{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:52:43Z","timestamp":1754157163075,"version":"3.41.2"},"reference-count":32,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2011,3,8]],"date-time":"2011-03-08T00:00:00Z","timestamp":1299542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3,8]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this research is to identify and describe the impact of comment spam in library blogs. Three research questions guided the study: current level of commenting in library blogs; librarians' perception of comment spam; and techniques used to address the comment spam problem.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A quantitative approach is used to investigate research questions. Informal interviews were conducted with four academic and three public libraries with active blogs to develop a better understanding of the problem and then to develop an appropriate data collection instrument. Based on the feedback received from these blog administrators, a survey questionnaire was developed and then distributed online via direct e\u2010mailing and mailing lists. A total of 108 responses were received.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Regardless of the library type with which blogs were affiliated with and the size of the community they served, user participation in library blogs was very limited in terms of comments left. Over 80 percent of libraries reported receiving five or fewer comments in a given week. Comment spam was not perceived to be a major problem by blog administrators. Detection\u2010based techniques were the most commonly used approaches to combat comment spam in library blogs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The research focuses on the comment spam problem in blogs affiliated with libraries where the library is responsible for content published on the blog. The comment spam problem is investigated from the library blog administrator's perspective.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Results of this study provide empirical evidence regarding level of commenting and the impact of comment spam in library blogs. The results and findings of the study can offer guidance to libraries that are reconsidering whether to allow commenting in their blogs and to those that are planning to establish a blog to reach out to their users, while keeping this online environment engaging and interactive.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The study provides empirical evidence that level of commenting is very limited, comment spam is not regarded as an important problem, and it does not interfere with the communication process in library blogs.<\/jats:p><\/jats:sec>","DOI":"10.1108\/07378831111116994","type":"journal-article","created":{"date-parts":[[2011,3,12]],"date-time":"2011-03-12T07:11:32Z","timestamp":1299913892000},"page":"173-188","source":"Crossref","is-referenced-by-count":5,"title":["Library blogs and user participation: a survey about comment spam in library blogs"],"prefix":"10.1108","volume":"29","author":[{"given":"Fatih","family":"Oguz","sequence":"first","affiliation":[]},{"given":"Michael","family":"Holt","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012220155478800_b1","unstructured":"Akismet (n.d.), \u201cStop comment and trackback spam\u201c, available at: www.akismet.com\/ (accessed 10 September 2010)."},{"key":"key2022012220155478800_b2","unstructured":"Bar\u2010Ilan, J. (2007), \u201cThe use of weblogs (blogs) by librarians and libraries to disseminate information\u201d, Information Research, Vol. 12 No. 4, available at: http:\/\/informationr.net\/ir\/12\u20104\/paper323.html (accessed 10 September 2010)."},{"key":"key2022012220155478800_b3","unstructured":"Blogger (n.d.), \u201cCreate your free blog\u201d, available at: http:\/\/www.blogger.com (accessed 10 September 2010)."},{"key":"key2022012220155478800_b4","unstructured":"Blogger Help (2010), \u201cPreventing unwanted comments and comment spam\u201d, available at: http:\/\/www.google.com\/support\/blogger\/bin\/answer.py?answer=42064 (accessed 10 September 2010)."