Search (2221 results, page 1 of 112)

  • × type_ss:"m"
  1. Convey, J.: Online information retrieval : an introductory manual to principles and practice (1992) 0.17
    0.16761255 = product of:
      0.20951569 = sum of:
        0.12269233 = weight(_text_:section in 763) [ClassicSimilarity], result of:
          0.12269233 = score(doc=763,freq=2.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.46641576 = fieldWeight in 763, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.0625 = fieldNorm(doc=763)
        0.036917817 = weight(_text_:on in 763) [ClassicSimilarity], result of:
          0.036917817 = score(doc=763,freq=6.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.33671528 = fieldWeight in 763, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.0625 = fieldNorm(doc=763)
        0.030362446 = weight(_text_:information in 763) [ClassicSimilarity], result of:
          0.030362446 = score(doc=763,freq=10.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.3469568 = fieldWeight in 763, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=763)
        0.01954309 = product of:
          0.03908618 = sum of:
            0.03908618 = weight(_text_:technology in 763) [ClassicSimilarity], result of:
              0.03908618 = score(doc=763,freq=2.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.2632547 = fieldWeight in 763, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0625 = fieldNorm(doc=763)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    Abstract
    A succinet overview of the latest developments in the information retrieval industry with an expanded section on CD technology. Practical examples can be used in training searchers new to online information retrieval
    COMPASS
    Information retrieval / Use of / On-line computers
    Subject
    Information retrieval / Use of / On-line computers
  2. Hebeler, J.; Fisher, M.; Blace, R.; Perez-Lopez, A.: Semantic Web programming (2009) 0.17
    0.16574462 = product of:
      0.20718077 = sum of:
        0.15182401 = weight(_text_:section in 1541) [ClassicSimilarity], result of:
          0.15182401 = score(doc=1541,freq=4.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.57716006 = fieldWeight in 1541, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1541)
        0.02637536 = weight(_text_:on in 1541) [ClassicSimilarity], result of:
          0.02637536 = score(doc=1541,freq=4.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.24056101 = fieldWeight in 1541, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1541)
        0.011881187 = weight(_text_:information in 1541) [ClassicSimilarity], result of:
          0.011881187 = score(doc=1541,freq=2.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.13576832 = fieldWeight in 1541, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1541)
        0.017100206 = product of:
          0.03420041 = sum of:
            0.03420041 = weight(_text_:technology in 1541) [ClassicSimilarity], result of:
              0.03420041 = score(doc=1541,freq=2.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.23034787 = fieldWeight in 1541, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=1541)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    Abstract
    The next major advance in the Web-Web 3.0-will be built on semantic Web technologies, which will allow data to be shared and reused across application, enterprise, and community boundaries. Written by a team of highly experienced Web developers, this book explains examines how this powerful new technology can unify and fully leverage the ever-growing data, information, and services that are available on the Internet. Helpful examples demonstrate how to use the semantic Web to solve practical, real-world problems while you take a look at the set of design principles, collaborative working groups, and technologies that form the semantic Web. The companion Web site features full code, as well as a reference section, a FAQ section, a discussion forum, and a semantic blog.
  3. Eddings, J.: How the Internet works (1994) 0.16
    0.16337985 = product of:
      0.20422481 = sum of:
        0.15336542 = weight(_text_:section in 1514) [ClassicSimilarity], result of:
          0.15336542 = score(doc=1514,freq=8.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.58301973 = fieldWeight in 1514, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1514)
        0.026643137 = weight(_text_:on in 1514) [ClassicSimilarity], result of:
          0.026643137 = score(doc=1514,freq=8.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.24300331 = fieldWeight in 1514, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1514)
        0.012001811 = weight(_text_:information in 1514) [ClassicSimilarity], result of:
          0.012001811 = score(doc=1514,freq=4.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.13714671 = fieldWeight in 1514, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1514)
        0.012214432 = product of:
          0.024428863 = sum of:
            0.024428863 = weight(_text_:technology in 1514) [ClassicSimilarity], result of:
              0.024428863 = score(doc=1514,freq=2.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.16453418 = fieldWeight in 1514, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1514)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    Abstract
    How the Internet Works promises "an exciting visual journey down the highways and byways of the Internet," and it delivers. The book's high quality graphics and simple, succinct text make it the ideal book for beginners; however it still has much to offer for Net vets. This book is jam- packed with cool ways to visualize how the Net works. The first section visually explores how TCP/IP, Winsock, and other Net connectivity mysteries work. This section also helps you understand how e-mail addresses and domains work, what file types mean, and how information travels across the Net. Part 2 unravels the Net's underlying architecture, including good information on how routers work and what is meant by client/server architecture. The third section covers your own connection to the Net through an Internet Service Provider (ISP), and how ISDN, cable modems, and Web TV work. Part 4 discusses e-mail, spam, newsgroups, Internet Relay Chat (IRC), and Net phone calls. In part 5, you'll find out how other Net tools, such as gopher, telnet, WAIS, and FTP, can enhance your Net experience. The sixth section takes on the World Wide Web, including everything from how HTML works to image maps and forms. Part 7 looks at other Web features such as push technology, Java, ActiveX, and CGI scripting, while part 8 deals with multimedia on the Net. Part 9 shows you what intranets are and covers groupware, and shopping and searching the Net. The book wraps up with part 10, a chapter on Net security that covers firewalls, viruses, cookies, and other Web tracking devices, plus cryptography and parental controls.
