Search (279 results, page 14 of 14)

  • × theme_ss:"Internet"
  • × type_ss:"m"
  1. Bradley, P.: Advanced Internet searcher's handbook (1998) 0.00
    4.357587E-4 = product of:
      0.010458209 = sum of:
        0.010458209 = product of:
          0.031374626 = sum of:
            0.031374626 = weight(_text_:p in 5454) [ClassicSimilarity], result of:
              0.031374626 = score(doc=5454,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.39725178 = fieldWeight in 5454, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.078125 = fieldNorm(doc=5454)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
  2. Bradley, P.; Smith, A.: World Wide Web : how do design and construct home pages (1995) 0.00
    4.357587E-4 = product of:
      0.010458209 = sum of:
        0.010458209 = product of:
          0.031374626 = sum of:
            0.031374626 = weight(_text_:p in 1298) [ClassicSimilarity], result of:
              0.031374626 = score(doc=1298,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.39725178 = fieldWeight in 1298, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.078125 = fieldNorm(doc=1298)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
  3. Burke, J.: IntroNet : a beginner's guide to searching the Internet (1999) 0.00
    4.357587E-4 = product of:
      0.010458209 = sum of:
        0.010458209 = product of:
          0.031374626 = sum of:
            0.031374626 = weight(_text_:p in 1439) [ClassicSimilarity], result of:
              0.031374626 = score(doc=1439,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.39725178 = fieldWeight in 1439, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.078125 = fieldNorm(doc=1439)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
    Footnote
    Rez. in: Electronic library 18(2000) no.4, S.294-295 (J. Edwards); Teacher librarian 27(1999) S.50 (P. Genco)
  4. Janes, J.: Introduction to reference work in the digital age. (2003) 0.00
    4.2456272E-4 = product of:
      0.0050947526 = sum of:
        0.0020916418 = product of:
          0.006274925 = sum of:
            0.006274925 = weight(_text_:p in 3993) [ClassicSimilarity], result of:
              0.006274925 = score(doc=3993,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.079450354 = fieldWeight in 3993, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.015625 = fieldNorm(doc=3993)
          0.33333334 = coord(1/3)
        0.0030031109 = product of:
          0.0060062218 = sum of:
            0.0060062218 = weight(_text_:29 in 3993) [ClassicSimilarity], result of:
              0.0060062218 = score(doc=3993,freq=2.0), product of:
                0.07726968 = queryWeight, product of:
                  3.5176873 = idf(docFreq=3565, maxDocs=44218)
                  0.021966046 = queryNorm
                0.07773064 = fieldWeight in 3993, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5176873 = idf(docFreq=3565, maxDocs=44218)
                  0.015625 = fieldNorm(doc=3993)
          0.5 = coord(1/2)
      0.083333336 = coord(2/24)
    
    Footnote
    Rez. in: JASIST 56(2005) no.11, S.1237-1238 (E. Yakel): "This book provides the profession with a cogent, thorough, and thoughtful introduction to digital reference. Janes not only provides the breadth of coverage expected in an introduction, but also depth into this important topic. Janes' approach is managerial or administrative, providing guidelines for reference work that can be applied in different settings. Janes creates a decision-making framework to help reference librarians make decisions concerning how, to what extent, and in what cases digital reference services will be delivered. In this way, Janes avoids dictating a "one-size-fits-all" model. This approach is the major strength of the book. Library administrators and heads of reference services will find the administrative approach welcome by helping them think through which digital reference policies and methods will best target core constituencies and their institutional environments. However, the book deserves a broader audience as professors will find that the book fits nicely in a general reference course. For all readers, the book is readable and engaging and also challenging and questioning. The book begins with a history of reference work, nicely positioning digital reference in this tradition and noting the changes wrought by the digital age. By doing this, the author establishes both continuity and change in reference work as well as the values surrounding this activity. These values are largely those from the library community and Support people's access to information as well as activities that support the use of information. Janes closes this chapter by noting that the continuing changes in demographics, technology, and connectivity will impact reference work in ways that are not yet imaginable. This introduction sets the tone for the rest of the book. Janes defines digital reference service as "the use of digital technologies and resources to provide direct, professional assistance to people who are seeking information, wherever and whenever they need it" (p. 29). This definition covers a lot of ground. Examples include everything from a public library answering email queries to commercial ask-an-expert services. While the primary audience is librarians, Janes continually reminds readers that many others perform reference activities an the World Wide Web. Furthermore, he cautions readers that there are larger forces shaping this activity in the world that need to acknowledged. In building a framework for decision-making, Janes outlines the types of digital reference service. This discussion covers the communieations modes, such as e-mail, chat, Web forms, etc. It also analyzes the modalities by which reference service is delivered: synchronous/ asynchronous. Using these two dimensions (communication method and synchronous/asynchronous), Janes presents the variety of contexts in which digital reference can take place and then outlines the strengths and weaknesses of each of these. This translates into a decision-making framework by which readers analyze their particular setting and then select the modes and modalities that world be most effective. This is a powerful device and demonstrates the many options (and perhaps also the obstacles) for providing digital reference service.