},{"key":"key2022012220155478800_b26","unstructured":"(The) Blogging Libraries Wiki (2010), The Blogging Libraries Wiki, available at: www.blogwithoutalibrary.net\/links\/ (accessed 10 September 2010)."},{"key":"key2022012220155478800_b8","unstructured":"\u00c7elik, T. and Marks, K. (2009), \u201crel=\u201cnofollow\u201d\u201d, available at: http:\/\/microformats.org\/wiki\/rel\u2010nofollow (accessed 10 September 2010)."},{"key":"key2022012220155478800_b5","doi-asserted-by":"crossref","unstructured":"Clyde, L.A. (2004), \u201cLibrary weblogs\u201d, Library Management, Vol. 25 Nos 4\/5, pp. 183\u20109.","DOI":"10.1108\/01435120410533765"},{"key":"key2022012220155478800_b6","unstructured":"Crosby, C. (2010), Effective Blogging for Libraries, Neal\u2010Schuman Publishers Inc., New York, NY."},{"key":"key2022012220155478800_b7","unstructured":"Cutts, M. and Shellen, J. (2005), \u201cPreventing comment spam\u201d, The Official Google Blog, available at: http:\/\/googleblog.blogspot.com\/2005\/01\/preventing\u2010comment\u2010spam.html (accessed 10 September 2010)."},{"key":"key2022012220155478800_b9","unstructured":"Facebook (2010), \u201cStatistics\u201d, available at: www.facebook.com\/press\/info.php?statistics (accessed 10 September 2010)."},{"key":"key2022012220155478800_b10","unstructured":"Han, S., Moon, S., Ahn, Y\u2010y and Jeong, H. (2006), \u201cCollaborative blog spam filtering using adaptive percolation search\u201d, paper presented at WWW 2006 Workshop on Weblogging Ecosystem: Aggregation, Analysis and Dynamics, Edinburgh, UK."},{"key":"key2022012220155478800_b11","doi-asserted-by":"crossref","unstructured":"Heymann, P., Koutrika, G. and Garcia\u2010Molina, H. (2007), \u201cFighting spam on social websites: a survey of approaches and future challenges\u201d, IEEE Internet Computing, Vol. 11 No. 6, pp. 36\u201045.","DOI":"10.1109\/MIC.2007.125"},{"key":"key2022012220155478800_b12","unstructured":"Jones, S. and Fox, S. (2009), \u201cGenerational differences in online activities\u201d, The Pew Research Center, available at: www.pewinternet.org\/Infographics\/Generational\u2010differences\u2010in\u2010online\u2010activities.aspx (accessed 10 September 2010)."},{"key":"key2022012220155478800_b13","doi-asserted-by":"crossref","unstructured":"Kraut, R., Maher, M.L., Olson, J., Malone, T.W., Pirolli, P. and Thomas, J.C. (2010), \u201cScientific foundations: a case for technology\u2010mediated social participation theory\u201d, Technology Mediated Social Participation Workshop, available at: www.tmsp.umd.edu\/TMSPreports_files\/1.IEEE\u2010Computer\u2010TMSP\u2010Theory\u2010Kraut\u2010100812.pdf (accessed 11 September 2010).","DOI":"10.1109\/MC.2010.324"},{"key":"key2022012220155478800_b14","unstructured":"Maher, M.L. (2010), \u201cMotivation and collective intelligence: design lessons\u201d, Technology Mediated Social Participation Workshop, available at: www.tmsp.umd.edu\/position%20papers\/Maher_TMSP\u2010workshop.pdf (accessed 11 September 2010)."},{"key":"key2022012220155478800_b15","unstructured":"May, M. (2005), \u201cInaccessibility of CAPTCHA \u2013 alternatives to visual turing tests on the web\u201d, W3C Working Group, available at: http:\/\/www.w3.org\/TR\/turingtest\/ (accessed 10 September 2010)."},{"key":"key2022012220155478800_b16","unstructured":"Mishne, G., Carmel, D. and Lempel, R. (2005), \u201cBlocking blog spam with language model disagreement\u201d, Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, Chiba, Japan, available at: http:\/\/airweb.cse.lehigh.edu\/2005\/mishne.pdf (accessed 10 September 2010)."},{"key":"key2022012220155478800_b17","unstructured":"Newcomb, K. (2009), \u201cGoogle changes course on Nofollow\u201d, available at: http:\/\/searchenginewatch.com\/3633972 (accessed 10 September 2010)."},{"key":"key2022012220155478800_b18","unstructured":"OpenID Foundation Website (n.d.), OpenID Foundation Website, available at: http:\/\/openid.net (accessed 10 September 2010)."