’s Learning in the Age of Digital Culture. Polity Press.##Burks, A. W. (1978). Review: Charles S. Peirce, The new elements of mathematics, Bulletin of the American Mathematical Society. 84 (5): 913–918.##Cambridge Dictionary (2017). Awareness. Retrieved April 15, 2017, online at http://dictionary.cambridge.org/dictionary/english/awareness##Charmaz, K. (1990). ‘Discovering’ chronic illness: Using grounded theory. Social Science &amp; Medicine, 30: 1161-1172.##Charmaz, K. (2000). Constructivist and objectivist grounded theory. In N. K. Denzin &amp; Y. Lincoln (Eds.), Handbook of qualitative research (2nd ed., pp. 509–535). Thousand Oaks, CA: Sage.##Charmaz, K. (2002). Grounded theory analysis. In J. F. Gubrium &amp; J. A. Holstein (Eds.), Handbook of interview research (pp. 675–694). Thousand Oaks, CA: Sage.##Charmaz, K. (2006) Constructing grounded theory: A practical guide through qualitative analysis. Thousand Oaks, CA: Sage Publications, Inc.##Charmaz, K. (2008). Constructionism and the grounded theory method. In J. A. Holstein &amp; J. F. Gubrium (Eds.), Handbook of constructionist research. Guilford Press.##Chartered Institute of Library and Information Professionals (2004). Information literacy: Definition. London: CILIP. Retrieved April 11, 2017, online from https://www.cilip.org.uk/research/topics/information-literacy##Chung, A. M, Gill, I. B., &amp; O&#039;Byrne, I. (2017). Web Literacy 2.0. Retrieved April 10, 2017, online at https://mozilla.github.io/content/web-lit-whitepaper/#introduction##Collins, H. (2001). Corporate Portals: Revolutionizing Information Access to Increase Productivity and Drive the Bottom Line. New York: AMACOM.##Cope, B. &amp; Kalantzis, M. (Eds.) (2000). Multiliteracies: Literacy and the design of social futures. London: Routledge.##De Castell, S. &amp; Luke, A. (1986). Models of literacy in North American schools: Social and historical conditions and consequences‖. In De Castell, Suzanne; Luke, Allan; &amp; Egan, Kieran (Eds.). Literacy, society, and schooling. New York: Cambridge University Press, p. 87-109.##Denzin, N. K. &amp; Lincoln, Y. S. (1998). Strategies of Qualitative Inquiry. Sage Publications.##Eisenberg, M.B., Lowe, C.A. &amp; Spitzer, K.L. (2004). Information literacy: essential skills for the information age, 2nd ed. Westport, Connecticut: Libraries Unlimited.##Eriksson, S. &amp; Reinsjö, A. (2016). The Success Factors of a Technical Exhibition: A study to investigate the design aspects of an exhibition. Master’s thesis in Applied Information Technology, Department of Applied Information Technology, Chalmers University of Technology.##Eshet-Alkali, Y. &amp; Amichai-Hamburger, Y. (2004). Experiments in Digital Literacy. Cyberpsychology &amp; Behavior, 7(4): 421-429.##Estes, J. S. (2015). A Call for Teacher Preparation Programs to Model Technology Integration into the Instructional Process. In J. Keengwe. Handbook of Research on Educational Technology Integration and Active Learning (p. 62-77). Hershey: IGI Global.##Estes, J. S. (2017).Teacher Preparation Programs and Learner-Centered, Technology-Integrated Instruction. In J. Keengwe. &amp; J. Onchwari (Editors). Handbook of Research on Learner-Centered Pedagogy in Teacher Education and Professional Development (p. 85-103). Hershey: IGI Global.##Fabbro, E. (2009). Information Literacy. In P. L. Rogers, G. A. Berg, J. V. Boettcher, C. Howard, L. Justice and K. D. Schenk, Encyclopedia of Distance Learning, Second Edition (Volume 4) (p. 1178-1182). California: Information Science Reference.##Farmer, L. S. J. (2011). How Adults Learn Through Information Technologies. In V. C. X. Wang. Encyclopedia of Information Communication Technologies and Adult Education Integration (p. 17-36). Hershey: IGI Global.##Farmer, L. S. &amp; Henri, J. (2008). Information literacy assessment in K-12 settings. Lanham, MD: Scarecrow Press.##Fuji, K. &amp; Yoshida, F. (2015). Mobile Phone-Related Behaviors and Problems in Japan. In Z. Yan. Encyclopedia of Mobile Phone Behavior (p. 1079-1088). Hershey: IGI Global.##Gee, J. P. (1996). Social linguistics and literacies. London: Taylor &amp; Francis.##Gilster, P. (1997). Digital Literacy, New York: Wiley and Computer Publishing.##Glaser, B. &amp; Strauss, A. (1967). The Discovery of Grounded Theory: strategies for qualitative research. New York: Aldine de Gruyter Publications.##Golian-Lui, L. M. &amp; Westenkirchner, S. (2011). Library Issues in Adult Online Education. In V. C. X. Wang. Encyclopedia of Information Communication Technologies and Adult Education Integration (p. 485-505). Hershey: IGI Global.##Gurak, L. J. (2003). Cyberliteracy: Navigating the Internet with Awareness Paperback. Yale University Press.##Haigh, R. W. (1985). Planning for Computer Literacy. The Journal of Higher Education. 56 (2): 161–171.##Halvorsen, A. (2009). Social Networking Sites and Critical Language Learning. In M. Thomas. Handbook of Research on Web 2.0 and Second Language Learning (p. 237-258).##Julien, H. (2014). Digital Literacy. Encyclopedia of Information Science and Technology, Third Edition. IGI Global Publication.##Kaiser Family Foundation (2003). Key Facts: Media literacy. Retrieved April 12,  2017, online at https://kaiserfamilyfoundation.files.wordpress.com/2013/01/key-facts-media-literacy.pdf##Keith J Topping, K. J. &amp; Mckenna, M. C. (1999). Introduction to Electronic Literacy – Part 1, Reading &amp; Writing Quarterly, 15(2): 107-110.##Kim, E. &amp; Yang, S. (2016). Internet literacy and digital natives’ civic engagement: Internet skill literacy or Internet information literacy?, Journal of Youth Studies, 19 (4): 438-456. DOI: 10.1080/13676261.2015.1083961##Kim, E. (2011). Is Internet Literacy Inherited from Parent to Children? Journal of Korean Society for Journalism and Communication Studies, 55(2): 155–177.##Klein, M. (2005). Responsibility. In Honderich, Ted. Oxford Companion to Philosophy.##Koren, N. (2014). An Intimate Look at the Rise of Data Totalitarianism(reviewing Dave Eggers, the Circle (. Retrieved 11 10, 2015, from Cyber Law JOTWELL: http://cyber.jotwell.com/an-intimate-look-at-the-rise-of-data-totalitarianism/##Leadbeater, C. (2009). We-Think: Mass Innovation, Not Mass Production. London: Profile Books.##Yuping, L, &amp; Shrum, L. J. (2002). What is Interactivity and is it always Such a Good Thing? Implications of Definition, Person, and Situation for the Influence of Interactivity on Advertising Effectiveness, Journal of Advertising, 31(4): 53-64.##Livingstone, S. (2004). Media Literacy and the Challenge of New Information and Communication Technologies. The communication Review, 7:3-14.##Livingstone, S. (2009). Children and the Internet. Cambridge, UK: Polity Press.##Livingstone, S.; Bober, M. &amp; Helsper, E. (2005). Internet literacy among children and young people: Findings from the UK children Go Online project. London: London School of Economics and Political Science.##Martin, A. &amp; Grudziecki, J. (2006). DigEuLit: concepts and tools for digital literacy development. ITALICS, 5(4): 249-267.