Search published articles


Showing 6 results for Sharif

Anahita Bavakhani, Saeid Rezaei-Sharifabadi,
Volume 1, Issue 4 (3-2015)
Abstract

Background and Aim: This study attempts to show the cybernetics approach on peer reviewing articles to recommend an appropriate solution for increasing the qualitative level of published articles in scientific journals.
Method: Heuristic Cybernetics method is suggested, based on the scientific experiences of related researches and also the mathematical principles that is an appropriate formed solution. This field is modeled by simulating real space by use of the Fuzzy theory, based on AHP method and relying on expert's opinions.
Results: The effective factors of peer reviewing articles are divided into 5 categories: innovation novelty of subjects and its practicality in international domain order, logical solidarity and its reasonableness validity of used sources appropriateness for audiences and writing style. Then these factors have been prioritized, regarding the cybernetics nature of the case and by use of the AHP method. Also the available limitations in optimization problem have been studied. Meanwhile, fuzzy sets were appropriate tools for achieving the objective.
Conclusion: Using the suggested method for peer reviewing articles, fuzzy AHP method has acceptable results in this field and emphasizes the importance of peer reviewing articles as a systematic process.
Mrs Sanam Ebrahimzadeh, Doc Saeed Rezaei Sharifabadi,
Volume 3, Issue 2 (9-2016)
Abstract

Abstract

Background and Aim: The socio-cognitive theory introduced in information science by Horland and Alberchtsen. The socio-cognitive view turns the traditional cognitive program upside down. The socio-cognitive theory emphasizes on different cultural and social structures of users. Hence, the aim of the article is to explain the role of socio - cognitive theory in information retrieval (IR).

Method: The role of the socio - cognitive theory in information retrieval was determined by reviewing of relevant literature and identifying its concepts. The current research methodology is descriptive, analytical and theoretical. The research paradigm is qualitative.

Results: The results revealed that the socio - cognitive theory can affect the information retrieval (IR), information behavior and relevancy. The socio - cognitive helps classification of a particular topic in information retrieval. It can change a thesaurus to ontology. Also, it can contribute to non-linguistic factors in understanding the meaning in ontologies and it can take account into the mediating factors in information-seeking behavior.

Conclusion. The result of this study showed that we can not only examine issues related to information retrieval, relevancy and information behavior through the traditional cognitive views. We have to sure that all the cultures and social factors are examined in our studies about IR.


Vajihe Hoseini, Azam Sanatjoo, Atefeh Sharif, Seyed Amir Amin Yazdi,
Volume 5, Issue 1 (6-2018)
Abstract

Background and Aim: The adolescence period is one of the most important stages in the life of each individual, and the basic component of this period is identity. So far, there have been different views about this period of life. One of these is the psychosocial theory of Ericsson, which defined the crisis as "identity against the confusion of the role". In addition, other people like Marcia and Berzonsky have referred to identity and identity processing styles. Story books are tools for gaining knowledge and identity in adolescents. The purpose of this study is to examine the status of adolescence stories in terms of dimensions and identity components.
Methods: The present research is applied in terms of purpose. The method of this research is descriptive. Also, content analysis approach has been used to collect research data. The research population includes all the fiction books of the age groups D and E, which were published by the Children's and Young Children's Intellectual Development Center in the years 1390-94, which totally cover 180 story titles. .
Results: Findings show that the focus of the stories is on individual identity, family identity, group identity, and national identity. Other types of identity differ in compilation and translation stories. In general, the main characters of the stories (compilation and translation) are confused. After that, the status of the identity of the person is too late and the status of the identity is successful. The fast-paced situation also includes the least percentage of stories.  Also, most of the story's main characters used the information processing style. The other dominant style of information processing by the main characters of the stories is a confused style and the least amount is devoted to the normative style. T
Conclusion: In general, according to the findings of the present research, it is completely clear that in the fiction books examined, different types of identity are not taken into account in the same way. It is certain that little and very little attention is given to other identities, negative effects and serious and irreparable damage to the formation and identity of adolescents. Also, in assessing the status of the identity of the main characters of teenage stories, the findings showed that the abundance of these characters in the field of identification is different. In the study of identity processing styles, the same characters were not found in the main characters of the stories studied.
Ms Zohre Eftekhar, Ms Soraya Ziaei, Mr Hadi Sharif Moghaddam,
Volume 5, Issue 4 (3-2019)
Abstract

