Search (5 results, page 1 of 1)

  • × subject_ss:"Information science"
  1. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.02
    0.023378028 = product of:
      0.046756055 = sum of:
        0.03411752 = weight(_text_:reference in 566) [ClassicSimilarity], result of:
          0.03411752 = score(doc=566,freq=2.0), product of:
            0.18975449 = queryWeight, product of:
              4.0683694 = idf(docFreq=2055, maxDocs=44218)
              0.04664141 = queryNorm
            0.17979822 = fieldWeight in 566, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.0683694 = idf(docFreq=2055, maxDocs=44218)
              0.03125 = fieldNorm(doc=566)
        0.012638534 = product of:
          0.025277069 = sum of:
            0.025277069 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.025277069 = score(doc=566,freq=2.0), product of:
                0.16333027 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04664141 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
  2. Covert and overt : recollecting and connecting intelligence service and information science (2005) 0.01
    0.010483787 = product of:
      0.04193515 = sum of:
        0.04193515 = sum of:
          0.024061562 = weight(_text_:services in 69) [ClassicSimilarity], result of:
            0.024061562 = score(doc=69,freq=6.0), product of:
              0.1712379 = queryWeight, product of:
                3.6713707 = idf(docFreq=3057, maxDocs=44218)
                0.04664141 = queryNorm
              0.1405154 = fieldWeight in 69, product of:
                2.4494898 = tf(freq=6.0), with freq of:
                  6.0 = termFreq=6.0
                3.6713707 = idf(docFreq=3057, maxDocs=44218)
                0.015625 = fieldNorm(doc=69)
          0.017873587 = weight(_text_:22 in 69) [ClassicSimilarity], result of:
            0.017873587 = score(doc=69,freq=4.0), product of:
              0.16333027 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.04664141 = queryNorm
              0.109432176 = fieldWeight in 69, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.015625 = fieldNorm(doc=69)
      0.25 = coord(1/4)
    
    Classification
    327.12 22
    DDC
    327.12 22
    Footnote
    The role of technology in both intelligence and information science is just one question explored in Covert and Overt, which takes on more fundamental issues as well. Even the ubiquitous "What is information?" debate is revisited. But the questions asked are always subordinate to the overarching theme of bringing concepts and techniques of intelligence and information science together and examining the results. The process and lifecycle of intelligence is explored and mapped to information science methods, primarily indexing and information retrieval. In more historical explorations undertaken by contributors, it becomes apparent that intelligence and information science have always been closely aligned, but that this alignment is not always perceived by those engaged in intelligence work. Interestingly, and probably not surprisingly, a general consensus seems to be that library and information science practitioners involved in intelligence were (and are) more capable of seeing the complementary nature of the techniques information science brings to intelligence services than many intelligence professionals, who often needed demonstrations of efficacy to be convinced. Structurally, the book is divided into four parts, moving from anecdotal accounts through to discussions of definition and theory. Part 1, "Information Science and Intelligence: Reminiscences and Reflections from World War II to Today" is comprised of the personal stories of information scientists who also served as intelligence professionals at various times during and since World War II, collected from special panel presentations at the 2001 and 2002 American Society for Information Science and Technology (ASIS&T) annual conferences. These contributors include former American and British servicemen and intelligence officers who all relate a common experience of dealing with information, documents, and other records in the pursuit of intelligence goals.
    LCSH
    Intelligence service / Information services
    Subject
    Intelligence service / Information services
  3. Warner, J.: Humanizing information technology (2004) 0.01
    0.0053308625 = product of:
      0.02132345 = sum of:
        0.02132345 = weight(_text_:reference in 438) [ClassicSimilarity], result of:
          0.02132345 = score(doc=438,freq=2.0), product of:
            0.18975449 = queryWeight, product of:
              4.0683694 = idf(docFreq=2055, maxDocs=44218)
              0.04664141 = queryNorm
            0.11237389 = fieldWeight in 438, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.0683694 = idf(docFreq=2055, maxDocs=44218)
              0.01953125 = fieldNorm(doc=438)
      0.25 = coord(1/4)
    
