{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:54Z","timestamp":1754157234264,"version":"3.41.2"},"reference-count":139,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2011,4,26]],"date-time":"2011-04-26T00:00:00Z","timestamp":1303776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,26]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Current research methodologies in the field of information science employ induction or deduction, ignoring the third fundamental mode of cognition, retroduction. This paper seeks to introduce the Retroductive Recognition of Absence (RRA) methodology that expands inquiry from its current inductive and deductive bases to include the intuition\u2010based retroduction\/abduction of Charles Sanders Peirce.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>In brief, RRA consists of an iterative performance, of its nine\u2010step heuristic, with each iteration narrowing the scope of the research, while increasing the depth of examination. The nine steps are: perceive a phenomenon leading to surprise; perform the fundamental and primary retroduction; synthesize the phenomenon into a hypothesis; bracket intuitive prejudices; immerse in the data; conceptualize; hypothesize; select the hypothesis most efficient to test; and test the hypothesis. The iterations continue until the researcher reaches a hypothesis testable by inductive or deductive methods. This RRA methodology incorporates a \u201cdefinition heuristic\u201d that defines any previously undefined concept, a heuristic based on Spradley and McCurdy's classification of definitions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>A study of Compelled Nonuse of Information (CNI) demonstrated the usefulness of RRA in the study of phenomena from an initial \u201chunch\u201d to a testable hypothesis. As such, the RRA methodology decreases subjectivity and imparts rigor to the study of absent or newly emergent phenomena that have no theoretical basis, no data, and no pre\u2010existing, coherent body of literature.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper presents the philosophy and practice of the RRA methodology and the retroductive philosophical inquiry postulated by Peirce.<\/jats:p><\/jats:sec>","DOI":"10.1108\/00220411111124514","type":"journal-article","created":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T07:03:30Z","timestamp":1305961410000},"page":"378-406","source":"Crossref","is-referenced-by-count":2,"title":["The Retroductive Recognition of Absence (RRA) methodology"],"prefix":"10.1108","volume":"67","author":[{"given":"Ron","family":"Houston","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022031320341384600_b1","unstructured":"Ak\u00e7am, T. (1997), \u201cT\u00fcrk Ulusal Kimligi ve Ermeni Sorunu (Turkish National Identity and the Armenian Problem)\u201d, Problems of Genocide: Proceedings of the International Conference on \u201cProblems of Genocide\u201d, April 21\u201023, 1995, National Academy of Sciences, Yerevan, Republic of Armenia, Zoryan Institute for Contemporary Armenian Research and Documentation, Cambridge, MA."},{"key":"key2022031320341384600_b2","doi-asserted-by":"crossref","unstructured":"Alexander, K.L., Entwisle, D.R. and Horsey, C.S. (1997), \u201cFrom first grade forward: early foundations of high school dropout\u201d, Sociology of Education, Vol. 70 No. 2, pp. 87\u2010107.","DOI":"10.2307\/2673158"},{"key":"key2022031320341384600_b3","unstructured":"Allport, G.W. (1958), The Nature of Prejudice, Addison\u2010Wesley, Reading, MA."},{"key":"key2022031320341384600_b4","doi-asserted-by":"crossref","unstructured":"Allport, G.W. and Ross, J.M. (1967), \u201cPersonal religious orientation and prejudice\u201d, Journal of Personality and Social Psychology, Vol. 5 No. 4, pp. 432\u201043.","DOI":"10.1037\/h0021212"},{"key":"key2022031320341384600_b5","doi-asserted-by":"crossref","unstructured":"Arsenault, A. and Castells, M. (2006), \u201cConquering the minds, conquering Iraq: the social production of misinformation in the United States \u2013 a case study\u201d, Information, Communication & Society, Vol. 9 No. 3, pp. 284\u2010307.","DOI":"10.1080\/13691180600751256"},{"key":"key2022031320341384600_b6","doi-asserted-by":"crossref","unstructured":"Azaiza, F. and Cohen, M. (2006), \u201cHealth beliefs and rates of breast cancer screening among Arab women\u201d, Journal of Women's Health, Vol. 15 No. 5, pp. 520\u201030.","DOI":"10.1089\/jwh.2006.15.520"},{"key":"key2022031320341384600_b7","doi-asserted-by":"crossref","unstructured":"Baarsma, W. (2002), \u201cShafer vs South Carolina: another missed opportunity to remove juror ignorance as a factor in capital sentencing\u201d, Journal of Criminal Law & Criminology, Vol. 93 No. 1, p. 23.","DOI":"10.2307\/1144308"},{"key":"key2022031320341384600_b8","unstructured":"Barber, B.R. (2003), Fear's Empire: War, Terrorism, and Democracy, Norton, New York, NY."