Diese Datenbank enthält über 40.000 Dokumente zu Themen aus den Bereichen Formalerschließung – Inhaltserschließung – Information Retrieval.
© 2015 W. Gödert, TH Köln, Institut für Informationswissenschaft / Powered by litecat, BIS Oldenburg (Stand: 03. März 2020)
21Hu, X.-H. (Hrsg.): Wang, H. ; Song, Y.-Q. ; Wang, L.-T.: Memory model for web ad effect based on multimodal features.
In: Journal of the Association for Information Science and Technology. 71(2020) no.1, S.16-28.
Abstract: Web ad effect evaluation is a challenging problem in web marketing research. Although the analysis of web ad effectiveness has achieved excellent results, there are still some deficiencies. First, there is a lack of an in-depth study of the relevance between advertisements and web content. Second, there is not a thorough analysis of the impacts of users and advertising features on user browsing behaviors. And last, the evaluation index of the web advertisement effect is not adequate. Given the above problems, we conducted our work by studying the observer's behavioral pattern based on multimodal features. First, we analyze the correlation between ads and links with different searching results and further assess the influence of relevance on the observer's attention to web ads using eye-movement features. Then we investigate the user's behavioral sequence and propose the directional frequent-browsing pattern algorithm for mining the user's most commonly used browsing patterns. Finally, we offer the novel use of "memory" as a new measure of advertising effectiveness and further build an advertising memory model with integrated multimodal features for predicting the efficacy of web ads. A large number of experiments have proved the superiority of our method.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24214.
22Dinneen, J.D. ; Julien, C.-A.: ¬The ubiquitous digital file : a review of file management research.
In: Journal of the Association for Information Science and Technology. 71(2020) no.1, S.E1-E32.
(e-only AIS review)
Abstract: Computer users spend time every day interacting with digital files and folders, including downloading, moving, naming, navigating to, searching for, sharing, and deleting them. Such file management has been the focus of many studies across various fields, but has not been explicitly acknowledged nor made the focus of dedicated review. In this article we present the first dedicated review of this topic and its research, synthesizing more than 230 publications from various research domains to establish what is known and what remains to be investigated, particularly by examining the common motivations, methods, and findings evinced by the previously furcate body of work. We find three typical research motivations in the literature reviewed: understanding how and why users store, organize, retrieve, and share files and folders, understanding factors that determine their behavior, and attempting to improve the user experience through novel interfaces and information services. Relevant conceptual frameworks and approaches to designing and testing systems are described, and open research challenges and the significance for other research areas are discussed. We conclude that file management is a ubiquitous, challenging, and relatively unsupported activity that invites and has received attention from several disciplines and has broad importance for topics across information science.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24222.
23Jörs, B.: Wider eine Überschätzung der gegenwärtigen Leistungen der deutschsprachigen Informationswissenschaft : Keine fehlende Fundierung? Doch mit gesellschaftlicher Relevanz ausgestattet?.Bernd Jörs antwortet Dirk Lewandowski.
In: Open Password. Nr. 691 vom 21.01.2020, [https://www.password-online.de/?mailpoet_router&endpoint=view_in_browser&action=view&data=WzksMCw2MjY0LCIxMjF0dWVibnVuczBra2dnY2d3d2c0ODB3ODgwazRzYyIsOCwwXQ].
(Zukunft der Informationswissenschaft: Hat die Informationswissenschaft eine Zukunft?)
Abstract: In einem aktuellen Beitrag von Open Password (#664, 19. November ) zu einer Veranstaltung des Berliner Arbeitskreises Information unter dem Titel "Zukunft der Informationswissenschaft. Hat die Informationswissenschaft eine Zukunft?" nimmt der Herausgeber des gleichnamigen Buches, Dr. Willi Bredemeier, die Rolle eines Berichterstatters ein. Vorgestellt werden die Inhalte eines Vortrages des Hamburger HAW-Referenten, Prof. Dr. Dirk Lewandowski, zum Thema: "Warum die Frage nach der Zukunft der Informationswissenschaft falsch gestellt ist". Dem Bericht darüber in Open Password wurde der Titel "Die Informationswissenschaft hat ein strukturelles, kein inhaltliches Problem. Ein Sechs-Punkte-Programm, um aus dem Status eines kleinen Faches herauszukommen" gegeben.
