Search (45 results, page 3 of 3)

  • × theme_ss:"Internet"
  • × type_ss:"s"
  • × year_i:[2000 TO 2010}
  1. Shaping the network society : the new role of civil society in cyberspace (2004) 0.00
    2.0139998E-4 = product of:
      0.0030209995 = sum of:
        0.0030209995 = product of:
          0.006041999 = sum of:
            0.006041999 = weight(_text_:information in 441) [ClassicSimilarity], result of:
              0.006041999 = score(doc=441,freq=12.0), product of:
                0.050870337 = queryWeight, product of:
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.028978055 = queryNorm
                0.11877254 = fieldWeight in 441, product of:
                  3.4641016 = tf(freq=12.0), with freq of:
                    12.0 = termFreq=12.0
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=441)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Footnote
    Rez. in: JASIST 57(2006) no.5, S.724-725 (P.K. Nayar): "The network society (Castells, 1996) calls for radically new definitions of the public sphere. and this is what Shaping the Network Society's essays set out to do. The first section lays out the essential issues at stake here: human rights, the sociology of cyberspace. and globalization. Oliver BoydBarrett characterizes cyberspace as exclusive. Pointing to the almost total corporate control of the technologies of cyberspace. Boyd-Barrett argues that any attempt of huge corporate bodies to get into grassroots democracy should be viewed with suspicion. The institution of a public sphere. argues Boyd-Barrett, must begin with an assessment of how far the Internet at fords a space of contestation of elitist governing frameworks. Gary Chapman looks at Italy's slow food movement as a counter to the technoglobalist trends, and suggests that the globaltechnological imperative must not be allowed to occlude human values. Rather we need a social imperative here. one which thinks about technology as "malleable, as capable of serving human-determined ends" (p. 64). Cees Hamelink discusses how four rights-right to speech. democratic order, equal participation in social life. and cultural identity are threatened by what he terms the billboardization of society in the networked age. In the second section a range of case studies are presented. Kate Williams and Abdul Alkalimat survey every public computing facility in Toledo (Ohio) to map the parameters of public access to information and decision-making. They conclude that government public computing sites arc situated randomly, community sites are in economically rich or poor (but not middle-stratum) localities, and that commercial and university sites are influenced by market forces. They suggest that future research must necessarily focus on what forms of cyberpower emerge through such use of public computing.
    Geert Lovnik and Patrice Riemens explore the digital culture of Amsterdam to show how. despite the techno-social idealism of the early years of the public sphere Digital City project. the culture ran into problems. Susan Finquelievich studies the practices of civic networks in Buenos Aires and Montevideo to demonstrate how local sociohistorical conditions have shaped the technology's development. Veran Matic focuses on the role of media in defending human rights in a hostile environment (former Yugoslavia). Media, she notes, need not necessarily he (or become) a tool of fascist forces, but can he used to generate resistance and to forge a democratic public sphere. Scott Robinson looks at Mexico's telecenter movement to argue that these cybercafes are likely to become an institution for the new Second World of immigrants and refugees. through socially relevant functions. Fiorella de Cindio looks at one of the worlds most significant community networks that of Milan. She demonstrates how local citizens have used information and communication technologies to build a viable. and potentially empowering, participatory public sphere in academia, computer-supported cooperative work, participatory design, and civil engagement (what she calls genes). The third section, -'Building a New Public Sphere in Cyberspace," pros- ides a series of suggestions and frameworks for the spacing of public space through information and communications technologies. Craig Calhoun argues that a global public sphere is indispensable to the formation of a global democracy. Public discourse can still fight commercialism and violence to form a more democratic civil society. Howard Rheingold the great enthusiast of virtual worlds-performs an intricate mix of autobiographical reflection and speculation when he writes of the role of the new technologies. Rheingold, despite his fetishistic enthusiasm for technology and online community, is cautious when it comes to crucial issues such as the creation of democratic public spheres, arguing that we require a great deal more serious thinking on matters of ownership and control (over the technology). He argues that if citizens lose our freedom to communicate, then even the powerful potential of the Net to create electronic democracy will be fatal illusion (p. 275). Nancy Kranich turns to public libraries as the site of potential democratic society, arguing that as sites of informationdissemination. public libraries can become a commons for the exchange of ideas and social interaction. David Silver compares the Blacksburg Electronic Village (BEV) to the Seattle Community Network the former funded by corporations and the state, the latter built essentially out of and through volunteer efforts. Silver, in characteristic style. looks at the historical archaeologies of the networks to show how sociohistorical contexts shape certain kinds of public spheres (and public discourse). going on to ask how, these networks can overcome these contexts to achieve their original goals. He warns that we need to uncover the histories of such networks because they inform the kinds of interactions of communities that exist within them. Douglas Morris analyzes the Independent Media Centre (IMO) Movement of antiglobalization activists to argue that alternative viewpoints and ideological differences can he aired, debated, and appropriated through the new technologies in order to fight corporate and commercial forces.