  4. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.15
    0.14708547 = product of:
      0.18385684 = sum of:
        0.1371742 = weight(_text_:section in 566) [ClassicSimilarity], result of:
          0.1371742 = score(doc=566,freq=10.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.5214687 = fieldWeight in 566, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.03125 = fieldNorm(doc=566)
        0.010657255 = weight(_text_:on in 566) [ClassicSimilarity], result of:
          0.010657255 = score(doc=566,freq=2.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.097201325 = fieldWeight in 566, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.03125 = fieldNorm(doc=566)
        0.022517392 = weight(_text_:information in 566) [ClassicSimilarity], result of:
          0.022517392 = score(doc=566,freq=22.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.25731003 = fieldWeight in 566, product of:
              4.690416 = tf(freq=22.0), with freq of:
                22.0 = termFreq=22.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=566)
        0.0135079995 = product of:
          0.027015999 = sum of:
            0.027015999 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.027015999 = score(doc=566,freq=2.0), product of:
                0.17456654 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.049850095 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    Abstract
    Knowledge Architectures reviews traditional approaches to managing information and explains why they need to adapt to support 21st-century information management and discovery. Exploring the rapidly changing environment in which information is being managed and accessed, the book considers how to use knowledge architectures, the basic structures and designs that underlie all of the parts of an effective information system, to best advantage. Drawing on 40 years of work with a variety of organizations, Bedford explains that failure to understand the structure behind any given system can be the difference between an effective solution and a significant and costly failure. Demonstrating that the information user environment has shifted significantly in the past 20 years, the book explains that end users now expect designs and behaviors that are much closer to the way they think, work, and act. Acknowledging how important it is that those responsible for developing an information or knowledge management system understand knowledge structures, the book goes beyond a traditional library science perspective and uses case studies to help translate the abstract and theoretical to the practical and concrete. Explaining the structures in a simple and intuitive way and providing examples that clearly illustrate the challenges faced by a range of different organizations, Knowledge Architectures is essential reading for those studying and working in library and information science, data science, systems development, database design, and search system architecture and engineering.
