<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v3.0 20080202//EN" "journalpublishing3.dtd">
<article article-type="Original article" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">Cyberspace Studies</journal-id>
			      <journal-id journal-id-type="publisher-id">University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Cyberspace Studies</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2588-5499</issn>
			      <publisher>
			        <publisher-name>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">167</article-id>
			      <article-id pub-id-type="doi">10.22059/jcss.2017.238999.1008</article-id>		
			      <ext-link xlink:href="https://jcss.ut.ac.ir/article_64638_f8ee25df97d703b26b3e69dd68727f75.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
			          		<subject>Original article</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>A Comparative Study of Regulating the Filtering of Cyberspace in the US, the EU and China; Proposals for Policymaking in Iran</article-title>
			        <subtitle>A Comparative Study of Regulating the Filtering of Cyberspace in the US, the EU and China; Proposals for Policymaking in Iran</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1">
			          <name>
			            <surname>Bashir</surname>
			            <given-names>Hassan</given-names>
			          </name>
					  <aff>Professor, Imam Sadiq University, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2" corresp="yes">
			          <name>
			            <surname>Nasrollahi</surname>
			            <given-names>Mohammad Sadegh</given-names>
			          </name>
					  <aff>Assistant Professor, Imam Sadiq University, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>01</day>
			        <month>01</month>
			        <year>2018</year>
			      </pub-date>
			      <volume>2</volume>
			      <issue>1</issue>
			      <fpage>1</fpage>
			      <lpage>28</lpage>
			      <history>
			        <date date-type="received">
			          <day>01</day>
			          <month>08</month>
			          <year>2017</year>
			        </date>
			        <date date-type="accepted">
			          <day>21</day>
			          <month>10</month>
			          <year>2017</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2018, University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World". </copyright-statement>	
			        <copyright-year>2018</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jcss.ut.ac.ir/article_64638.html">https://jcss.ut.ac.ir/article_64638.html</self-uri> 		
			      <abstract>
			        <p>The crucial role of cyberspace attracted the special attention of the governments in different countries, which consider it both as a challenge and an opportunity. One of the key policies and preventive measures adopted concerning the challenges posed by the cyberspace is it regulation. In fact, there are only a few states have not taken any steps in regulating their cyberspace. This paper seeks to demonstrate a set of policy proposals for the Islamic Republic of Iran through the study of three leading but different precedents in regulating the cyberspace, including the United States, the European Union, and China. This study employs a descriptive-analytical model, which recommends placing the main investment in and concentration on the final user, employing economic strategies, special attention to governmental and public institutions, prioritizing content removal over blocking, negotiating an agreement with foreign service providers, drafting a content rating system, and using international capacities for cooperation. Accordingly, the final policy proposals for the Islamic Republic of Iran would be decentralization, user-oriented decisions, prioritizing removal over blocking, and monitoring over filtering.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>cyberspace</kwd>
						<kwd>Filtering</kwd>
						<kwd>Internet</kwd>
						<kwd>monitoring</kwd>
						<kwd>regulating</kwd>
						<kwd>Regulation</kwd>
						<kwd>Surveillance</kwd>
						<kwd>virtual space</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Ameli, S.R. (2011) Rooykarde dofazaei be asibha, jarayem, ghavanin va siasathaye fazaye majazi [dual-spacization approach toward harms, offences, laws and policies of Iran’s cyberspace]. Tehran: Amirkabir Publications.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Amn Afzar Gostar Sharif Service Provider (2008a). [Comparative studies in other countries’ approach toward internet regulation] (Phase 1, Vol. 1, Report 2). Tehran: Iran Telecommunications Research Center.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Amn Afzar Gostar Sharif Service Provider (2008b). [Legal status and challenges regulating the internet in national and international levels] (Phase 1, Vol. 2, Report 2). Tehran: Iran Telecommunications Research Center.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Ansari, B. (2011). Hoghoghe ertebate jamei [Mass Communications Law]. Tehran: Samt Publication. </element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Balkin, J.M., Noveck, B.S., &amp; Roosevelt, K. (1999). Filtering the internet: A best practices model. The Information Society Project at Yale Law School.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Child Online Protection Act (COPA) (H.R.3783). (1998). Retrieved from Library of Congress website: https://www.congress.gov/bill/105th-congress/house-bill/3783.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Children's Internet Protection Act (CIPA). (2000). Retrieved from https://www.fcc.gov/consumers/guides/childrens-internet-protection-act.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Costello, R.B. (1992). Random House Webster's college dictionary. New York, NY: Random House.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Deibert, R., Palfrey, J., Rohozinski, R., Zittrain, J., &amp; Stein, J.G. (2008). Access denied: The practice and policy of global internet filtering. Mit Press.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Digital Millennium Copyright Act (DMCA). (1998). Retrieved from https://www.copyright.gov/legislation/dmca.pdf</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Electronic Commerce Directive. (2000). Retrieved from http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32000L0031</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Frybman, B., Hennebel, L., &amp; Lewkowicz, G. (2008). Rahbordhay dolati baray samandehi moshtarake internet dar Amrika, Oroopa va Chin. [Public Strategies for Internet Co-regulation in the United States, Europe and China]. (M. A. Nouri, Trans.). Law Information Journal, 6(14), pp. 171-188.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Illegal and harmful content on the Internet. (1996). Retrieved from http://aei.pitt.edu/5895/1/5895.pdf</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Jalali Farahani, A.H. (2007). [Taamoli bar filtering (motaleye tatbighi sayer keshvarha). A Review of Filtering (A comparative study on other countries)] (8442 Vol. 2). Tehran: Iran Parliament Research Center. “Studies on Communications and New Technologies”. Retrieved from http://rc.majlis.ir/fa/report/show/734106.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Rouzbahani, M.R. (2014). Jaygahe feghhi va hoghooghie filtering (mahdoodiat) dar rasanehaye majazi az didgahe mazahebe khamse [Filtering in Virtual Media from Legal and Jurisprudence Perspectives]. Tehran: Ketab Ava.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Summers, D. (2003). Longman dictionary of contemporary English. Essex: Pearson.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>USA Patriot Act. (2001). Retrieved from https://www.justice.gov/archive/ll/highlights.htm</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Wehmeier, S. (Ed.). (2005). Oxford Advanced Learner's Dictionary of Current English: AS Hornby. Oxford University.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>The voluntary Public Pledge of Self-Discipline for the China Internet Industry. Communications Decency Act (CDA). (1996). Retrieved from https://internetlaw.uslegal.com/free-speech/the-communications-decency-act-of-1996/.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Original article" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">Cyberspace Studies</journal-id>
			      <journal-id journal-id-type="publisher-id">University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Cyberspace Studies</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2588-5499</issn>
			      <publisher>
			        <publisher-name>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">167</article-id>
			      <article-id pub-id-type="doi">10.22059/jcss.2018.245833.1012</article-id>		
			      <ext-link xlink:href="https://jcss.ut.ac.ir/article_64646_1f6ed44dfb107542a01a3772e007e6a3.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
			          		<subject>Original article</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Rearticulating Internet Literacy</article-title>
			        <subtitle>Rearticulating Internet literacy</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1">
			          <name>
			            <surname>Bauer</surname>
			            <given-names>Alfred Thomas</given-names>
			          </name>
					  <aff>Institut fuer Publizistik und Kommunikationswissenschaft, Universität Wien, Österreich</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2" corresp="yes">
			          <name>
			            <surname>Mohseni Ahooei</surname>
			            <given-names>Ebrahim</given-names>
			          </name>
					  <aff>PhD Student, Department of Communication, University of Vienna, Austria and Senior Researcher at Cyberspace Research Policy Center, University of Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>01</day>
			        <month>01</month>
			        <year>2018</year>
			      </pub-date>
			      <volume>2</volume>
			      <issue>1</issue>
			      <fpage>29</fpage>
			      <lpage>53</lpage>
			      <history>
			        <date date-type="received">
			          <day>19</day>
			          <month>11</month>
			          <year>2017</year>
			        </date>
			        <date date-type="accepted">
			          <day>16</day>
			          <month>01</month>
			          <year>2018</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2018, University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World". </copyright-statement>	
			        <copyright-year>2018</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jcss.ut.ac.ir/article_64646.html">https://jcss.ut.ac.ir/article_64646.html</self-uri> 		
			      <abstract>
