Search (5 results, page 1 of 1)

  • × classification_ss:"06.00 / Information und Dokumentation: Allgemeines"
  1. Information ethics : privacy, property, and power (2005) 0.05
    0.05153709 = sum of:
      0.010622948 = product of:
        0.042491794 = sum of:
          0.042491794 = weight(_text_:authors in 2392) [ClassicSimilarity], result of:
            0.042491794 = score(doc=2392,freq=4.0), product of:
              0.23861247 = queryWeight, product of:
                4.558814 = idf(docFreq=1258, maxDocs=44218)
                0.05234091 = queryNorm
              0.17807868 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                4.558814 = idf(docFreq=1258, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
        0.25 = coord(1/4)
      0.04091414 = sum of:
        0.015842004 = weight(_text_:r in 2392) [ClassicSimilarity], result of:
          0.015842004 = score(doc=2392,freq=2.0), product of:
            0.17326194 = queryWeight, product of:
              3.3102584 = idf(docFreq=4387, maxDocs=44218)
              0.05234091 = queryNorm
            0.09143383 = fieldWeight in 2392, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.3102584 = idf(docFreq=4387, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.025072135 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
          0.025072135 = score(doc=2392,freq=4.0), product of:
            0.18328895 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.05234091 = queryNorm
            0.13679022 = fieldWeight in 2392, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
  2. Finding new values and uses of information : 47th FID Conference and Congress, Sonic City Omiya, Saitama, Japan, Oct. 5-8 1994 (1994) 0.01
    0.009505202 = product of:
      0.019010404 = sum of:
        0.019010404 = product of:
          0.03802081 = sum of:
            0.03802081 = weight(_text_:r in 1551) [ClassicSimilarity], result of:
              0.03802081 = score(doc=1551,freq=2.0), product of:
                0.17326194 = queryWeight, product of:
                  3.3102584 = idf(docFreq=4387, maxDocs=44218)
                  0.05234091 = queryNorm
                0.2194412 = fieldWeight in 1551, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.3102584 = idf(docFreq=4387, maxDocs=44218)
                  0.046875 = fieldNorm(doc=1551)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Content
    Enthält u.a. die Beiträge: FUGMANN, R.: The limitations of automatic indexing; KOBUCHI, Y., T. SAITO u. H. NUNONE: Theoretical considerations on words classification through elementary meanings; MERKL, D. u. A.M. TJOA: The representation of semantic similarity between documents by using maps: application of an artificial neural network to organize software libraries; DEWAR, A. u. E. KATSURA: Effective multilingual subject searching through Translex; RAHMSTORF, G.: A new thesaurus structure for semantic retrieval; NAKAO, Y u. G.J. ANKER: Some fundamental principles of terminology database design; CURRAS, E.: An approach to application of systematics to knowledge organization; KITAGAWA, T. u. Y. KIYOKI: A new information retrieval methods with a dynamic context recognition mechanism; PIENAAR, R.E.: Subject access in OPACs: results of a user survey in a university library
  3. Information: Droge, Ware oder Commons? : Wertschöpfungs- und Transformationsprozesse auf den Informationsmärkten ; Proceedings des 11. Internationalen Symposiums für Informationswissenschaft (ISI 2009) ; Konstanz, 1. - 3. April 2009 / [Hochschulverband für Informationswissenschaft (HI) e.V., Konstanz] (2009) 0.01
    0.005544701 = product of:
      0.011089402 = sum of:
        0.011089402 = product of:
          0.022178805 = sum of:
            0.022178805 = weight(_text_:r in 2930) [ClassicSimilarity], result of:
              0.022178805 = score(doc=2930,freq=2.0), product of:
                0.17326194 = queryWeight, product of:
                  3.3102584 = idf(docFreq=4387, maxDocs=44218)
                  0.05234091 = queryNorm
                0.12800737 = fieldWeight in 2930, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.3102584 = idf(docFreq=4387, maxDocs=44218)
                  0.02734375 = fieldNorm(doc=2930)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Editor
    Kuhlen, R.
  4. Machate, J.; Burmester, M.: User-Interface-Tunig : Benutzungsschnittstellen menschlich gestalten (2003) 0.00
    0.003960501 = product of:
      0.007921002 = sum of:
        0.007921002 = product of:
          0.015842004 = sum of:
            0.015842004 = weight(_text_:r in 1793) [ClassicSimilarity], result of:
              0.015842004 = score(doc=1793,freq=2.0), product of:
                0.17326194 = queryWeight, product of:
                  3.3102584 = idf(docFreq=4387, maxDocs=44218)
                  0.05234091 = queryNorm