  5. Kretschmer, B.; Hackl, Y.; Knapp, M.: ¬Das große Buch Java : mit Top-Index - Nachschlagen für alle Fälle ; heisse Themen, Tips & Tricks: mehr als 100 Programmbeispiele, mit vollständiger Praxisreferenz, verständliche Einführung in die objektorientierte Programmierung (1997) 0.00
    4.0365593E-4 = product of:
      0.009687742 = sum of:
        0.009687742 = weight(_text_:der in 5641) [ClassicSimilarity], result of:
          0.009687742 = score(doc=5641,freq=2.0), product of:
            0.049067024 = queryWeight, product of:
              2.2337668 = idf(docFreq=12875, maxDocs=44218)
              0.021966046 = queryNorm
            0.19743896 = fieldWeight in 5641, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.2337668 = idf(docFreq=12875, maxDocs=44218)
              0.0625 = fieldNorm(doc=5641)
      0.041666668 = coord(1/24)
    
    Abstract
    Von der starren Webseite zum animierten Multimedia-Ereignis - Java macht's möglich. Das große Buch Java führt ausführlich uns schrittweise in die Programmierung mit Java ein
  6. Bradley, P.: Going online, CD-ROM and the Internet (1997) 0.00
    3.4860696E-4 = product of:
      0.008366567 = sum of:
        0.008366567 = product of:
          0.0250997 = sum of:
            0.0250997 = weight(_text_:p in 1726) [ClassicSimilarity], result of:
              0.0250997 = score(doc=1726,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.31780142 = fieldWeight in 1726, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.0625 = fieldNorm(doc=1726)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
  7. Levy, P.: Collective intelligence : mankind's emerging world in cyberspace (1997) 0.00
    3.4860696E-4 = product of:
      0.008366567 = sum of:
        0.008366567 = product of:
          0.0250997 = sum of:
            0.0250997 = weight(_text_:p in 3) [ClassicSimilarity], result of:
              0.0250997 = score(doc=3,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.31780142 = fieldWeight in 3, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
  8. Eddings, J.: How the Internet works (1994) 0.00
    3.1282406E-4 = product of:
      0.0075077773 = sum of:
        0.0075077773 = product of:
          0.015015555 = sum of:
            0.015015555 = weight(_text_:29 in 1514) [ClassicSimilarity], result of:
              0.015015555 = score(doc=1514,freq=2.0), product of:
                0.07726968 = queryWeight, product of:
                  3.5176873 = idf(docFreq=3565, maxDocs=44218)
                  0.021966046 = queryNorm
                0.19432661 = fieldWeight in 1514, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5176873 = idf(docFreq=3565, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1514)
          0.5 = coord(1/2)
      0.041666668 = coord(1/24)
    
    Date
    29. 2.2008 18:48:52
  9. Lazar, J.: Web usability : a user-centered design approach (2006) 0.00
    2.890496E-4 = product of:
      0.0069371904 = sum of:
        0.0069371904 = product of:
          0.02081157 = sum of:
            0.02081157 = weight(_text_:p in 340) [ClassicSimilarity], result of:
              0.02081157 = score(doc=340,freq=22.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.263507 = fieldWeight in 340, product of:
                  4.690416 = tf(freq=22.0), with freq of:
                    22.0 = termFreq=22.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.015625 = fieldNorm(doc=340)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
    Footnote
    Rez. in: JASIST 58(2007) no.7, S.1066-1067 (X. Zhu u. J. Liao): "The user, without whom any product or service would be nothing, plays a very important role during the whole life cycle of products or services. The user's involvement should be from the very beginning, not just after products or services are ready to work. According to ISO 9241-11: 1998, Part 11, Usability refers to "the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of user." As an academic topic of human-computer interaction, Web usability has been studied widely for a long time. This classroom-oriented book, bridging academia and the educational community, talks about Web usability in a student-friendly fashion. It outlines not only the methodology of user-centered Web site design but also details the methods to implement at every stage of the methodology. That is, the book presents the user-centered Web-design approach from both macrocosm and microcosm points of view, which makes it both recapitulative and practical. The most important key word in Web Usability is "user-centered," which means Web developers should not substitute their own personal preferences for the users' needs. The book classifies Web sites into five types: E-commerce, informational, entertainment, community, and intranet. Since the methods used during Web development differ somewhat depending on the type of Web site, it is necessary to have a classification in advance. With Figure 1.3 on p. 17, the book explains the whole user-centered Webdevelopment life cycle (called "methodology" in this book review), which provides a clear path