##McCallin, A. (2004). Pluralistic Dialoguing: A theory of interdisciplinary team working, The Grounded Theory Review, 4(1): 25-42.##Michael, S. (2016). Privates in the online public: Sex(ting) and reputation on social media. New Media &amp; Society, 2016, 18(11), pp.2723-2739.##Müller, A. R., Röder, M., &amp; Fingerle, M. (2014). Child sexual abuse prevention goes online: Introducing “Cool and Safe” and its effects. Computers &amp; Education 78 (2014) 60-65.##Na, L. &amp; Yan, Z. (2013). Promote Data-intensive Scientific Discovery, Enhance Scientific and Technological Innovation Capability: New Model, New Method, and New Challenges Comments on The Fourth Paradigm: Data-intensive Scientific Discovery. Bulletin of Chinese Academy of Sciences. 1 (16).##National Forum on Information Literacy (2017). What is the NFIL? Retrieved April 02, 2017 online at http://infolit.org/about-the-nfil/what-is-the-nfil/##NetSciEd (2017). Network Literacy: Essential Concepts and Core Ideas. Retrieved April 07, 2017 online from https://sites.google.com/a/binghamton.edu/netscied/teaching-learning/network-concepts##Nicholas, H. &amp; Ng, W. (2009). Ubiquitous Learning and Handhelds. In P. L. Rogers, G. A. Berg, J. V. Boettcher, C. Howard, L. Justice and K. D. Schenk, Encyclopedia of Distance Learning, Second Edition (Volume 4) (p. 2171-2176). California: Information Science Reference.##Oxford Dictionary (2017). Productivity. Retrieved April 16, 2017, online from https://en.oxforddictionaries.com/definition/productivity##Parker, J. D. A.; Taylor, R. N.; Eastabrook, J. M.; Schell, S. L. &amp;  Wood, L. M. (2008). Problem gambling in adolescence: Relationships with Internet misuse, gaming abuse, and emotional intelligence. Personality and Individual Differences, 45 (2): 174–180.##Potter, W. J. (2010). The state of media literacy. Journal of Broadcasting &amp; Electronic Media 54: 675–696.##Prasad, L. &amp; Gulshan. S. S. (2011). Management Principles and Practices. New Delhi: Excel Books.##Rafaeli, S. (1988). Interactivity: From new media to communication. In R. P. Hawkins, J. M. Wiemann, &amp; S. Pingree (Eds.), Sage Annual Review of Communication Research: Advancing Communication Science: Merging Mass and Interpersonal Processes, 16, 110-134. Beverly Hills: Sage. Haifa.ac.il.##Rouse, M. &amp; Wigmore, I. (2015). Definition data literacy. Retrieved April 13, 2017, online at http://whatis.techtarget.com/definition/data-literacy##Rubin, P. H. &amp; Lenard, T. M. (2002). Privacy and the Commercial Use of Personal Information. Washington, D.C.: Progress and Freedom Foundation.##Scottish Qualifications Authority (2014). National Unit specification: Network literacy. Retrieved April 10, 2017, online from http://www.sqa.org.uk/sqa/files/nu/H7EA44.pdf##Sedivy-Benton, A. L. (2016). Individual Differences, Learning Opportunities and Learning Outcomes, Digital Equity: Bridging the Gap – Creating Learning Opportunities for All Students. In V. C. X. Wang.  Handbook of Research on Learning Outcomes and Opportunities in the Digital Age (p. 266-286). Hershey: IGI Global.##SETDA (2007). 2007 Technology Literacy Assessment and Educational Technology Standards Report. Retrieved April 07, 2017 online at www.setda.org/wp-content/uploads/2015/03/TEchnologyLiteracy2007Final.pdf##The American Heritage Dictionary (2000). (4th College edition). Boston: Houghton Mifflin.##Theodore Schneyer, &quot;Professionalism as Politics: The Making of a Modern Legal Ethics Code,&quot; in Lawyers&#039; Ideals/Lawyers&#039; Practices: Transformations in the American Legal Profession, eds. Robert L. Nelson, David M. Trubek, &amp; Rayman L. Solomon, 95–143 (Ithaca: Cornell University Press, 1992), 104.##Tobin, C. D. (1983). Developing Computer Literacy. The Arithmetic Teacher. 30 (6): 22–23.##Tyner, K. R. (1998). Literacy in a Digital World: Teaching and Learning in the Age of Information. Hillsdale, NJ: L. Erlbaum Associates.##Van Deursen, A. &amp; Van Dijk, J. (2011). Internet Skills and the Digital Divide. New Media &amp; Society 13(6): 893–911.##Vanwynsberghe, H.; Boudry, E. &amp; Verdegem, P. (2011). Mapping Social Media Literacy: Towards a Conceptual Framework. Brussels: EMSOC.##Willig, C. (2013). Introducing Qualitative Research in Psychology. London: McGraw-Hill Education.##</REF>
						</REFRENCE>
					</REFRENCES>
			</ARTICLE>
				<ARTICLE>
                <LANGUAGE_ID>1</LANGUAGE_ID>
				<TitleF>-</TitleF>
				<TitleE>Topographies of Hate: Islamophobia in Cyberia</TitleE>
                <URL>https://jcss.ut.ac.ir/article_64647.html</URL>
                <DOI>10.22059/jcss.2018.241160.1011</DOI>
                <DOR></DOR>
				<ABSTRACTS>
					<ABSTRACT>
						<LANGUAGE_ID>1</LANGUAGE_ID>
						<CONTENT>Islamophobia’s occurrence in any particular country has little do with the presence of Muslim; it is possible to be Islamophobic when there are virtually no Muslim around. This because the lack of Muslims is filled by the surplus of Islamophobic representations. This surplus of representations is now increasingly reliant on the internet. There are many studies reporting on Islamophobia on the internet, classifying the negative representations, the targeted acts of aggressive online behaviour (trolling) against Muslims. These studies are basically taxonomies, and they share this feature with general literature on Islamophobia, which is concerned with reporting instances of Islamophobia empirically with little time spent on its theorisation. Such an understanding of Islamophobia implies that it is simply dismissed as being a matter of prejudice, bias, and closed views. A Critical Muslim Studies understanding of Islamophobia developed initially in the collected volume Thinking Through Islamophobia (2010), and then subsequent publications shift the focus away positivism to decolonial discourse theory. Using decolonial discourse theory, this study will how online Islamophobia is not just a distortion of Islam, or hatred of Muslims but rather it main vectors for denying Muslim political consciousness.</CONTENT>
					</ABSTRACT>
					<ABSTRACT>
						<LANGUAGE_ID>0</LANGUAGE_ID>
						<CONTENT>-</CONTENT>
					</ABSTRACT>
				</ABSTRACTS>
				<PAGES>
					<PAGE>
						<FPAGE>55</FPAGE>
						<TPAGE>73</TPAGE>
					</PAGE>
				</PAGES>
	
				<AUTHORS><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Salman</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Sayyid</FamilyE>
						<Organizations>
							<Organization>School of Sociology and Social Policy University of Leeds, Leeds, UK</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>s.sayyid@leeds.ac.uk</Email>			
						</EMAILS>
					</AUTHOR></AUTHORS>
				<KEYWORDS>
					<KEYWORD>
						<KeyText>Critical Muslim Studies</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>cyberspace</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>the internet</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Islamophobia</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>spatialization</KeyText>