                0.09143383 = fieldWeight in 1793, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.3102584 = idf(docFreq=4387, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=1793)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Rez. in: Nfd 55(2004) H.6, S.375-376 (R. Mangold): "Unser Alltag ist voll von mechanischen, elektronischen und digitalen Geräten, die alle bedient werden wollen, deren Bedienung jedoch angesichts übergroßer Komplexität und mangelnder Übersichtlich keit des User-Interfaces den Benutzer bisweilen überfordern. User-InterfaceTuning ist eine stark anwendungsorientierte Forschungsrichtung, in der auf der Grundlage ergonomischer, psychologischer, arbeitswissenschaftlicher und informationstechnischer Erkenntnisse Prinzipien und Regeln formuliert werden, wie Mensch-Geräte-Schnittstellen (= Interfaces) gestaltet sein müssen, um ein effektives, effizientes und zufriedenstellendes Bedienen aller Funktionen der Geräte zu ermöglichen. Wer auch immer sich beruflich oder privat mit der Gestaltung solcher Interfaces befasst, indem er entweder selbst am Schnittstellendesign beteiligt ist oder indem er solche Schnittstellen im Einsatz evaluiert und Kritiken bzw. Verbesserungsvorschläge formuliert, an den richtet sich dieses von Joachim Machate und Michael Burmester im Software & Support Verlag 2003 herausgegebene Buch. Dass die beiden Herausgeber schon seit Jahren Profis im Geschäft des User-Interface-Design sind, zeigt sich auch an der Auswahl und Zusammenstellung der Kapitel. Im Buch wird Grundlagenwissen zur ergonomischen Gestaltung von User-Interfaces ergänzt und veranschaulicht durch Anwendungsbeispiele aus unterschiedlichen Bereichen. Im ersten Kapitel "Usability - die unterschätzte Qualität" begründen die Herausgeber, warum es sich nicht nur aus arbeitswissenschaftlicher und psychologischer, sondern auch aus ökonomischer Sicht lohnt, den zusätzlichen Aufwand nicht zu scheuen und Prinzipien der Usability beim InterfaceDesign zu beachten bzw. im Rahmen von Usability-Tests im Nachhinein die Benutzungsfreundlichkeit zu überprüfen. Besonders lesenswert fand ich den zweiten Aufsatz von Marc Hassenzahl, der die Frage aufwirft, warum Nutzer zwar oftmals über die mangelnde Bedienungsfreundlichkeit vieler Office-Programme klagen und nicht freiwillig die Arbeit mit einem solchen Programm fortsetzen würden, sich andererseits aber in der Freizeit über viele Stunden hinweg mit hoher Motivation und Konzentration mit einem Computerspiel befassen. Möglicherweise ließen sich Fortschritte beim User-Interface-Design erzielen, wenn es nur gelänge, durch eine Übertragung von Gestaltungsprinzipien bei Spielen auf die Interfaces von "Arbeitssoftware" auch nur ein wenig von der großen Begeisterung für Spiele einzufangen. Im dritten Kapitel arbeiten Michael Burmester und Claus Görner die zentralen Elemente des benutzerzentrierten Gestaltens heraus: Gestaltung ist ein zeitlich ausgedehnter Prozess, bei dem fortlaufend optimiert wird und in dessen Zentrum der Benutzer mit seinen bedienungsrelevanten Eigenheiten steht. Hierbei soll eine empirisch-methodische Vorgehensweise gewährleisten, dass brauchbare gestaltungsrelevante Hinweise und Daten gewonnen werden: Je intensiver die Anforderungen und der Nutzungskontext analysiert werden, desto erfolgreiche kann eine benutzerzentrierte Gestaltung sein, wie Andreas Beu im vierten Kapitel hervorhebt. Wenn der Benutzer noch stärker in den Mittelpunkt rückt, wird er schließlich bei der partizipativen Schnittstellengestaltung zum Mitwirkenden; die dabei zu beachtenden Besonderheiten beschreibt Joachim Machate im fünften Kapitel. Und zum Ende eines Designprozesses sollte man im Rahmen einer Evaluation überprüfen, ob das User-Interface auch "wirklich gut" ist, wie Michael Burmester in der Überschrift zum sechsten Kapitel die Frage formuliert. Dieses Kapitel stellt eine gute Übersicht zu den verfügbaren Evaluationsverfahren und den Randbedingungen einer systematischen Bewertung der angestrebten Wirkungen dar.
  5. ¬The information literacy cookbook : ingredients, recipes and tips for success (2007) 0.00
    0.0037557795 = product of:
      0.007511559 = sum of:
        0.007511559 = product of:
          0.030046236 = sum of:
            0.030046236 = weight(_text_:authors in 2100) [ClassicSimilarity], result of:
              0.030046236 = score(doc=2100,freq=2.0), product of:
                0.23861247 = queryWeight, product of:
                  4.558814 = idf(docFreq=1258, maxDocs=44218)
                  0.05234091 = queryNorm
                0.12592064 = fieldWeight in 2100, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.558814 = idf(docFreq=1258, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2100)
          0.25 = coord(1/4)
      0.5 = coord(1/2)
    
    Abstract
    This book, aimed at an international audience, provides an overview of information literacy (IL) in practice; what it is, why it's become so important in the library profession and demonstrates how librarians can cultivate a better understanding of IL in their own organisations. It uses the 'Cookbook' theme throughout to provide a more informal approach, which will appeal to practitioners, and also reflects the need to provide guidance in the form of recipes, tips for success, regional variations, and possible substitutions if ingredients aren't available. This approach makes it easy to read and highly valuable for the busy information professional. It includes an overview of information literacy in higher education, the schools sector, public libraries, the health service and the commercial sector. It also includes contributions from international authors. Key Features: 1. Highly readable for busy information professionals 2. Contains advice, case studies and examples of good practice particularly useful for practitioners 3. Relevant to librarians from all sectors 4.Suitable for an international audience The Editors: Dr Jane Secker is Learning Technology Librarian at the Centre for Learning Technology, based at the London School of Economics.

Languages

Types