for Web development that is easy to understand, remember, and perform. Since all the following chapters are based on the methodology, a clear presentation of it is paramount. The table on p. 93 summarizes concisely all types of methods for requirements gathering and their advantages and disadvantages. According to this table, appropriate methods can be easily chosen for different Web site development projects. As the author remarked, "requirements gathering is central to the concept of user-centered design," (p. 98) and "one of the hallmarks of user-centered design is usability testing" (p. 205). Stage 2 (collect user requirements) and Stage 5 (perform usability testing) of the user-centered Web-development life cycle are the two stages with the most user involvement: however, this does not mean that all other stages are user unrelated. For example, in Stage 4 (create and modify physical design), frame is not suggested to be used just because most users are unfamiliar with the concept of frame (p. 201). Note that frequently there are several rounds of usability testing to be performed in the four case studies, and some of them are performed before the physical-design stage or even the conceptual-design stage, which embodies the idea of an iterative design process.
    Besides the major well-known software applications such as FrontPage and Dreamweaver (pp. 191-194), many useful software tools can be adopted to assist and accelerate the Web-development process, resulting in improvement of the productivity of the Web industry. Web Usability mentions such tools as the "code validator" (p. 189) to identify problematic areas of the handwritten code against spelling and usage, the tool available at a given URL address to convert portable document format (PDF) files into hypertext markup language (HTML) files (p. 201), WEBXACT, WebSAT, A-Prompt, Dottie, InFocus, and RAMP (pp. 226-227) to automate usability testing, and ClickTracks, NetTracker, WebTrends, and Spotfire (p. 263) to summarize Web-usage data and analyze the trends. Thus, Web developers are able to find these tools and benefit from them. Other strengths of the book include the layout of each page, which has a wide margin in which readers may easily place notes, and the fact that the book is easy to read and understand. Although there are many strengths in this book, a few weaknesses are evident. All chapter wrap-ups should have an identical layout. Without numbering for sections and subsections, it is very likely that readers will lose sense of where they are in the overall information architecture of the book. At present, the only solution is to frequently refer to the table of contents to confirm the location. The hands-on example on p. 39 would be better placed in chap. 4 because it focuses on a requirements gathering method, the interview. There are two similar phrases, namely "user population" and "user group," that are used widely in this book. User population is composed of user groups; however, they are not strictly used in this book. The section title "Using a Search Engine" (p. 244) should be on the same level as that of the section "Linking to a URL," and not as that of the section entitled "Marketing: Bringing Users to Your Web Site," according to what the author argued at the top of p. 236.
  10. Creation, use, and deployment of digital information (2005) 0.00
    2.6145522E-4 = product of:
      0.006274925 = sum of:
        0.006274925 = product of:
          0.018824775 = sum of:
            0.018824775 = weight(_text_:p in 6120) [ClassicSimilarity], result of:
              0.018824775 = score(doc=6120,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.23835106 = fieldWeight in 6120, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.046875 = fieldNorm(doc=6120)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
    Footnote
    Rez. in: JASIST 57(2006) no.12, S.1709-1710 (Y. Awazu): "This hook presents a collection of research studies on the creation, use, and deployment of digital information. According to the editors, the goal of the book is "to present results of scientific research on (I) how digital information has to be designed, (2) how artifacts or systems containing digital content should maximize usability, and (3) how context can influence the nature and efficiency of digital communication" (p. 2). Contributors to this volume have a wide assortment of backgrounds in information science, classical studies, cognitive science, information systems, and organizational sciences. The editors did an excellent job in designing the book. Each chapter is unique in its theory and method. The editors successfully put these unique chapters into the life-cycle view of information: creation, use, and deployment. . . . I would highly recommend this book as a supplementary text for graduate classes in information science, especially those dealing with the design of information systems. It was a pleasure to read this book, and I believe that readers will certainly gain from the wealth of knowledge and insights contained in the volume."