			        <p>As a simple explanation, Internet literacy is a capability constitutive to utilizing the advantages of the Internet. But, due to the constant changes of digital technologies, what kinds of necessary capabilities are required to gain the advantages? In fact, more than focusing on the essential capabilities to benefit users from the Internet advantages, existing perceptions of Internet literacy have caused the misuse of large digital companies from users’ abilities. Due to the increasing importance of data economics, privacy, and cybersecurity, a critical review of Internet literacy has become a necessity. Based on the emerging of such new critical features of internet environment, this paper proposes a new articulation of Internet literacy. Following a review and analysis of the existing notions and classifications of Internet literacy and using grounded theory method, the article concludes by suggesting a rearticulated version of Internet literacy. The new classification is established based on the 3 main components including responsibility, productivity, and interactivity; 9 main categories, and 43 subcategories. The four critical, analytical, operational, and informational crossover components are also taken into account.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>Internet literacy</kwd>
						<kwd>responsibility</kwd>
						<kwd>productivity</kwd>
						<kwd>interactivity</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Acquisti, A.; John, L. &amp; Loewenstein, G. (2013). What Is Privacy Worth? The Journal of Legal Studies, 42(2), 249-274.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Association of College and Research Libraries (2000). Information Literacy Competency Standards for Higher Education. Chicago: American Library Association.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Aufderheide, P. (1993). Media literacy: a report of the national leadership conference on media literacy. Aspen, CO: Aspen Institute.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Banta, T. W. &amp; Mzumara, H. R. (2004). Assessing information literacy and technological competency. Assessment Update, 16 (5): 3–14.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Barbara R. &amp; Suzanne L. (2006). Flannigan: Connecting the Digital Dots: Literacy of the 21st Century. Educause Quarterly, 2: 8-10.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Bauduin, J. L.; Audouin, J.L.; Jobin, P. G. &amp; N. Vezina, N. (2005). Les Obligations, 6th ed. Cowansville: Éditions Yvon Blais.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Bhaskar, R. (1975). A realist theory of science. Leeds, UK: Leeds Books Ltd.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Bukingham, D. (2007). Beyond Technology: Children’s Learning in the Age of Digital Culture. Polity Press.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Burks, A. W. (1978). Review: Charles S. Peirce, The new elements of mathematics, Bulletin of the American Mathematical Society. 84 (5): 913–918.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Cambridge Dictionary (2017). Awareness. Retrieved April 15, 2017, online at http://dictionary.cambridge.org/dictionary/english/awareness</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Charmaz, K. (1990). ‘Discovering’ chronic illness: Using grounded theory. Social Science &amp; Medicine, 30: 1161-1172.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Charmaz, K. (2000). Constructivist and objectivist grounded theory. In N. K. Denzin &amp; Y. Lincoln (Eds.), Handbook of qualitative research (2nd ed., pp. 509–535). Thousand Oaks, CA: Sage.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Charmaz, K. (2002). Grounded theory analysis. In J. F. Gubrium &amp; J. A. Holstein (Eds.), Handbook of interview research (pp. 675–694). Thousand Oaks, CA: Sage.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Charmaz, K. (2006) Constructing grounded theory: A practical guide through qualitative analysis. Thousand Oaks, CA: Sage Publications, Inc.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Charmaz, K. (2008). Constructionism and the grounded theory method. In J. A. Holstein &amp; J. F. Gubrium (Eds.), Handbook of constructionist research. Guilford Press.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Chartered Institute of Library and Information Professionals (2004). Information literacy: Definition. London: CILIP. Retrieved April 11, 2017, online from https://www.cilip.org.uk/research/topics/information-literacy</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Chung, A. M, Gill, I. B., &amp; O'Byrne, I. (2017). Web Literacy 2.0. Retrieved April 10, 2017, online at https://mozilla.github.io/content/web-lit-whitepaper/#introduction</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Collins, H. (2001). Corporate Portals: Revolutionizing Information Access to Increase Productivity and Drive the Bottom Line. New York: AMACOM.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Cope, B. &amp; Kalantzis, M. (Eds.) (2000). Multiliteracies: Literacy and the design of social futures. London: Routledge.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>De Castell, S. &amp; Luke, A. (1986). Models of literacy in North American schools: Social and historical conditions and consequences‖. In De Castell, Suzanne; Luke, Allan; &amp; Egan, Kieran (Eds.). Literacy, society, and schooling. New York: Cambridge University Press, p. 87-109.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Denzin, N. K. &amp; Lincoln, Y. S. (1998). Strategies of Qualitative Inquiry. Sage Publications.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Eisenberg, M.B., Lowe, C.A. &amp; Spitzer, K.L. (2004). Information literacy: essential skills for the information age, 2nd ed. Westport, Connecticut: Libraries Unlimited.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Eriksson, S. &amp; Reinsjö, A. (2016). The Success Factors of a Technical Exhibition: A study to investigate the design aspects of an exhibition. Master’s thesis in Applied Information Technology, Department of Applied Information Technology, Chalmers University of Technology.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Eshet-Alkali, Y. &amp; Amichai-Hamburger, Y. (2004). Experiments in Digital Literacy. Cyberpsychology &amp; Behavior, 7(4): 421-429.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Estes, J. S. (2015). A Call for Teacher Preparation Programs to Model Technology Integration into the Instructional Process. In J. Keengwe. Handbook of Research on Educational Technology Integration and Active Learning (p. 62-77). Hershey: IGI Global.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Estes, J. S. (2017).Teacher Preparation Programs and Learner-Centered, Technology-Integrated Instruction. In J. Keengwe. &amp; J. Onchwari (Editors). Handbook of Research on Learner-Centered Pedagogy in Teacher Education and Professional Development (p. 85-103). Hershey: IGI Global.</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Fabbro, E. (2009). Information Literacy. In P. L. Rogers, G. A. Berg, J. V. Boettcher, C. Howard, L. Justice and K. D. Schenk, Encyclopedia of Distance Learning, Second Edition (Volume 4) (p. 1178-1182). California: Information Science Reference.</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>Farmer, L. S. J. (2011). How Adults Learn Through Information Technologies. In V. C. X. Wang. Encyclopedia of Information Communication Technologies and Adult Education Integration (p. 17-36). Hershey: IGI Global.</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Farmer, L. S. &amp; Henri, J. (2008). Information literacy assessment in K-12 settings. Lanham, MD: Scarecrow Press.</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>Fuji, K. &amp; Yoshida, F. (2015). Mobile Phone-Related Behaviors and Problems in Japan. In Z. Yan. Encyclopedia of Mobile Phone Behavior (p. 1079-1088). Hershey: IGI Global.</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>Gee, J. P. (1996). Social linguistics and literacies. London: Taylor &amp; Francis.</element-citation>
		</ref>
		<ref id="R32">
			<label>32</label>
			<element-citation>Gilster, P. (1997). Digital Literacy, New York: Wiley and Computer Publishing.</element-citation>
		</ref>
		<ref id="R33">
			<label>33</label>
			<element-citation>Glaser, B. &amp; Strauss, A. (1967). The Discovery of Grounded Theory: strategies for qualitative research. New York: Aldine de Gruyter Publications.</element-citation>
		</ref>
		<ref id="R34">
			<label>34</label>
			<element-citation>Golian-Lui, L. M. &amp; Westenkirchner, S. (2011). Library Issues in Adult Online Education. In V. C. X. Wang. Encyclopedia of Information Communication Technologies and Adult Education Integration (p. 485-505). Hershey: IGI Global.</element-citation>
		</ref>
		<ref id="R35">
			<label>35</label>
			<element-citation>Gurak, L. J. (2003). Cyberliteracy: Navigating the Internet with Awareness Paperback. Yale University Press.</element-citation>
		</ref>
		<ref id="R36">
			<label>36</label>
			<element-citation>Haigh, R. W. (1985). Planning for Computer Literacy. The Journal of Higher Education. 56 (2): 161–171.</element-citation>
		</ref>
		<ref id="R37">
			<label>37</label>
			<element-citation>Halvorsen, A. (2009). Social Networking Sites and Critical Language Learning. In M. Thomas. Handbook of Research on Web 2.0 and Second Language Learning (p. 237-258).</element-citation>
		</ref>
		<ref id="R38">
			<label>38</label>
			<element-citation>Julien, H. (2014). Digital Literacy. Encyclopedia of Information Science and Technology, Third Edition. IGI Global Publication.</element-citation>
		</ref>
		<ref id="R39">
			<label>39</label>
			<element-citation>Kaiser Family Foundation (2003). Key Facts: Media literacy. Retrieved April 12,  2017, online at https://kaiserfamilyfoundation.files.wordpress.com/2013/01/key-facts-media-literacy.pdf</element-citation>
		</ref>
		<ref id="R40">
			<label>40</label>
			<element-citation>Keith J Topping, K. J. &amp; Mckenna, M. C. (1999). Introduction to Electronic Literacy – Part 1, Reading &amp; Writing Quarterly, 15(2): 107-110.</element-citation>
		</ref>
		<ref id="R41">
			<label>41</label>
			<element-citation>Kim, E. &amp; Yang, S. (2016). Internet literacy and digital natives’ civic engagement: Internet skill literacy or Internet information literacy?, Journal of Youth Studies, 19 (4): 438-456. DOI: 10.1080/13676261.2015.1083961</element-citation>
		</ref>
		<ref id="R42">
			<label>42</label>
			<element-citation>Kim, E. (2011). Is Internet Literacy Inherited from Parent to Children? Journal of Korean Society for Journalism and Communication Studies, 55(2): 155–177.</element-citation>
		</ref>
		<ref id="R43">
			<label>43</label>
			<element-citation>Klein, M. (2005). Responsibility. In Honderich, Ted. Oxford Companion to Philosophy.</element-citation>
		</ref>
		<ref id="R44">
			<label>44</label>
			<element-citation>Koren, N. (2014). An Intimate Look at the Rise of Data Totalitarianism(reviewing Dave Eggers, the Circle (. Retrieved 11 10, 2015, from Cyber Law JOTWELL: http://cyber.jotwell.com/an-intimate-look-at-the-rise-of-data-totalitarianism/</element-citation>
		</ref>
		<ref id="R45">
			<label>45</label>
			<element-citation>Leadbeater, C. (2009). We-Think: Mass Innovation, Not Mass Production. London: Profile Books.</element-citation>