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
    LCSH
    Information science
    Information storage and retrieval systems / Management
    Subject
    Information science
    Information storage and retrieval systems / Management
  5. Knowledge management in practice : connections and context. (2008) 0.14
    0.1397912 = product of:
      0.174739 = sum of:
        0.12269233 = weight(_text_:section in 2749) [ClassicSimilarity], result of:
          0.12269233 = score(doc=2749,freq=8.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.46641576 = fieldWeight in 2749, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.03125 = fieldNorm(doc=2749)
        0.015071635 = weight(_text_:on in 2749) [ClassicSimilarity], result of:
          0.015071635 = score(doc=2749,freq=4.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.13746344 = fieldWeight in 2749, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.03125 = fieldNorm(doc=2749)
        0.013578499 = weight(_text_:information in 2749) [ClassicSimilarity], result of:
          0.013578499 = score(doc=2749,freq=8.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.1551638 = fieldWeight in 2749, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=2749)
        0.023396542 = product of:
          0.046793085 = sum of:
            0.046793085 = weight(_text_:22 in 2749) [ClassicSimilarity], result of:
              0.046793085 = score(doc=2749,freq=6.0), product of:
                0.17456654 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.049850095 = queryNorm
                0.268053 = fieldWeight in 2749, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=2749)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    BK
    85.20 / Betriebliche Information und Kommunikation
    Classification
    658.4/038 22
    85.20 / Betriebliche Information und Kommunikation
    Date
    22. 3.2009 18:43:51
    DDC
    658.4/038 22
    Footnote
    Rez. in: JASIST 60(2006) no.3, S.642 (A.E. Prentice): "What is knowledge management (KM)? How do we define it? How do we use it and what are the benefits? KM is still an operational discipline that has yet to have an academic foundation. Its core has yet to solidify and concepts and practices remain fluid, making it difficult to discuss or even to identify the range of relevant elements. Being aware of this lack of a well-structured retrievable disciplinary literature, the editors made a practice of attending trade shows and conferences attended by KM professionals to look for presentations that would in some way expand knowledge of the field. They asked presenters to turn their paper into a book chapter, which is the major source of the material in this book. Although this is a somewhat chancy method of identifying authors and topics, several of the papers are excellent and a number add to an understanding of KM. Because of the fluidity of the area of study, the editors devised a three-dimensional topic expansion approach to the content so that the reader can follow themes in the papers that would not have been easy to do if one relied solely on the table of contents. The table of contents organizes the presentations into eight subject sections, each section with a foreword that introduces the topic and indicates briefly the contribution of each chapter to the overall section title. Following this, the Roadmap lists 18 topics or themes that appear in the book and relevant chapters where information on the theme can be found. Readers have the choice of following themes using the roadmap or of reading the book section by section. ..."
    Imprint
    Medford, NJ : Information Today
  6. Social capital and information technology (2004) 0.14
    0.13594568 = product of:
      0.1699321 = sum of:
        0.10735579 = weight(_text_:section in 5055) [ClassicSimilarity], result of:
          0.10735579 = score(doc=5055,freq=8.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.40811378 = fieldWeight in 5055, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.02734375 = fieldNorm(doc=5055)
        0.024671894 = weight(_text_:on in 5055) [ClassicSimilarity], result of:
          0.024671894 = score(doc=5055,freq=14.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.22502424 = fieldWeight in 5055, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.02734375 = fieldNorm(doc=5055)
        0.018785806 = weight(_text_:information in 5055) [ClassicSimilarity], result of:
          0.018785806 = score(doc=5055,freq=20.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.21466857 = fieldWeight in 5055, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.02734375 = fieldNorm(doc=5055)
        0.019118613 = product of:
          0.038237225 = sum of:
            0.038237225 = weight(_text_:technology in 5055) [ClassicSimilarity], result of:
              0.038237225 = score(doc=5055,freq=10.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.25753677 = fieldWeight in 5055, product of:
                  3.1622777 = tf(freq=10.0), with freq of:
                    10.0 = termFreq=10.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.02734375 = fieldNorm(doc=5055)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    Footnote
    Rez. in: JASIST 57(2006) no.5, S.723-724 (P. Galloway): "This collection consists of 14 chapters that bring together the two universes of discourse named in the title. Social Capital and Information Technology, under the editorship of a sociologist (Marleen Huysman) and a computer scientist (Volker Wulf) who had both begun to see the importance of social ties to the success of knowledge management/ knowledge sharing systems when they met and shared their interests. Its aim is chiefly to introduce the concept of social capital to information scientists and to demonstrate through a series of case studies how it can serve to explain the success or failure of information and communication technology systems, and even to assist in the building or improvement of such systems. Case studies range across many fields: KarEllen Bear Dog breeders' databases, multiple-sport athletes' newsgroups. a network supporting Iranian NGOs, B2B software for geographical business clusters, and after-.school computer labs for children. Of the papers gathered here most were presented at an Amsterdam workshop in 2002 focused on knowledge management and social capital, whereas a few others, concentrating more directly on societal issues, were invited by the editors to leaven the mix. The result is a readable collection that marks a promising hybrid direction in information research, still characterized by what the Editors term an "absolute lack of closure." The influence of knowledge management and informal learning threads is dominant, because the unit of analysis in all the studies is a definable user community. Examples all assume networked environ-ments and computer-mediated communication. though they do not always prove that such technologies are the best way to solve problems. The network, however, is the bridging metaphor between the social and the technological.
