-
Fremery, W. de; Buckland, M.K.: Copy theory (2022)
0.00
0.0018710414 = product of:
0.014968331 = sum of:
0.014968331 = weight(_text_:of in 487) [ClassicSimilarity], result of:
0.014968331 = score(doc=487,freq=10.0), product of:
0.06457475 = queryWeight, product of:
1.5637573 = idf(docFreq=25162, maxDocs=44218)
0.041294612 = queryNorm
0.23179851 = fieldWeight in 487, product of:
3.1622777 = tf(freq=10.0), with freq of:
10.0 = termFreq=10.0
1.5637573 = idf(docFreq=25162, maxDocs=44218)
0.046875 = fieldNorm(doc=487)
0.125 = coord(1/8)
- Abstract
- In information science, writing, printing, telecommunication, and digital computing have been central concerns because of their ability to distribute information. Overlooked is the obvious fact that these technologies fashion copies, and the theorizing of copies has been neglected. We may think a copy is the same as what it copies, but no two objects can really be the same. "The same" means similar enough as an acceptable substitute for some purpose. The differences between usefully similar things are also often important, in forensic analysis, for example, or inferential processes. Status as a copy is only one form of relationship between objects, but copies are so integral to information science that they demand a theory. Indeed, theorizing copies provides a basis for a more complete and unified view of information science.
- Source
- Journal of the Association for Information Science and Technology. 73(2022) no.3, S.407-418
-
Wu, P.F.; Vitak, J.; Zimmer, M.T.: ¬A contextual approach to information privacy research (2020)
0.00
0.0016908528 = product of:
0.013526822 = sum of:
0.013526822 = weight(_text_:of in 5768) [ClassicSimilarity], result of:
0.013526822 = score(doc=5768,freq=6.0), product of:
0.06457475 = queryWeight, product of:
1.5637573 = idf(docFreq=25162, maxDocs=44218)
0.041294612 = queryNorm
0.20947541 = fieldWeight in 5768, product of:
2.4494898 = tf(freq=6.0), with freq of:
6.0 = termFreq=6.0
1.5637573 = idf(docFreq=25162, maxDocs=44218)
0.0546875 = fieldNorm(doc=5768)
0.125 = coord(1/8)
- Abstract
- In this position article, we synthesize various knowledge gaps in information privacy scholarship and propose a research agenda that promotes greater cross-disciplinary collaboration within the iSchool community and beyond. We start by critically examining Westin's conceptualization of information privacy and argue for a contextual approach that holds promise for overcoming some of Westin's weaknesses. We then highlight three contextual considerations for studying privacy-digital networks, marginalized populations, and the global context-and close by discussing how these considerations advance privacy theorization and technology design.
- Source
- Journal of the Association for Information Science and Technology. 71(2020) no.4, S.485-490
-
Schüller-Zwierlein, A.: ¬Die Fragilität des Zugangs : eine Kritik der Informationsgesellschaft (2021)
0.00
0.0011156735 = product of:
0.008925388 = sum of:
0.008925388 = weight(_text_:of in 5716) [ClassicSimilarity], result of:
0.008925388 = score(doc=5716,freq=2.0), product of:
0.06457475 = queryWeight, product of:
1.5637573 = idf(docFreq=25162, maxDocs=44218)
0.041294612 = queryNorm
0.13821793 = fieldWeight in 5716, product of:
1.4142135 = tf(freq=2.0), with freq of:
2.0 = termFreq=2.0
1.5637573 = idf(docFreq=25162, maxDocs=44218)
0.0625 = fieldNorm(doc=5716)
0.125 = coord(1/8)
- Series
- Age of Access? Grundfragen der Informationsgesellschaft; Bd. 14