Search (3 results, page 1 of 1)

  • × theme_ss:"Literaturübersicht"
  • × type_ss:"a"
  • × year_i:[2020 TO 2030}
  1. Dewey, S.H.: Foucault's toolbox : use of Foucault's writings in LIS journal literature, 1990-2016 (2020) 0.01
    0.011353682 = product of:
      0.06812209 = sum of:
        0.06812209 = weight(_text_:wide in 5841) [ClassicSimilarity], result of:
          0.06812209 = score(doc=5841,freq=4.0), product of:
            0.19679762 = queryWeight, product of:
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.044416238 = queryNorm
            0.34615302 = fieldWeight in 5841, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5841)
      0.16666667 = coord(1/6)
    
    Abstract
    Purpose To provide a close, detailed analysis of the frequency, nature, and depth of visible use of Michel Foucault's works by library and information science/studies (LIS) scholars. Design/methodology/approach The study conducted extensive full-text searches in a large number of electronically available LIS journal databases to find citations of Foucault's works, then examined each cited article to evaluate the nature and depth of use. Findings Most uses of Foucault are brief or in passing. In-depth explorations of Foucault's works are comparatively rare and relatively little-used by other LIS scholars. Yet the relatively brief uses of Foucault encompass a wide array of different topics spread across a wide spectrum of LIS journal literature. Research limitations/implications The study was limited to articles from particular relatively prominent LIS journals. Results might vary if different journals or non-journal literature were studied. More sophisticated bibliometric techniques might reveal different relative performance among journals and might better test, confirm, or reject various patterns and relationships found here. Other research approaches, such as discourse analysis, social network analysis, or scholar interviews, might reveal patterns of use and influence not visible in this literature sample. Originality/value This intensive study of both quality and quantity of citations may challenge some existing assumptions regarding citation analysis, plus illuminating Foucault scholarship. It also indicates possible problems for future application of artificial intelligence (AI) approaches to similar depth-of-use studies.
  2. Siqueira, J.; Martins, D.L.: Workflow models for aggregating cultural heritage data on the web : a systematic literature review (2022) 0.01
    0.006159573 = product of:
      0.036957435 = sum of:
        0.036957435 = weight(_text_:web in 464) [ClassicSimilarity], result of:
          0.036957435 = score(doc=464,freq=4.0), product of:
            0.14495286 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.044416238 = queryNorm
            0.25496176 = fieldWeight in 464, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0390625 = fieldNorm(doc=464)
      0.16666667 = coord(1/6)
    
    Abstract
    In recent years, different cultural institutions have made efforts to spread culture through the construction of a unique search interface that integrates their digital objects and facilitates data retrieval for lay users. However, integrating cultural data is not a trivial task; therefore, this work performs a systematic literature review on data aggregation workflows, in order to answer five questions: What are the projects? What are the planned steps? Which technologies are used? Are the steps performed manually, automatically, or semi-automatically? Which perform semantic search? The searches were carried out in three databases: Networked Digital Library of Theses and Dissertations, Scopus and Web of Science. In Q01, 12 projects were selected. In Q02, 9 stages were identified: Harvesting, Ingestion, Mapping, Indexing, Storing, Monitoring, Enriching, Displaying, and Publishing LOD. In Q03, 19 different technologies were found it. In Q04, we identified that most of the solutions are semi-automatic and, in Q05, that most of them perform a semantic search. The analysis of the workflows allowed us to identify that there is no consensus regarding the stages, their nomenclatures, and technologies, besides presenting superficial discussions. But it allowed to identify the main steps for the implementation of the aggregation of cultural data.
  3. MacFarlane, A.; Missaoui, S.; Makri, S.; Gutierrez Lopez, M.: Sender vs. recipient-orientated information systems revisited (2022) 0.00
    0.0043693185 = product of:
      0.02621591 = sum of:
        0.02621591 = weight(_text_:computer in 607) [ClassicSimilarity], result of:
          0.02621591 = score(doc=607,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.16150802 = fieldWeight in 607, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.03125 = fieldNorm(doc=607)
      0.16666667 = coord(1/6)
    
    Abstract
    Purpose Belkin and Robertson (1976a) reflected on the ethical implications of theoretical research in information science and warned that there was potential for abuse of knowledge gained by undertaking such research and applying it to information systems. In particular, they identified the domains of advertising and political propaganda that posed particular problems. The purpose of this literature review is to revisit these ideas in the light of recent events in global information systems that demonstrate that their fears were justified. Design/methodology/approach The authors revisit the theory in information science that Belkin and Robertson used to build their argument, together with the discussion on ethics that resulted from this work in the late 1970s and early 1980s. The authors then review recent literature in the field of information systems, specifically information retrieval, social media and recommendation systems that highlight the problems identified by Belkin and Robertson. Findings Information science theories have been used in conjunction with empirical evidence gathered from user interactions that have been detrimental to both individuals and society. It is argued in the paper that the information science and systems communities should find ways to return control to the user wherever possible, and the ways to achieve this are considered. Research limitations/implications The ethical issues identified require a multidisciplinary approach with research in information science, computer science, information systems, business, sociology, psychology, journalism, government and politics, etc. required. This is too large a scope to deal with in a literature review, and we focus only on the design and implementation of information systems (Zimmer, 2008a) through an information science and information systems perspective. Practical implications The authors argue that information systems such as search technologies, social media applications and recommendation systems should be designed with the recipient of the information in mind (Paisley and Parker, 1965), not the sender of that information. Social implications Information systems designed ethically and with users in mind will go some way to addressing the ill effects typified by the problems for individuals and society evident in global information systems. Originality/value The authors synthesize the evidence from the literature to provide potential technological solutions to the ethical issues identified, with a set of recommendations to information systems designers and implementers.