Inhalt: Erwiderung auf: Lewandowski, D.: Die Informationswissenschaft hat ein strukturelles, kein inhaltliches Problem: Ein Sechs-Punkte-Programm, um aus dem Status eines kleinen Faches herauszukommen. In: Open Password. Nr. 664 vom 19.11.2019, [https://www.password-online.de/?wysija-page=1&controller=email&action=view&email_id=822&wysijap=subscriptions&user_id=1045]. Zweiter Teil als: Doch einen angemessenen Praxisbezug und einen ausreichenden gesellschaftlichen Nutzen? In: Open Password. Nr. 701 vom 06. Februar 2020 [Unter: https://www.password-online.de/?mailpoet_router&endpoint=view_in_browser&action=view&data=WzIwLDAsNjI2NCwiMTIxdHVlYm51bnMwa2tnZ2Nnd3dnNDgwdzg4MGs0c2MiLDE5LDBd]. Vgl. auch die vorangegangenen Beiträge von Lewandoski und Jörs.
24Barth, T.: Inverse Panopticon : Digitalisierung & Transhumanismus [Transhumanismus II].[25. Januar 2020].
Abstract: Transhumanisten fordern in der Digitalisierungsdebatte auch eine Revision der Menschenwürde - wir brauchen aber eine Umkehr von Machtstrukturen.
Inhalt: Vgl.: Barth, T.: Digitalisierung und Lobby: Transhumanismus I. [12. Januar 2020]. Unter: https://www.heise.de/tp/features/Digitalisierung-und-Lobby-Transhumanismus-I-4633314.html?view=print.
Wissenschaftsfach: Informatik ; Kognitionswissenschaft
25Franke-Maier, M. ; Beck, C. ; Kasprzik, A. ; Maas, J.F. ; Pielmeier, S. ; Wiesenmüller, H: ¬Ein Feuerwerk an Algorithmen und der Startschuss zur Bildung eines Kompetenznetzwerks für maschinelle Erschließung : Bericht zur Fachtagung Netzwerk maschinelle Erschließung an der Deutschen Nationalbibliothek am 10. und 11. Oktober 2019.
In: o-bib: Das offene Bibliotheksjournal. 7(2020) Nr.1, S.1-12.
Abstract: Am 10. und 11. Oktober 2019 trafen sich rund 100 Vertreterinnen und Vertreter aus Bibliothek, Wissenschaft und Wirtschaft an der Deutschen Nationalbibliothek (DNB) in Frankfurt am Main zu einer Fachtagung über das derzeitige Trend-Thema "maschinelle Erschließung". Ziel der Veranstaltung war die "Betrachtung unterschiedlicher Anwendungsbereiche maschineller Textanalyse" sowie die Initiation eines Dialogs zu Technologien für die maschinelle Textanalyse, Aufgabenstellungen, Erfahrungen und den Herausforderungen, die maschinelle Verfahren nach sich ziehen. Hintergrund ist der Auftrag des Standardisierungsausschusses an die DNB, regelmäßig einschlägige Tagungen durchzuführen, aus denen "perspektivisch ein Kompetenznetzwerk für die maschinelle Erschließung entsteh[t]".
Inhalt: https://www.o-bib.de/article/view/5565. https://doi.org/10.5282/o-bib/5565.
Themenfeld: Automatisches Indexieren
26Sprenger, M.: Best-Practice-Guide für das Metadatenschema DataCite.
In: Inetbib, Mail vom 06.02.2020.