    Peter Day and Douglas Schuler wind up the book by taking a close look at the sociotechnical context in the 1990s. They argue that utopian schemes for the development of civil society and/or the public sphere may entail a degree of risk. However. Day and Schuler argue that community networks should be ''networks of awareness. advocacy and action" with a high degree of grassroots involvement. This can be done through more responsive policies. Local citizens-the first beneficiaries or victims of policy-should he brought into the decision-making process via civic dialogue. Public funding must be provided for projects that enable dissemination of information about a variety of cultures and belief systems. Shaping the Network Society is understandably more cautious than earlier accounts of cyberculture in its reception of new information and communications technology. Haunted by post 9/11 security measures. increasing surveillance, the faster erosion of liberal humanist ideals, and the internationalization/ commercialization of the media, the essays prefer to be wary about the potential of cyberpower. However, the optimist tone of every essay is unmistakable. While admitting that much more needs to be done to overcome the digital divide and the (mis)appropriation of cyberpower. the essays and ease studies draw attention to the potential for public debate and alternative ideologies. The case studies demonstrate success stories, but invariably conclude with a moral: about the need for vigilance against appropriation and fascist control! What emerges clearly is that the new media have achieved considerable progress in opening up the space for greater citizen involvement, more locally-responsive policy decisions. and socially relevant information-dissemination. Shaping the Network Society, with a strangely messianic slant, is a useful step in the mapping of the present and future cyberspace as the space of new democracies to come of a justice to he worked and prepared for."
  2. Digital library use : social practice in design and evaluation (2003) 0.00
    1.9733087E-4 = product of:
      0.002959963 = sum of:
        0.002959963 = product of:
          0.005919926 = sum of:
            0.005919926 = weight(_text_:information in 6121) [ClassicSimilarity], result of:
              0.005919926 = score(doc=6121,freq=2.0), product of:
                0.050870337 = queryWeight, product of:
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.028978055 = queryNorm
                0.116372846 = fieldWeight in 6121, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.046875 = fieldNorm(doc=6121)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Footnote
    Rez. in: JASIST 57(2006) no.8, S.1130-1132 (S.R. Tompson): "The editors of This text in MIT Press' Digital Libraries and Electronic Publishing series deliberately view digital libraries (DLs) as "sociotechnical systems" - "networks of technology. information. documents, people and practices''. They allow an additional definition of "sociotechnical" as "an analytical stance that privileges neither the social nor the technological and in which neither is reducible to the other". This is an important definition, as it is the foundation of the contributors' sociological approach to digital libraries, an approach not typical of the DL literature which still focuses "largely on the technology itself". Bishop et al. have two stated goals for this volume: 1. "... to inform police and professional practice in DLs with socially grounded understanding of DLs as part of a web of social relations and practices. 2. "... to perform technically informed social analysis of phenomena of interest to social scientists that are highlighted by digital libraries. specifically issues of work, groups, and knowledge"."
  3. Beyond book indexing : how to get started in Web indexing, embedded indexing and other computer-based media (2000) 0.00
    1.6444239E-4 = product of:
      0.0024666358 = sum of:
        0.0024666358 = product of:
          0.0049332716 = sum of:
            0.0049332716 = weight(_text_:information in 215) [ClassicSimilarity], result of:
              0.0049332716 = score(doc=215,freq=2.0), product of:
                0.050870337 = queryWeight, product of:
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.028978055 = queryNorm
                0.09697737 = fieldWeight in 215, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=215)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Imprint
    Phoenix, AZ : American Society of Indexers / Information Today
  4. Net effects : how librarians can manage the unintended consequenees of the Internet (2003) 0.00
    1.6111998E-4 = product of:
      0.0024167995 = sum of:
        0.0024167995 = product of:
          0.004833599 = sum of:
            0.004833599 = weight(_text_:information in 1796) [ClassicSimilarity], result of:
              0.004833599 = score(doc=1796,freq=12.0), product of:
                0.050870337 = queryWeight, product of:
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.028978055 = queryNorm
                0.09501803 = fieldWeight in 1796, product of:
                  3.4641016 = tf(freq=12.0), with freq of:
                    12.0 = termFreq=12.0
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.015625 = fieldNorm(doc=1796)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Abstract
    In this collection of nearly 50 articles written by librarians, computer specialists, and other information professionals, the reader finds 10 chapters, each devoted to a problem or a side effect that has emerged since the introduction of the Internet: control over selection, survival of the book, training users, adapting to users' expectations, access issues, cost of technology, continuous retraining, legal issues, disappearing data, and how to avoid becoming blind sided. After stating a problem, each chapter offers solutions that are subsequently supported by articles. The editor's comments, which appear throughout the text, are an added bonus, as are the sections concluding the book, among them a listing of useful URLs, a works-cited section, and a comprehensive index. This book has much to recommend it, especially the articles, which are not only informative, thought-provoking, and interesting but highly readable and accessible as well. An indispensable tool for all librarians.
    Footnote
    Rez. in: JASIST 55(2004) no.11, S.1025-1026 (D.E. Agosto): ""Did you ever feel as though the Internet has caused you to lose control of your library?" So begins the introduction to this volume of over 50 articles, essays, library policies, and other documents from a variety of sources, most of which are library journals aimed at practitioners. Volume editor Block has a long history of library service as well as an active career as an online journalist. From 1977 to 1999 she was the Associate Director of Public Services at the St. Ambrose University library in Davenport, Iowa. She was also a Fox News Online weekly columnist from 1998 to 2000. She currently writes for and publishes the weekly ezine Exlibris, which focuses an the use of computers, the Internet, and digital databases to improve library services. Despite the promising premise of this book, the final product is largely a disappointment because of the superficial coverage of its issues. A listing of the most frequently represented sources serves to express the general level and style of the entries: nine articles are reprinted from Computers in Libraries, five from Library Journal, four from Library Journal NetConnect, four from ExLibris, four from American Libraries, three from College & Research Libraries News, two from Online, and two from The Chronicle of Higher Education. Most of the authors included contributed only one item, although Roy Tennant (manager of the California Digital Library) authored three of the pieces, and Janet L. Balas (library information systems specialist at the Monroeville Public Library in Pennsylvania) and Karen G. Schneider (coordinator of lii.org, the Librarians' Index to the Internet) each wrote two. Volume editor Block herself wrote six of the entries, most of which have been reprinted from ExLibris. Reading the volume is muck like reading an issue of one of these journals-a pleasant experience that discusses issues in the field without presenting much research. Net Effects doesn't offer much in the way of theory or research, but then again it doesn't claim to. Instead, it claims to be an "idea book" (p. 5) with practical solutions to Internet-generated library problems. While the idea is a good one, little of the material is revolutionary or surprising (or even very creative), and most of the solutions offered will already be familiar to most of the book's intended audience.
    Unlike muck of the professional library literature, Net Effects is not an open-aimed embrace of technology. Block even suggests that it is helpful to have a Luddite or two an each library staff to identify the setbacks associated with technological advances in the library. Each of the book's 10 chapters deals with one Internet-related problem, such as "Chapter 4-The Shifted Librarian: Adapting to the Changing Expectations of Our Wired (and Wireless) Users," or "Chapter 8-Up to Our Ears in Lawyers: Legal Issues Posed by the Net." For each of these 10 problems, multiple solutions are offered. For example, for "Chapter 9-Disappearing Data," four solutions are offered. These include "Link-checking," "Have a technological disaster plan," "Advise legislators an the impact proposed laws will have," and "Standards for preservation of digital information." One article is given to explicate each of these four solutions. A short bibliography of recommended further reading is also included for each chapter. Block provides a short introduction to each chapter, and she comments an many of the entries. Some of these comments seem to be intended to provide a research basis for the proposed solutions, but they tend to be vague generalizations without citations, such as, "We know from research that students would rather ask each other for help than go to adults. We can use that (p. 91 )." The original publication dates of the entries range from 1997 to 2002, with the bulk falling into the 2000-2002 range. At up to 6 years old, some of the articles seem outdated, such as a 2000 news brief announcing the creation of the first "customizable" public