Background and Aim: This paper aims to survey the method of Selecting subject to coping with Information Resources based on the Ellis model in Seminary, study 323 Students in Fars and Bushehr Province.   
Methods: The method of this study is a survey with analytical approach. Data collection tools in this study was questionnaire and in order to assess validity (content), and the questionnaire reliability was obtained by Cronbach alpha. Sampling is purposeful; Descriptive and analytical statistical methods such as Spearman's correlation coefficient, Kruskal-Wallis and Friedman tests were utilized. 
Results: prying mind (2/6), reviewing of information resources (3/13), Sites in the Internet related to subjects or social networks (3/92), Using online databases or weblogs (3/48), Authority (3/7), Studying abstract (2/48), is so important for seminary students.      
Conclusion: The results showed that Students of Seminary selected different methods that selected by research population for Selecting subject to coping with Information Resources and its not based on the Ellis Model
Mahmmoud Ahmadisharif,
Volume 10, Issue 1 (6-2023)
Abstract

Purpose: This study was conducted to know the relationship between monitoring the relationship between information literacy components of marketing experts in manufacturing industries with their success rate in marketing and their success rate in marketing.
Methodology: The research method is a descriptive survey of correlation type. The statistical population of the study is all marketing experts of food production industries in Tehran, due to the size of the statistical population, 384 of them were selected as a sample. Katz and McLean's (2007) ICT questionnaire was used to collect information related to information literacy and a researcher-made questionnaire was used to measure the success of experts in marketing. Overall reliability of the Information Literacy Questionnaire based on Cronbach's alpha coefficient formula / 78. And the reliability of the researcher-made questionnaire was estimated to be 0.72.
Findings: Pearson's formula was used to analyze the data in the inferential statistics section on the correlation coefficient and Kolmogorov-Smirnov test was used to determine the normality of the data.
Conclusion: The results of the study showed that there is a relationship between ICT literacy and each of its dimensions (describing, achieving, evaluating, managing, combining, creating, and communicating) with the success of experts in marketing. has it.

Mohammad Hossein Marzban, Rahman Sharifzadeh, ,
Volume 12, Issue 2 (9-2025)
Abstract