},{"key":"key2022031320341384600_b9","doi-asserted-by":"crossref","unstructured":"Bartholomew, R.E. (1989), \u201cThe South African monoplane hysteria: an evaluation of the usefulness of Smelser's theory of hysterical beliefs\u201d, Sociological Inquiry, Vol. 59 No. 3, pp. 287\u2010300.","DOI":"10.1111\/j.1475-682X.1989.tb00107.x"},{"key":"key2022031320341384600_b10","unstructured":"Bartholomew, R.E. and Goode, E. (1999), \u201cThe mad gasser of Botetouri County\u201d, Skeptic, Vol. 7 No. 4, pp. 50\u20105."},{"key":"key2022031320341384600_b11","unstructured":"Bateson, G. (1972), Steps to an Ecology of Mind; Collected Essays in Anthropology, Psychiatry, Evolution, and Epistemology, Ballantine, New York, NY."},{"key":"key2022031320341384600_b12","unstructured":"Belkin, N.J. (1980), \u201cAnomalous states of knowledge for information retrieval\u201d, Canadian Journal of Information Science, Vol. 5, pp. 133\u201043."},{"key":"key2022031320341384600_b13","unstructured":"Bergen, T.J. Jr (2001), \u201cThe development of prejudice in children\u201d, Education, Vol. 122 No. 1, p. 154."},{"key":"key2022031320341384600_b14","unstructured":"Bergman, M. and Paavola, S. (2001), The Commens Dictionary of Peirce's Terms: Peirce's Terminology in His Own Words, available at: www.helsinki.fi\/science\/commens\/dictionary.html (accessed April 18, 2005)."},{"key":"key2022031320341384600_b15","unstructured":"Bernard, V.W. (1963), \u201cWhy people become the victims of medical quackery\u201d, in American Medical Association & US Food and Drug Administration (Eds), Proceedings of the 2nd National Congress on Medical Quackery, Washington, DC, pp. 53\u20106."},{"key":"key2022031320341384600_b16","doi-asserted-by":"crossref","unstructured":"Birch, L.L. (1990), \u201cDevelopment of food acceptance patterns\u201d, Developmental Psychology, Vol. 26 No. 4, pp. 515\u201019.","DOI":"10.1037\/0012-1649.26.4.515"},{"key":"key2022031320341384600_b17","doi-asserted-by":"crossref","unstructured":"Blackman, L. and Walkerdine, V. (2001), Mass Hysteria: Critical Psychology and Media Studies, Palgrave, Basingstoke and New York, NY.","DOI":"10.1007\/978-1-349-91159-2"},{"key":"key2022031320341384600_b18","doi-asserted-by":"crossref","unstructured":"Boss, L.P. (1997), \u201cEpidemic hysteria: a review of the published literature\u201d, Epidemiologic Reviews, Vol. 19 No. 2, pp. 233\u201043.","DOI":"10.1093\/oxfordjournals.epirev.a017955"},{"key":"key2022031320341384600_b19","doi-asserted-by":"crossref","unstructured":"Brandon, L. (2006), \u201cOn dysconsciousness: an interview with Joyce E. King\u201d, Educational Studies, Vol. 40 No. 2, pp. 196\u2010208.","DOI":"10.1207\/s15326993es4002_12"},{"key":"key2022031320341384600_b20","unstructured":"Brent, J. (1993\/1998), Charles Sanders Peirce: A Life, Indiana University Press, Bloomington, IN."},{"key":"key2022031320341384600_b21","unstructured":"Brent, J. (1996\/1998), The Singular Experience of the Peirce Biographer, June 26, available at: www.cspeirce.com\/menu\/library\/aboutcsp\/brent\/singular.htm (accessed July 22, 2005)."},{"key":"key2022031320341384600_b22","doi-asserted-by":"crossref","unstructured":"Brookes, B.C. (1969), \u201cBradford's Law and the Bibliography of Science\u201d, Nature, Vol. 224, pp. 953\u20106.","DOI":"10.1038\/224953a0"},{"key":"key2022031320341384600_b23","doi-asserted-by":"crossref","unstructured":"Brooks, M.E., Highhouse, S., Russell, S.S. and Mohr, D.C. (2003), \u201cFamiliarity, ambivalence, and firm reputation: is corporate fame a double\u2010edged sword?\u201d, Journal of Applied Psychology, Vol. 88 No. 5, pp. 904\u201014.","DOI":"10.1037\/0021-9010.88.5.904"},{"key":"key2022031320341384600_b24","doi-asserted-by":"crossref","unstructured":"Brunel, O. and Pichon, P.\u2010E. (2004), \u201cFood\u2010related risk\u2010reduction strategies: purchasing and consumption processes\u201d, Journal of Consumer Behaviour, Vol. 3 No. 4, pp. 360\u201074.","DOI":"10.1002\/cb.148"},{"key":"key2022031320341384600_b25","doi-asserted-by":"crossref","unstructured":"Budd, J.M. (2005), \u201cPhenomenology and information studies\u201d, Journal of Documentation, Vol. 61 No. 1, pp. 44\u201059.","DOI":"10.1108\/00220410510578005"},{"key":"key2022031320341384600_b26","unstructured":"Burbules, N.C. (1986\/2002), \u201cTootle: a parable of schooling and destiny\u201d, in Merriam and Associates, S.B. (Ed.), Qualitative Research in Practice, Jossey\u2010Bass, San Francisco, CA, pp. 330\u201047."},{"key":"key2022031320341384600_b27","doi-asserted-by":"crossref","unstructured":"Bynum, B. (2001), \u201cDiscarded diagnoses\u201d, Lancet, Vol. 358 No. 9294, p. 1736.","DOI":"10.1016\/S0140-6736(01)06731-9"},{"key":"key2022031320341384600_b28","unstructured":"Cantril, H. (1940), The Invasion from Mars, Princeton University Press, Princeton, NJ."