  11. Bizer, C.; Mendes, P.N.; Jentzsch, A.: Topology of the Web of Data (2012) 0.00
    2.5025924E-4 = product of:
      0.0060062218 = sum of:
        0.0060062218 = product of:
          0.0120124435 = sum of:
            0.0120124435 = weight(_text_:29 in 425) [ClassicSimilarity], result of:
              0.0120124435 = score(doc=425,freq=2.0), product of:
                0.07726968 = queryWeight, product of:
                  3.5176873 = idf(docFreq=3565, maxDocs=44218)
                  0.021966046 = queryNorm
                0.15546128 = fieldWeight in 425, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5176873 = idf(docFreq=3565, maxDocs=44218)
                  0.03125 = fieldNorm(doc=425)
          0.5 = coord(1/2)
      0.041666668 = coord(1/24)
    
    Pages
    S.3-29
  12. Conner-Sax, K.; Krol, E.: ¬The whole Internet : the next generation (1999) 0.00
    2.48008E-4 = product of:
      0.005952192 = sum of:
        0.005952192 = product of:
          0.011904384 = sum of:
            0.011904384 = weight(_text_:22 in 1448) [ClassicSimilarity], result of:
              0.011904384 = score(doc=1448,freq=2.0), product of:
                0.07692135 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.021966046 = queryNorm
                0.15476047 = fieldWeight in 1448, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=1448)
          0.5 = coord(1/2)
      0.041666668 = coord(1/24)
    
    Footnote
    Rez. in: Internet Professionell. 2000, H.2, S.22
  13. Breton, P.: ¬The culture of the Internet and the Internet as cult : social fears and religious fantasies (2011) 0.00
    2.1787935E-4 = product of:
      0.0052291043 = sum of:
        0.0052291043 = product of:
          0.015687313 = sum of:
            0.015687313 = weight(_text_:p in 4950) [ClassicSimilarity], result of:
              0.015687313 = score(doc=4950,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.19862589 = fieldWeight in 4950, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=4950)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
  14. Shaping the network society : the new role of civil society in cyberspace (2004) 0.00
    1.8868907E-4 = product of:
      0.0045285374 = sum of:
        0.0045285374 = product of:
          0.013585611 = sum of:
            0.013585611 = weight(_text_:p in 441) [ClassicSimilarity], result of:
              0.013585611 = score(doc=441,freq=6.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.17201507 = fieldWeight in 441, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=441)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
    Editor
    Schuler, D. u. P. Day
    Footnote
    Rez. in: JASIST 57(2006) no.5, S.724-725 (P.K. Nayar): "The network society (Castells, 1996) calls for radically new definitions of the public sphere. and this is what Shaping the Network Society's essays set out to do. The first section lays out the essential issues at stake here: human rights, the sociology of cyberspace. and globalization. Oliver BoydBarrett characterizes cyberspace as exclusive. Pointing to the almost total corporate control of the technologies of cyberspace. Boyd-Barrett argues that any attempt of huge corporate bodies to get into grassroots democracy should be viewed with suspicion. The institution of a public sphere. argues Boyd-Barrett, must begin with an assessment of how far the Internet at fords a space of contestation of elitist governing frameworks. Gary Chapman looks at Italy's slow food movement as a counter to the technoglobalist trends, and suggests that the globaltechnological imperative must not be allowed to occlude human values. Rather we need a social imperative here. one which thinks about technology as "malleable, as capable of serving human-determined ends" (p. 64). Cees Hamelink discusses how four rights-right to speech. democratic order, equal participation in social life. and cultural identity are threatened by what he terms the billboardization of society in the networked age. In the second section a range of case studies are presented. Kate Williams and Abdul Alkalimat survey every public computing facility in Toledo (Ohio) to map the parameters of public access to information and decision-making. They conclude that government public computing sites arc situated randomly, community sites are in economically rich or poor (but not middle-stratum) localities, and that commercial and university sites are influenced by market forces. They suggest that future research must necessarily focus on what forms of cyberpower emerge through such use of public computing.