		</ref>
		<ref id="R46">
			<label>46</label>
			<element-citation>Yuping, L, &amp; Shrum, L. J. (2002). What is Interactivity and is it always Such a Good Thing? Implications of Definition, Person, and Situation for the Influence of Interactivity on Advertising Effectiveness, Journal of Advertising, 31(4): 53-64.</element-citation>
		</ref>
		<ref id="R47">
			<label>47</label>
			<element-citation>Livingstone, S. (2004). Media Literacy and the Challenge of New Information and Communication Technologies. The communication Review, 7:3-14.</element-citation>
		</ref>
		<ref id="R48">
			<label>48</label>
			<element-citation>Livingstone, S. (2009). Children and the Internet. Cambridge, UK: Polity Press.</element-citation>
		</ref>
		<ref id="R49">
			<label>49</label>
			<element-citation>Livingstone, S.; Bober, M. &amp; Helsper, E. (2005). Internet literacy among children and young people: Findings from the UK children Go Online project. London: London School of Economics and Political Science.</element-citation>
		</ref>
		<ref id="R50">
			<label>50</label>
			<element-citation>Martin, A. &amp; Grudziecki, J. (2006). DigEuLit: concepts and tools for digital literacy development. ITALICS, 5(4): 249-267.</element-citation>
		</ref>
		<ref id="R51">
			<label>51</label>
			<element-citation>McCallin, A. (2004). Pluralistic Dialoguing: A theory of interdisciplinary team working, The Grounded Theory Review, 4(1): 25-42.</element-citation>
		</ref>
		<ref id="R52">
			<label>52</label>
			<element-citation>Michael, S. (2016). Privates in the online public: Sex(ting) and reputation on social media. New Media &amp; Society, 2016, 18(11), pp.2723-2739.</element-citation>
		</ref>
		<ref id="R53">
			<label>53</label>
			<element-citation>Müller, A. R., Röder, M., &amp; Fingerle, M. (2014). Child sexual abuse prevention goes online: Introducing “Cool and Safe” and its effects. Computers &amp; Education 78 (2014) 60-65.</element-citation>
		</ref>
		<ref id="R54">
			<label>54</label>
			<element-citation>Na, L. &amp; Yan, Z. (2013). Promote Data-intensive Scientific Discovery, Enhance Scientific and Technological Innovation Capability: New Model, New Method, and New Challenges Comments on The Fourth Paradigm: Data-intensive Scientific Discovery. Bulletin of Chinese Academy of Sciences. 1 (16).</element-citation>
		</ref>
		<ref id="R55">
			<label>55</label>
			<element-citation>National Forum on Information Literacy (2017). What is the NFIL? Retrieved April 02, 2017 online at http://infolit.org/about-the-nfil/what-is-the-nfil/</element-citation>
		</ref>
		<ref id="R56">
			<label>56</label>
			<element-citation>NetSciEd (2017). Network Literacy: Essential Concepts and Core Ideas. Retrieved April 07, 2017 online from https://sites.google.com/a/binghamton.edu/netscied/teaching-learning/network-concepts</element-citation>
		</ref>
		<ref id="R57">
			<label>57</label>
			<element-citation>Nicholas, H. &amp; Ng, W. (2009). Ubiquitous Learning and Handhelds. In P. L. Rogers, G. A. Berg, J. V. Boettcher, C. Howard, L. Justice and K. D. Schenk, Encyclopedia of Distance Learning, Second Edition (Volume 4) (p. 2171-2176). California: Information Science Reference.</element-citation>
		</ref>
		<ref id="R58">
			<label>58</label>
			<element-citation>Oxford Dictionary (2017). Productivity. Retrieved April 16, 2017, online from https://en.oxforddictionaries.com/definition/productivity</element-citation>
		</ref>
		<ref id="R59">
			<label>59</label>
			<element-citation>Parker, J. D. A.; Taylor, R. N.; Eastabrook, J. M.; Schell, S. L. &amp;  Wood, L. M. (2008). Problem gambling in adolescence: Relationships with Internet misuse, gaming abuse, and emotional intelligence. Personality and Individual Differences, 45 (2): 174–180.</element-citation>
		</ref>
		<ref id="R60">
			<label>60</label>
			<element-citation>Potter, W. J. (2010). The state of media literacy. Journal of Broadcasting &amp; Electronic Media 54: 675–696.</element-citation>
		</ref>
		<ref id="R61">
			<label>61</label>
			<element-citation>Prasad, L. &amp; Gulshan. S. S. (2011). Management Principles and Practices. New Delhi: Excel Books.</element-citation>
		</ref>
		<ref id="R62">
			<label>62</label>
			<element-citation>Rafaeli, S. (1988). Interactivity: From new media to communication. In R. P. Hawkins, J. M. Wiemann, &amp; S. Pingree (Eds.), Sage Annual Review of Communication Research: Advancing Communication Science: Merging Mass and Interpersonal Processes, 16, 110-134. Beverly Hills: Sage. Haifa.ac.il.</element-citation>
		</ref>
		<ref id="R63">
			<label>63</label>
			<element-citation>Rouse, M. &amp; Wigmore, I. (2015). Definition data literacy. Retrieved April 13, 2017, online at http://whatis.techtarget.com/definition/data-literacy</element-citation>
		</ref>
		<ref id="R64">
			<label>64</label>
			<element-citation>Rubin, P. H. &amp; Lenard, T. M. (2002). Privacy and the Commercial Use of Personal Information. Washington, D.C.: Progress and Freedom Foundation.</element-citation>
		</ref>
		<ref id="R65">
			<label>65</label>
			<element-citation>Scottish Qualifications Authority (2014). National Unit specification: Network literacy. Retrieved April 10, 2017, online from http://www.sqa.org.uk/sqa/files/nu/H7EA44.pdf</element-citation>
		</ref>
		<ref id="R66">
			<label>66</label>
			<element-citation>Sedivy-Benton, A. L. (2016). Individual Differences, Learning Opportunities and Learning Outcomes, Digital Equity: Bridging the Gap – Creating Learning Opportunities for All Students. In V. C. X. Wang.  Handbook of Research on Learning Outcomes and Opportunities in the Digital Age (p. 266-286). Hershey: IGI Global.</element-citation>
		</ref>
		<ref id="R67">
			<label>67</label>
			<element-citation>SETDA (2007). 2007 Technology Literacy Assessment and Educational Technology Standards Report. Retrieved April 07, 2017 online at www.setda.org/wp-content/uploads/2015/03/TEchnologyLiteracy2007Final.pdf</element-citation>
		</ref>
		<ref id="R68">
			<label>68</label>
			<element-citation>The American Heritage Dictionary (2000). (4th College edition). Boston: Houghton Mifflin.</element-citation>
		</ref>
		<ref id="R69">
			<label>69</label>
			<element-citation>Theodore Schneyer, "Professionalism as Politics: The Making of a Modern Legal Ethics Code," in Lawyers' Ideals/Lawyers' Practices: Transformations in the American Legal Profession, eds. Robert L. Nelson, David M. Trubek, &amp; Rayman L. Solomon, 95–143 (Ithaca: Cornell University Press, 1992), 104.</element-citation>
		</ref>
		<ref id="R70">
			<label>70</label>
			<element-citation>Tobin, C. D. (1983). Developing Computer Literacy. The Arithmetic Teacher. 30 (6): 22–23.</element-citation>
		</ref>
		<ref id="R71">
			<label>71</label>
			<element-citation>Tyner, K. R. (1998). Literacy in a Digital World: Teaching and Learning in the Age of Information. Hillsdale, NJ: L. Erlbaum Associates.</element-citation>
		</ref>
		<ref id="R72">
			<label>72</label>
			<element-citation>Van Deursen, A. &amp; Van Dijk, J. (2011). Internet Skills and the Digital Divide. New Media &amp; Society 13(6): 893–911.</element-citation>
		</ref>
		<ref id="R73">
			<label>73</label>
			<element-citation>Vanwynsberghe, H.; Boudry, E. &amp; Verdegem, P. (2011). Mapping Social Media Literacy: Towards a Conceptual Framework. Brussels: EMSOC.</element-citation>
		</ref>
		<ref id="R74">
			<label>74</label>
			<element-citation>Willig, C. (2013). Introducing Qualitative Research in Psychology. London: McGraw-Hill Education.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Original article" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">Cyberspace Studies</journal-id>
			      <journal-id journal-id-type="publisher-id">University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Cyberspace Studies</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2588-5499</issn>
			      <publisher>
			        <publisher-name>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">167</article-id>
			      <article-id pub-id-type="doi">10.22059/jcss.2018.241160.1011</article-id>		
			      <ext-link xlink:href="https://jcss.ut.ac.ir/article_64647_def4ff079abb56a5602a12760cac25fc.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
			          		<subject>Original article</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Topographies of Hate: Islamophobia in Cyberia</article-title>
			        <subtitle>Topographies of Hate: Islamophobia in Cyberia</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Sayyid</surname>
			            <given-names>Salman</given-names>
			          </name>
					  <aff>School of Sociology and Social Policy University of Leeds, Leeds, UK</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>01</day>
			        <month>01</month>
			        <year>2018</year>
			      </pub-date>
			      <volume>2</volume>
			      <issue>1</issue>
			      <fpage>55</fpage>
			      <lpage>73</lpage>
			      <history>
			        <date date-type="received">
			          <day>03</day>
			          <month>10</month>
			          <year>2017</year>
			        </date>
			        <date date-type="accepted">
			          <day>01</day>
			          <month>11</month>
			          <year>2017</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2018, University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World". </copyright-statement>	
			        <copyright-year>2018</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jcss.ut.ac.ir/article_64647.html">https://jcss.ut.ac.ir/article_64647.html</self-uri> 		
			      <abstract>
			        <p>Islamophobia’s occurrence in any particular country has little do with the presence of Muslim; it is possible to be Islamophobic when there are virtually no Muslim around. This because the lack of Muslims is filled by the surplus of Islamophobic representations. This surplus of representations is now increasingly reliant on the internet. There are many studies reporting on Islamophobia on the internet, classifying the negative representations, the targeted acts of aggressive online behaviour (trolling) against Muslims. These studies are basically taxonomies, and they share this feature with general literature on Islamophobia, which is concerned with reporting instances of Islamophobia empirically with little time spent on its theorisation. Such an understanding of Islamophobia implies that it is simply dismissed as being a matter of prejudice, bias, and closed views. A Critical Muslim Studies understanding of Islamophobia developed initially in the collected volume Thinking Through Islamophobia (2010), and then subsequent publications shift the focus away positivism to decolonial discourse theory. Using decolonial discourse theory, this study will how online Islamophobia is not just a distortion of Islam, or hatred of Muslims but rather it main vectors for denying Muslim political consciousness.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>Critical Muslim Studies</kwd>