Introduction
This study tries to find out the human and non-human things that affect how information security culture is formed. It uses the Actor-Network Theory (ANT) to look at this. Today, information is very important for businesses, and there are more cyber threats than ever. Because of this, organizations are spending a lot on security tools. But more than 90% of big security problems come from human errors. This shows that having a strong information security culture is very important, and it works well with technical tools.
Most of the traditional ways of looking at information security culture, like the ones from Schein and Hofstede, focus mainly on people and don't consider non-human factors like technology, rules, or systems. This is a gap in the theory, so using a more complete framework like ANT helps understand how all these factors work together.
ANT looks at how humans and non-humans, such as technology, policies, and infrastructure, are treated equally in networks. It also looks at how ideas and actions change as they move through these networks. This helps understand how information security culture develops over time. The main questions this study looks at are:
What are the important human factors that help create information security culture?
What are the important non-human factors?
What role do hybrid actors—those that mix humans and technology—play in building security culture?
This research is new in theory, method, and practice. It gives a more full picture of how information security culture works by bringing together different kinds of factors.
Methods and Materoal
This study used a qualitative method based on the interpretivist viewpoint. In this approach, there isn’t one true reality—instead, reality is shaped by people’s experiences and how they see things, and it changes depending on the situation. The researcher isn’t just watching from the side; they help build understanding together with the people involved.
The research focused on the Central Bank of the Islamic Republic of Iran because it was seen as the best place to study information security culture. This is because this organisation plays a key role in setting cybersecurity rules for the banking system, faces many complex security threats, and handles highly sensitive financial information. Within this organization, the ongoing balance between strong security policies and the need for new technology created a good setting to look at how people and technology work together.
Data for this study was gathered using semi-structured interviews with 25 managers, experts, and important users. These people were chosen through purposive and snowball sampling until no new ideas were coming up. They were picked because they had at least five years of work experience and were directly involved with security matters in big projects within the organization. The interview questions were based on five main topics, looking through the idea of actor-network theory. These topics covered roles, how people interact with technology, things that influence the culture, current problems, and how policies and technology affect how employees behave.
To make the data more complete and credible, we also observed employees' actual behavior on the job and studied documents like security policies, internal reports, and guidelines. Using multiple sources of data in this way helped compare information and cut down on possible biases. The data was analyzed in six steps using the Brown and Clarke content analysis method and the MAXQDA version 2024 software. To make sure the results were accurate and reliable, we also used the participant review technique. The study followed ethical guidelines, including getting informed consent and keeping participants' information private.
Results and Discussion
This study shows that information security culture comes from the ongoing interaction between people and other factors. Among the people involved, three main groups were found: senior managers, who make important decisions, set standards, and allocate resources; regular employees, who carry out daily tasks and are the first line of defense in security, and whose responsibility and quick reporting affect how well security policies work; and technical teams, who help turn policies into action, handle security problems, and provide ongoing training to users.
Among the human challenges, there were several key issues like the mismatch between security rules and how work is done, high work pressure, people not wanting to change their habits, and the balance between user comfort and system security. Also, psychological factors such as the need for trust, being open and honest, and having a personal drive to do the right thing were important in building a security culture. These learning and culture-building efforts were supported by ongoing training, encouraging people to report problems without fear of being punished, and sharing responsibility as a team.
In the section about non-human actors, five main groups were found: policies and standards like ISO 27001 that set rules and guidelines; security tools such as SIEM, DLP, and multi-factor authentication that help watch over systems and influence how people behave; technical systems like networks and hardware; written guides and rules that explain how humans and technology work together; and organizational steps like reporting and feedback processes.
A major part of this study found that there are hybrid actors that exist between humans and non-human elements. These actors include things like multi-factor authentication systems that slowly become part of how people work; policies that use technology to control actions, like automatic limits on copying data; and processes within organizations that help learn about security, such as using attack simulation tools. These hybrid actors show that the line between people and technology in information security culture is not fixed. To improve security culture, it's important to focus on both human and technological aspects at the same time.
When we compare these findings to traditional models, we see that traditional models are mostly focused on humans and see technology as just a tool. However, the actor-network approach treats both humans and non-humans as equal parts of a network. This gives a more connected and changing view of information security culture. In this view, culture isn't something fixed—it comes from the ongoing interactions and discussions between all the different actors involved.


Conclusion
This study finds that information security culture is formed by the dynamic interaction of human and non-human actors.
Key Human Actors:
  • Senior Managers: Make decisions and allocate resources.
  • Employees: The first line of defense; their responsibility and reporting are crucial.
  • Technical Teams: Implement policies and provide training.
Key Non-Human Actors:
  • Policies and standards (e.g., ISO 27001).
  • Security tools (e.g., SIEM, DLP, multi-factor authentication).
  • Technical infrastructure and written guides.
Crucial Finding: Hybrid Actors
The study highlights "hybrid actors" that blur the line between people and technology, such as:
  • Multi-factor authentication becoming a routine part of work.
  • Automated policies that enforce rules.
  • Attack simulation tools used for training.
So, unlike traditional human-focused models, this study uses an actor-network approach, treating humans and non-humans as equal partners. In this view, security culture is not fixed but is constantly created through the interactions between all these actors. Therefore, improving it requires addressing both human and technological aspects simultaneously.
 


Page 1 from 1     

© 2025 CC BY-NC 4.0 | Human Information Interaction

Designed & Developed by : Yektaweb