},{"key":"key2022031320341384600_b29","unstructured":"Chatman, E.A. (1985), \u201cInformation, mass media use, and the working poor\u201d, Library & Information Science Research, Vol. 7 No. 2, pp. 97\u2010114."},{"key":"key2022031320341384600_b30","doi-asserted-by":"crossref","unstructured":"Chute, R.D. and Wiener, E.L. (1996), \u201cCockpit\u2010cabin communication: II. Shall we tell the pilots?\u201d, International Journal of Aviation Psychology, Vol. 6 No. 3, pp. 211\u201031.","DOI":"10.1207\/s15327108ijap0603_1"},{"key":"key2022031320341384600_b31","unstructured":"Clodd, E. (1920), Magic in Names, and in Other Things, Chapman & Hall, London."},{"key":"key2022031320341384600_b32","unstructured":"Cockerill, P.E. (1981), Information and the Practice of Medicine: Report of the Medical Information Review Panel, British Library, London."},{"key":"key2022031320341384600_b33","doi-asserted-by":"crossref","unstructured":"Collins, P.H. (1991), Black Feminist Thought: Knowledge, Consciousness, and the Politics of Empowerment, Routledge, New York, NY.","DOI":"10.1086\/229850"},{"key":"key2022031320341384600_b34","doi-asserted-by":"crossref","unstructured":"Corbin, J.M. and Strauss, A.L. (2008), Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 3rd ed., Sage, Thousand Oaks, CA.","DOI":"10.4135\/9781452230153"},{"key":"key2022031320341384600_b35","unstructured":"Dawkins, R. (1986), The Blind Watchmaker: Why the Evidence of Evolution Reveals a Universe without Design, Norton, New York, NY."},{"key":"key2022031320341384600_b36","unstructured":"de Saint Exup\u00e9ry, A. (1943), The Little Prince, Harcourt, Brace & World, New York, NY."},{"key":"key2022031320341384600_b37","unstructured":"Dewey, J. and McDermott, J.J. (1981), The Philosophy of John Dewey, Putnam, New York, NY."},{"key":"key2022031320341384600_b38","unstructured":"Dichter, E. (1958), \u201cThe doctor's human relationships\u201d, Medical Annals of the District of Columbia, Vol. 27, pp. 493\u20104."},{"key":"key2022031320341384600_b39","doi-asserted-by":"crossref","unstructured":"Dore, M.M. (1994), \u201cFeminist pedagogy and the teaching of social work practice\u201d, Journal of Social Work Education, Vol. 30 No. 1, pp. 97\u2010106.","DOI":"10.1080\/10437797.1994.10672217"},{"key":"key2022031320341384600_b40","doi-asserted-by":"crossref","unstructured":"Floyd, J.J. and Clements, S.M. (2005), \u201cThe vital importance of critical listening: an extended example\u201d, International Journal of Listening, Vol. 19, pp. 39\u201050.","DOI":"10.1080\/10904018.2005.10499072"},{"key":"key2022031320341384600_b41","unstructured":"Foucault, M. (1977), Surveiller et Punir (Discipline and Punish: The Birth of the Prison), Vintage Books, New York, NY."},{"key":"key2022031320341384600_b42","doi-asserted-by":"crossref","unstructured":"Freyd, J.J. (2006), \u201cThe social psychology of cognitive repression\u201d, Behavioral & Brain Sciences, Vol. 29 No. 5, pp. 518\u201019.","DOI":"10.1017\/S0140525X06289118"},{"key":"key2022031320341384600_b43","doi-asserted-by":"crossref","unstructured":"Frohmann, B. (1990), \u201cRules of indexing: a critique of mentalism in information retrieval theory\u201d, Journal of Documentation, Vol. 46 No. 2, pp. 81\u2010101.","DOI":"10.1108\/eb026855"},{"key":"key2022031320341384600_b44","doi-asserted-by":"crossref","unstructured":"Frohmann, B. (1992), \u201cThe power of images: a discourse analysis of the cognitive viewpoint\u201d, Journal of Documentation, Vol. 48, pp. 365\u201086.","DOI":"10.1108\/eb026904"},{"key":"key2022031320341384600_b45","doi-asserted-by":"crossref","unstructured":"Giacalone, A., Blandino, M., Talamini, R., Bortolus, R., Spazzapan, S. and Valentini, M. (2007), \u201cWhat elderly cancer patients want to know? Differences among elderly and young patients\u201d, Psycho\u2010Oncology, Vol. 16 No. 4, pp. 365\u201070.","DOI":"10.1002\/pon.1065"},{"key":"key2022031320341384600_b46","doi-asserted-by":"crossref","unstructured":"Glaser, B.G. and Strauss, A.L. (1967), The Discovery of Grounded Theory: Strategies for Qualitative Research, Aldine, Chicago, IL.","DOI":"10.1097\/00006199-196807000-00014"},{"key":"key2022031320341384600_b47","doi-asserted-by":"crossref","unstructured":"Godfrey\u2010Smith, P. (2003), Theory and Reality: An Introduction to the Philosophy of Science, University of Chicago Press, Chicago, IL.","DOI":"10.7208\/chicago\/9780226300610.001.0001"},{"key":"key2022031320341384600_b48","doi-asserted-by":"crossref","unstructured":"Godlee, F., Pakenham\u2010Walsh, N., Ncayiyana, D., Cohen, B. and Packer, A. (2004), \u201cCan we achieve health information for all by 2015?\u201d, Lancet, Vol. 364 No. 9430, pp. 295\u2010300.","DOI":"10.1016\/S0140-6736(04)16681-6"},{"key":"key2022031320341384600_b49","unstructured":"Gould, S.J. (1996), The Mismeasure of Man, W.W. Norton, New York, NY."},{"key":"key2022031320341384600_b50","doi-asserted-by":"crossref","unstructured":"Graber, D. (1989), \u201cContent and meaning: what's it all about?