						<kwd>cyberspace</kwd>
						<kwd>the internet</kwd>
						<kwd>Islamophobia</kwd>
						<kwd>spatialization</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Buzan, B., &amp; Little, R. (2000) International Systems in World History. Oxford: Oxford University Press.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Choucri, N. (2012). Cyberpolitics and International Relations. Boston: MIT Press.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Devetak, R. (1995). Theories and practices of statecraft. in MacMillan, John, and Andrew Linklater (Editors). Boundaries in Question: New Directions on International Relations, London: Bloomsbury Press.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Dikötter, F. (2008). The racialization of the globe: an interactive interpretation. Ethnic and Racial Studies, 31(8).</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Diouf, S. (1998). Servants of Allah: African Muslims Enslaved in the Americas. New York: New York University Press.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Douhet,  Giulio (2009), The Command of The Air. translated by Dino Ferrari, Tuscaloosa, Alabama:  University of Alabama Press.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Giddens, A. (1984). The Constitution of Society. Cambridge, MA: Polity Press.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Goldberg, D.Th. (2009). Racial comparisons, relational racisms: some thoughts on method. Ethnic and Racial Studies, 32(7).</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Goodman, D. (1994). The republic of letters. Ithaca: Cornell University Press.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Greathouse, C.B. (2014). Cyber war and strategic thought: Do the classic theorists still matter?, in Kremer, Jan-Fredrick and Benedikt Müller (eds.), Cyberspace and International Relations, Heidelberg and New York: Springer, pp. 22-40.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Jordan, P., &amp; Taylor, A. (2004). Hacktivism and Cyberwars Rebels with a cause? London: Routledge.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Kosmin, P. (2014). The Land of the Elephant Kings. Cambridge, MA: Harvard University Press.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Kremer, J.F., &amp; Müller, B. (eds.) (2014). Cyberspace and International Relations. Heidelberg and New York: Springer. </element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Lean, N. (2012). The Islamophobia Industry, London: Pluto Press.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Massey, D. (1992). Politics and Space-Time. New Left Review, 196, 84.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Mehta, U.S. (1999). Liberalism and Empire. Chicago: University of Chicago Press.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Mouffe, Ch. (2005). On the Political. London: Routledge.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Al-Musawi, M. (2015). The Medieval Islamic Republic of Letters. Notre Dame, India: University of Notre Dame Press.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Sayyid, S. (2016). Normalizing Islamophobia-Anadolu Agency. http://aa.com.tr/en/analysis-news/opinion-normalizing-islamophobia/580967.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Sayyid, S. (2015). A Fundamental Fear. 3rd edition, London: Zed Press.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Sayyid, S. (2014) Recalling the Caliphate. Oxford, Oxford University Press.  </element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Sayyid, S., &amp; Vakil, A. (eds) (2010). Thinking Through Islamophobia. New York: Columbia University Press.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Scott, J. (2010). The Art of Not Being Governed. Newhaven: Yale University Press.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Soja, E. (1980). The Socio-Spatial Dialectic. Annals of the Association of American Geographers, 70, 208.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Yang, A., &amp; Self, Ch. (2015). Anti-Muslim prejudice in the virtual space: A case study of blog network structure and message features of the ‘Ground Zero mosque controversy. Media, War &amp; Conflict, 8(1), 46-69.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Original article" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">Cyberspace Studies</journal-id>
			      <journal-id journal-id-type="publisher-id">University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Cyberspace Studies</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2588-5499</issn>
			      <publisher>
			        <publisher-name>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">167</article-id>
			      <article-id pub-id-type="doi">10.22059/jcss.2017.232442.1004</article-id>		
			      <ext-link xlink:href="https://jcss.ut.ac.ir/article_64633_2bb2de90b5dbce74dcdf66d8124a4cb3.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
			          		<subject>Original article</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Semiotic Approach to Globalization: Living in a World of Glocal Things</article-title>
			        <subtitle>Semiotic Approach to Globalization: Living in a World of Glocal Things</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Sabbar</surname>
			            <given-names>Shaho</given-names>
			          </name>
					  <aff>Assistant Professor, Faculty of World Studies, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Dalvand</surname>
			            <given-names>Somayeh</given-names>
			          </name>
					  <aff>M.A in Social Communication Sciences, Faculty of Social Sciences, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>01</day>
			        <month>01</month>
			        <year>2018</year>
			      </pub-date>
			      <volume>2</volume>
			      <issue>1</issue>
			      <fpage>75</fpage>
			      <lpage>88</lpage>
			      <history>
			        <date date-type="received">
			          <day>02</day>
			          <month>05</month>
			          <year>2017</year>
			        </date>
			        <date date-type="accepted">
			          <day>06</day>
			          <month>09</month>
			          <year>2017</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2018, University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World". </copyright-statement>	
			        <copyright-year>2018</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jcss.ut.ac.ir/article_64633.html">https://jcss.ut.ac.ir/article_64633.html</self-uri> 		
			      <abstract>
			        <p>This paper is an effort to discuss the concept of glocalization from a semiotic point of view. In order to carry out a semiotic analysis of globalization or glocalization, first globalization needs to be defined from a semiotic perspective. Therefore, first an explanation of globalization and glocalization in semiotic terms is provided. Some believe the ongoing process in the world cannot be best described as globalization and it should be called glocalization. According to this approach, the ongoing universal process is a combination of globalization and localization leading to new diversities, not uniformity. With a structuralist approach to semiotics a better understanding is gained on how glocalization may affect the world in which we are living. After a theoretical argument on the semiotic definition of globalization and glocalization, the results of a number of in-depth interviews with people who have experienced living in two different cultures will be analyzed in a qualitative method to provide further insight on how glocalization might work.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>Code</kwd>
						<kwd>Globalization</kwd>
						<kwd>glocalization</kwd>
						<kwd>Semiotics</kwd>
						<kwd>Typology</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Ameli, S.R. (2004). Globalizations: concepts and theories. Arghanoon Monthly, 24, 1-58.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Ameli, S.R. (2003). Two globalizations and the future of the world. The Monthly Book of Social Sciences, 69 &amp; 70, 15-28.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Barber, B.R. (1992). Jihad vs. McWorld. The Atlantic, 269(3).</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Beyer, P. (2007). Globalization and Glocalization. The SAGE Handbook of the Sociology of Religion, Edited By James A Beckford, Jay Demerath, SAGE Publication, pp. 98- 115.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Chandler, D. (2007). Semiotics: The Basics. Second Edition, Taylor &amp; Francis.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Festinger, L. (1962). A Theory of Cognitive Dissonance. Vermont: Stanford University Press.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Gramigna, R. (2013). The place of language among systems: Juri Lotman and Emile Benveniste. Sign System Studies, 41(2/3), 339-354.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Holdcroft, D. (1991). Saussure: Signs, System and Arbitrariness. Cambridge: Cambridge University Press.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Kane, D. (2006). The Chinese Language: Its History and Current Usage. Vermont: Tuttle Publishing.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Lucy, N. (2001). Beyond Semiotics: Text, Culture and Technology. London: Continuum.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Mele, C. (1996). Globalization, culture, and neighborhood change, reinventing the lower east side of New York. Urban Affairs Review, 32(1), September.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Nöth, W. (1995). Handbook of Semiotics.Bloomington: Indiana University Press.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Ritzer, G. (2003). Rethinking Globalization: Glocalization/Globalization and Something/Nothing. Socioloquical Theory, 21)3(, 193-209.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Robertson, R. (1995) Glocalization: Time-space and Homogeneity- heterogeneity. London: Sage Publications.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Turner, B. (1993). Citizenship and Social Theory. London: Sage Publications.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Original article" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">Cyberspace Studies</journal-id>
			      <journal-id journal-id-type="publisher-id">University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Cyberspace Studies</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2588-5499</issn>
			      <publisher>
			        <publisher-name>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">167</article-id>
			      <article-id pub-id-type="doi">10.22059/jcss.2017.236381.1006</article-id>		
			      <ext-link xlink:href="https://jcss.ut.ac.ir/article_64634_4a48b32b5605e799f6f389f3500a29ec.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
			          		<subject>Original article</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>The Perception of Usefulness: Iranian Customers’ Evaluation of Customer Reviews</article-title>