    The book is divided into three sections reflecting three main streams of research. After a cogent general review of the literature by the editors, the first section. "Social Capital in Civic Engagement.. shows how information technologies can alter existing social contexts, sometimes reinforcing existing ties, sometimes discouraging others. In this section the standout essay by Anita Blanched examines a newsgroup for multiple-sport athletes and shows that much of the continuing effectiveness of their technology-mediated communication stems from face-to-face contacts. established by some of the members, whose effects enter recursively into the ongoing online community dialogue. The second section, "Social Capital in Knowledge Sharing," is strong on the knowledge management problem of knowledge sharing: how to get people together who need to exchange knowledge hut have no prior awareness of each other. Bart van den Hooff. Jan de Ridder. and Eline Aukema in "Exploring the Eagerness to Share Knowledge." offer the interesting finding that knowledge sharing may depend more significantly on the eagerness of some members of a network to share than on the more passive willingness to share. More abstractly but quite fundamentally for the hook. Huysman offers an essay making the case for social capital analysis as a prerequisite for system design. effectively articulating the often compartmentalized information technology. management. and individual learning issues in the knowledge sharing problem. The final section, "Applications of IT." focuses on established applications, most involved with informal learning. ... Nevertheless. there is much in the volume of interest to information systems designers and students of information science. The general emphasis on the social context of information systems as a major element in their effectiveness, although not stunningly new, is nevertheless usefully operationalized through the concept of social capital, and the wealth of examples and compendium of references brought together in this hook make it a useful tool for gaining access to the approach and the relevant literature."
  7. Human perspectives in the Internet society : culture, psychology and gender; International Conference on Human Perspectives in the Internet Society <1, 2004, Cádiz> (2004) 0.13
    0.13301907 = product of:
      0.16627385 = sum of:
        0.0751334 = weight(_text_:section in 91) [ClassicSimilarity], result of:
          0.0751334 = score(doc=91,freq=12.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.28562015 = fieldWeight in 91, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.015625 = fieldNorm(doc=91)
        0.023226948 = weight(_text_:on in 91) [ClassicSimilarity], result of:
          0.023226948 = score(doc=91,freq=38.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.21184538 = fieldWeight in 91, product of:
              6.164414 = tf(freq=38.0), with freq of:
                38.0 = termFreq=38.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.015625 = fieldNorm(doc=91)
        0.013578499 = weight(_text_:information in 91) [ClassicSimilarity], result of:
          0.013578499 = score(doc=91,freq=32.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.1551638 = fieldWeight in 91, product of:
              5.656854 = tf(freq=32.0), with freq of:
                32.0 = termFreq=32.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.015625 = fieldNorm(doc=91)
        0.054335006 = sum of:
          0.03523181 = weight(_text_:technology in 91) [ClassicSimilarity], result of:
            0.03523181 = score(doc=91,freq=26.0), product of:
              0.14847288 = queryWeight, product of:
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.049850095 = queryNorm
              0.2372946 = fieldWeight in 91, product of:
                5.0990195 = tf(freq=26.0), with freq of:
                  26.0 = termFreq=26.0
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.015625 = fieldNorm(doc=91)
          0.019103196 = weight(_text_:22 in 91) [ClassicSimilarity], result of:
            0.019103196 = score(doc=91,freq=4.0), product of:
              0.17456654 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.049850095 = queryNorm
              0.109432176 = fieldWeight in 91, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.015625 = fieldNorm(doc=91)
      0.8 = coord(4/5)
    
    Classification
    303.48/33 22 (LoC)
    DDC
    303.48/33 22 (LoC)
    Footnote
    Rez. in: JASIST 58(2007) no.1, S.150-151 (L. Westbrook): "The purpose of this volume is to bring together various analyses by international scholars of the social and cultural impact of information technology on individuals and societies (preface, n.p.). It grew from the First International Conference on Human Perspectives in the Internet Society held in Cadiz, Spain, in 2004. The editors and contributors have addressed an impressive array of significant issues with rigorous research and insightful analysis although the resulting volume does suffer from the usual unevenness in depth and content that affects books based on conference proceedings. Although the $256 price is prohibitive for many individual scholars, the effort to obtain a library edition for perusal regarding particular areas of interest is likely to prove worthwhile. Unlike many international conferences that are able to attract scholars from only a handful of nations, this genuinely diverse conference included research conducted in Australia, Beijing, Canada, Croatia, the Czech Republic, England, Fiji, Germany, Greece, Iran, Ireland, Israel, Italy, Japan, Jordan, Malaysia, Norway, Russia, Scotland, South Africa, Sweden, Taiwan, and the United States. The expense of a conference format and governmental travel restrictions may have precluded greater inclusion of the work being done to develop information technology for use in nonindustrialized nations in support of economic, social justice, and political movements. Although the cultural variants among these nations preclude direct cross-cultural comparisons, many papers carefully provide