\u201d, American Behavioral Scientist, Vol. 33, pp. 144\u201051.","DOI":"10.1177\/0002764289033002004"},{"key":"key2022031320341384600_b51","doi-asserted-by":"crossref","unstructured":"Hacker, W. (1985), \u201cActivity: a fruitful concept in industrial psychology\u201d, in Frese, M. and Sabini, J.P. (Eds), Goal Directed Behavior: The Concept of Action in Psychology, Lawrence Erlbaum Associates, Hillsdale, NJ, pp. 262\u201084.","DOI":"10.4324\/9781003150749-21"},{"key":"key2022031320341384600_b52","doi-asserted-by":"crossref","unstructured":"Hansson, J. (2005), \u201cHermeneutics as a bridge between the modern and the postmodern in library and information science\u201d, Journal of Documentation, Vol. 61 No. 1, pp. 102\u201013.","DOI":"10.1108\/00220410510578032"},{"key":"key2022031320341384600_b53","doi-asserted-by":"crossref","unstructured":"Hardin, G. (1968), \u201cThe tragedy of the commons\u201d, Science, Vol. 162, pp. 1243\u201097.","DOI":"10.1126\/science.162.3859.1243"},{"key":"key2022031320341384600_b54","doi-asserted-by":"crossref","unstructured":"Harman, G.H. (1965), \u201cThe inference to the best explanation\u201d, The Philosophical Review, Vol. 74 No. 1, pp. 88\u201095.","DOI":"10.2307\/2183532"},{"key":"key2022031320341384600_b55","unstructured":"Harris, C. (1984), \u201cStudying the non\u2010user\u201d, in Van der Laan, A. and Winters, A.A. (Eds), The Use of Information in a Changing World: Proceedings of the 42nd FID Congress, The Hague, 24\u201027 September, Elsevier, New York, NY, pp. 69\u201075."},{"key":"key2022031320341384600_b56","doi-asserted-by":"crossref","unstructured":"Harris, R.M. and Dewdney, P. (1994), Barriers to Information: How Formal Help Systems Fail Battered Women, Greenwood, Westport, CT.","DOI":"10.5040\/9798400616549"},{"key":"key2022031320341384600_b57","doi-asserted-by":"crossref","unstructured":"Hemsley\u2010Brown, J. and Sharp, C. (2003), \u201cThe use of research to improve professional practice: a systematic review of the literature\u201d, Oxford Review of Education, Vol. 29 No. 4, pp. 449\u201071.","DOI":"10.1080\/0305498032000153025"},{"key":"key2022031320341384600_b58","unstructured":"Herring, S. (1994\/2004), Gender Differences in Computer\u2010Mediated Communication: Bringing Familiar Baggage to the New Frontier, October, available at: www.mith2.umd.edu\/WomensStudies\/Computing\/Articles%2BResearchPapers\/gender\u2010differences\u2010communication (accessed March 13, 2006)."},{"key":"key2022031320341384600_b59","unstructured":"Hertzel, D.H. (2003), \u201cBibliometrics history\u201d, in Drake, M.A. (Ed.), Encyclopedia of Library and Information Science, 2nd ed., revised and expanded, Marcel Dekker, New York, NY, pp. 288\u2010328."},{"key":"key2022031320341384600_b60","doi-asserted-by":"crossref","unstructured":"Hinton, L., Franz, C.E., Yeo, G. and Levkoff, S.E. (2005), \u201cConceptions of dementia in a multiethnic sample of family caregivers\u201d, Journal of the American Geriatrics Society, Vol. 53 No. 8, pp. 1405\u201010.","DOI":"10.1111\/j.1532-5415.2005.53409.x"},{"key":"key2022031320341384600_b61","doi-asserted-by":"crossref","unstructured":"Hj\u00f8rland, B. (2005a), \u201cLibrary and information science and the philosophy of science\u201d, Journal of Documentation, Vol. 61 No. 1, pp. 5\u201010.","DOI":"10.1108\/00220410510577970"},{"key":"key2022031320341384600_b62","doi-asserted-by":"crossref","unstructured":"Hj\u00f8rland, B. (2005b), \u201cEmpiricism, rationalism and positivism in library and information science\u201d, Journal of Documentation, Vol. 61 No. 1, pp. 130\u201055.","DOI":"10.1108\/00220410510578050"},{"key":"key2022031320341384600_b63","doi-asserted-by":"crossref","unstructured":"Hj\u00f8rland, B. (2005c), \u201cComments on the articles and proposals for further work\u201d, Journal of Documentation, Vol. 61 No. 1, pp. 156\u201063.","DOI":"10.1108\/00220410510578069"},{"key":"key2022031320341384600_b64","unstructured":"Hollway, W. (1984), \u201cGender difference and the production of subjectivity\u201d, in Henriques, J., Hollway, W., Urwin, C., Venn, C. and Walkerdine, V. (Eds), Changing the Subject: Psychology, Social Regulation and Subjectivity, Methuen, London, pp. 227\u201063."},{"key":"key2022031320341384600_b65","unstructured":"Honderich, T. (1995), The Oxford Companion to Philosophy, Oxford University Press, Oxford."},{"key":"key2022031320341384600_b66","unstructured":"Houston, R.D. (2009), \u201cA model of compelled nonuse of information\u201d, unpublished PhD dissertation, The University of Texas at Austin, Austin, TX."