			        <subtitle>Perception of Usefulness: Iranian Customers' Evaluation of Customer Reviews</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Shahghasemi</surname>
			            <given-names>Ehsan</given-names>
			          </name>
					  <aff>Assistant Professor, Department of Communication, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Hajijafari</surname>
			            <given-names>Mojtaba</given-names>
			          </name>
					  <aff>Senior Researcher, Center for Cyberpolicy Studies, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c3">
			          <name>
			            <surname>Shirzadifard</surname>
			            <given-names>Maysam</given-names>
			          </name>
					  <aff>PhD Candidate, Department of Educational Psychology, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c4">
			          <name>
			            <surname>Ahmadzadeh</surname>
			            <given-names>Mostafa</given-names>
			          </name>
					  <aff>PhD, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>01</day>
			        <month>01</month>
			        <year>2018</year>
			      </pub-date>
			      <volume>2</volume>
			      <issue>1</issue>
			      <fpage>89</fpage>
			      <lpage>102</lpage>
			      <history>
			        <date date-type="received">
			          <day>24</day>
			          <month>06</month>
			          <year>2017</year>
			        </date>
			        <date date-type="accepted">
			          <day>02</day>
			          <month>09</month>
			          <year>2017</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2018, University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World". </copyright-statement>	
			        <copyright-year>2018</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jcss.ut.ac.ir/article_64634.html">https://jcss.ut.ac.ir/article_64634.html</self-uri> 		
			      <abstract>
			        <p>Over the last decade, the retail industry has had a phenomenal growth. All figures show their success and efficiency and many studies have shown the role of customer reviews in encouraging ambivalent purchasers to buy items online. There have been numerous studies on why people read and trust these comments and taking for granted the important role of customer reviews in determining buying decision, this study endeavors to identify and explain the different factors involved in making a comment “useful.” We took an Iranian retail website and collected comments on perceived “usefulness” of each review. Our results showed that perceived level of usefulness was related to the word count of the comments, personal experience of the writer with the product, emotional description of the product, and mentioning the strength/weakness points of the product.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>customer reviews</kwd>
						<kwd>Digikala</kwd>
						<kwd>Iran</kwd>
						<kwd>perception of usefulness</kwd>
						<kwd>Retail industry</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Burton, J., &amp; Khammash, M. (2010). Why do people read reviews posted on consumer-opinion portals?. Journal of Marketing Management, 26, 230-255.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Cheng, Y.H., &amp; Ho, H.Y. (2015). Social influence's impact on reader perceptions of online reviews. Journal of Business Research, 68(4), 883-887.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Chengai, S., Qiaolin, D., &amp; Gang, T. (2016). Exploiting product related review features for fake review ddetection. Mathematical Problems in Engineering.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>CMA (2016). Online reviews: letting your customers see the true picture. Retrieved May 22, 2017 from https://www.gov.uk/government/publications/online-reviews-and-endorsements-advice-for-businesses/online-reviews-giving-consumers-the-full-picture.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Dadgar, Y., &amp; Nazari, R. (2012). The impact of economic growth and good governance on misery index in Iranian economy. European Journal of Law and Economics, 4(1), 1-19.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>eMarketer (2016). Worldwide Retail Ecommerce Sales Will Reach $1.915 Trillion This Year; Double-digit growth will continue through 2020, when sales will top $4 trillion. Retrieved June 2, 2017 from https://www.emarketer.com/Article/Worldwide-Retail-Ecommerce-Sales-Will-Reach-1915-Trillion-This-Year/1014369.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Farzanegan, M.R., &amp; Gholipour, H.F. (2016). Divorce and the cost of housing: evidence from Iran. Review of Economics of the Household, 14(4), 1029-1054.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Filieri, R. (2015). What makes online reviews helpful? A diagnosticity-adoption framework to explain informational and normative influences in e-WOM. Journal of Business Research, 68(6), 1261-1270.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Guillory, M.D., Lohtia, R., &amp; Donthu, N. (2016). The usefulness of online reviews in financial services. International Journal of Electronic Marketing and Retailing, 7(1), 66.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Hassanpour, S.E., Heidari, A., Moosavizadeh, S.M., Tarahomi, M.R., Goljanian, A., &amp; Tavakoli, S. (2016). Comparison of aesthetic and functional outcomes of spreader graft and autospreader flap in rhinoplasty. World Journal of Plastic Surgery, 5(2), 133-138.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Kim, J., Watson, J., &amp; Kirmani, A. (2015). Red Flag! The effect of fake reviews on consumer evaluations. NA-Advances in Consumer Research, 43.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Kozinets, R.V. (2017). Netnography: radical participative understanding for a networked communications society. In Willig, C. and W. Stainton-Rogers, eds. Handbook of Qualitative Research on Psychology, 376-382. London: SAGE.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Krestel, R., &amp; Dokoohaki, N. (2015). Diversifying customer review rankings. Neural Networks, 66, 36-45.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Kyungyup, L., Kyungah, H., Sung-Hyon, M. (2016). Capturing word choice patterns with LDA for fake review detection in sentiment analysis. Mining and Semantics Proceedings of the 6th International Conference / Web Intelligence (WIMS ‘16), New York, NY 10121-0701, USA.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Li, Y., Feng, X., &amp; Zhang, S. (2016). Detecting fake reviews utilizing semantic and emotion model. 3rd International Conference on Information Science and Control Engineering (ICISCE). 317-320.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Li, H., Chen, Z., Liu, B., Wei, X., &amp; Shao, J., (2015). Spotting fake reviews via collective positive-unlabeled learning. Proceedings - IEEE International Conference on Data Mining, ICDM, 899-904.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Li, H., Liu, B., Mukherjee, A., &amp; Shao, J. (2014). Spotting fake reviews using positive-unlabeled learning. Computación Y Sistemas, 18(3), 467-475.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Liu, Y., Zhou, W., &amp; Chen, H. (2017). Efficiently promoting product online outcome: An iterative rating attack utilizing product and market property. IEEE Transactions on Information Forensics and Security, 12(6), 1444-1457.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Liu, Z., &amp; Park, S. (2015). What makes a useful online review? Implication for travel product websites. Tourism Management, 47(2), 140-151.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Mukherjee, A., Liu, B. &amp; Glance, N. (2012). Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st International Conference on World Wide Web, Lyon, France.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Mukherjee, A., Liu, B., Wang, J., Glance, N. &amp; Jindal, N. (2011). Detecting group review spam. In Proceedings of the 20th International Conference Companion on World Wide Web, Hyderabad, India.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Pahlavanyali, N., &amp; Momeni, S.M.H. (2016). An empirical study on predicting user acceptance of online apparel shopping in Iran. International Journal of Online Marketing (ijom), 6(1), 34-53.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Park, S., &amp; Nicolau, J.L. (2015). Asymmetric effects of online consumer reviews. Annals of Tourism Research, 50, 67-83.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Qazi, A., Raj, R.G., Tahir, M., Waheed, M., Khan, S.U.R., &amp; Abraham, A. (2014). A preliminary investigation of user perception and behavioral intention for different review types: customers and designers perspective. The Scientific World Journal, 3, 1-8.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Rout, J.K., Singh, S., Jena, S.K., &amp; Bakshi, S. (2017). Deceptive review detection using labeled and unlabeled data. Multimedia Tools and Applications: an International Journal, 76(3), 3187-3211.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Safari, M., Forouzandeh, M., &amp; Safahani, N. (2016). An empirical model to explain the effects of electronic customer relationship management on customer e-satisfaction and e-loyalty: Evidence from Iranian service shopping websites. Journal of Internet Banking and Commerce, 21(1), 1-11.</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Shahghasemi, E., &amp; Tafazzoli, B. (2013). Scrabble the face of your opponent: Iranian blogger's endeavour to discursively undermine Ahmadi Nejad's legitimacy. Online International Journal of Arts and Humanities, 2(8), 198-207.</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>Sivaramakrishnan, N., &amp; Subramaniyaswamy, V. (2016). Recommendation system with demographic attributes for fake review identification. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 891-899.</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Soltani, A., Angelsen, A., Eid, T., Naieni, M.S.N., &amp; Shamekhi, T. (2012). Poverty, sustainability, and household livelihood strategies in Zagros, Iran. Ecological Economics, 79, 60-70.</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>Sun, C., Du, Q., &amp; Tian, G. (2016). Exploiting product related review features for fake review detection. Mathematical Problems in Engineering, 1, 1-7.</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>Taleizadeh, A.A., Noori-Daryan, M., &amp; Govindan, K. (2016). Pricing and ordering decisions of two competing supply chains with different composite policies: A Stackelberg game-theoretic approach. International Journal of Production Research, 54(9), 2807-2836.</element-citation>
		</ref>
		<ref id="R32">
			<label>32</label>
			<element-citation>Townsend, P. (2014). The International Analysis of Poverty. London: Routledge.</element-citation>
		</ref>
		<ref id="R33">
			<label>33</label>
