Search (85 results, page 5 of 5)

  • × theme_ss:"Internet"
  • × type_ss:"m"
  1. Lipow, A.G.: ¬The virtual reference librarian's handbook (2003) 0.00
    0.0038570343 = product of:
      0.0077140685 = sum of:
        0.0077140685 = product of:
          0.015428137 = sum of:
            0.015428137 = weight(_text_:22 in 3992) [ClassicSimilarity], result of:
              0.015428137 = score(doc=3992,freq=2.0), product of:
                0.15950468 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.045548957 = queryNorm
                0.09672529 = fieldWeight in 3992, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=3992)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Date
    22. 3.2004 14:46:50
  2. Schwartz, C.: Sorting out the Web : approaches to subject access (2001) 0.00
    0.0037424145 = product of:
      0.007484829 = sum of:
        0.007484829 = product of:
          0.014969658 = sum of:
            0.014969658 = weight(_text_:c in 2050) [ClassicSimilarity], result of:
              0.014969658 = score(doc=2050,freq=2.0), product of:
                0.15711682 = queryWeight, product of:
                  3.4494052 = idf(docFreq=3817, maxDocs=44218)
                  0.045548957 = queryNorm
                0.09527725 = fieldWeight in 2050, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.4494052 = idf(docFreq=3817, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2050)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
  3. Hirko, B.; Ross, M.B.: Virtual reference training : the complete guide to providing anytime anywhere answers (2004) 0.00
    0.0037424145 = product of:
      0.007484829 = sum of:
        0.007484829 = product of:
          0.014969658 = sum of:
            0.014969658 = weight(_text_:c in 4818) [ClassicSimilarity], result of:
              0.014969658 = score(doc=4818,freq=2.0), product of:
                0.15711682 = queryWeight, product of:
                  3.4494052 = idf(docFreq=3817, maxDocs=44218)
                  0.045548957 = queryNorm
                0.09527725 = fieldWeight in 4818, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.4494052 = idf(docFreq=3817, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=4818)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    The real core of the SRVP, that is, the VRT training activities actually utilized by Washington State, are presented in Chapter Seven in roughly the same order as they took place in the course (train the trainer, orientation, chat practice, multitasking skills, virtual field trips, secret patron, transcript review, checking out the competition, policy and procedure review, sharing via a discussion list, and online meetings). Most interestingly, Chapter Eight deals with behavior, an issue rarely discussed in the context of librarianship, let alone providing reference services. As stated by the authors, "the most difficult aspect of digital reference service involves incorporating model reference interview techniques into an online transaction" (p. 74). The SVRP utilized an "online secret patron scenario" as a training tool that helped the student get the question straight, kept the customer informed, and provided the information required by the patron. The final chapter of the book reviews the important tasks of evaluation, modification, and follow-up. To that end, evaluative material is described and linked to Appendix A (assessment tools). In addition, evaluative tasks such as trainer debriefings and consultation with others participating in the SVRP are described. Finally, the chapter includes examples of unexpected consequences experienced in evaluating VRT services (from total inability to handle online transactions to poor marketing or branding of online services). Many useful appendices are included in this book. Appendix A provides examples of several assessment tools used during the "Anytime, Anywhere Answers" program. Appendix B consists of actual transcripts (edited) designed to illustrate good and bad virtual reference transactions. The transcripts illustrate transactions involving helping with homework, source citing, providing an opinion, suggesting print materials, and clarifying a question. This appendix should be required reading as it provides real-world examples of VRT in action. Appendix C is a copy of a VRT field trip questionnaire. The next appendix, like Appendix B, should be required reading as it includes an actual transcript from seven secret patron scenarios. A policies and procedures checklist is provided in Appendix E. Yet another critical source of information is presented in Appendix F, online meeting transcript. This transcript is the result of an online meeting conducted during a VRSP training class held in 2003. According to the authors, it is an example of the positive working relationship developed during a five-week learning course. The remaining appendices (G through 1) present information about support materials used in the VSRP, the VSRP budget, and trainer notes and tips. Clearly, VRT is a skill and resource that information professionals need to embrace, and this book does a fine job of outlining the essentials. It is apparent that the Washington State experience with VRT was a pioneering venture and is a model that other information professionals may seek to embrace, if not emulate, in developing their own VRT programs. However, this book is not a "complete guide" to VRT. There is too rapid development in virtual environments for any one to claim such an achievement. However, it is likely the most "complete" guide to the Washington State experience that will be published; therefore, this book should serve as a thorough and revelatory guide to VRT for several years to come."