},{"key":"key2022031320341384600_b67","doi-asserted-by":"crossref","unstructured":"Johnson, D. (1945), \u201cThe \u2018Phantom Anesthetist\u2019 of Matoon: a field study of mass hysteria\u201d, Journal of Abnormal and Social Psychology, Vol. 40, pp. 175\u201086.","DOI":"10.1037\/h0062339"},{"key":"key2022031320341384600_b68","doi-asserted-by":"crossref","unstructured":"Jones, J.L. and Leary, M.R. (1994), \u201cEffects of appearance\u2010based admonitions against sun exposure on tanning intentions in young adults\u201d, Health Psychology, Vol. 13 No. 1, pp. 86\u201090.","DOI":"10.1037\/0278-6133.13.1.86"},{"key":"key2022031320341384600_b69","doi-asserted-by":"crossref","unstructured":"Jost, J.T. and Hunyady, O. (2005), \u201cAntecedents and consequences of system\u2010justifying ideologies\u201d, Current Directions in Psychological Science, Vol. 14 No. 5, pp. 260\u20105.","DOI":"10.1111\/j.0963-7214.2005.00377.x"},{"key":"key2022031320341384600_b70","doi-asserted-by":"crossref","unstructured":"Kalichman, S.C., Cherry, C., Cain, D., Weinhardt, L.S., Benotsch, E., Pope, H. and Kalichman, M. (2006), \u201cHealth information on the internet and people living with HIV\/AIDS: information evaluation and coping styles\u201d, Health Psychology, Vol. 25 No. 2, pp. 205\u201010.","DOI":"10.1037\/0278-6133.25.2.205"},{"key":"key2022031320341384600_b71","unstructured":"Kaplan, A. (1964), The Conduct of Inquiry: Methodology for Behavioral Science, Harper & Row, New York, NY."},{"key":"key2022031320341384600_b72","doi-asserted-by":"crossref","unstructured":"Keller, P.A., Lipkus, I.M. and Rimer, B.K. (2003), \u201cAffect, framing, and persuasion\u201d, Journal of Marketing Research (JMR), Vol. 40 No. 1, pp. 54\u201064.","DOI":"10.1509\/jmkr.40.1.54.19133"},{"key":"key2022031320341384600_b73","doi-asserted-by":"crossref","unstructured":"Kreling, B., Figueiredo, M.I., Sheppard, V.L. and Mandelblatt, J.S. (2006), \u201cA qualitative study of factors affecting chemotherapy use in older women with breast cancer: barriers, promoters, and implications for intervention\u201d, Psycho\u2010Oncology, Vol. 15 No. 12, pp. 1065\u201076.","DOI":"10.1002\/pon.1042"},{"key":"key2022031320341384600_b74","unstructured":"Krzys, R. (2005), \u201cLibrary historiography\u201d, in Drake, M.A. (Ed.), Encyclopedia of Library and Information Science, 2d ed., revised and expanded, Vol. 3, Marcel Dekker, New York, NY, pp. 1621\u201041."},{"key":"key2022031320341384600_b75","unstructured":"Kwasnik, B.H. (1992), \u201cThe role of classification structures in reflecting and building theory\u201d, in Fidel, R., Kwasnik, B.H. and Smith, P.J. (Eds), Advances in Classification Research: Proceedings of the 3rd American Society for Information Science Special Interest Group\/Classification Research Workshop, Vol. 3, Learned Information, Medford, NJ, pp. 63\u201081."},{"key":"key2022031320341384600_b76","unstructured":"Lasswell, H.D. (1927), Propaganda Technique in the World War, Knopf, New York, NY."},{"key":"key2022031320341384600_b77","unstructured":"Lasswell, H.D. (1949), Language of Politics: Studies in Quantitative Semantics, G.W. Stewart, New York, NY."},{"key":"key2022031320341384600_b78","doi-asserted-by":"crossref","unstructured":"Leschziner, V. (2006), \u201cEpistemic foundations of cuisine: a socio\u2010cognitive study of the configuration of cuisine in historical perspective\u201d, Theory & Society, Vol. 35 No. 4, pp. 421\u201043.","DOI":"10.1007\/s11186-006-9008-7"},{"key":"key2022031320341384600_b79","doi-asserted-by":"crossref","unstructured":"Lewis, A. (1975), \u201cThe survival of hysteria\u201d, Psychological Medicine, Vol. 5, pp. 9\u201012.","DOI":"10.1017\/S0033291700007169"},{"key":"key2022031320341384600_b80","doi-asserted-by":"crossref","unstructured":"Leydon, G.M., Boulton, M., Moynihan, C., Jones, A., Mossman, J., Boudioni, M. and McPherson, K. (2000), Cancer Patients' Information Needs and Information Seeking Behaviour: In Depth Interview Study, available at: http:\/\/bmj.bmjjournals.com\/cgi\/content\/full\/320\/7239\/909. Response at http:\/\/bmj.bmjjournals.com\/cgi\/content\/full\/321\/7261\/632 (accessed March 13, 2005).","DOI":"10.1136\/bmj.320.7239.909"},{"key":"key2022031320341384600_b81","unstructured":"Linnaeus, C. (1735), Systema Naturae, Apud Theodorum Haak, Leiden."},{"key":"key2022031320341384600_b82","doi-asserted-by":"crossref","unstructured":"Lips, H.M. and Colwill, N.L. (1988), \u201cPsychology addresses women and work: Canadian research in 1980s\u201d, Canadian Psychology (Psychologie Canadienne), Vol. 29 No. 1, pp. 57\u201068.","DOI":"10.1037\/h0079755"},{"key":"key2022031320341384600_b83","unstructured":"Locke, A.L. and Stewart, J.C. (1992), Race Contacts and Interracial Relations: Lectures on the Theory and Practice of Race, Howard University Press, Washington, DC."},{"key":"key2022031320341384600_b87","unstructured":"McKnight, M. (2006), \u201cThe information seeking of on\u2010duty critical care nurses: evidence from participant observation and in\u2010context interviews\u201d, Journal of the Medical Library Association, Vol. 94 No. 2, pp. 145\u201051."},{"key":"key2022031320341384600_b88","unstructured":"McLuhan, M. and Fiore, Q. (1967), The Medium is the Massage: An Inventory of Effects, Random House, New York, NY."