Search (2 results, page 1 of 1)

  • × classification_ss:"06.00 / Information und Dokumentation: Allgemeines"
  1. Information ethics : privacy, property, and power (2005) 0.03
    0.025526067 = product of:
      0.051052134 = sum of:
        0.051052134 = sum of:
          0.029496435 = weight(_text_:v in 2392) [ClassicSimilarity], result of:
            0.029496435 = score(doc=2392,freq=2.0), product of:
              0.219214 = queryWeight, product of:
                4.871427 = idf(docFreq=920, maxDocs=44218)
                0.044999957 = queryNorm
              0.13455543 = fieldWeight in 2392, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                4.871427 = idf(docFreq=920, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
          0.0215557 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
            0.0215557 = score(doc=2392,freq=4.0), product of:
              0.15758218 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.044999957 = queryNorm
              0.13679022 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
      0.5 = coord(1/2)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
  2. ASIS&T Thesaurus of Information Science, Technology and Librarianship (2005) 0.01
    0.00884893 = product of:
      0.01769786 = sum of:
        0.01769786 = product of:
          0.03539572 = sum of:
            0.03539572 = weight(_text_:v in 41) [ClassicSimilarity], result of:
              0.03539572 = score(doc=41,freq=2.0), product of:
                0.219214 = queryWeight, product of:
                  4.871427 = idf(docFreq=920, maxDocs=44218)
                  0.044999957 = queryNorm
                0.16146651 = fieldWeight in 41, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.871427 = idf(docFreq=920, maxDocs=44218)
                  0.0234375 = fieldNorm(doc=41)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Rez. in: KO 32(2005) no.4, S.159-160 (G.J.A. Riesthuis): "This thesaurus is a revised edition of: ASIS thesaurus of information science and librarianship, edited by Jessica L. Milstead, 2nd ed. (1998). The change in the title is result of the change of the name of the ASIS (American Society of Information Science) into American Society for Information Science and Technology. Since 2002 the 2nd edition was used by Information Science Abstracts (now Information Science & Technology Abstracts). In the 2nd edition the goal of the thesaurus was formulated as "[include concepts from] information science and librarianship to a depth that will adequately support indexing in those fields with [...] related fields [...] computer science, linguistics and cognitive sciences [...]" (p. vii). The present editors started to update the thesaurus to reflect "the current state of the field and to implement it for indexing the Society's publications for the ASIS&T Digital Library" (p. v). The draft 3rd edition is used to index a great part of the Society's four publications. This means that the 3`1 edition is, more than its predecessors, based on literary warrant as far as this warrant is reflected in ASIS&T publications. The Netherlands have a descriptor, but Romania or Portugal not. The Bliss Bibliographic Classification is mentioned, but the far more often used Russian Library Bibliographical Classification (BBK) is missing. The thesaurus is presented in three parts: 1. An alphabetical listing of all terms. Here one finds the preferred and non-preferred terms with their relations denoted in the customary form (SN, BT, NT, RT, USE and UF). The ordering is word-byword. 2. An hierarchical display of the terms. This display contains the preferred terms only. 3. A permuted display of all terms. Unlike the 2nd edition, this list contains the non-preferred terms too. The thesaurus is like its predecessors a faceted one. There are seven main facets: 1. People and organizations, 2. Actions, events, and processes, 3. Physical objects, 4. Theoretical concepts and influences on information, 5. Information, information delivery formats and channels, 6. Methods of study, 7. Geographic information. The first five facets are subdivided in subfacets, the last have just one subfacet each. In total there arc 18 subfacets, referred to as "top terms" in the language of the thesaurus. This structure is not very different from the structure of the second edition, although the number of subfacets and the terminology has changed. There is one new facet "geographic information" with one subfacet: "countries and regions". In this facet one can see very clearly see that the thesaurus is based on literary warrant: only relatively few countries arc mentioned. The facet "methods of study" is expanded strongly. Under each of the top terms additional concepts are presented in a hierarchical structure. The maximum depth of the hierarchy is nine, although most subfacets have no more than four or five levels. The record for the "bibliometrics" entry shows clearly the changes. The domain and the main structure have not changed, but narrower terms not previously mentioned are added."