					</KEYWORD></KEYWORDS>
				<REFRENCES>
				<REFRENCE>
				<REF>Buzan, B., &amp; Little, R. (2000) International Systems in World History. Oxford: Oxford University Press.##Choucri, N. (2012). Cyberpolitics and International Relations. Boston: MIT Press.##Devetak, R. (1995). Theories and practices of statecraft. in MacMillan, John, and Andrew Linklater (Editors). Boundaries in Question: New Directions on International Relations, London: Bloomsbury Press.##Dikötter, F. (2008). The racialization of the globe: an interactive interpretation. Ethnic and Racial Studies, 31(8).##Diouf, S. (1998). Servants of Allah: African Muslims Enslaved in the Americas. New York: New York University Press.##Douhet,  Giulio (2009), The Command of The Air. translated by Dino Ferrari, Tuscaloosa, Alabama:  University of Alabama Press.##Giddens, A. (1984). The Constitution of Society. Cambridge, MA: Polity Press.##Goldberg, D.Th. (2009). Racial comparisons, relational racisms: some thoughts on method. Ethnic and Racial Studies, 32(7).##Goodman, D. (1994). The republic of letters. Ithaca: Cornell University Press.##Greathouse, C.B. (2014). Cyber war and strategic thought: Do the classic theorists still matter?, in Kremer, Jan-Fredrick and Benedikt Müller (eds.), Cyberspace and International Relations, Heidelberg and New York: Springer, pp. 22-40.##Jordan, P., &amp; Taylor, A. (2004). Hacktivism and Cyberwars Rebels with a cause? London: Routledge.##Kosmin, P. (2014). The Land of the Elephant Kings. Cambridge, MA: Harvard University Press.##Kremer, J.F., &amp; Müller, B. (eds.) (2014). Cyberspace and International Relations. Heidelberg and New York: Springer. ##Lean, N. (2012). The Islamophobia Industry, London: Pluto Press.##Massey, D. (1992). Politics and Space-Time. New Left Review, 196, 84.##Mehta, U.S. (1999). Liberalism and Empire. Chicago: University of Chicago Press.##Mouffe, Ch. (2005). On the Political. London: Routledge.##Al-Musawi, M. (2015). The Medieval Islamic Republic of Letters. Notre Dame, India: University of Notre Dame Press.##Sayyid, S. (2016). Normalizing Islamophobia-Anadolu Agency. http://aa.com.tr/en/analysis-news/opinion-normalizing-islamophobia/580967.##Sayyid, S. (2015). A Fundamental Fear. 3rd edition, London: Zed Press.##Sayyid, S. (2014) Recalling the Caliphate. Oxford, Oxford University Press.  ##Sayyid, S., &amp; Vakil, A. (eds) (2010). Thinking Through Islamophobia. New York: Columbia University Press.##Scott, J. (2010). The Art of Not Being Governed. Newhaven: Yale University Press.##Soja, E. (1980). The Socio-Spatial Dialectic. Annals of the Association of American Geographers, 70, 208.##Yang, A., &amp; Self, Ch. (2015). Anti-Muslim prejudice in the virtual space: A case study of blog network structure and message features of the ‘Ground Zero mosque controversy. Media, War &amp; Conflict, 8(1), 46-69.##</REF>
						</REFRENCE>
					</REFRENCES>
			</ARTICLE>
				<ARTICLE>
                <LANGUAGE_ID>1</LANGUAGE_ID>
				<TitleF>-</TitleF>
				<TitleE>Semiotic Approach to Globalization: Living in a World of Glocal Things</TitleE>
                <URL>https://jcss.ut.ac.ir/article_64633.html</URL>
                <DOI>10.22059/jcss.2017.232442.1004</DOI>
                <DOR></DOR>
				<ABSTRACTS>
					<ABSTRACT>
						<LANGUAGE_ID>1</LANGUAGE_ID>
						<CONTENT>This paper is an effort to discuss the concept of glocalization from a semiotic point of view. In order to carry out a semiotic analysis of globalization or glocalization, first globalization needs to be defined from a semiotic perspective. Therefore, first an explanation of globalization and glocalization in semiotic terms is provided. Some believe the ongoing process in the world cannot be best described as globalization and it should be called glocalization. According to this approach, the ongoing universal process is a combination of globalization and localization leading to new diversities, not uniformity. With a structuralist approach to semiotics a better understanding is gained on how glocalization may affect the world in which we are living. After a theoretical argument on the semiotic definition of globalization and glocalization, the results of a number of in-depth interviews with people who have experienced living in two different cultures will be analyzed in a qualitative method to provide further insight on how glocalization might work.</CONTENT>
					</ABSTRACT>
					<ABSTRACT>
						<LANGUAGE_ID>0</LANGUAGE_ID>
						<CONTENT>-</CONTENT>
					</ABSTRACT>
				</ABSTRACTS>
				<PAGES>
					<PAGE>
						<FPAGE>75</FPAGE>
						<TPAGE>88</TPAGE>
					</PAGE>
				</PAGES>
	
				<AUTHORS><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Shaho</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Sabbar</FamilyE>
						<Organizations>
							<Organization>Assistant Professor, Faculty of World Studies, University of Tehran, Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>shaho_sabbar@yahoo.com</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Somayeh</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Dalvand</FamilyE>
						<Organizations>
							<Organization>M.A in Social Communication Sciences, Faculty of Social Sciences, University of Tehran, Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>dsdalvand@gmail.com</Email>			
						</EMAILS>
					</AUTHOR></AUTHORS>
				<KEYWORDS>
					<KEYWORD>
						<KeyText>Code</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Globalization</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>glocalization</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Semiotics</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Typology</KeyText>
					</KEYWORD></KEYWORDS>
				<REFRENCES>
				<REFRENCE>
				<REF>Ameli, S.R. (2004). Globalizations: concepts and theories. Arghanoon Monthly, 24, 1-58.##Ameli, S.R. (2003). Two globalizations and the future of the world. The Monthly Book of Social Sciences, 69 &amp; 70, 15-28.##Barber, B.R. (1992). Jihad vs. McWorld. The Atlantic, 269(3).##Beyer, P. (2007). Globalization and Glocalization. The SAGE Handbook of the Sociology of Religion, Edited By James A Beckford, Jay Demerath, SAGE Publication, pp. 98- 115.##Chandler, D. (2007). Semiotics: The Basics. Second Edition, Taylor &amp; Francis.##Festinger, L. (1962). A Theory of Cognitive Dissonance. Vermont: Stanford University Press.##Gramigna, R. (2013). The place of language among systems: Juri Lotman and Emile Benveniste. Sign System Studies, 41(2/3), 339-354.##Holdcroft, D. (1991). Saussure: Signs, System and Arbitrariness. Cambridge: Cambridge University Press.##Kane, D. (2006). The Chinese Language: Its History and Current Usage. Vermont: Tuttle Publishing.##Lucy, N. (2001). Beyond Semiotics: Text, Culture and Technology. London: Continuum.##Mele, C. (1996). Globalization, culture, and neighborhood change, reinventing the lower east side of New York. Urban Affairs Review, 32(1), September.##Nöth, W. (1995). Handbook of Semiotics.Bloomington: Indiana University Press.##Ritzer, G. (2003). Rethinking Globalization: Glocalization/Globalization and Something/Nothing. Socioloquical Theory, 21)3(, 193-209.##Robertson, R. (1995) Glocalization: Time-space and Homogeneity- heterogeneity. London: Sage Publications.##Turner, B. (1993). Citizenship and Social Theory. London: Sage Publications.##</REF>