sufficient background information to make basic conceptual transfers possible. A great strength of the work is the unusual combination of academic disciplines that contributes substantially to the depth of many individual papers, particularly when they are read within the larger context of the entire volume. Although complete professional affiliations are not universally available, the authors who did name their affiliation come from widely divergent disciplines including accounting, business administration, architecture, business computing, communication, computing, economics, educational technology, environmental management, experimental psychology, gender research in computer science, geography, human work sciences, humanistic informatics, industrial engineering, information management, informatics in transport and telecommunications, information science, information technology, management, mathematics, organizational behavior, pedagogy, psychology, telemedicine, and women's education. This is all to the good, but the lack of representation from departments of women's studies, gender studies, and library studies certainly limits the breadth and depth of the perspectives provided.
    The editorial and peer review processes appear to be slightly spotty in application. All of the 55 papers are in English but a few of them are in such need of basic editing that they are almost incomprehensible in sections. Consider, for example, the following: "So, the meaning of region where we are studying on, should be discovered and then affect on the final plan" (p. 346). The collection shows a strong array of methodological approaches including quantitative, qualitative, and mixed methods studies; however, a few of the research efforts exhibit fundamental design flaws. Consider, for example, the study that "set[s] out to show that nurses as care-givers find it difficult to transfer any previously acquired technological skills into their work based on technology needs (p. 187). After studying 39 female and 6 male nurses, this study finds, not surprisingly, exactly what it "set out" to find. Rather than noting the limitations of sample size and data gathering techniques, the paper firmly concludes that nurses can be technologists "only in areas of technology that support their primary role as carers" (p. 188). Finally, some of the papers do not report on original research but are competent, if brief, summaries of theories or concepts that are covered in equal depth elsewhere. For example, a three-page summary of "the major personality and learning theories" (p. 3) is useful but lacks the intellectual depth or insight needed to contribute substantially to the field. These problems with composition, methodological rigor, and theoretical depth are not uncommon in papers designed for a broadly defined conference theme. The authors may have been writing for an in-person audience and anticipating thoughtful postpresentation discussions; they probably had no idea of the heavy price tag put on their work. The editors, however, might have kept that $256 in mind and exercised a heavier editorial hand. Perhaps the publisher could have paid for a careful subject indexing of the work as a substantive addition to the author index provided. The complexity of the subject domains included in the volume certainly merits careful indexing.
    The volume is organized into 13 sections, each of which contains between two and eight conference papers. As with most conferences, the papers do not cover the issues in each section with equal weight or depth but the editors have grouped papers into reasonable patterns. Section 1 covers "understanding online behavior" with eight papers on problems such as e-learning attitudes, the neuropsychology of HCI, Japanese blogger motivation, and the dividing line between computer addiction and high engagement. Sections 2 (personality and computer attitudes), 3 (cyber interactions), and 4 (new interaction methods) each contain only two papers on topics such as helmet-mounted displays, online energy audits, and the use of ICT in family life. Sections 6, 7, and 8 focus on gender issues with papers on career development, the computer literacy of Malaysian women, mentoring, gaming, and faculty job satisfaction. Sections 9 and 10 move to a broader examination of cyber society and its diversity concerns with papers on cultural identity, virtual architecture, economic growth's impact on culture, and Iranian development impediments. Section 11's two articles on advertising might well have been merged with those of section 13's ebusiness. Section 12 addressed education with papers on topics such as computer-assisted homework, assessment, and Web-based learning. It would have been useful to introduce each section with a brief definition of the theme, summaries of the major contributions of the authors, and analyses of the gaps that might be addressed in future conferences. Despite the aforementioned concerns, this volume does provide a uniquely rich array of technological analyses embedded in social context. An examination of recent works in related areas finds nothing that is this complex culturally or that has such diversity of disciplines. Cultural Production in a Digital Age (Klinenberg, 2005), Perspectives and Policies on ICT in Society (Berleur & Avgerou, 2005), and Social, Ethical, and Policy Implications of Information Technology (Brennan & Johnson, 2004) address various aspects of the society/Internet intersection but this volume is unique in its coverage of psychology, gender, and culture issues in cyberspace. The lip service often given to global concerns and the value of interdisciplinary analysis of intransigent social problems seldom develop into a genuine willingness to listen to unfamiliar research paradigms. Academic silos and cultural islands need conferences like this one-willing to take on the risk of examining the large questions in an intellectually open space. Editorial and methodological concerns notwithstanding, this volume merits review and, where appropriate, careful consideration across disciplines."