library Web site (www.brarydog.net). These critiques are not intended to dismiss the volume entirely. Some of the entries are likely to find receptive audiences, such as a nuts-and-bolts instructive article for making Web sites accessible to people with disabilities. "Providing Equitable Access," by Cheryl H. Kirkpatrick and Catherine Buck Morgan, offers very specific instructions, such as how to renovate OPAL workstations to suit users with "a wide range of functional impairments." It also includes a useful list of 15 things to do to make a Web site readable to most people with disabilities, such as, "You can use empty (alt) tags (alt="') for images that serve a purely decorative function. Screen readers will skip empty (alt) tags" (p. 157). Information at this level of specificity can be helpful to those who are faced with creating a technological solution for which they lack sufficient technical knowledge or training.
    Some of the pieces are more captivating than others and less "how-to" in nature, providing contextual discussions as well as pragmatic advice. For example, Darlene Fichter's "Blogging Your Life Away" is an interesting discussion about creating and maintaining blogs. (For those unfamiliar with the term, blogs are frequently updated Web pages that ]ist thematically tied annotated links or lists, such as a blog of "Great Websites of the Week" or of "Fun Things to Do This Month in Patterson, New Jersey.") Fichter's article includes descriptions of sample blogs and a comparison of commercially available blog creation software. Another article of note is Kelly Broughton's detailed account of her library's experiences in initiating Web-based reference in an academic library. "Our Experiment in Online Real-Time Reference" details the decisions and issues that the Jerome Library staff at Bowling Green State University faced in setting up a chat reference service. It might be useful to those finding themselves in the same situation. This volume is at its best when it eschews pragmatic information and delves into the deeper, less ephemeral libraryrelated issues created by the rise of the Internet and of the Web. One of the most thought-provoking topics covered is the issue of "the serials pricing crisis," or the increase in subscription prices to journals that publish scholarly work. The pros and cons of moving toward a more free-access Web-based system for the dissemination of peer-reviewed material and of using university Web sites to house scholars' other works are discussed. However, deeper discussions such as these are few, leaving the volume subject to rapid aging, and leaving it with an audience limited to librarians looking for fast technological fixes."
    Imprint
    Medford, NJ : Information Today
  5. OWLED 2009; OWL: Experiences and Directions, Sixth International Workshop, Chantilly, Virginia, USA, 23-24 October 2009, Co-located with ISWC 2009. (2009) 0.00
    9.8665434E-5 = product of:
      0.0014799815 = sum of:
        0.0014799815 = product of:
          0.002959963 = sum of:
            0.002959963 = weight(_text_:information in 3391) [ClassicSimilarity], result of:
              0.002959963 = score(doc=3391,freq=2.0), product of:
                0.050870337 = queryWeight, product of:
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.028978055 = queryNorm
                0.058186423 = fieldWeight in 3391, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.0234375 = fieldNorm(doc=3391)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Content
    Short Papers * A Database Backend for OWL, Jörg Henss, Joachim Kleb and Stephan Grimm. * Unifying SysML and OWL, Henson Graves. * The OWLlink Protocol, Thorsten Liebig, Marko Luther and Olaf Noppens. * A Reasoning Broker Framework for OWL, Juergen Bock, Tuvshintur Tserendorj, Yongchun Xu, Jens Wissmann and Stephan Grimm. * Change Representation For OWL 2 Ontologies, Raul Palma, Peter Haase, Oscar Corcho and Asunción Gómez-Pérez. * Practical Aspects of Query Rewriting for OWL 2, Héctor Pérez-Urbina, Ian Horrocks and Boris Motik. * CSage: Use of a Configurable Semantically Attributed Graph Editor as Framework for Editing and Visualization, Lawrence Levin. * A Conformance Test Suite for the OWL 2 RL/RDF Rules Language and the OWL 2 RDF-Based Semantics, Michael Schneider and Kai Mainzer. * Improving the Data Quality of Relational Databases using OBDA and OWL 2 QL, Olivier Cure. * Temporal Classes and OWL, Natalya Keberle. * Using Ontologies for Medical Image Retrieval - An Experiment, Jasmin Opitz, Bijan Parsia and Ulrike Sattler. * Task Representation and Retrieval in an Ontology-Guided Modelling System, Yuan Ren, Jens Lemcke, Andreas Friesen, Tirdad Rahmani, Srdjan Zivkovic, Boris Gregorcic, Andreas Bartho, Yuting Zhao and Jeff Z. Pan. * A platform for reasoning with OWL-EL knowledge bases in a Peer-to-Peer environment, Alexander De Leon and Michel Dumontier. * Axiomé: a Tool for the Elicitation and Management of SWRL Rules, Saeed Hassanpour, Martin O'Connor and Amar Das. * SQWRL: A Query Language for OWL, Martin O'Connor and Amar Das. * Classifying ELH Ontologies In SQL Databases, Vincent Delaitre and Yevgeny Kazakov. * A Semantic Web Approach to Represent and Retrieve Information in a Corporate Memory, Ana B. Rios-Alvarado, R. Carolina Medina-Ramirez and Ricardo Marcelin-Jimenez. * Towards a Graphical Notation for OWL 2, Elisa Kendall, Roy Bell, Roger Burkhart, Mark Dutra and Evan Wallace.

Languages

  • e 32
  • d 11
  • m 1
  • More… Less…

Types

  • m 39
  • el 2
  • More… Less…

Subjects

Classifications