						</REFRENCE>
					</REFRENCES>
			</ARTICLE>
				<ARTICLE>
                <LANGUAGE_ID>1</LANGUAGE_ID>
				<TitleF>-</TitleF>
				<TitleE>The Perception of Usefulness: Iranian Customers’ Evaluation of Customer Reviews</TitleE>
                <URL>https://jcss.ut.ac.ir/article_64634.html</URL>
                <DOI>10.22059/jcss.2017.236381.1006</DOI>
                <DOR></DOR>
				<ABSTRACTS>
					<ABSTRACT>
						<LANGUAGE_ID>1</LANGUAGE_ID>
						<CONTENT>Over the last decade, the retail industry has had a phenomenal growth. All figures show their success and efficiency and many studies have shown the role of customer reviews in encouraging ambivalent purchasers to buy items online. There have been numerous studies on why people read and trust these comments and taking for granted the important role of customer reviews in determining buying decision, this study endeavors to identify and explain the different factors involved in making a comment “useful.” We took an Iranian retail website and collected comments on perceived “usefulness” of each review. Our results showed that perceived level of usefulness was related to the word count of the comments, personal experience of the writer with the product, emotional description of the product, and mentioning the strength/weakness points of the product.</CONTENT>
					</ABSTRACT>
					<ABSTRACT>
						<LANGUAGE_ID>0</LANGUAGE_ID>
						<CONTENT>-</CONTENT>
					</ABSTRACT>
				</ABSTRACTS>
				<PAGES>
					<PAGE>
						<FPAGE>89</FPAGE>
						<TPAGE>102</TPAGE>
					</PAGE>
				</PAGES>
	
				<AUTHORS><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Ehsan</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Shahghasemi</FamilyE>
						<Organizations>
							<Organization>Assistant Professor, Department of Communication, University of Tehran, Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>shahghasemi@ut.ac.ir</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Mojtaba</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Hajijafari</FamilyE>
						<Organizations>
							<Organization>Senior Researcher, Center for Cyberpolicy Studies, University of Tehran, Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>mojtaba.hajijafari@gmail.com</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Maysam</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Shirzadifard</FamilyE>
						<Organizations>
							<Organization>PhD Candidate, Department of Educational Psychology, University of Tehran, Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>m.shirzadi@ut.ac.ir</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Mostafa</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Ahmadzadeh</FamilyE>
						<Organizations>
							<Organization>PhD, University of Tehran, Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>mostefa_ahmedzade@yahoo.com</Email>			
						</EMAILS>
					</AUTHOR></AUTHORS>
				<KEYWORDS>
					<KEYWORD>
						<KeyText>customer reviews</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Digikala</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Iran</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>perception of usefulness</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Retail industry</KeyText>
					</KEYWORD></KEYWORDS>
				<REFRENCES>
				<REFRENCE>
				<REF>Burton, J., &amp; Khammash, M. (2010). Why do people read reviews posted on consumer-opinion portals?. Journal of Marketing Management, 26, 230-255.##Cheng, Y.H., &amp; Ho, H.Y. (2015). Social influence&#039;s impact on reader perceptions of online reviews. Journal of Business Research, 68(4), 883-887.##Chengai, S., Qiaolin, D., &amp; Gang, T. (2016). Exploiting product related review features for fake review ddetection. Mathematical Problems in Engineering.##CMA (2016). Online reviews: letting your customers see the true picture. Retrieved May 22, 2017 from https://www.gov.uk/government/publications/online-reviews-and-endorsements-advice-for-businesses/online-reviews-giving-consumers-the-full-picture.##Dadgar, Y., &amp; Nazari, R. (2012). The impact of economic growth and good governance on misery index in Iranian economy. European Journal of Law and Economics, 4(1), 1-19.##eMarketer (2016). Worldwide Retail Ecommerce Sales Will Reach $1.915 Trillion This Year; Double-digit growth will continue through 2020, when sales will top $4 trillion. Retrieved June 2, 2017 from https://www.emarketer.com/Article/Worldwide-Retail-Ecommerce-Sales-Will-Reach-1915-Trillion-This-Year/1014369.##Farzanegan, M.R., &amp; Gholipour, H.F. (2016). Divorce and the cost of housing: evidence from Iran. Review of Economics of the Household, 14(4), 1029-1054.##Filieri, R. (2015). What makes online reviews helpful? A diagnosticity-adoption framework to explain informational and normative influences in e-WOM. Journal of Business Research, 68(6), 1261-1270.##Guillory, M.D., Lohtia, R., &amp; Donthu, N. (2016). The usefulness of online reviews in financial services. International Journal of Electronic Marketing and Retailing, 7(1), 66.##Hassanpour, S.E., Heidari, A., Moosavizadeh, S.M., Tarahomi, M.R., Goljanian, A., &amp; Tavakoli, S. (2016). Comparison of aesthetic and functional outcomes of spreader graft and autospreader flap in rhinoplasty. World Journal of Plastic Surgery, 5(2), 133-138.##Kim, J., Watson, J., &amp; Kirmani, A. (2015). Red Flag! The effect of fake reviews on consumer evaluations. NA-Advances in Consumer Research, 43.##Kozinets, R.V. (2017). Netnography: radical participative understanding for a networked communications society. In Willig, C. and W. Stainton-Rogers, eds. Handbook of Qualitative Research on Psychology, 376-382. London: SAGE.##Krestel, R., &amp; Dokoohaki, N. (2015). Diversifying customer review rankings. Neural Networks, 66, 36-45.##Kyungyup, L., Kyungah, H., Sung-Hyon, M. (2016). Capturing word choice patterns with LDA for fake review detection in sentiment analysis. Mining and Semantics Proceedings of the 6th International Conference / Web Intelligence (WIMS ‘16), New York, NY 10121-0701, USA.##Li, Y., Feng, X., &amp; Zhang, S. (2016). Detecting fake reviews utilizing semantic and emotion model. 3rd International Conference on Information Science and Control Engineering (ICISCE). 317-320.##Li, H., Chen, Z., Liu, B., Wei, X., &amp; Shao, J., (2015). Spotting fake reviews via collective positive-unlabeled learning. Proceedings - IEEE International Conference on Data Mining, ICDM, 899-904.##Li, H., Liu, B., Mukherjee, A., &amp; Shao, J. (2014). Spotting fake reviews using positive-unlabeled learning. Computación Y Sistemas, 18(3), 467-475.