			<element-citation>Viviani, M., &amp; Pasi, G. (2017). Quantifier guided aggregation for the veracity assessment of online reviews. International Journal of Intelligent Systems, 32(5), 481-501.</element-citation>
		</ref>
		<ref id="R34">
			<label>34</label>
			<element-citation>Wahyuni E.D., &amp; Djunaidy A. (2016). Fake review detection from a product review using modified method of iterative computation framework. Matec Web of Conferences, 58, 3003.</element-citation>
		</ref>
		<ref id="R35">
			<label>35</label>
			<element-citation>World Health Organization (2010). Country cooperation strategy for WHO and Islamic Republic of Iran: 2010–2014. Retrieved March 15, 2017 from http://apps.who.int/iris/bitstream/10665/113238/1/CCS_Islamic_Republic_Iran_2010_EN_14482.pdf.</element-citation>
		</ref>
		<ref id="R36">
			<label>36</label>
			<element-citation>Xiao, B., &amp; Benbasat, I. (2014). Research on the Use, Characteristics, and Impact of e-Commerce Product Recommendation Agents: A Review and Update for 2007-2012. International Journal of Electronic Marketing and Retailing, 7(1), 66-90.</element-citation>
		</ref>
		<ref id="R37">
			<label>37</label>
			<element-citation>Zhang, R., Gao, M., He, X., &amp; Zhou, A. (2016). Learning user credibility for product ranking. Knowledge and Information Systems: an International Journal, 46(3), 679-705.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Original article" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">Cyberspace Studies</journal-id>
			      <journal-id journal-id-type="publisher-id">University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Cyberspace Studies</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2588-5499</issn>
			      <publisher>
			        <publisher-name>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">167</article-id>
			      <article-id pub-id-type="doi">10.22059/jcss.2017.239847.1009</article-id>		
			      <ext-link xlink:href="https://jcss.ut.ac.ir/article_64635_925f4efbf8d90e012c7ccb0684f1ff8f.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
			          		<subject>Original article</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Topic Modeling and Classification of Cyberspace Papers Using Text Mining</article-title>
			        <subtitle>Topic Modeling and Classification of Cyberspace Papers Using Text Mining</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Sohrabi</surname>
			            <given-names>Babak</given-names>
			          </name>
					  <aff>Professor, Department of IT Management, Faculty of Management, University of Tehran (UT), Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Raeesi Vanani</surname>
			            <given-names>Iman</given-names>
			          </name>
					  <aff>Assistant Professor of Industrial Management, Allameh Tabataba’i University (ATU), Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c3">
			          <name>
			            <surname>Baranizade Shineh</surname>
			            <given-names>MMohsen</given-names>
			          </name>
					  <aff>Master of IT Management, Faculty of Management, University of Tehran (UT), Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>01</day>
			        <month>01</month>
			        <year>2018</year>
			      </pub-date>
			      <volume>2</volume>
			      <issue>1</issue>
			      <fpage>103</fpage>
			      <lpage>125</lpage>
			      <history>
			        <date date-type="received">
			          <day>15</day>
			          <month>08</month>
			          <year>2017</year>
			        </date>
			        <date date-type="accepted">
			          <day>18</day>
			          <month>11</month>
			          <year>2017</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2018, University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World". </copyright-statement>	
			        <copyright-year>2018</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jcss.ut.ac.ir/article_64635.html">https://jcss.ut.ac.ir/article_64635.html</self-uri> 		
			      <abstract>
			        <p>The global cyberspace networks provide individuals with platforms to can interact, exchange ideas, share information, provide social support, conduct business, create artistic media, play games, engage in political discussions, and many more. The term cyberspace has become a conventional means to describe anything associated with the Internet and the diverse Internet culture. In fact, cyberspace is an umbrella term that covers all issues occurring through the interaction of information systems and humans over these networks. Deep evaluation of the scientific articles on the cyberspace domain provides concentrated knowledge and insights about major trends of the field. Text mining tools and techniques enable the practitioners and scholars to discover significant trends in a large set of internationally validated papers. This study utilizes text mining algorithms to extract, validate, and analyze 1860 scientific articles on the cyberspace domain and provides insight over the future scientific directions or cyberspace studies.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>cyberspace</kwd>
						<kwd>Text mining</kwd>
						<kwd>trend discovery</kwd>
						<kwd>topic modeling</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Akhgar, B., Rasouli, H., &amp; Raeesi Vanani, I. (2012). Evaluation of knowledge-based competency in Iranian universities: a practical model. International Journal of Knowledge and Learning, 8(3-4), 282-297.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Alghamdi, R., Alfalqi, Kh. (2015). A survey of topic modeling in text mining. I. J. ACSA, 1, 147-153.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Arun, R., Suresh, V., Madhavan, C.V., &amp; Murthy, M.N. (2010, June). On finding the natural number of topics with latent dirichlet allocation: Some observations. In Pacific-Asia Conference on Knowledge Discovery and Data Mining (pp. 391-402). Springer, Berlin, Heidelberg.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Bhagat, B.C. (2011). Cloud computing governance, cyber security, risk, and compliance business rules system and method. Google Patents, 2-5.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Cao, J., Xia, T., Li, J., Zhang, Y., &amp; Tang, S. (2009). A density-based method for adaptive LDA model selection. Neurocomputing, 72(7), 1775-1781.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Choudhary, A.K., Oluikpe, P.I., Harding, J.A., &amp; Carrillo, P.M. (2009). The needs and benefits of Text Mining applications on Post-Project Reviews. Computers in Industry, 60, 728-740.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Deveaud, R., SanJuan, E., &amp; Bellot, P. (2014). Accurate and effective latent concept modeling for ad hoc information retrieval. Document Numérique, 17(1), 61-84.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Frias, S. M., &amp; Finkelhor, D. (2017). Victimizations of Mexican youth (12–17 years old): A 2014 national survey. Child Abuse &amp; Neglect, 67, 86-97.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Griffiths, T.L., &amp; Steyvers, M. (2004). Finding scientific topics. Proceedings of the National Academy of Sciences, 101, 5228-5235.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Hinduja, S., &amp; Patchin, J.W. (2010). Bullying, cyberbullying, and suicide. Archives of suicide research, 14, 206-221.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Hwang, S.Y., Wei, C.P., Lee, C.H., &amp; Chen, Y.S. (2017). Coauthorship networkbased literature recommendation with topic model. Online Information Review, 41(3), 318-336.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>International Telecommunication Union (ITU) (2009). Measuring the information society. The ICT Development Index, ISBN 92-61-12831-9.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Jun, S., Park, S.S., &amp; Jang, D.S. (2014). Document clustering method using dimension reduction and support vector clustering to overcome sparseness. Expert Systems with Applications, 41, 3204-3212.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Kannan, S., &amp; Gurusamy, V. (2014). Preprocessing Techniques for Text Mining. RTRICS. Podi: researchgate. Retrieved from https://www.researchgate.net/profile/Vairaprakash_Gurusamy/publication/273127322_Preprocessing_Techniques_for_Text_Mining/links/54f8319e0cf210398e949292.pdf.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Kumar, B., &amp; Ravi, V. (2016). A survey of the applications of text mining in financial domain. Knowledge-Based Systems, 114, 128-147.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Nallapati, R.M., Ahmed, A.X., Eric, P., &amp; Cohen, W.W. (2008). Joint latent topic models for text and citations. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining (542-550). New York: ACM New York, NY, USA.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Ning, H.A. (2012). Cyber-physical-social based security architecture for future internet of things. Advances in Internet of Things, 2, 1-2.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Ottis, R., &amp; Lorents, P. (2010). Cyberspace: Definition and Implications. In Proceedings of the 5th International Conference on Information Warfare and Security, Dayton, OH, US, 8-9 April. Reading: Academic Publishing Limited, pp. 267-270. </element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Ottis, R.A. (2010) International Conference on Cyber Warfare and Security (p. 267). Sonning Common: Academic Conferences International Limited.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Raeesi Vanani, I., &amp; Jalali, S.M.J. (2017). Analytical evaluation of emerging scientific trends in business intelligence through the utilisation of burst detection algorithm. International Journal of Bibliometrics in Business and Management, 1(1), 70-79.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Saini, J.R., &amp; Rakholia, R.M. (2016). On continent and script-wise divisions-based statistical measures for stop-words lists of international languages. Procedia Computer Science, 89, 313-319.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Sarkar, D. (2016). Processing and Understanding Text. In D. Sarkar, Text Analytics with Python (167-215). New York, United States: Apress. doi:10.1007/978-1-4842-2388-8.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Shafia, M.A., Sohrabi, B., Raeesi Vanani, I., &amp; Faghih Mirzaii, S. (2009). A model to evaluation components of intellectual capital. Proceedings of the 2nd International Conference on Intellectual Capital, 7-8.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Shi, J., Wan, J., Yan, H., &amp; Suo, H. (2011). A survey of cyber-physical systems. In Wireless Communications and Signal Processing (WCSP). International Conference on IEEE, 1-6.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Sivic, J.A. (2009). Efficient visual search of videos cast as text retrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31, 591-606.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Sohrabi, B., Raeesi Vanani, I., &amp; Baranizadeh Shineh, M. (2017). Designing a Predictive Analytics Solution for Evaluating the Scientific Trends in Information Systems Domain. Webology, 14(1), 32-52.</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Sohrabi, B., Raeesi Vanani, I.R., Qorbani, D., &amp; Forte, P., (2012). An integrative view of knowledge sharing impact on e-learning quality: A model for higher education institutes. International Journal of Enterprise Information Systems, 8(2), 14-29.</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>Sohrabi, B., Raeesi Vanani, I., &amp; Shafia, S. (2010). An applied model for measuring the knowledge sharing capability. Iranian Journal of Information Processing &amp; Management, 26(1), 5-28.</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Sunde, I.M. (2017). Cybercrime Law. Digital Forensics, 51-116.</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>Truyens, M., &amp; Van Eecke, P. (2014). Legal aspects of text mining. Computer Law &amp; Security Review, 30, 153-170.</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>Vijayarani, S., Ilamathi, M.J., &amp; Nithya, M. (2015). Preprocessing techniques for text mining- An overview. International Journal of Computer Science &amp; Communication Networks, 5, 7-16.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Review article" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">Cyberspace Studies</journal-id>