},{"key":"key2022012220155478800_b19","unstructured":"Prasad, S. (2008), \u201cGoogle's CAPTCHA busted in recent spammer tactics\u201d, websense:essential information protection, available at: http:\/\/securitylabs.websense.com\/content\/Blogs\/2919.aspx (accessed 10 September 2010)."},{"key":"key2022012220155478800_b20","unstructured":"Ringalda, P. (2005), \u201cReal comment throttle\u201d, Phil Ringalda: A Digital Magpie, available at: http:\/\/weblog.philringnalda.com\/mt\u2010plugins\/real\u2010comment\u2010throttle\/ (accessed 10 September 2010)."},{"key":"key2022012220155478800_b21","doi-asserted-by":"crossref","unstructured":"Rutherford, L.L. (2008), \u201cImplementing social software in public libraries: an exploration of the issues confronting public library adopters of social software\u201d, Library Hi Tech, Vol. 26 No. 2, pp. 184\u2010200.","DOI":"10.1108\/07378830810880306"},{"key":"key2022012220155478800_b22","unstructured":"Six Apart (n.d.), \u201cSix Apart guide to comment spam\u201d, available at: www.sixapart.com\/pronet\/comment_spam\/ (accessed 10 September 2010)."},{"key":"key2022012220155478800_b23","unstructured":"Stephens, M. (2006), \u201cBlogs\u201d, Library Technology Reports, Vol. 42 No. 4, pp. 184\u2010200."},{"key":"key2022012220155478800_b24","unstructured":"Stuart, D. (2009), \u201cSocial media metrics\u201d, Online, Vol. 33 No. 6, available at: www.onlinemag.net\/nov09\/Stuart.shtml (accessed 10 September 2010)."},{"key":"key2022012220155478800_b25","unstructured":"Sussman, M. (2009), \u201cThe what and why of blogging \u2013 the state of the blogsphere 2009\u201d, available at: http:\/\/technorati.com\/blogging\/article\/day\u20102\u2010the\u2010what\u2010and\u2010why2\/ (accessed 10 September 2010)."},{"key":"key2022012220155478800_b27","unstructured":"Thomason, A. (2007), \u201cBlog spam: a review\u201d, Proceedings of the Fourth Conference on Email and Anti\u2010Spam (CEAS), Mountain View, California, available at: www.ceas.cc\/2007\/papers\/paper\u201085.pdf (accessed 10 September 2010)."},{"key":"key2022012220155478800_b28","unstructured":"Timmer, J. (2008), \u201cComputer scientists find audio CAPTCHAs easy to crack\u201d, available at: http:\/\/arstechnica.com\/security\/news\/2008\/12\/computer\u2010scientists\u2010find\u2010audio\u2010captchas\u2010easy\u2010to\u2010crack.ars (accessed 10 September 2010)."},{"key":"key2022012220155478800_b29","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Maurer, B., McMillen, C., Abraham, D. and Blum, M. (2008), \u201creCAPTCHA: human\u2010based character recognition via web security measures\u201d, Science, Vol. 321 No. 12, pp. 1465\u20108.","DOI":"10.1126\/science.1160379"},{"key":"key2022012220155478800_b30","unstructured":"WordPress (n.d.), \u201cBlog tool and publishing platform\u201d, available at: http:\/\/wordpress.org\/ (accessed 10 September 2010)."},{"key":"key2022012220155478800_b31","unstructured":"WordPress Codex (n.d.), \u201cCombating comment spam\u201d, Vol. 10, available at: http:\/\/codex.wordpress.org\/Combating_Comment_Spam (accessed 10 September 2010)."},{"key":"key2022012220155478800_b32","doi-asserted-by":"crossref","unstructured":"Yan, J. and Ahmad, A.S.E. (2008), \u201cUsability of CAPTCHAs or usability issues in CAPTCHA design\u201d, Proceedings of the 4th Symposium on Usable Privacy and Security, Pittsburgh, PA, available at: http:\/\/cups.cs.cmu.edu\/soups\/2008\/proceedings\/p44Yan.pdf (accessed 10 September 2010).","DOI":"10.1145\/1408664.1408671"}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/07378831111116994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/07378831111116994\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/07378831111116994\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:33:53Z","timestamp":1753400033000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/lht\/article\/29\/1\/173-188\/259807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,8]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,3,8]]}},"alternative-id":["10.1108\/07378831111116994"],"URL":"https:\/\/doi.org\/10.1108\/07378831111116994","relation":{},"ISSN":["0737-8831"],"issn-type":[{"type":"print","value":"0737-8831"}],"subject":[],"published":{"date-parts":[[2011,3,8]]}}}