##Liu, Y., Zhou, W., &amp; Chen, H. (2017). Efficiently promoting product online outcome: An iterative rating attack utilizing product and market property. IEEE Transactions on Information Forensics and Security, 12(6), 1444-1457.##Liu, Z., &amp; Park, S. (2015). What makes a useful online review? Implication for travel product websites. Tourism Management, 47(2), 140-151.##Mukherjee, A., Liu, B. &amp; Glance, N. (2012). Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st International Conference on World Wide Web, Lyon, France.##Mukherjee, A., Liu, B., Wang, J., Glance, N. &amp; Jindal, N. (2011). Detecting group review spam. In Proceedings of the 20th International Conference Companion on World Wide Web, Hyderabad, India.##Pahlavanyali, N., &amp; Momeni, S.M.H. (2016). An empirical study on predicting user acceptance of online apparel shopping in Iran. International Journal of Online Marketing (ijom), 6(1), 34-53.##Park, S., &amp; Nicolau, J.L. (2015). Asymmetric effects of online consumer reviews. Annals of Tourism Research, 50, 67-83.##Qazi, A., Raj, R.G., Tahir, M., Waheed, M., Khan, S.U.R., &amp; Abraham, A. (2014). A preliminary investigation of user perception and behavioral intention for different review types: customers and designers perspective. The Scientific World Journal, 3, 1-8.##Rout, J.K., Singh, S., Jena, S.K., &amp; Bakshi, S. (2017). Deceptive review detection using labeled and unlabeled data. Multimedia Tools and Applications: an International Journal, 76(3), 3187-3211.##Safari, M., Forouzandeh, M., &amp; Safahani, N. (2016). An empirical model to explain the effects of electronic customer relationship management on customer e-satisfaction and e-loyalty: Evidence from Iranian service shopping websites. Journal of Internet Banking and Commerce, 21(1), 1-11.##Shahghasemi, E., &amp; Tafazzoli, B. (2013). Scrabble the face of your opponent: Iranian blogger&#039;s endeavour to discursively undermine Ahmadi Nejad&#039;s legitimacy. Online International Journal of Arts and Humanities, 2(8), 198-207.##Sivaramakrishnan, N., &amp; Subramaniyaswamy, V. (2016). Recommendation system with demographic attributes for fake review identification. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 891-899.##Soltani, A., Angelsen, A., Eid, T., Naieni, M.S.N., &amp; Shamekhi, T. (2012). Poverty, sustainability, and household livelihood strategies in Zagros, Iran. Ecological Economics, 79, 60-70.##Sun, C., Du, Q., &amp; Tian, G. (2016). Exploiting product related review features for fake review detection. Mathematical Problems in Engineering, 1, 1-7.##Taleizadeh, A.A., Noori-Daryan, M., &amp; Govindan, K. (2016). Pricing and ordering decisions of two competing supply chains with different composite policies: A Stackelberg game-theoretic approach. International Journal of Production Research, 54(9), 2807-2836.##Townsend, P. (2014). The International Analysis of Poverty. London: Routledge.##Viviani, M., &amp; Pasi, G. (2017). Quantifier guided aggregation for the veracity assessment of online reviews. International Journal of Intelligent Systems, 32(5), 481-501.##Wahyuni E.D., &amp; Djunaidy A. (2016). Fake review detection from a product review using modified method of iterative computation framework. Matec Web of Conferences, 58, 3003.##World Health Organization (2010). Country cooperation strategy for WHO and Islamic Republic of Iran: 2010–2014. Retrieved March 15, 2017 from http://apps.who.int/iris/bitstream/10665/113238/1/CCS_Islamic_Republic_Iran_2010_EN_14482.pdf.##Xiao, B., &amp; Benbasat, I. (2014). Research on the Use, Characteristics, and Impact of e-Commerce Product Recommendation Agents: A Review and Update for 2007-2012. International Journal of Electronic Marketing and Retailing, 7(1), 66-90.##Zhang, R., Gao, M., He, X., &amp; Zhou, A. (2016). Learning user credibility for product ranking. Knowledge and Information Systems: an International Journal, 46(3), 679-705.##</REF>
						</REFRENCE>
					</REFRENCES>
			</ARTICLE>
				<ARTICLE>
                <LANGUAGE_ID>1</LANGUAGE_ID>
				<TitleF>-</TitleF>
				<TitleE>Topic Modeling and Classification of Cyberspace Papers Using Text Mining</TitleE>
                <URL>https://jcss.ut.ac.ir/article_64635.html</URL>
                <DOI>10.22059/jcss.2017.239847.1009</DOI>
                <DOR></DOR>
				<ABSTRACTS>
					<ABSTRACT>
						<LANGUAGE_ID>1</LANGUAGE_ID>
						<CONTENT>The global cyberspace networks provide individuals with platforms to can interact, exchange ideas, share information, provide social support, conduct business, create artistic media, play games, engage in political discussions, and many more. The term cyberspace has become a conventional means to describe anything associated with the Internet and the diverse Internet culture. In fact, cyberspace is an umbrella term that covers all issues occurring through the interaction of information systems and humans over these networks. Deep evaluation of the scientific articles on the cyberspace domain provides concentrated knowledge and insights about major trends of the field. Text mining tools and techniques enable the practitioners and scholars to discover significant trends in a large set of internationally validated papers. This study utilizes text mining algorithms to extract, validate, and analyze 1860 scientific articles on the cyberspace domain and provides insight over the future scientific directions or cyberspace studies.</CONTENT>
					</ABSTRACT>
					<ABSTRACT>
						<LANGUAGE_ID>0</LANGUAGE_ID>
						<CONTENT>-</CONTENT>
					</ABSTRACT>
				</ABSTRACTS>
				<PAGES>
					<PAGE>
						<FPAGE>103</FPAGE>
						<TPAGE>125</TPAGE>
					</PAGE>
				</PAGES>
	
				<AUTHORS><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Babak</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Sohrabi</FamilyE>
						<Organizations>
							<Organization>Professor, Department of IT Management, Faculty of Management, University of Tehran (UT), Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>bsohrabi@ut.ac.ir</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Iman</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Raeesi Vanani</FamilyE>
						<Organizations>
							<Organization>Assistant Professor of Industrial Management, Allameh Tabataba’i University (ATU), Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>imanraeesi@atu.ac.ir</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>MMohsen</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Baranizade Shineh</FamilyE>
						<Organizations>
							<Organization>Master of IT Management, Faculty of Management, University of Tehran (UT), Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>baranizade.mohsen@gmail.com</Email>			
						</EMAILS>
					</AUTHOR></AUTHORS>
				<KEYWORDS>
					<KEYWORD>
						<KeyText>cyberspace</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>Text mining</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>trend discovery</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>topic modeling</KeyText>
					</KEYWORD></KEYWORDS>
				<REFRENCES>
				<REFRENCE>