			      <journal-id journal-id-type="publisher-id">University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Cyberspace Studies</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2588-5499</issn>
			      <publisher>
			        <publisher-name>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">167</article-id>
			      <article-id pub-id-type="doi">10.22059/jcss.2017.235653.1005</article-id>		
			      <ext-link xlink:href="https://jcss.ut.ac.ir/article_64637_f35b1ec76579de3f0333b606e5ebc2ad.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
			          		<subject>Review article</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Behavioral Considerations in Developing Web Information Systems: User-centered Design Agenda</article-title>
			        <subtitle>Behavioral Considerations in Developing Web Information Systems: User-centered Design Agenda</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Keshavarz</surname>
			            <given-names>Hamid</given-names>
			          </name>
					  <aff>Assistant Professor, Department of Information Science and Knowledge Studies, University of Semnan, Semnan, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Fahimnia</surname>
			            <given-names>Fatima</given-names>
			          </name>
					  <aff>Associate Professor, Department of Information Science and Knowledge Studies, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c3">
			          <name>
			            <surname>Sedigh Talemi</surname>
			            <given-names>Fatemeh</given-names>
			          </name>
					  <aff>MA Student in TEFL, Faculty of Foreign Languages, Islamic Azad University, Central Tehran Branch, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>01</day>
			        <month>01</month>
			        <year>2018</year>
			      </pub-date>
			      <volume>2</volume>
			      <issue>1</issue>
			      <fpage>127</fpage>
			      <lpage>143</lpage>
			      <history>
			        <date date-type="received">
			          <day>20</day>
			          <month>07</month>
			          <year>2017</year>
			        </date>
			        <date date-type="accepted">
			          <day>17</day>
			          <month>09</month>
			          <year>2017</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2018, University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World". </copyright-statement>	
			        <copyright-year>2018</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jcss.ut.ac.ir/article_64637.html">https://jcss.ut.ac.ir/article_64637.html</self-uri> 		
			      <abstract>
			        <p>The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users.  From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-centered; user-centered; interactive and cognitive designs. However, there is a lack of research related to possible relationships between information behavior and information systems design to date. Traditionally, designers used human factors but not necessarily human behaviors while designing information systems. Therefore, there are few systems designed by information scientist aiming to regard or support the human information behavior. There are now new techniques and methodologies such as Contextual Design and Participatory Design to fill the gap. Implementing a behavioral approach to designing information systems are of interest and importance in terms of modern information technologies like social software, web 2.0, mobile phones and internet websites. New methodologies and research frameworks are proposed that place user location, attention and behavior as their main issues.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>human-computer interaction</kwd>
						<kwd>human searching behavior</kwd>
						<kwd>information retrieval systems</kwd>
						<kwd>information science</kwd>
						<kwd>information systems</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Bates, M. (1989). The design of browsing and berry-picking techniques for online search interface. Online Review, 13(5), 407-424.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Beaulieu, M. (2000). Interaction of information searching and retrieval. Journal of Documentation, 56(4), 431-9.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Belkin, N.J. (1993). Interaction with texts: Information retrieval as information-seeking behavior. Information retrieval ‘93. Von der Modellierung zur Anwendung. Konstanz: Universitaetsverlag Konstanz, pp. 55-66.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Belkin, N.J. (1990). The cognitive viewpoint in information science. Journal of Information Science, 16(1), 11-15.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Belkin, N.J. (1984). Cognitive models and information transfer. Social Science Information Studies, 4, 111-129.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Belkin, N.J., Marchetti, P.G., &amp; Cool, C. (1993). BRAQUE: Design of an interface to support user interaction in Information Retrieval. Information Processing &amp; Management, 29(3), 325-344.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Belkin, N.J., Oddy, R.N., &amp; Brooks, H.M. (1982). ASK for information retrieval, Part I: Background and theory; Part II: Results of a design study. Journal of Documentation, 3(2&amp;3), 61-71, 145-164.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Bilal, D. (2005). Children’s Information Seeking and the Design of Digital Interfaces in the Affective Paradigm. Library Trends, 54(2), 197-208.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Beyer, H., &amp; Holtzblatt, K. (1998). Contextual Design: Defining Customer-Centered Systems. San Francisco: Morgan Kaufmann.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Case, O. D. (2003). Looking for information: a survey of research on information seeking, needs and behavior. San Diego: Academic Press.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Case, D.O. (2006), "Information behavior", In; Cronin, B, (Ed.) Annual Review of Information Science and TechnologyVol. 40, pp.297-327. Medford, NJ: Information Today.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Checkland, P., &amp; Scholes, J. (1990). Soft systems methodology in action. Wiley: Chichester.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Croft, W.B., &amp; Thompson, R.H. (1987). I3R: a new approach to the design of document retrieval systems. Journal of the American Society for Information Science, 38(6), 389-404.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Dervin, B., &amp; Nilan, M. (1986). Information needs and uses. Annual review of information science and technology, 21, 3-33.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Dervin, B. (1983), "An overview of sense-making research: concepts, methods and results to date", Paper presented at the International Communications Association Annual Meeting. Dallas, Texas.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Dervin, B. (1995). The relationship of user-centered evaluation to design: addressing issues of productivity and power. ACM SIGOIS Bulletin, 16(2), 42-46.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Fidel, R., &amp; Pejtersen, A.M. (2004). From information behavior research to the design of information systems: the Cognitive Work Analysis framework. Information Research, Vol. 10 No.1. Online: www.informationr.net/ir/10-1/paper210.html (accessed 2 September 2016).</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Ford, N. (2000). Cognitive styles and virtual environments. Journal of the American Society for Information Science and Technology, 51(6), 543-557.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Gasson, S. (2003). Human-centered vs. user-centered approaches to information system design. Journal of Information Technology Theory and Application, 5(2), 29-41.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Ginsburg, G. (2005). Human factors engineering: a tool for medical device evaluation in hospital procurement decision-making. J. Biomed. Inform. 38(3), 213-219.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Goldkuhl, G (2004). Design theories in information systems– a need for multi-grounding. Journal of Information Technology Theory and Application (JITTA), 6(2), 59-72.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Hagedorn, T.J., Krishnamurty, S., &amp; Grosse, I.R. (2016). An information model to support user-centered design of medical devices. Journal of Biomedical Informatics, 62, 181-194.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Harman, D. (1992). Evaluation issues in information retrieval. Information Processing &amp; Management, 28, 439-440.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Hjorland, B. (2002). Epistemology and the socio-cognitive perspective in information science. Journal of the American Society for Information Science and Technology, 53(4), 257-270.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Hjorland, B. (1997). Information seeking and subject representation: an activity-theoretical approach to information science. Westport, CN: Greenwood Press.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Hyysalo, S., &amp; Johnson, M. (2015). The user as relational entity: Options that deeper insight into user representations opens for human-centered design. Information Technology &amp; People, 28(1), 72-89.</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Ingwersen, P. (1996). Cognitive perspectives of information retrieval interaction: Elements of a cognitive IR theory. Journal of Documentation, 52(1), 3-50.</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>Ingwersen, P. (1992). Information Retrieval Interaction. Taylor Graham, London. Online: http://vip.db.dk/pi/iri/files/Ingwersen_IRI.pdf (accessed 2 September 2016).</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Ingwersen, P., &amp; Järvelin, K. (2005). The Turn. Integration of Information Seeking and Retrieval in Context. Berlin: Springer.</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>Johnstone, D., Bonner, M., &amp; Tate, M. (2004). Bringing human information behaviour into information systems research: an application of systems modelling. Information Research, 9(4), 9-4.</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>Julien, H., McKechnie, L.E.F., &amp; Hart, S. (2005). Affective issues in library and information science systems work: A content analysis. Library and Information Science Research, 27(4), 453-466.</element-citation>