    Geert Lovnik and Patrice Riemens explore the digital culture of Amsterdam to show how. despite the techno-social idealism of the early years of the public sphere Digital City project. the culture ran into problems. Susan Finquelievich studies the practices of civic networks in Buenos Aires and Montevideo to demonstrate how local sociohistorical conditions have shaped the technology's development. Veran Matic focuses on the role of media in defending human rights in a hostile environment (former Yugoslavia). Media, she notes, need not necessarily he (or become) a tool of fascist forces, but can he used to generate resistance and to forge a democratic public sphere. Scott Robinson looks at Mexico's telecenter movement to argue that these cybercafes are likely to become an institution for the new Second World of immigrants and refugees. through socially relevant functions. Fiorella de Cindio looks at one of the worlds most significant community networks that of Milan. She demonstrates how local citizens have used information and communication technologies to build a viable. and potentially empowering, participatory public sphere in academia, computer-supported cooperative work, participatory design, and civil engagement (what she calls genes). The third section, -'Building a New Public Sphere in Cyberspace," pros- ides a series of suggestions and frameworks for the spacing of public space through information and communications technologies. Craig Calhoun argues that a global public sphere is indispensable to the formation of a global democracy. Public discourse can still fight commercialism and violence to form a more democratic civil society. Howard Rheingold the great enthusiast of virtual worlds-performs an intricate mix of autobiographical reflection and speculation when he writes of the role of the new technologies. Rheingold, despite his fetishistic enthusiasm for technology and online community, is cautious when it comes to crucial issues such as the creation of democratic public spheres, arguing that we require a great deal more serious thinking on matters of ownership and control (over the technology). He argues that if citizens lose our freedom to communicate, then even the powerful potential of the Net to create electronic democracy will be fatal illusion (p. 275). Nancy Kranich turns to public libraries as the site of potential democratic society, arguing that as sites of informationdissemination. public libraries can become a commons for the exchange of ideas and social interaction. David Silver compares the Blacksburg Electronic Village (BEV) to the Seattle Community Network the former funded by corporations and the state, the latter built essentially out of and through volunteer efforts. Silver, in characteristic style. looks at the historical archaeologies of the networks to show how sociohistorical contexts shape certain kinds of public spheres (and public discourse). going on to ask how, these networks can overcome these contexts to achieve their original goals. He warns that we need to uncover the histories of such networks because they inform the kinds of interactions of communities that exist within them. Douglas Morris analyzes the Independent Media Centre (IMO) Movement of antiglobalization activists to argue that alternative viewpoints and ideological differences can he aired, debated, and appropriated through the new technologies in order to fight corporate and commercial forces.
  15. Waesche, N.M.: Internet entrepreneurship in Europe : venture failure and the timing of telecommunications reform (2003) 0.00
    1.7430348E-4 = product of:
      0.0041832835 = sum of:
        0.0041832835 = product of:
          0.01254985 = sum of:
            0.01254985 = weight(_text_:p in 3566) [ClassicSimilarity], result of:
              0.01254985 = score(doc=3566,freq=8.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.15890071 = fieldWeight in 3566, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.015625 = fieldNorm(doc=3566)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
    Footnote
    Rez. in: JASIST 55(2004) no.2, S.181-182 (J. Scholl): "The book is based an a doctoral thesis titled "Global opportunity and national political economy: The development of internet ventures in Germany," which was supervised by Razeen Sally and accepted at the International Relations Department of the London School of Economics & Political Science, UK, in 2002. Its primary audience, although it is certainly of interest to policy makers, trade press journalists, and industry practitioners, is the academic community, and, in particular, (international) policy, business, business history, information technology, and information science scholars. The book's self-stated purpose is to explain "why Europe, despite initiating a tremendous amount of change ... failed to produce independent internet ventures of note" (p. 1) in contrast to the United States, where Internet start-ups such as Amazon.com, eBay, E*trade, and Yahoo managed to survive the notorious dot.com shakeout of 200I-2002. A few pages down, the objective is restated as "to explore the hypothesis of a global opportunity for technology innovation delivered via the internet and to explain Europe's entrepreneurial response" (p. 4). As a proxy case for Europe, the study provides a broad account of the changing legal and socioeconomic setting during the phase of early Internet adoption and development in Germany throughout the 1990s. The author highlights and details various facets of the entrepreneurial opportunity and compares the German case in some detail to corresponding developments in Sweden. Waesche concludes that starting an Internet business in Germany during that particular period of time was a "wrong country, wrong time" (p. I86) proposition.