},{"key":"key2022031320341384600_b89","doi-asserted-by":"crossref","unstructured":"McRobbie, A. (1991), Feminism and Youth Culture: From Jackie to Just Seventeen, Unwin Hyman, Boston, MA.","DOI":"10.1007\/978-1-349-21168-5"},{"key":"key2022031320341384600_b90","unstructured":"McWhorter, J.H. (2000), Losing the Race: Self\u2010Sabotage in Black America, Free Press, New York, NY."},{"key":"key2022031320341384600_b91","unstructured":"McWilliams, J.E. (2004), \u201cWhen bovines go bad\u201d, The Texas Observer, Vol. 96 No. 16."},{"key":"key2022031320341384600_b84","doi-asserted-by":"crossref","unstructured":"Mann, J. and Rosenblatt, W. (1979), \u201cCollective stress syndrome\u201d, Journal of the American Medical Association, Vol. 242, p. 27.","DOI":"10.1001\/jama.1979.03300010019015"},{"key":"key2022031320341384600_b85","doi-asserted-by":"crossref","unstructured":"Massey, W., Brannon, W.L. and Riley, T.L. (1981), \u201cThe jerks: mass hysteria or epilepsy?\u201d, Southern Medical Journal, Vol. 74, pp. 606\u20109.","DOI":"10.1097\/00007611-198105000-00026"},{"key":"key2022031320341384600_b86","doi-asserted-by":"crossref","unstructured":"Matlin, M.W. (1999), \u201cBimbos and rambos: the cognitive basis of gender stereotypes\u201d, Eye on Psi Chi, Vol. 3 No. 2, pp. 13\u201014, 16.","DOI":"10.24839\/1092-0803.Eye3.2.12"},{"key":"key2022031320341384600_b92","unstructured":"Mearns, W.H. (1899), Antigonish, available at: http:\/\/en.wikipedia.org\/wiki\/Antigonish_(poem) (accessed July 18, 2010)."},{"key":"key2022031320341384600_b93","doi-asserted-by":"crossref","unstructured":"Medalia, N.Z. and Larsen, O.N. (1958), \u201cDiffusion and belief in a collective delusion: the Seattle windshield pitting epidemic\u201d, American Sociological Review, Vol. 23, pp. 221\u201032.","DOI":"10.2307\/2089002"},{"key":"key2022031320341384600_b94","doi-asserted-by":"crossref","unstructured":"Meyer, C., Serpell, L., Waller, G., Murphy, F., Treasure, J. and Leung, N. (2005), \u201cCognitive avoidance in the strategic processing of ego threats among eating\u2010disordered patients\u201d, International Journal of Eating Disorders, Vol. 38 No. 1, pp. 30\u20106.","DOI":"10.1002\/eat.20147"},{"key":"key2022031320341384600_b95","doi-asserted-by":"crossref","unstructured":"Miller, S.M., Rodoletz, M., Schroeder, C.M., Mangan, C.E. and Sedlacek, T.V. (1996), \u201cApplications of the monitoring process model to coping with severe long\u2010term medical threats\u201d, Health Psychology, Vol. 15 No. 3, pp. 216\u201025.","DOI":"10.1037\/0278-6133.15.3.216"},{"key":"key2022031320341384600_b96","doi-asserted-by":"crossref","unstructured":"Muha, C. and Smith, K.S. (1998), \u201cThe use and selection of sources in information seeking: the cancer information service\u201d, Journal of Health Communication, Vol. 3, p. 109.","DOI":"10.1080\/108107398127292"},{"key":"key2022031320341384600_b97","doi-asserted-by":"crossref","unstructured":"Muris, P., Vanzuuren, F.J. and Devries, S. (1994), \u201cMonitoring, blunting and situational anxiety: a laboratory study on coping with a quasi\u2010medical stressor\u201d, Personality and Individual Differences, Vol. 16 No. 3, pp. 365\u201072.","DOI":"10.1016\/0191-8869(94)90061-2"},{"key":"key2022031320341384600_b98","unstructured":"Myers, D.G. (2002), \u201cThe powers & perils of intuition\u201d, Psychology Today, November\/December, pp. 42\u201052."},{"key":"key2022031320341384600_b99","unstructured":"National Transportation Safety Board (2006), Update on NTSB Investigation into the Crash of Comair Flight 5191, National Transportation Safety Board, Washington, DC."},{"key":"key2022031320341384600_b100","unstructured":"Parker, J. (1996), \u201cElectronic fe\u2010mail? The rationale behind use and non\u2010use of the internet by women and dender\u2010based differences in perceptions of the internet\u201d, unpublished Master's dissertation, University of Sheffield, Sheffield."},{"key":"key2022031320341384600_b101","doi-asserted-by":"crossref","unstructured":"Peirce, C.S. (1905), \u201cIssues of pragmaticism\u201d, The Monist, Vol. 15, pp. 481\u201099.","DOI":"10.5840\/monist19051544"},{"key":"key2022031320341384600_b102","unstructured":"Peirce, C.S. (1931\u20101958a), in Hartshorne, C. and Weiss, P. (Eds), Collected Papers of Charles Sanders Peirce, Vols. 1\u20106, and in Burks, A.W. (Ed.), Collected Papers of Charles Sanders Peirce, Vols 7\u20108, Harvard University Press, Cambridge, MA."},{"key":"key2022031320341384600_b103","unstructured":"Peirce, C.S. (1931\u20101958b), \u201cHarvard lectures on pragmatism\u201d, in Hartshorne, C. and Weiss, P. (Eds), Collected Papers of Charles Sanders Peirce (Vol. 5), Harvard University Press, Cambridge, MA."},{"key":"key2022031320341384600_b104","unstructured":"Peirce, C.S. (1931\u20101958c), \u201cHume on miracles\u201d, in Hartshorne, C. and Weiss, P. (Eds), Collected Papers of Charles Sanders Peirce (Vol. 6), Harvard University Press, Cambridge, MA."