		</ref>
		<ref id="R32">
			<label>32</label>
			<element-citation>Kuhlthau, C.C. (2005). Towards collaboration between information seeking and information retrieval. Information Research, 10(2). Online: http://informationr.net/ir/10-2/paper225.html (accessed 2 September 2016).</element-citation>
		</ref>
		<ref id="R33">
			<label>33</label>
			<element-citation>Kuhlthau, C.C. (2004). Seeking Meaning: A Process Approach to Library and Information Services, 2nd ed., Libraries Unlimited, Westport, CT.</element-citation>
		</ref>
		<ref id="R34">
			<label>34</label>
			<element-citation>Kuhlthau, C.C. (1991). Inside the search process: information seeking from the user's perspective. Journal of the American Society for Information Science, 42(5), 361-371.</element-citation>
		</ref>
		<ref id="R35">
			<label>35</label>
			<element-citation>Kujala, S. (2003). User in Volvement: A review of the benefits and challenges. Behaviour &amp; Information Technology, 22(1), 1-16.</element-citation>
		</ref>
		<ref id="R36">
			<label>36</label>
			<element-citation>Maguire, M. (2001). Methods to support human-centred design. International Journal of Human-Computer Studies, 55(4), 587-634.</element-citation>
		</ref>
		<ref id="R37">
			<label>37</label>
			<element-citation>Marchionini, G. (2006). Toward human-computer information retrieval. Bulletin of the American Society for Information Science and Technology. June/July. Online: http://www.asis.org/Bulletin/Jun-06/marchionini.html (accessed 2 September 2007).</element-citation>
		</ref>
		<ref id="R38">
			<label>38</label>
			<element-citation>Marchionini, G, (2004). From information retrieval to information interaction. Keynote at European Conference on Information Retrieval. Online: http://ils.unc.edu/%7Emarch/ECIR.pdf (accessed 2 September 2016).</element-citation>
		</ref>
		<ref id="R39">
			<label>39</label>
			<element-citation>Marchionini, G. (1995). Information Seeking in Electronic Environments. Cambridge, UK: Cambridge University Press. Online: http://ils.unc.edu/~march/isee_book/web_page.html (accessed 2 September 2016).</element-citation>
		</ref>
		<ref id="R40">
			<label>40</label>
			<element-citation>McDonnell, M., &amp; Shiri, A. (2011). Social search: A taxonomy of, and a user‐centred approach to, social web search. Program, 45(1), 6-28.</element-citation>
		</ref>
		<ref id="R41">
			<label>41</label>
			<element-citation> Newby, G. B. (2001). Cognitive space and information space. Journal of the Association for Information Science and Technology, 52(12), 1026-1048.</element-citation>
		</ref>
		<ref id="R42">
			<label>42</label>
			<element-citation>Oddy, R.N. (1977). Information retrieval through man-machine dialogue. Journal of Documentation, 33(1), 1-14.</element-citation>
		</ref>
		<ref id="R43">
			<label>43</label>
			<element-citation>Olsson, E. (2004). What active users and designers contribute in the design process. Interacting with Computers, 16, 377-401.</element-citation>
		</ref>
		<ref id="R44">
			<label>44</label>
			<element-citation>Pettigrew, K.E., Fidel, R. &amp; Bruce, H. (2001), "Conceptual frameworks in information behavior", In M. E. Williams (Ed.), Annual Review of Information Science and Technology, Vol.  35, pp. 43-78. Medford, NJ: Information Today.</element-citation>
		</ref>
		<ref id="R45">
			<label>45</label>
			<element-citation>Pejtersen, A.M. (1992), "The Book House. An icon based database system for fiction retrieval in public libraries", In: B. Cronin (Ed.), The marketing of library and information services 2. (pp. 572-591). London: Aslib.</element-citation>
		</ref>
		<ref id="R46">
			<label>46</label>
			<element-citation>Pejtersen, A. M. (1989). The BOOK HOUSE. Modeling users’ needs and search strategies as a basis for system design. RISØ National Laboratory. RISØ-M-2794, 98 p. Google Scholar.</element-citation>
		</ref>
		<ref id="R47">
			<label>47</label>
			<element-citation>Rogers, Y. (2004). New theoretical approaches for HCI. Annual review of information science and technology, 38(1), 87-143</element-citation>
		</ref>
		<ref id="R48">
			<label>48</label>
			<element-citation>Rouse, W. B., &amp; Rouse, S. H. (1984). Human information seeking and design of information systems. Information Processing &amp; Management, 20(1-2), 129-138.</element-citation>
		</ref>
		<ref id="R49">
			<label>49</label>
			<element-citation>Saffer, D. (2010). Designing for Interaction. New Riders, Berkeley.</element-citation>
		</ref>
		<ref id="R50">
			<label>50</label>
			<element-citation>Saracevic, T. (1999). Information science. Journal of the American Society for Information Science, 50(12), 1051-1063. Online: http://www.scils.rutgers.edu/~tefko/JASIS1999.pdf (accessed 2 September 2016).</element-citation>
		</ref>
		<ref id="R51">
			<label>51</label>
			<element-citation>Saracevic, T. (1997a). The stratified model of information retrieval interaction: Extension and applications. Proceedings of the American Society for Information Science, 34, 313-327. Online: http://www.scils.rutgers.edu/~tefko/ProcASIS1997.doc (accessed 2 September 2016).</element-citation>
		</ref>
		<ref id="R52">
			<label>52</label>
			<element-citation>Saracevic, T. (1997b). Users lost: Reflections on the past, future, and limits of information science. SIGIR Forum, 31(2), 16-27. [Acceptance address for the 1997 Gerard Salton Award for Excellence in Research, Special Interest Group for Information Retrieval (SIGIR) of the Association for Computing Machinery (ACM).] Online: http://www.scils.rutgers.edu/~tefko/SIGIR_Forum_97.doc (accessed 2 September 2007).</element-citation>
		</ref>
		<ref id="R53">
			<label>53</label>
			<element-citation>Saracevic, T. (1996). Modeling interaction in information retrieval (IR): A review and proposal. Proceedings of the American Society for Information Science, 33, 3-9, Online: http://www.scils.rutgers.edu/~tefko/ProcASIS1996.doc (accessed 2 September 2016).</element-citation>
		</ref>
		<ref id="R54">
			<label>54</label>
			<element-citation>Saracevic, T. (1995). Evaluation of evaluation in information retrieval. Proceedings of the 18th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Special issue of SIGIR Forum, pp. 138-146. Online: http://www.scils.rutgers.edu/~tefko/SIGIR_Forum_95.pdf (accessed 2 September 2016).</element-citation>
		</ref>
		<ref id="R55">
			<label>55</label>
			<element-citation>Savolainen, R. (1995). Everday life information seeking: Approaching information seeking in the context of ‘way of life”. Library &amp; Information Science Research, 17, 259-294.</element-citation>
		</ref>
		<ref id="R56">
			<label>56</label>
			<element-citation>Savolainen, R. (1993). The sense-making theory: reviewing the interests of a user-centered approach to information seeking and use. Information Processing &amp; Management, 29(1), 13-28.</element-citation>
		</ref>
		<ref id="R57">
			<label>57</label>
			<element-citation>Smart, K.L., &amp; Whiting, M. (2001). Designing systems that support learning and use: A customer-centered approach. Information and Management, 39(3), 177-190.</element-citation>
		</ref>
		<ref id="R58">
			<label>58</label>
			<element-citation>Spink, A. &amp; Cole, C. (2004). A human information behavior approach to the philosophy of information. Library Trends, 52(3), 373-380.</element-citation>
		</ref>
		<ref id="R59">
			<label>59</label>
			<element-citation>Spink, A., &amp; Currier, J. (2006). Towards an evolutionary perspective for human information behavior: an exploratory study. Journal of Documentation, 62(2), 171-193</element-citation>
		</ref>
		<ref id="R60">
			<label>60</label>
			<element-citation>Spink, A., &amp; Cole, C. (2006). Human information behavior: Integrating diverse approaches and information use. Journal of the American Society for Information Science and Technology, 57(1), 25-35.</element-citation>
		</ref>
		<ref id="R61">
			<label>61</label>
			<element-citation>Spink, A., &amp; Wilson, T.D. (1999). Toward a theoretical framework for information retrieval (IR) evaluation in an information seeking context. Proceedings of MIRA 99: Evaluation Frameworks for Multimedia IR Applications, Dept. Computing Science, University of Glasgow - Scotland, April 14-16, (pp.75-92) Online: http://www.bcs.org/upload/pdf/ewic_mi99_paper9.pdf  (accessed 2 September 2015).</element-citation>
		</ref>
		<ref id="R62">
			<label>62</label>
			<element-citation>Turnbull, D. (2003). Augmenting information seeking on the world wide web using collaborative filtering techniques. URL: Online: http://www.ischool.utexas.edu/~donturn/research/augmentis-abstract.html (accessed 2 September 2016)</element-citation>
		</ref>
		<ref id="R63">
			<label>63</label>
			<element-citation>Wang, Y.D., &amp; Forgionne, G. (2006). A decision-theoretic approach to the evaluation of information retrieval systems. Information Processing and Management, 42(4), 863-874.</element-citation>
		</ref>
		<ref id="R64">
			<label>64</label>
			<element-citation>Watters, C.R., &amp; Shepherd, M.A. (1994). Shifting the Information Paradigm from Data-Centered to User-Centered. Information Processing &amp; Management, 30(4), 455-471.</element-citation>
		</ref>
		<ref id="R65">
			<label>65</label>
			<element-citation>Wilson, T.D. (1999). Models in information behaviour research. Journal of Documentation, 55(3), 249-270.</element-citation>
		</ref>
		<ref id="R66">
			<label>66</label>
			<element-citation>Vicente, K.J. (2002). Ecological interface design: progress and challenges. Human Factors, 44, 62-78.</element-citation>
		</ref>
		<ref id="R67">
			<label>67</label>
			<element-citation>Vicente, K.J. (1999). Cognitive work analysis. Mahwah, NJ: Lawrence Erlbaum.</element-citation>
		</ref>
		<ref id="R68">
			<label>68</label>
			<element-citation>Zhang, J., &amp; Fine, S. (1996). The effect of human behavior on the design of an information retrieval system interface. International Information and Library Review, 28, 249-260.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>