    Waesche sparsely Sketches out a theoretical framework for his study combining "network thinking," which he Claims to stand in the Schumpeterian research tradition, with classical institutional theory a la Max Weber. It is not clear, though, how this theory has guided his empirical research. No detailed hypotheses are presented, which would further clarify what was studied. Beyond the rudimentary framework, the author presents a concept of "refraction" denoting the "distorting effect national institutions have an a global innovation opportunity" (p. 17). Again, no hypotheses or measures for this concept are developed. No indication is given about which specific academic contribution was intended to be made and which particular gap of knowledge was attempted to be filled. Waesche's book would have greatly benefited from a more sharply posed and more detailed set of research questions. Instead we leam many details about the German situation in general and about the perceptions of individual players, particularly managerial personnel, in entrepreneurial Internet businesses in a specific Situation within a relatively short period of time. While many of those details are interesting in their own right, the reader is left wondering what the study's novelty is, what it specifically uncovered, what the frame of reference was, and what was finally learned. Contrary to its Claim and unlike a Chandlerian treatment of business history, the study does not explain, it rather just deseribes a particular historical situation. Consequently, the author refrains from presenting any new theory or prescriptive framework in his concluding remarks, but rather briefly revisits and summarizes the presening chapters. The study's empirical basis consists of two surveys with Sample sizes of 123 and 30 as well as a total of 68 interviews. The surveys and interviews were mostly completed between July of 1997 and November of 1999. Although descriptive statistics and detailed demographic information is provided in the appendix, the questionnaires and interview protocols are not included, making it difficult to follow the research undertaking. In summary, while undeniably a number of interesting and illustrative details regarding early Internet entrepreneurship in Germany are accounted for in Waesche's book, it would have provided a much stronger academic contribution had it developed a sound theory upfront and then empirically tested that theory. Alternatively the author could have singled out certain gaps in existing theory, and then attempted to fill those gaps by providing empirical evidence. In either case, he would have almost inevitably arrived at new insights directing to further study."
  16. Net effects : how librarians can manage the unintended consequenees of the Internet (2003) 0.00
    1.5095125E-4 = product of:
      0.00362283 = sum of:
        0.00362283 = product of:
          0.01086849 = sum of:
            0.01086849 = weight(_text_:p in 1796) [ClassicSimilarity], result of:
              0.01086849 = score(doc=1796,freq=6.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.13761206 = fieldWeight in 1796, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.015625 = fieldNorm(doc=1796)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
    Footnote
    Rez. in: JASIST 55(2004) no.11, S.1025-1026 (D.E. Agosto): ""Did you ever feel as though the Internet has caused you to lose control of your library?" So begins the introduction to this volume of over 50 articles, essays, library policies, and other documents from a variety of sources, most of which are library journals aimed at practitioners. Volume editor Block has a long history of library service as well as an active career as an online journalist. From 1977 to 1999 she was the Associate Director of Public Services at the St. Ambrose University library in Davenport, Iowa. She was also a Fox News Online weekly columnist from 1998 to 2000. She currently writes for and publishes the weekly ezine Exlibris, which focuses an the use of computers, the Internet, and digital databases to improve library services. Despite the promising premise of this book, the final product is largely a disappointment because of the superficial coverage of its issues. A listing of the most frequently represented sources serves to express the general level and style of the entries: nine articles are reprinted from Computers in Libraries, five from Library Journal, four from Library Journal NetConnect, four from ExLibris, four from American Libraries, three from College & Research Libraries News, two from Online, and two from The Chronicle of Higher Education. Most of the authors included contributed only one item, although Roy Tennant (manager of the California Digital Library) authored three of the pieces, and Janet L. Balas (library information systems specialist at the Monroeville Public Library in Pennsylvania) and Karen G. Schneider (coordinator of lii.org, the Librarians' Index to the Internet) each wrote two. Volume editor Block herself wrote six of the entries, most of which have been reprinted from ExLibris. Reading the volume is muck like reading an issue of one of these journals-a pleasant experience that discusses issues in the field without presenting much research. Net Effects doesn't offer much in the way of theory or research, but then again it doesn't claim to. Instead, it claims to be an "idea book" (p. 5) with practical solutions to Internet-generated library problems. While the idea is a good one, little of the material is revolutionary or surprising (or even very creative), and most of the solutions offered will already be familiar to most of the book's intended audience.