				<REF>Akhgar, B., Rasouli, H., &amp; Raeesi Vanani, I. (2012). Evaluation of knowledge-based competency in Iranian universities: a practical model. International Journal of Knowledge and Learning, 8(3-4), 282-297.##Alghamdi, R., Alfalqi, Kh. (2015). A survey of topic modeling in text mining. I. J. ACSA, 1, 147-153.##Arun, R., Suresh, V., Madhavan, C.V., &amp; Murthy, M.N. (2010, June). On finding the natural number of topics with latent dirichlet allocation: Some observations. In Pacific-Asia Conference on Knowledge Discovery and Data Mining (pp. 391-402). Springer, Berlin, Heidelberg.##Bhagat, B.C. (2011). Cloud computing governance, cyber security, risk, and compliance business rules system and method. Google Patents, 2-5.##Cao, J., Xia, T., Li, J., Zhang, Y., &amp; Tang, S. (2009). A density-based method for adaptive LDA model selection. Neurocomputing, 72(7), 1775-1781.##Choudhary, A.K., Oluikpe, P.I., Harding, J.A., &amp; Carrillo, P.M. (2009). The needs and benefits of Text Mining applications on Post-Project Reviews. Computers in Industry, 60, 728-740.##Deveaud, R., SanJuan, E., &amp; Bellot, P. (2014). Accurate and effective latent concept modeling for ad hoc information retrieval. Document Numérique, 17(1), 61-84.##Frias, S. M., &amp; Finkelhor, D. (2017). Victimizations of Mexican youth (12–17 years old): A 2014 national survey. Child Abuse &amp; Neglect, 67, 86-97.##Griffiths, T.L., &amp; Steyvers, M. (2004). Finding scientific topics. Proceedings of the National Academy of Sciences, 101, 5228-5235.##Hinduja, S., &amp; Patchin, J.W. (2010). Bullying, cyberbullying, and suicide. Archives of suicide research, 14, 206-221.##Hwang, S.Y., Wei, C.P., Lee, C.H., &amp; Chen, Y.S. (2017). Coauthorship networkbased literature recommendation with topic model. Online Information Review, 41(3), 318-336.##International Telecommunication Union (ITU) (2009). Measuring the information society. The ICT Development Index, ISBN 92-61-12831-9.##Jun, S., Park, S.S., &amp; Jang, D.S. (2014). Document clustering method using dimension reduction and support vector clustering to overcome sparseness. Expert Systems with Applications, 41, 3204-3212.##Kannan, S., &amp; Gurusamy, V. (2014). Preprocessing Techniques for Text Mining. RTRICS. Podi: researchgate. Retrieved from https://www.researchgate.net/profile/Vairaprakash_Gurusamy/publication/273127322_Preprocessing_Techniques_for_Text_Mining/links/54f8319e0cf210398e949292.pdf.##Kumar, B., &amp; Ravi, V. (2016). A survey of the applications of text mining in financial domain. Knowledge-Based Systems, 114, 128-147.##Nallapati, R.M., Ahmed, A.X., Eric, P., &amp; Cohen, W.W. (2008). Joint latent topic models for text and citations. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining (542-550). New York: ACM New York, NY, USA.##Ning, H.A. (2012). Cyber-physical-social based security architecture for future internet of things. Advances in Internet of Things, 2, 1-2.##Ottis, R., &amp; Lorents, P. (2010). Cyberspace: Definition and Implications. In Proceedings of the 5th International Conference on Information Warfare and Security, Dayton, OH, US, 8-9 April. Reading: Academic Publishing Limited, pp. 267-270. ##Ottis, R.A. (2010) International Conference on Cyber Warfare and Security (p. 267). Sonning Common: Academic Conferences International Limited.##Raeesi Vanani, I., &amp; Jalali, S.M.J. (2017). Analytical evaluation of emerging scientific trends in business intelligence through the utilisation of burst detection algorithm. International Journal of Bibliometrics in Business and Management, 1(1), 70-79.##Saini, J.R., &amp; Rakholia, R.M. (2016). On continent and script-wise divisions-based statistical measures for stop-words lists of international languages. Procedia Computer Science, 89, 313-319.##Sarkar, D. (2016). Processing and Understanding Text. In D. Sarkar, Text Analytics with Python (167-215). New York, United States: Apress. doi:10.1007/978-1-4842-2388-8.##Shafia, M.A., Sohrabi, B., Raeesi Vanani, I., &amp; Faghih Mirzaii, S. (2009). A model to evaluation components of intellectual capital. Proceedings of the 2nd International Conference on Intellectual Capital, 7-8.##Shi, J., Wan, J., Yan, H., &amp; Suo, H. (2011). A survey of cyber-physical systems. In Wireless Communications and Signal Processing (WCSP). International Conference on IEEE, 1-6.##Sivic, J.A. (2009). Efficient visual search of videos cast as text retrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31, 591-606.##Sohrabi, B., Raeesi Vanani, I., &amp; Baranizadeh Shineh, M. (2017). Designing a Predictive Analytics Solution for Evaluating the Scientific Trends in Information Systems Domain. Webology, 14(1), 32-52.##Sohrabi, B., Raeesi Vanani, I.R., Qorbani, D., &amp; Forte, P., (2012). An integrative view of knowledge sharing impact on e-learning quality: A model for higher education institutes. International Journal of Enterprise Information Systems, 8(2), 14-29.##Sohrabi, B., Raeesi Vanani, I., &amp; Shafia, S. (2010). An applied model for measuring the knowledge sharing capability. Iranian Journal of Information Processing &amp; Management, 26(1), 5-28.##Sunde, I.M. (2017). Cybercrime Law. Digital Forensics, 51-116.##Truyens, M., &amp; Van Eecke, P. (2014). Legal aspects of text mining. Computer Law &amp; Security Review, 30, 153-170.##Vijayarani, S., Ilamathi, M.J., &amp; Nithya, M. (2015). Preprocessing techniques for text mining- An overview. International Journal of Computer Science &amp; Communication Networks, 5, 7-16.##</REF>
						</REFRENCE>
					</REFRENCES>
			</ARTICLE>
				<ARTICLE>
                <LANGUAGE_ID>1</LANGUAGE_ID>
				<TitleF>-</TitleF>
				<TitleE>Behavioral Considerations in Developing Web Information Systems: User-centered Design Agenda</TitleE>
                <URL>https://jcss.ut.ac.ir/article_64637.html</URL>
                <DOI>10.22059/jcss.2017.235653.1005</DOI>
                <DOR></DOR>
				<ABSTRACTS>
					<ABSTRACT>
						<LANGUAGE_ID>1</LANGUAGE_ID>
						<CONTENT>The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users.  From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-centered; user-centered; interactive and cognitive designs. However, there is a lack of research related to possible relationships between information behavior and information systems design to date. Traditionally, designers used human factors but not necessarily human behaviors while designing information systems. Therefore, there are few systems designed by information scientist aiming to regard or support the human information behavior. There are now new techniques and methodologies such as Contextual Design and Participatory Design to fill the gap. Implementing a behavioral approach to designing information systems are of interest and importance in terms of modern information technologies like social software, web 2.0, mobile phones and internet websites. New methodologies and research frameworks are proposed that place user location, attention and behavior as their main issues.</CONTENT>