Abstract: "Kürzlich erschien Best-Practice-Guide für das Metadatenschema DataCite aufmerksam machen, der in Zusammenarbeit einiger Münchner Institutionen in Verbindung mit dem Modellprojekt "eHumanities - interdisziplinär" entstanden ist: https://doi.org/10.5281/zenodo.3559800. Der Guide, der unter Beteiligung des Leibniz-Rechenzentrums der Bayerischen Akademie der Wissenschaften, der IT-Gruppe Geisteswissenschaften (LMU) und der Universitätsbibliothek der LMU erstellt wurde, stellt eine Empfehlung für den Einsatz von DataCite (https://schema.datacite.org/) an den beteiligten Institutionen dar. Dabei ist er so formuliert, dass er sich problemlos auf andere Institutionen oder Szenarien übertragen lässt. Die einzelnen Teile des Guides sowie Anwendungsbeispiele als XML-Dateien sind auf GitHub veröffentlicht: https://github.com/UB-LMU/DataCite_BestPracticeGuide . Das Repositorium kann und soll gerne für Feedback genutzt werden. Um die Befüllung der DataCite-Felder zu erleichtern, wurde durch die IT-Gruppe Geisteswissenschaften der bereits verfügbare DataCite-Generator aktualisiert und mit Erklärungen aus dem Best-Practice-Guide verlinkt: https://dhvlab.gwi.uni-muenchen.de/datacite-generator/ ; der Quellcode ist ebenfalls verfügbar: https://github.com/UB-LMU/datacite-metadata-generator. Weitere Informationen zum Best-Practice-Guide finden Sie in der Begleitpublikation "Standardisierung eines Standards: Warum und wie ein Best-Practice-Guide für das Metadatenschema DataCite entstand" (http://www.kit.gwi.uni-muenchen.de/?p=42800)."
27Hellsten, I. ; Leydesdorff, L.: Automated analysis of actor-topic networks on twitter : new approaches to the analysis of socio-semantic networks.
In: Journal of the Association for Information Science and Technology. 71(2020) no.1, S.3-15.
Abstract: Social media data provide increasing opportunities for the automated analysis of large sets of textual documents. So far, automated tools have been developed either to account for the social networks among participants in the debates, or to analyze the content of these debates. Less attention has been paid to mapping co-occurrences of actors (participants) and topics (content) in online debates that can be considered as socio-semantic networks. We propose a new, automated approach that uses the whole matrix of co-addressed topics and actors for understanding and visualizing online debates. We show the advantages of the new approach with the analysis of two data sets: first, a large set of English-language Twitter messages at the Rio?+?20 meeting, in June 2012 (72,077 tweets), and second, a smaller data set of Dutch-language Twitter messages on bird flu related to poultry farming in 2015-2017 (2,139 tweets). We discuss the theoretical, methodological, and substantive implications of our approach, also for the analysis of other social media data.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24207.
28Belkin, N.J. (Hrsg.): Liu, J. ; Liu, C.: Personalization in text information retrieval : a survey.
In: Journal of the Association for Information Science and Technology. 71(2020) no.3, S.349-369.
Abstract: Personalization of information retrieval (PIR) is aimed at tailoring a search toward individual users and user groups by taking account of additional information about users besides their queries. In the past two decades or so, PIR has received extensive attention in both academia and industry. This article surveys the literature of personalization in text retrieval, following a framework for aspects or factors that can be used for personalization. The framework consists of additional information about users that can be explicitly obtained by asking users for their preferences, or implicitly inferred from users' search behaviors. Users' characteristics and contextual factors such as tasks, time, location, etc., can be helpful for personalization. This article also addresses various issues including when to personalize, the evaluation of PIR, privacy, usability, etc. Based on the extensive review, challenges are discussed and directions for future effort are suggested.
29Makri, S. ; Buckley, L.: Down the rabbit hole : investigating disruption of the information encountering process.
In: Journal of the Association for Information Science and Technology. 71(2020) no.2, S.127-142.
Abstract: Information encountering (IE) often occurs during active information seeking and involves passively finding unsought, unexpected information that is subjectively considered interesting, useful, or potentially useful. While the idealized IE process involves engaging with information after noticing it (for example, by examining it, conducting follow-up seeking to determine usefulness, then using or sharing it), the process can be disrupted-resulting in missed opportunities for knowledge and insight creation. This study provides a detailed understanding of when and why the process can be disrupted. Think-aloud observations and Critical Incident Interviews were conducted with 15 web users, focusing on examining when they encountered information but did not engage with it. Factors that discouraged engagement and simultaneously encouraged participants to return to active, goal-directed information seeking by disrupting the IE process were identified. These factors individually and collectively demonstrate that IE can instigate a highly uncertain cost-benefit trade-off, sometimes resulting in encounterers being cautious by returning to "less risky" active seeking. Design suggestions are made for reducing the uncertainty of deciding whether to engage with encountered information and making it easier to return to the active seeking task if disruption occurs.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24233.
