Inputs and Outputs of the Information flow in Iranian Research Institutes

Document Type : Research Article

Authors

1 Tarbiat Modares University, Library & Information Sciences Department

2 Islamic Azad University, Science and Research Branch

Abstract

Purpose: This study aimed to investigate the inputs and outputs of Iranian research Institutes.

Method: Data were collected using a researcher-made questionnaire distributed among the Managers, Deputies, Researchers and Librarians of institutes affiliated to the Ministry of Science, Research and Technology (MSRT), Ministry of Health and Medical Education, and Azad University.

Findings: Findings indicated that in the "input" stage, electronic materials were used more than Printed Materials but in Both "Process" and "output" stages non-electronic materials were major information formats in use. ANOVA test results also revealed significant difference between three types of information in research institutes. Overall analysis reported in the main article indicates that the input phase of information flow in research institutes works better than the process and output phases.

Keywords


Black, Alistar. 2007. “A Pre – History of the Learning Organization: Information and Knowledge Management befor the Digital Age” in The early information society: information management in Britain befor the computer. Ashgate.
Hargie, Owen; Dickson, David. 2007. “Are important corporate policies understood by employees?: Atracking study of organizational information flow”. Journal of Communication Management, Voll 11, No 1, pp9-25.
Shroeder, Roger G. 2004. Operations management: contemporary concepts and cases. McGraw,Hill. p219.
Soo – Seong, Lee. 1988. International information flow and the NICS: An investigation of the S. Korean case in relation to resent Amwrican ttrade policy. p Abstract.
Waxman, Janet & Feldman, Susan. 2006. Partnering with HP in Information Lifecycle Management. [On-line] available at: http://www.idc.com.
Zhang, Chang N; Yang, Cungang. 2002. “Information flow analysis on role-based access control model”. Information Management & Computer Security. Vol 10, No 5, p225- 236.
CAPTCHA Image