  4. Web 2.0 in der Unternehmenspraxis : Grundlagen, Fallstudien und Trends zum Einsatz von Social-Software (2009) 0.00
    0.0037424145 = product of:
      0.007484829 = sum of:
        0.007484829 = product of:
          0.014969658 = sum of:
            0.014969658 = weight(_text_:c in 2917) [ClassicSimilarity], result of:
              0.014969658 = score(doc=2917,freq=2.0), product of:
                0.15711682 = queryWeight, product of:
                  3.4494052 = idf(docFreq=3817, maxDocs=44218)
                  0.045548957 = queryNorm
                0.09527725 = fieldWeight in 2917, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.4494052 = idf(docFreq=3817, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2917)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Rez. in: IWP 60(1009) H.4, S.245-246 (C. Wolff): "Der von Andrea Back (St. Gallen), Norbert Gronau (Potsdam) und Klaus Tochtermann herausgegebene Sammelband "Web 2.0 in der Unternehmenspraxis" verbindet in schlüssiger Weise die systematische Einführung in die Themen Web 2.0 und social software mit der Darstellung von Möglichkeiten, solche neuen Informationssysteme für Veränderungen im Unternehmen zu nutzen und zeigt dies anhand einer ganzen Reihe einzelner Fallstudien auf. Auch zukünftige Anwendungen wie das social semantic web werden als Entwicklungschance erörtert. In einer knappen Einleitung werden kurz die wesentlichen Begriffe wie Web 2.0, social software oder "Enterprise 2.0" eingeführt und der Aufbau des Bandes wird erläutert. Das sehr viel umfangreichere zweite Kapitel führt in die wesentlichen Systemtypen der social software ein: Erläutert werden Wikis, Weblogs, Social Bookmarking, Social Tagging, Podcasting, Newsfeeds, Communities und soziale Netzwerke sowie die technischen Besonderheiten von social software. Die Aufteilung ist überzeugend, für jeden Systemtyp werden nicht nur wesentliche Funktionen, sondern auch typische Anwendungen und insbesondere das Potenzial zur Nutzung im Unternehmen, insbesondere mit Blick auf Fragen des Wissensmanagements erläutert. Teilweise können die Autoren auch aktuelle Nutzungsdaten der Systeme ergänzen. Auch wenn bei der hohen Entwicklungsdynamik der social software-Systeme ständig neue Formen an Bedeutung gewinnen, vermag die Einteilung der Autoren zu überzeugen.
  5. Bruce, H.: ¬The user's view of the Internet (2002) 0.00
    0.0023142204 = product of:
      0.004628441 = sum of:
        0.004628441 = product of:
          0.009256882 = sum of:
            0.009256882 = weight(_text_:22 in 4344) [ClassicSimilarity], result of:
              0.009256882 = score(doc=4344,freq=2.0), product of:
                0.15950468 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.045548957 = queryNorm
                0.058035173 = fieldWeight in 4344, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01171875 = fieldNorm(doc=4344)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Chapter 2 (Technology and People) focuses an several theories of technological acceptance and diffusion. Unfortunately, Bruce's presentation is somewhat confusing as he moves from one theory to next, never quite connecting them into a logical sequence or coherent whole. Two theories are of particular interest to Bruce: the Theory of Diffusion of Innovations and the Theory of Planned Behavior. The Theory of Diffusion of Innovations is an "information-centric view of technology acceptance" in which technology adopters are placed in the information flows of society from which they learn about innovations and "drive innovation adoption decisions" (p. 20). The Theory of Planned Behavior maintains that the "performance of a behavior is a joint function of intentions and perceived behavioral control" (i.e., how muck control a person thinks they have) (pp. 22-23). Bruce combines these two theories to form the basis for the Technology Acceptance Model. This model posits that "an individual's acceptance of information technology is based an beliefs, attitudes, intentions, and behaviors" (p. 24). In all these theories and models echoes a recurring theme: "individual perceptions of the innovation or technology are critical" in terms of both its characteristics and its use (pp. 24-25). From these, in turn, Bruce derives a predictive theory of the role personal perceptions play in technology adoption: Personal Innovativeness of Information Technology Adoption (PIITA). Personal inventiveness is defined as "the willingness of an individual to try out any new information technology" (p. 26). In general, the PIITA theory predicts that information technology will be adopted by individuals that have a greater exposure to mass media, rely less an the evaluation of information technology by others, exhibit a greater ability to cope with uncertainty and take risks, and requires a less positive perception of an information technology prior to its adoption. Chapter 3 (A Focus an Usings) introduces the User-Centered Paradigm (UCP). The UCP is characteristic of the shift of emphasis from technology to users as the driving force behind technology and research agendas for Internet development [for a dissenting view, see Andrew Dillion's (2003) challenge to the utility of user-centerness for design guidance]. It entails the "broad acceptance of the user-oriented perspective across a range of disciplines and professional fields," such as business, education, cognitive engineering, and information science (p. 34).

Languages

  • e 47
  • d 38

Types

  • s 13
  • i 6

Subjects

Classifications