30Kang, X. ; Wu, Y. ; Ren, W.: Toward action comprehension for searching : mining actionable intents in query entities.
In: Journal of the Association for Information Science and Technology. 71(2020) no.2, S.143-157.
Abstract: Understanding search engine users' intents has been a popular study in information retrieval, which directly affects the quality of retrieved information. One of the fundamental problems in this field is to find a connection between the entity in a query and the potential intents of the users, the latter of which would further reveal important information for facilitating the users' future actions. In this article, we present a novel research method for mining the actionable intents for search users, by generating a ranked list of the potentially most informative actions based on a massive pool of action samples. We compare different search strategies and their combinations for retrieving the action pool and develop three criteria for measuring the informativeness of the selected action samples, that is, the significance of an action sample within the pool, the representativeness of an action sample for the other candidate samples, and the diverseness of an action sample with respect to the selected actions. Our experiment, based on the Action Mining (AM) query entity data set from the Actionable Knowledge Graph (AKG) task at NTCIR-13, suggests that the proposed approach is effective in generating an informative and early-satisfying ranking of potential actions for search users.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24220.
Themenfeld: Suchmaschinen ; Suchtaktik
31Zhang, P. ; Soergel, D.: Cognitive mechanisms in sensemaking : a qualitative user study.
In: Journal of the Association for Information Science and Technology. 71(2020) no.2, S.158-171.
Abstract: Throughout an information search, a user needs to make sense of the information found to create an understanding. This requires cognitive effort that can be demanding. Building on prior sensemaking models and expanding them with ideas from learning and cognitive psychology, we examined the use of cognitive mechanisms during individual sensemaking. We conducted a qualitative user study of 15 students who searched for and made sense of information for business analysis and news writing tasks. Through the analysis of think-aloud protocols, recordings of screen movements, intermediate work products of sensemaking, including notes and concept maps, and final reports, we observed the use of 17 data-driven and structure-driven mechanisms for processing new information, examining individual concepts and relationships, and detecting anomalies. These cognitive mechanisms, as the basic operators that move sensemaking forward, provide in-depth understanding of how people process information to produce sense. Meaningful learning and sensemaking are closely related, so our findings apply to learning as well. Our results contribute to a better understanding of the sensemaking process-how people think-and this better understanding can inform the teaching of thinking skills and the design of improved sensemaking assistants and mind tools.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24221.
32Li, K. ; Greenberg, J. ; Dunic, J.: Data objects and documenting scientific processes : an analysis of data events in biodiversity data papers.
In: Journal of the Association for Information Science and Technology. 71(2020) no.2, S.172-182.
Abstract: The data paper, an emerging scholarly genre, describes research data sets and is intended to bridge the gap between the publication of research data and scientific articles. Research examining how data papers report data events, such as data transactions and manipulations, is limited. The research reported on in this article addresses this limitation and investigated how data events are inscribed in data papers. A content analysis was conducted examining the full texts of 82 data papers, drawn from the curated list of data papers connected to the Global Biodiversity Information Facility. Data events recorded for each paper were organized into a set of 17 categories. Many of these categories are described together in the same sentence, which indicates the messiness of data events in the laboratory space. The findings challenge the degrees to which data papers are a distinct genre compared to research articles and they describe data-centric research processes in a through way. This article also discusses how our results could inform a better data publication ecosystem in the future.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24226.
33Wu, Z. ; Li, R. ; Zhou, Z. ; Guo, J. ; Jiang, J. ; Su, X.: ¬A user sensitive subject protection approach for book search service.
In: Journal of the Association for Information Science and Technology. 71(2020) no.2, S.183-195.