},{"key":"key2022031320341384600_b105","unstructured":"Peirce, C.S. (1931\u20101958d), \u201cLowell lectures\u201d, in Hartshorne, C. and Weiss, P. (Eds), Collected Papers of Charles Sanders Peirce (Vol. 5), Harvard University Press, Cambridge, MA."},{"key":"key2022031320341384600_b106","unstructured":"Peirce, C.S. (1931\u20101958e), \u201cOn the logic of drawing history from ancient documents, especially from testimonies\u201d, in Burks, A.W. (Ed.), Collected Papers of Charles Sanders Peirce (Vol. 7), Harvard University Press, Cambridge, MA."},{"key":"key2022031320341384600_b107","unstructured":"Peirce, C.S. (1976a), \u201cCarnegie Application (L75)\u201d, in Eisele, C. (Ed.), The New Elements of Mathematics (Vol. 4), Mouton Publishers, The Hague."},{"key":"key2022031320341384600_b108","unstructured":"Peirce, C.S. (1976b), \u201cProlegomena to an apology for pragmaticism\u201d, in Eisele, C. (Ed.), The New Elements of Mathematics, Vol. 4, Mouton Publishers, The Hague, pp. 319\u201020."},{"key":"key2022031320341384600_b109","unstructured":"Peirce, C.S. (1985), \u201cThe proper treatment of hypotheses: a preliminary chapter, toward an examination of Hume's argument against miracles, in its logic and in its history (MS 692)\u201d, in Eisele, C. (Ed.), Historical Perspectives on Peirce's Logic of Science. A History of Science, Vol. 2, Mouton, Berlin, pp. 898\u20109."},{"key":"key2022031320341384600_b110","unstructured":"Peirce, C.S. (1998), \u201cA syllabus of certain topics of logic\u201d, in Peirce Edition Project (Ed.), The Essential Peirce: Selected Philosophical Writings, Vol. 2, Indiana University Press, Bloomington and Indianapolis, IN, 287 pp."},{"key":"key2022031320341384600_b111","unstructured":"Pifalo, V., Hollander, S., Henderson, C., DeSalvo, P. and Gill, G. (1997), \u201cThe impact of consumer health information provided by libraries: the Delaware experience\u201d, Bulletin of the Medical Library Association, Vol. 85 No. 1, pp. 16\u201022."},{"key":"key2022031320341384600_b112","unstructured":"Popper, K.R. (1962), Conjectures and Refutations: The Growth of Scientific Knowledge, Basic Books, New York, NY."},{"key":"key2022031320341384600_b137","unstructured":"(The) Psychiatric Bulletin: For the Physician in General Practice (1954), \u201cWhy do people detour to quacks?\u201d, Vol. 4, pp. 66\u20109."},{"key":"key2022031320341384600_b113","unstructured":"Quammen, D. (2007), \u201cA passion for order: Swedish botanist Carl Linnaeus treasured nature \u2013 and gave us a system for naming species still in use 300 years after his birth\u201d, National Geographic, Vol. 211 No. 6, pp. 72\u201088."},{"key":"key2022031320341384600_b114","doi-asserted-by":"crossref","unstructured":"Reis, S.M. (2001), \u201cExternal barriers experienced by gifted and talented girls and women\u201d, Gifted Child Today, Vol. 24 No. 4, pp. 26\u201035, 65.","DOI":"10.4219\/gct-2001-551"},{"key":"key2022031320341384600_b115","doi-asserted-by":"crossref","unstructured":"Rennie, D.L. (1998), \u201cGrounded theory methodology: the pressing need for a coherent logic of justification\u201d, Theory and Psychology, Vol. 8 No. 1, pp. 101\u201019.","DOI":"10.1177\/0959354398081006"},{"key":"key2022031320341384600_b116","doi-asserted-by":"crossref","unstructured":"Rose, A.J. and Rudolph, K.D. (2006), \u201cA review of sex differences in peer relationship processes: potential trade\u2010offs for the emotional and behavioral development of girls and boys\u201d, Psychological Bulletin, Vol. 132 No. 1, pp. 98\u2010131.","DOI":"10.1037\/0033-2909.132.1.98"},{"key":"key2022031320341384600_b117","unstructured":"Russ, J. (1983), How to Suppress Women's Writing, The University of Texas Press, Austin, TX."},{"key":"key2022031320341384600_b118","doi-asserted-by":"crossref","unstructured":"Schmuck, P. and Vlek, C. (2003), \u201cPsychologists can do much to support sustainable development\u201d, European Psychologist, Vol. 8 No. 2, pp. 66\u201076.","DOI":"10.1027\/\/1016-9040.8.2.66"},{"key":"key2022031320341384600_b119","doi-asserted-by":"crossref","unstructured":"Schuler, E.A. and Parenton, V.J. (1943), \u201cA recent epidemic of hysteria in a Louisiana High School\u201d, The Journal of Social Psychology, Vol. 17 No. 2, pp. 221\u201035.","DOI":"10.1080\/00224545.1943.9712279"},{"key":"key2022031320341384600_b120","doi-asserted-by":"crossref","unstructured":"Seld\u00e9n, L. (2005), \u201cOn grounded theory \u2013 with some malice\u201d, Journal of Documentation, Vol. 61 No. 1, pp. 114\u201029.","DOI":"10.1108\/00220410510578041"},{"key":"key2022031320341384600_b121","unstructured":"Servan, J.\u2010M.\u2010A. (1767), Discours sur l'Administration de la Justice Criminelle, Gen\u00e8ve."