    Footnote
    Rez. in: JASIST. 56(2003) no.12, S.1360 (C.Tomer): "Humanizing Information Technology is a collection of essays that represent what are presumably Julian Warner's best efforts to understand the perpetually nascent discipline of information science and its relationship to information technology. It is clearly a formidable task. Warner succeeds occasionally in this endeavor; more often, he fails. Yet, it would be wrong to mark Humanizing Information Technology as a book not worth reading. On the contrary, though much fault was found and this review is far from positive, it was nevertheless a book well-worth reading. That Humanizing Information Technology succeeds at all is in some ways remarkable, because Warner's prose tends to be dense and graceless, and understanding his commentaries often relies an close readings of a wide array of sources, some of them familiar, many of them less so. The inaccessibility of Warner's prose is unfortunate; there is not a single idea in Humanizing Information Technology so complicated that it could not have been stated in a clear, straightforward manner. The failure to establish a clear, sufficiently füll context for the more obscure sources is an even more serious problem. Perhaps the most conspicuous example of this problem stems from the frequent examination of the concept of the "information society" and the related notion of information as an autonomous variable, each of them ideas drawn largely from Frank Webster's 1995 book, Theories of the Information Society. Several of Warner's essays contain passages in Humanizing Information Technology whose meaning and value are largely dependent an a familiarity with Webster's work. Yet, Warner never refers to Theories of the Information Society in more than cursory terms and never provides a context füll enough to understand the particular points of reference. Suffice it to say, Humanizing Information Technology is not a book for readers who lack patience or a thorough grounding in modern intellectual history. Warner's philosophical analyses, which frequently exhibit the meter, substance, and purpose of a carefully crafted comprehensive examination, are a large part of what is wrong with Humanizing Information Technology. Warner's successes come when he turns his attention away from Marxist scholasticism and toward historical events and trends. "Information Society or Cash Nexus?" the essay in which Warner compares the role of the United States as a "copyright haven" for most of the 19th century to modern China's similar status, is successful because it relies less an abstruse analysis and more an a sharply drawn comparison of the growth of two economies and parallel developments in the treatment of intellectual property. The essay establishes an illuminating context and cites historical precedents in the American experience suggesting that China's official positions toward intellectual property and related international conventions are likely to evolve and grow more mature as its economy expands and becomes more sophisticated. Similarly, the essay entitled "In the Catalogue Ye Go for Men" is effective because Warner comes dangerously close to pragmatism when he focuses an the possibility that aligning cataloging practice with the "paths and tracks" of discourse and its analysis may be the means by which to build more information systems that furnish a more direct basis for intellectual exploration.
  4. Theories of information behavior (2005) 0.00
    0.00426469 = product of:
      0.01705876 = sum of:
        0.01705876 = weight(_text_:reference in 68) [ClassicSimilarity], result of:
          0.01705876 = score(doc=68,freq=2.0), product of:
            0.18975449 = queryWeight, product of:
              4.0683694 = idf(docFreq=2055, maxDocs=44218)
              0.04664141 = queryNorm
            0.08989911 = fieldWeight in 68, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.0683694 = idf(docFreq=2055, maxDocs=44218)
              0.015625 = fieldNorm(doc=68)
      0.25 = coord(1/4)
    
    Footnote
    Weitere Rez. in: JASIST 58(2007) no.2, S.303 (D.E. Agosto): "Due to the brevity of the entries, they serve more as introductions to a wide array of theories than as deep explorations of a select few. The individual entries are not as deep as those in more traditional reference volumes, such as The Encyclopedia of Library and Information Science (Drake, 2003) or The Annual Review of Information Science and Technology (ARIST) (Cronin, 2005), but the overall coverage is much broader. This volume is probably most useful to doctoral students who are looking for theoretical frameworks for nascent research projects or to more veteran researchers interested in an introductory overview of information behavior research, as those already familiar with this subfield also will probably already be familiar with most of the theories presented here. Since different authors have penned each of the various entries, the writing styles vary somewhat, but on the whole, this is a readable, pithy volume that does an excellent job of encapsulating this important area of information research."
  5. Crowley, W.: Spanning the theory-practice divide in library and information science (2005) 0.00
    0.00426469 = product of:
      0.01705876 = sum of:
        0.01705876 = weight(_text_:reference in 439) [ClassicSimilarity], result of:
          0.01705876 = score(doc=439,freq=2.0), product of:
            0.18975449 = queryWeight, product of:
              4.0683694 = idf(docFreq=2055, maxDocs=44218)
              0.04664141 = queryNorm
            0.08989911 = fieldWeight in 439, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.0683694 = idf(docFreq=2055, maxDocs=44218)
              0.015625 = fieldNorm(doc=439)
      0.25 = coord(1/4)
    
    Footnote
    In "The Revival of Pragmatism," the distinction between theory (how things work) and paradigm (how we look at the world) forms the basis for the exposition on competing paradigms. From Kuhn's traditional scientific paradigm (empiricism) to classical pragmatism, to the variants of modernism, specifically critical theory and feminism, the ability of cultural pragmatism to bridge the divide is promoted. The twelve core assertions and the role of religious beliefs in the creation of classical pragmatism are surely the stuff of which debates are made. While I was readily able to accept the first ten assertions, the eleventh ("Humans have the most opportunity to develop their capabilities in a democracy.") and twelfth ("Scientific and other knowledge progresses best in a democratic context that encourages freedom of inquiry.") certainly gave me pause (p. 60). Even Crowley admits, later in the text, that these two assertions may not be verifiable and indeed may conflict with the principle of freedom in research. In defining the applicability of cultural pragmatism to bridging the theory-practice gap, Crowley relates John Dewey's desire to rename his Experience and Nature to read Culture and Nature as a tribute to the power of readers' ability to understand the meaning of culture versus experience. Drawing on the work of Charles Sanders Peirce, cultural pragmatism treats "truth" as agreed-upon opinion, which is therefore continually tested and revised. The concepts of interlanguage and incommensurability are revisited, as they apply to the need to transcend cultural norms and create cross-cultural understandings. The increased complexity of modern work, partially related to the pervasiveness of technology, is established as an obvious factor. As a result, the validity and reliability of generalizing in a global environment is called into question. Cultural pragmatism does not demand an adherence to an objective reality. "For pragmatism, cultural complexity can be an intellectual positive, offering a seemingly endless source of remarkably interesting research questions" (p. 82). This chapter is highly recommended for LIS professionals interested in a brief yet coherent overview of the prevailing paradigms discussed and utilized in the field, as well as those who like to stir up lively discussions. A description of how the Maryland Division of Library Developments improved reference service by turning tacit knowledge into explicit knowledge opens the next chapter, "Tacit Knowledge: Bridging the Theory-Practice Divide." This example illustrates concretely the impact of an interlanguage on communication effectiveness within a library setting and as part of a research project. The role of time in the transformation of tacit into explicit knowledge, however, is apparent yet not fully explored. In this chapter, Crowley directly addresses the "how-to-think" issues and the role of a research philosophy as structural components of the bridge. Tacit knowledge becomes an integral component which researchers must recognize if they are to construct useful research and theory. The discussion of Georg Simmel's stranger as an analytical tool, however, seemed out of place.