    Unlike muck of the professional library literature, Net Effects is not an open-aimed embrace of technology. Block even suggests that it is helpful to have a Luddite or two an each library staff to identify the setbacks associated with technological advances in the library. Each of the book's 10 chapters deals with one Internet-related problem, such as "Chapter 4-The Shifted Librarian: Adapting to the Changing Expectations of Our Wired (and Wireless) Users," or "Chapter 8-Up to Our Ears in Lawyers: Legal Issues Posed by the Net." For each of these 10 problems, multiple solutions are offered. For example, for "Chapter 9-Disappearing Data," four solutions are offered. These include "Link-checking," "Have a technological disaster plan," "Advise legislators an the impact proposed laws will have," and "Standards for preservation of digital information." One article is given to explicate each of these four solutions. A short bibliography of recommended further reading is also included for each chapter. Block provides a short introduction to each chapter, and she comments an many of the entries. Some of these comments seem to be intended to provide a research basis for the proposed solutions, but they tend to be vague generalizations without citations, such as, "We know from research that students would rather ask each other for help than go to adults. We can use that (p. 91 )." The original publication dates of the entries range from 1997 to 2002, with the bulk falling into the 2000-2002 range. At up to 6 years old, some of the articles seem outdated, such as a 2000 news brief announcing the creation of the first "customizable" public library Web site (www.brarydog.net). These critiques are not intended to dismiss the volume entirely. Some of the entries are likely to find receptive audiences, such as a nuts-and-bolts instructive article for making Web sites accessible to people with disabilities. "Providing Equitable Access," by Cheryl H. Kirkpatrick and Catherine Buck Morgan, offers very specific instructions, such as how to renovate OPAL workstations to suit users with "a wide range of functional impairments." It also includes a useful list of 15 things to do to make a Web site readable to most people with disabilities, such as, "You can use empty (alt) tags (alt="') for images that serve a purely decorative function. Screen readers will skip empty (alt) tags" (p. 157). Information at this level of specificity can be helpful to those who are faced with creating a technological solution for which they lack sufficient technical knowledge or training.
  17. Ronan, J.S.: Chat reference : A guide to live virtual reference services (2003) 0.00
    1.3072761E-4 = product of:
      0.0031374625 = sum of:
        0.0031374625 = product of:
          0.009412387 = sum of:
            0.009412387 = weight(_text_:p in 2230) [ClassicSimilarity], result of:
              0.009412387 = score(doc=2230,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.11917553 = fieldWeight in 2230, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.0234375 = fieldNorm(doc=2230)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
    Footnote
    Training techniques are the focus in Chapter 6, including ways to relax trainees and reduce cognitive load as well as to maximize training utility when the software limits the number of logins available. Ronan covers everyday administration and policy issues in Chapters 7 and 8. These include a list of daily routines such as checking that the software is functioning, plus monthly routines of updating statistics, policies, and procedures. Chapter 9 offers guidance an the chat reference interview, which Ronan likens to "information therapy" within an online environment of diminished contextual cues. Marketing and publicity are discussed in Chapter 10, with advice an advertising and publicity campaigns as well as a checklist of 20 promotional strategies for attracting users to a new chat service (p. 165). In the final section of the book, Chapters 11-15 provide individual case studies written by six contributors describing how live different academic libraries have been able to launch and operate chat reference services using a variety of different types of software including instant messaging, MOO, Internet Relay Chat, and call center software. Each case study begins with a statement of the software used, launch date, staffing, and hours of the service, and most include statistical information an chat reference traffic. These final live chapters provide "voices from the front lines" giving details of individual librarians' experiences in launching chat services.