},{"key":"key2022031320341384600_b122","doi-asserted-by":"crossref","unstructured":"Smelser, N.J. (1962), Theory of Collective Behavior, The Free Press, New York, NY.","DOI":"10.1037\/14412-000"},{"key":"key2022031320341384600_b123","unstructured":"Soliah, L., Walter, J. and Antosh, D. (2006), \u201cQuantifying the impact of food preparation skills among college women\u201d, College Student Journal, Vol. 40 No. 4, pp. 729\u201039."},{"key":"key2022031320341384600_b124","unstructured":"Spradley, J.P. and McCurdy, D.W. (1972), The Cultural Experience: Ethnography in Complex Society, Science Research Associates, Chicago, IL."},{"key":"key2022031320341384600_b125","doi-asserted-by":"crossref","unstructured":"Sundin, O. and Johannisson, J. (2005), \u201cPragmatism, neo\u2010pragmatism and sociocultural theory: communicative participation as a perspective in LIS\u201d, Journal of Documentation, Vol. 61 No. 1, pp. 23\u201043.","DOI":"10.1108\/00220410510577998"},{"key":"key2022031320341384600_b126","doi-asserted-by":"crossref","unstructured":"Talja, S., Tuominen, K. and Savolainen, R. (2005), \u201c\u2018Isms\u2019 in Information Science: constructivism, collectivism and constructionism\u201d, Journal of Documentation, Vol. 61 No. 1, pp. 69\u2010101.","DOI":"10.1108\/00220410510578023"},{"key":"key2022031320341384600_b127","unstructured":"Thall, E. (2006), Development of Periodic Table, available at: http:\/\/mooni.fccj.org\/\u223cethall\/period\/period.htm (accessed March 31, 2006)."},{"key":"key2022031320341384600_b128","unstructured":"Tong, R.P. (1998), Feminist Thought: A More Comprehensive Introduction, 2nd ed., Westview Press, Boulder, CO."},{"key":"key2022031320341384600_b129","doi-asserted-by":"crossref","unstructured":"Tsang, J.\u2010A. (2002), \u201cMoral rationalization and the integration of situational factors and psychological processes in immoral behavior\u201d, Review of General Psychology, Vol. 6 No. 1, pp. 25\u201050.","DOI":"10.1037\/1089-2680.6.1.25"},{"key":"key2022031320341384600_b130","doi-asserted-by":"crossref","unstructured":"Volk, R.M. (2007), \u201cExpert searching in consumer health: an important role for librarians in the age of the internet and the web\u201d, Journal of the Medical Library Association, Vol. 95 No. 2, pp. 203\u20107.","DOI":"10.3163\/1536-5050.95.2.203"},{"key":"key2022031320341384600_b131","unstructured":"Walton, D. (2004), Abductive Reasoning, The University of Alabama Press, Tuscaloosa, AL."},{"key":"key2022031320341384600_b132","doi-asserted-by":"crossref","unstructured":"Weisgerber, C. (2004), \u201cTurning to the internet for help on sensitive medical problems\u201d, Information, Communication & Society, Vol. 7 No. 4, pp. 554\u201074.","DOI":"10.1080\/1369118042000305647"},{"key":"key2022031320341384600_b133","doi-asserted-by":"crossref","unstructured":"Wessely, S. (1987), \u201cMass hysteria: two syndromes?\u201d, Psychological Medicine, Vol. 17 No. 1, pp. 109\u201020.","DOI":"10.1017\/S0033291700013027"},{"key":"key2022031320341384600_b134","doi-asserted-by":"crossref","unstructured":"Westbrook, L.T. (1986), \u201cCensors: what makes them tick?\u201d, Public Library Quarterly, Vol. 6 No. 4, pp. 49\u201053.","DOI":"10.1300\/J118v06n04_06"},{"key":"key2022031320341384600_b135","doi-asserted-by":"crossref","unstructured":"Westbrook, L.T. (2009a), \u201cCrisis information concerns: information needs of domestic violence survivors\u201d, Information Processing and Management, Vol. 45 No. 1, pp. 98\u2010114.","DOI":"10.1016\/j.ipm.2008.05.005"},{"key":"key2022031320341384600_b136","doi-asserted-by":"crossref","unstructured":"Westbrook, L.T. (2009b), \u201cInformation myths and intimate partner violence: sources, contexts, and consequences\u201d, Journal of the American Society of Information Science and Technology, Vol. 60 No. 4, pp. 826\u201036.","DOI":"10.1002\/asi.21021"},{"key":"key2022031320341384600_b138","doi-asserted-by":"crossref","unstructured":"Wilkinson, E.A. (1972), \u201cThe ambiguity of Bradford's law\u201d, Journal of Documentation, Vol. 28 No. 2, pp. 122\u201030.","DOI":"10.1108\/eb026534"},{"key":"key2022031320341384600_b139","unstructured":"Young, J.H. (1967), The Medical Messiahs, Princeton University Press, Princeton, NJ."}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00220411111124514","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220411111124514\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220411111124514\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:20Z","timestamp":1753400300000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/67\/3\/378-406\/197950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,26]]},"references-count":139,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,4,26]]}},"alternative-id":["10.1108\/00220411111124514"],"URL":"https:\/\/doi.org\/10.1108\/00220411111124514","relation":{},"ISSN":["0022-0418"],"issn-type":[{"type":"print","value":"0022-0418"}],"subject":[],"published":{"date-parts":[[2011,4,26]]}}}