					</ABSTRACT>
					<ABSTRACT>
						<LANGUAGE_ID>0</LANGUAGE_ID>
						<CONTENT>-</CONTENT>
					</ABSTRACT>
				</ABSTRACTS>
				<PAGES>
					<PAGE>
						<FPAGE>127</FPAGE>
						<TPAGE>143</TPAGE>
					</PAGE>
				</PAGES>
	
				<AUTHORS><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Hamid</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Keshavarz</FamilyE>
						<Organizations>
							<Organization>Assistant Professor, Department of Information Science and Knowledge Studies, University of Semnan, Semnan, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>hkeshavarz@ut.ac.ir</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Fatima</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Fahimnia</FamilyE>
						<Organizations>
							<Organization>Associate Professor, Department of Information Science and Knowledge Studies, University of Tehran, Tehran, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>fahimnia@ut.ac.ir</Email>			
						</EMAILS>
					</AUTHOR><AUTHOR>
						<Name>-</Name>
						<MidName></MidName>		
						<Family>-</Family>
						<NameE>Fatemeh</NameE>
						<MidNameE></MidNameE>		
						<FamilyE>Sedigh Talemi</FamilyE>
						<Organizations>
							<Organization>MA Student in TEFL, Faculty of Foreign Languages, Islamic Azad University, Central Tehran Branch, Iran</Organization>
						</Organizations>
						<Countries>
							<Country>Iran</Country>
						</Countries>
						<EMAILS>
							<Email>sedighazadeh@yahoo.com</Email>			
						</EMAILS>
					</AUTHOR></AUTHORS>
				<KEYWORDS>
					<KEYWORD>
						<KeyText>human-computer interaction</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>human searching behavior</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>information retrieval systems</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>information science</KeyText>
					</KEYWORD>
					<KEYWORD>
						<KeyText>information systems</KeyText>
					</KEYWORD></KEYWORDS>
				<REFRENCES>
				<REFRENCE>
				<REF>Bates, M. (1989). The design of browsing and berry-picking techniques for online search interface. Online Review, 13(5), 407-424.##Beaulieu, M. (2000). Interaction of information searching and retrieval. Journal of Documentation, 56(4), 431-9.##Belkin, N.J. (1993). Interaction with texts: Information retrieval as information-seeking behavior. Information retrieval ‘93. Von der Modellierung zur Anwendung. Konstanz: Universitaetsverlag Konstanz, pp. 55-66.##Belkin, N.J. (1990). The cognitive viewpoint in information science. Journal of Information Science, 16(1), 11-15.##Belkin, N.J. (1984). Cognitive models and information transfer. Social Science Information Studies, 4, 111-129.##Belkin, N.J., Marchetti, P.G., &amp; Cool, C. (1993). BRAQUE: Design of an interface to support user interaction in Information Retrieval. Information Processing &amp; Management, 29(3), 325-344.##Belkin, N.J., Oddy, R.N., &amp; Brooks, H.M. (1982). ASK for information retrieval, Part I: Background and theory; Part II: Results of a design study. Journal of Documentation, 3(2&amp;3), 61-71, 145-164.##Bilal, D. (2005). Children’s Information Seeking and the Design of Digital Interfaces in the Affective Paradigm. Library Trends, 54(2), 197-208.##Beyer, H., &amp; Holtzblatt, K. (1998). Contextual Design: Defining Customer-Centered Systems. San Francisco: Morgan Kaufmann.##Case, O. D. (2003). Looking for information: a survey of research on information seeking, needs and behavior. San Diego: Academic Press.##Case, D.O. (2006), &quot;Information behavior&quot;, In; Cronin, B, (Ed.) Annual Review of Information Science and TechnologyVol. 40, pp.297-327. Medford, NJ: Information Today.##Checkland, P., &amp; Scholes, J. (1990). Soft systems methodology in action. Wiley: Chichester.##Croft, W.B., &amp; Thompson, R.H. (1987). I3R: a new approach to the design of document retrieval systems. Journal of the American Society for Information Science, 38(6), 389-404.##Dervin, B., &amp; Nilan, M. (1986). Information needs and uses. Annual review of information science and technology, 21, 3-33.##Dervin, B. (1983), &quot;An overview of sense-making research: concepts, methods and results to date&quot;, Paper presented at the International Communications Association Annual Meeting. Dallas, Texas.##Dervin, B. (1995). The relationship of user-centered evaluation to design: addressing issues of productivity and power. ACM SIGOIS Bulletin, 16(2), 42-46.##Fidel, R., &amp; Pejtersen, A.M. (2004). From information behavior research to the design of information systems: the Cognitive Work Analysis framework. Information Research, Vol. 10 No.1. Online: www.informationr.net/ir/10-1/paper210.html (accessed 2 September 2016).##Ford, N. (2000). Cognitive styles and virtual environments. Journal of the American Society for Information Science and Technology, 51(6), 543-557.##Gasson, S. (2003). Human-centered vs. user-centered approaches to information system design. Journal of Information Technology Theory and Application, 5(2), 29-41.##Ginsburg, G. (2005). Human factors engineering: a tool for medical device evaluation in hospital procurement decision-making. J. Biomed. Inform. 38(3), 213-219.##Goldkuhl, G (2004). Design theories in information systems– a need for multi-grounding. Journal of Information Technology Theory and Application (JITTA), 6(2), 59-72.##Hagedorn, T.J., Krishnamurty, S., &amp; Grosse, I.R. (2016). An information model to support user-centered design of medical devices. Journal of Biomedical Informatics, 62, 181-194.##Harman, D. (1992). Evaluation issues in information retrieval. Information Processing &amp; Management, 28, 439-440.##Hjorland, B. (2002). Epistemology and the socio-cognitive perspective in information science. Journal of the American Society for Information Science and Technology, 53(4), 257-270.##Hjorland, B. (1997). Information seeking and subject representation: an activity-theoretical approach to information science. Westport, CN: Greenwood Press.##Hyysalo, S., &amp; Johnson, M. (2015). The user as relational entity: Options that deeper insight into user representations opens for human-centered design. Information Technology &amp; People, 28(1), 72-89.##Ingwersen, P. (1996). Cognitive perspectives of information retrieval interaction: Elements of a cognitive IR theory. Journal of Documentation, 52(1), 3-50.##Ingwersen, P. (1992). Information Retrieval Interaction. Taylor Graham, London. Online: http://vip.db.dk/pi/iri/files/Ingwersen_IRI.pdf (accessed 2 September 2016).##Ingwersen, P., &amp; Järvelin, K. (2005). The Turn. Integration of Information Seeking and Retrieval in Context. Berlin: Springer.##Johnstone, D., Bonner, M., &amp; Tate, M. (2004). Bringing human information behaviour into information systems research: an application of systems modelling. Information Research, 9(4), 9-4.##Julien, H., McKechnie, L.E.F., &amp; Hart, S. (2005). Affective issues in library and information science systems work: A content analysis. Library and Information Science Research, 27(4), 453-466.