  18. Shaviro, S.: Connected, or what it means to live in the network society (2003) 0.00
    1.3072761E-4 = product of:
      0.0031374625 = sum of:
        0.0031374625 = product of:
          0.009412387 = sum of:
            0.009412387 = weight(_text_:p in 3885) [ClassicSimilarity], result of:
              0.009412387 = score(doc=3885,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.11917553 = fieldWeight in 3885, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.0234375 = fieldNorm(doc=3885)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
    Footnote
    Connected not only poses the "problem of connection," but also seeks, through Shaviro's scattered mode of critical analysis, to pose new ways of intervening in and viewing connections of all sorts. It does not work. Most of the time, Shaviro's efforts to il illuminate the "connections" never rise above a random, technophilic pastiche, lacking any powerful synthesis but often overflowing with the academic version of New Age babble. (It is ironic that Shaviro is concerned with the "problem of connection," because Connected is largely inaccessible to readers who have not read the novels of Samuel Delany, Philip K. Dick, William Gibson, and several other science fiction novelists, or seen the films in The Matrix series.) For example, Shaviro thinks that everything "flows." He writes: In postmodern society, everything flows. There are flows of commodities, flows of expressions, flows of embodiment, and flows of affect. The organizing material of each flow is a universal equivalent: money, information, DNA, or LSD. But how are these flows related among themselves? Strictly speaking, they should interchangeable. All the equivalents should themselves be mutually equivalent. (p. 193) This is, of course, patent nonsense. More to the point, it is one of many passages in Conneeted that has the ring of authority, but little else. In the midst of rising concerns over computer security, personal privacy, and freedom of expression, how much significance should we assign to Shaviro's assertion that the user's relationship to the network is like the junkie's need for heroin, as described by William Burroughs in The Naked Lunch? Or the claim that Microsoft's design for the "Horne of the Future" is part of a middle-class plot to repress itself sexually? Or the recommendation that a novel of the future in which copyright violators are put to death is a harbinger of things to come? In the end, a generous reading might conclude that Connected is an experimental meditation an the relevance of science fiction, whereas a less generous view would be that the author's misguided preoccupation with literary effect resulted in a book that never makes an effective case for the writers we are supposed to take so seriously."
  19. Deegan, M.; Tanner, S.: Digital futures : strategies for the information age (2002) 0.00
    1.08939676E-4 = product of:
      0.0026145522 = sum of:
        0.0026145522 = product of:
          0.007843656 = sum of:
            0.007843656 = weight(_text_:p in 13) [ClassicSimilarity], result of:
              0.007843656 = score(doc=13,freq=2.0), product of:
                0.078979194 = queryWeight, product of:
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.021966046 = queryNorm
                0.099312946 = fieldWeight in 13, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5955126 = idf(docFreq=3298, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=13)
          0.33333334 = coord(1/3)
      0.041666668 = coord(1/24)
    
    Footnote
    The most common definition for metadata is "data about data." What metadata does is provide schemes for describing, organizing, exchanging, and receiving information over networks. The authors explain how metadata is used to describe resources by tagging item attributes like author, title, creation date, key words, file formats, compression, etc. The most well known scheme is MARC, but other schemes are developing for creating and managing digital collections, such as XML, TEI, EAD, and Dublin Core. The authors also do a good job of describing the difference between metadata and mark-up languages like HTML. The next two chapters discuss developing, designing, and providing access to a digital collection. In Chapter Six, "Developing and Designing Systems for Sharing Digital Resources," the authors examine a number of issues related to designing a shared collection. For instance, one issue the authors examine is interoperability. The authors stress that when designing a digital collection the creators should take care to ensure that their collection is "managed in such a way as to maximize opportunities for exchange and reuse of information, whether internally or externally" (p. 140). As a complement to Chapter Six, Chapter Seven, "Portals and Personalization: Mechanisms for End-user Access," focuses an the other end of the process; how the collection is used once it is made available. The majority of this chapter concentrates an the use of portals or gateways to digital collections. One example the authors use is MyLibrary@NCState, which provides the university community with a flexible user-drive customizable portal that allows user to access remote and local resources. The work logically concludes with a chapter an preservation and a chapter an the evolving role of librarians. Chapter Eight, "Preservation," is a thought-provoking discussion an preserving digital data and digitization as a preservation technique. The authors do a good job of relaying the complexity of preservation issues in a digital world in a single chapter. While the authors do not answer their questions, they definitely provide the reader wich some things to ponder. The final chapter, "Digital Librarians: New Roles for the Information Age," outlines where the authors believe librarianship is headed. Throughout the work they stress the role of the librarian in the digital world, but Chapter Nine really brings the point home. As the authors stress, librarians have always managed information and as experienced leaders in the information field, librarians are uniquely suited to take the digital bull by the horns. Also, the role of the librarian and what librarians can do is growing and evolving. The authors suggest that librarians are likely to move into rotes such as knowledge mediator, information architect, hybrid librarian-who brings resources and technologies together, and knowledge preserver. While these librarians must have the technical skills to cope with new technologies, the authors also state that management skills and subject skills will prove equally important.

Years

Languages

  • d 184
  • e 93
  • m 2
  • More… Less…

Types

  • s 35
  • i 5
  • el 2
  • h 1
  • x 1
  • More… Less…

Subjects

Classifications