Abstract: In a digital library, book search is one of the most important information services. However, with the rapid development of network technologies such as cloud computing, the server-side of a digital library is becoming more and more untrusted; thus, how to prevent the disclosure of users' book query privacy is causing people's increasingly extensive concern. In this article, we propose to construct a group of plausible fake queries for each user book query to cover up the sensitive subjects behind users' queries. First, we propose a basic framework for the privacy protection in book search, which requires no change to the book search algorithm running on the server-side, and no compromise to the accuracy of book search. Second, we present a privacy protection model for book search to formulate the constraints that ideal fake queries should satisfy, that is, (i) the feature similarity, which measures the confusion effect of fake queries on users' queries, and (ii) the privacy exposure, which measures the cover-up effect of fake queries on users' sensitive subjects. Third, we discuss the algorithm implementation for the privacy model. Finally, the effectiveness of our approach is demonstrated by theoretical analysis and experimental evaluation.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24227.
34Sbaffi, L. ; Zhao, C.: Modeling the online health information seeking process : information channel selection among university students.
In: Journal of the Association for Information Science and Technology. 71(2020) no.2, S.196-207.
Abstract: This study investigates the influence of individual and information characteristics on university students' information channel selection (that is, search engines, social question & answer sites, online health websites, and social networking sites) of online health information (OHI) for three different types of search tasks (factual, exploratory, and personal experience). Quantitative data were collected via an online questionnaire distributed to students on various postgraduate programs at a large UK university. In total, 291 responses were processed for descriptive statistics, Principal Component Analysis, and Poisson regression. Search engines are the most frequently used among the four channels of information discussed in this study. Credibility, ease of use, style, usefulness, and recommendation are the key factors influencing users' judgments of information characteristics (explaining over 62% of the variance). Poisson regression indicated that individuals' channel experience, age, student status, health status, and triangulation (comparing sources) as well as style, credibility, usefulness, and recommendation are substantive predictors for channel selection of OHI.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24230.
35Gruss, R. ; Abrahams, A. ; Song, Y. ; Berry, D. ; Al-Daihani, S.M.: Community building as an effective user engagement strategy : a case study in academic libraries.
In: Journal of the Association for Information Science and Technology. 71(2020) no.2, S.208-220.
Abstract: Organizations have recognized that engaging with customers on social media is now a critical element of their public relations strategy, but many struggle to find the optimal way to use these new tools. This study examined the success factors of online posts from organizations in evoking a high level of response from group members. Specifically, appeals to community belongingness were discovered to be effective at motivating user engagement on social media. The impact of community-focused language on garnering likes, comments, and shares was assessed using a methodology that combined text analytics, supervised machine learning, and multilevel regression. In 51,760 postings from 100 academic libraries, it was found that general community appeals increase likes by 60%, comments by 130%, and shares by 39%, whereas specific intracommunity, locally meaningful references increase likes by 16% and shares by 12%. These findings have both theoretical implications, as they constitute a large-scale, empirical confirmation of the belongingness hypothesis from social psychology, and practical implications, as they suggest best practices for maintaining an organizational online presence.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24218.
36Geras, A. ; Siudem, G. ; Gagolewski, M.: Should we introduce a dislike button for academic articles?.
In: Journal of the Association for Information Science and Technology. 71(2020) no.2, S.221-229.
Abstract: There is a mutual resemblance between the behavior of users of the Stack Exchange and the dynamics of the citations accumulation process in the scientific community, which enabled us to tackle the outwardly intractable problem of assessing the impact of introducing "negative" citations. Although the most frequent reason to cite an article is to highlight the connection between the 2 publications, researchers sometimes mention an earlier work to cast a negative light. While computing citation-based scores, for instance, the h-index, information about the reason why an article was mentioned is neglected. Therefore, it can be questioned whether these indices describe scientific achievements accurately. In this article we shed insight into the problem of "negative" citations, analyzing data from Stack Exchange and, to draw more universal conclusions, we derive an approximation of citations scores. Here we show that the quantified influence of introducing negative citations is of lesser importance and that they could be used as an indicator of where the attention of the scientific community is allocated.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24231.
37Kumpulainen, S. ; Keskustalo, H. ; Zhang, B. ; Stefanidis, K.: Historical reasoning in authentic research tasks : mapping cognitive and document spaces.
In: Journal of the Association for Information Science and Technology. 71(2020) no.2, S.230-241.