##Kuhlthau, C.C. (2005). Towards collaboration between information seeking and information retrieval. Information Research, 10(2). Online: http://informationr.net/ir/10-2/paper225.html (accessed 2 September 2016).##Kuhlthau, C.C. (2004). Seeking Meaning: A Process Approach to Library and Information Services, 2nd ed., Libraries Unlimited, Westport, CT.##Kuhlthau, C.C. (1991). Inside the search process: information seeking from the user&#039;s perspective. Journal of the American Society for Information Science, 42(5), 361-371.##Kujala, S. (2003). User in Volvement: A review of the benefits and challenges. Behaviour &amp; Information Technology, 22(1), 1-16.##Maguire, M. (2001). Methods to support human-centred design. International Journal of Human-Computer Studies, 55(4), 587-634.##Marchionini, G. (2006). Toward human-computer information retrieval. Bulletin of the American Society for Information Science and Technology. June/July. Online: http://www.asis.org/Bulletin/Jun-06/marchionini.html (accessed 2 September 2007).##Marchionini, G, (2004). From information retrieval to information interaction. Keynote at European Conference on Information Retrieval. Online: http://ils.unc.edu/%7Emarch/ECIR.pdf (accessed 2 September 2016).##Marchionini, G. (1995). Information Seeking in Electronic Environments. Cambridge, UK: Cambridge University Press. Online: http://ils.unc.edu/~march/isee_book/web_page.html (accessed 2 September 2016).##McDonnell, M., &amp; Shiri, A. (2011). Social search: A taxonomy of, and a user‐centred approach to, social web search. Program, 45(1), 6-28.## Newby, G. B. (2001). Cognitive space and information space. Journal of the Association for Information Science and Technology, 52(12), 1026-1048.##Oddy, R.N. (1977). Information retrieval through man-machine dialogue. Journal of Documentation, 33(1), 1-14.##Olsson, E. (2004). What active users and designers contribute in the design process. Interacting with Computers, 16, 377-401.##Pettigrew, K.E., Fidel, R. &amp; Bruce, H. (2001), &quot;Conceptual frameworks in information behavior&quot;, In M. E. Williams (Ed.), Annual Review of Information Science and Technology, Vol.  35, pp. 43-78. Medford, NJ: Information Today.##Pejtersen, A.M. (1992), &quot;The Book House. An icon based database system for fiction retrieval in public libraries&quot;, In: B. Cronin (Ed.), The marketing of library and information services 2. (pp. 572-591). London: Aslib.##Pejtersen, A. M. (1989). The BOOK HOUSE. Modeling users’ needs and search strategies as a basis for system design. RISØ National Laboratory. RISØ-M-2794, 98 p. Google Scholar.##Rogers, Y. (2004). New theoretical approaches for HCI. Annual review of information science and technology, 38(1), 87-143##Rouse, W. B., &amp; Rouse, S. H. (1984). Human information seeking and design of information systems. Information Processing &amp; Management, 20(1-2), 129-138.##Saffer, D. (2010). Designing for Interaction. New Riders, Berkeley.##Saracevic, T. (1999). Information science. Journal of the American Society for Information Science, 50(12), 1051-1063. Online: http://www.scils.rutgers.edu/~tefko/JASIS1999.pdf (accessed 2 September 2016).##Saracevic, T. (1997a). The stratified model of information retrieval interaction: Extension and applications. Proceedings of the American Society for Information Science, 34, 313-327. Online: http://www.scils.rutgers.edu/~tefko/ProcASIS1997.doc (accessed 2 September 2016).##Saracevic, T. (1997b). Users lost: Reflections on the past, future, and limits of information science. SIGIR Forum, 31(2), 16-27. [Acceptance address for the 1997 Gerard Salton Award for Excellence in Research, Special Interest Group for Information Retrieval (SIGIR) of the Association for Computing Machinery (ACM).] Online: http://www.scils.rutgers.edu/~tefko/SIGIR_Forum_97.doc (accessed 2 September 2007).##Saracevic, T. (1996). Modeling interaction in information retrieval (IR): A review and proposal. Proceedings of the American Society for Information Science, 33, 3-9, Online: http://www.scils.rutgers.edu/~tefko/ProcASIS1996.doc (accessed 2 September 2016).##Saracevic, T. (1995). Evaluation of evaluation in information retrieval. Proceedings of the 18th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Special issue of SIGIR Forum, pp. 138-146. Online: http://www.scils.rutgers.edu/~tefko/SIGIR_Forum_95.pdf (accessed 2 September 2016).##Savolainen, R. (1995). Everday life information seeking: Approaching information seeking in the context of ‘way of life”. Library &amp; Information Science Research, 17, 259-294.##Savolainen, R. (1993). The sense-making theory: reviewing the interests of a user-centered approach to information seeking and use. Information Processing &amp; Management, 29(1), 13-28.##Smart, K.L., &amp; Whiting, M. (2001). Designing systems that support learning and use: A customer-centered approach. Information and Management, 39(3), 177-190.##Spink, A. &amp; Cole, C. (2004). A human information behavior approach to the philosophy of information. Library Trends, 52(3), 373-380.##Spink, A., &amp; Currier, J. (2006). Towards an evolutionary perspective for human information behavior: an exploratory study. Journal of Documentation, 62(2), 171-193##Spink, A., &amp; Cole, C. (2006). Human information behavior: Integrating diverse approaches and information use. Journal of the American Society for Information Science and Technology, 57(1), 25-35.##Spink, A., &amp; Wilson, T.D. (1999). Toward a theoretical framework for information retrieval (IR) evaluation in an information seeking context. Proceedings of MIRA 99: Evaluation Frameworks for Multimedia IR Applications, Dept. Computing Science, University of Glasgow - Scotland, April 14-16, (pp.75-92) Online: http://www.bcs.org/upload/pdf/ewic_mi99_paper9.pdf  (accessed 2 September 2015).##Turnbull, D. (2003). Augmenting information seeking on the world wide web using collaborative filtering techniques. URL: Online: http://www.ischool.utexas.edu/~donturn/research/augmentis-abstract.html (accessed 2 September 2016)##Wang, Y.D., &amp; Forgionne, G. (2006). A decision-theoretic approach to the evaluation of information retrieval systems. Information Processing and Management, 42(4), 863-874.##Watters, C.R., &amp; Shepherd, M.A. (1994). Shifting the Information Paradigm from Data-Centered to User-Centered. Information Processing &amp; Management, 30(4), 455-471.##Wilson, T.D. (1999). Models in information behaviour research. Journal of Documentation, 55(3), 249-270.##Vicente, K.J. (2002). Ecological interface design: progress and challenges. Human Factors, 44, 62-78.##Vicente, K.J. (1999). Cognitive work analysis. Mahwah, NJ: Lawrence Erlbaum.##Zhang, J., &amp; Fine, S. (1996). The effect of human behavior on the design of an information retrieval system interface. International Information and Library Review, 28, 249-260.##</REF>
						</REFRENCE>
					</REFRENCES>
			</ARTICLE></ARTICLES>
</JOURNAL>

				</XML>
				