Abstract: To support historians in their work, we need to understand their work-related needs and propose what is required to support those needs. Although the quantity of digitized historical documents available is increasing, historians' ways of working with the digital documents have not been widely studied, particularly in authentic work settings. To better support the historians' reasoning processes, we investigate history researchers' work tasks as the context of information interaction and examine their cognitive access points into information. The analysis is based on a longitudinal observational research and interviews in a task-based research setting. Based on these findings in the historians' cognitive space, we build bridges into the document space. By studying the information interactions in real task contexts, we facilitate the provision of task-specific handles into documents that can be used in designing digital research tools for historians.
Inhalt: Vgl.: https://asistdl.onlinelibrary.wiley.com/doi/10.1002/asi.24216.
38Hicks, A.: Moving beyond the descriptive : the grounded theory of mitigating risk and the theorisation of information literacy.
In: Journal of documentation. 76(2020) no.1, S.126-144.
Abstract: Purpose Information literacy has been consistently undertheorised. The purpose of this paper is to contribute in the ongoing theorisation of information literacy by exploring the meaning and implications of the emergent grounded theory of mitigating risk for information literacy research and practice. Design/methodology/approach The grounded theory was produced through a qualitative study that was framed by practice theory and the theoretical constructs of cognitive authority and affordance, and employed constructivist grounded theory, semi-structured interviews and photo-elicitation methods to explore the information literacy practices of language-learners overseas. Findings This paper provides a theoretically rich exploration of language-learner information literacy practices while further identifying the importance of time, affect and information creation within information literacy research and practice as well as the need for the continued theorisation of information literacy concepts. Research limitations/implications The paper's constructivist grounded theorisation of information literacy remains localised and contextualised rather than generalisable. Practical implications The paper raises questions and points of reflection that may be used to inform the continued development of information literacy instruction and teaching practices. Originality/value This paper contributes to an increasingly sophisticated theoretical conceptualisation of information literacy as well as forming a basis for ongoing theoretical development in the field.
Inhalt: Vgl.: https://doi.org/10.1108/JD-07-2019-0126.
Anmerkung: Volltext unter: Hicks_Moving%20beyond%20the%20descriptive.%20The%20grounded%20theory%20of%20mitigating%20risk%20and%20the%20theorisation%20of%20information%20literacy_AAM.pdf.
39Macdonald, S. ; Birdi, B.: ¬The concept of neutrality : a new approach.
In: Journal of documentation. 76(2020) no.1, S.333-353.
Abstract: Purpose Neutrality is a much debated value in library and information science (LIS). The "neutrality debate" is characterised by opinionated discussions in contrasting contexts. The purpose of this paper is to fill a gap in the literature by bringing these conceptions together holistically, with potential to deepen understanding of LIS neutrality. Design/methodology/approach First, a literature review identified conceptions of neutrality reported in the LIS literature. Second, seven phenomenographic interviews with LIS professionals were conducted across three professional sectors. To maximise variation, each sector comprised at least one interview with a professional of five or fewer years' experience and one with ten or more years' experience. Third, conceptions from the literature and interviews were compared for similarities and disparities. Findings In four conceptions, each were found in the literature and interviews. In the literature, these were labelled: "favourable", "tacit value", "social institutions" and "value-laden profession", whilst in interviews they were labelled: "core value", "subservient", "ambivalent", and "hidden values". The study's main finding notes the "ambivalent" conception in interviews is not captured by a largely polarised literature, which oversimplifies neutrality's complexity. To accommodate this complexity, it is suggested that future research should look to reconcile perceptions from either side of the "neutral non-neutral divide" through an inclusive normative framework. Originality/value This study's value lies in its descriptive methodology, which brings LIS neutrality together in a holistic framework. This framework brings a contextual awareness to LIS neutrality lacking in previous research. This awareness has the potential to change the tone of the LIS neutrality debate.
Inhalt: Vgl.: https://doi.org/10.1108/JD-05-2019-0102.
40DeWeerdt, S.: ¬Ein Schaltplan fürs Gehirn.
In: Spektrum der Wissenschaft. 2020, H.3, S.39-42.
Abstract: Synapse für Synapse kartieren Forscher das Gehirn von verschiedenen Spezies. Erste Daten zum Mäusehirn existieren bereits. Doch bis der komplette Schaltplan des menschlichen Denkorgans vorliegt, bleibt noch viel zu tun.
Inhalt: Teil 2 einer Themenfolge 'Das menschliche Gehirn'.