    LCSH
    Information technology / Psychological aspects / Congresses
    Information society / Congresses
    Information technology / Social aspects / Congresses
    Information technology / Economic aspects / Congresses
    Series
    Advances in information and communication technologies ; 4
    Subject
    Information technology / Psychological aspects / Congresses
    Information society / Congresses
    Information technology / Social aspects / Congresses
    Information technology / Economic aspects / Congresses
  8. Information ethics : privacy, property, and power (2005) 0.12
    0.123243034 = product of:
      0.15405379 = sum of:
        0.07668271 = weight(_text_:section in 2392) [ClassicSimilarity], result of:
          0.07668271 = score(doc=2392,freq=8.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.29150987 = fieldWeight in 2392, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.016315522 = weight(_text_:on in 2392) [ClassicSimilarity], result of:
          0.016315522 = score(doc=2392,freq=12.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.14880852 = fieldWeight in 2392, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.019902753 = weight(_text_:information in 2392) [ClassicSimilarity], result of:
          0.019902753 = score(doc=2392,freq=44.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.2274321 = fieldWeight in 2392, product of:
              6.6332498 = tf(freq=44.0), with freq of:
                44.0 = termFreq=44.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.04115281 = sum of:
          0.017273815 = weight(_text_:technology in 2392) [ClassicSimilarity], result of:
            0.017273815 = score(doc=2392,freq=4.0), product of:
              0.14847288 = queryWeight, product of:
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.049850095 = queryNorm
              0.116343245 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
          0.023878993 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
            0.023878993 = score(doc=2392,freq=4.0), product of:
              0.17456654 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.049850095 = queryNorm
              0.13679022 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
      0.8 = coord(4/5)
    
    BK
    06.00 / Information und Dokumentation: Allgemeines
    Classification
    323.44/5 22 (GBV;LoC)
    06.00 / Information und Dokumentation: Allgemeines
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Rez. in: JASIST 58(2007) no.2, S.302 (L.A. Ennis):"This is an important and timely anthology of articles "on the normative issues surrounding information control" (p. 11). Using an interdisciplinary approach, Moore's work takes a broad look at the relatively new field of information ethics. Covering a variety of disciplines including applied ethics, intellectual property, privacy, free speech, and more, the book provides information professionals of all kinds with a valuable and thought-provoking resource. Information Ethics is divided into five parts and twenty chapters or articles. At the end of each of the five parts, the editor has included a few "discussion cases," which allows the users to apply what they just read to potential real life examples. Part I, "An Ethical Framework for Analysis," provides readers with an introduction to reasoning and ethics. This complex and philosophical section of the book contains five articles and four discussion cases. All five of the articles are really thought provoking and challenging writings on morality. For instance, in the first article, "Introduction to Moral Reasoning," Tom Regan examines how not to answer a moral question. For example, he thinks using what the majority believes as a means of determining what is and is not moral is flawed. "The Metaphysics of Morals" by Immanuel Kant looks at the reasons behind actions. According to Kant, to be moral one has to do the right thing for the right reasons. By including materials that force the reader to think more broadly and deeply about what is right and wrong, Moore has provided an important foundation and backdrop for the rest of the book. Part II, "Intellectual Property: Moral and Legal Concerns," contains five articles and three discussion cases for tackling issues like ownership, patents, copyright, and biopiracy. This section takes a probing look at intellectual and intangible property from a variety of viewpoints. For instance, in "Intellectual Property is Still Property," Judge Frank Easterbrook argues that intellectual property is no different than physical property and should not be treated any differently by law. Tom Palmer's article, "Are Patents and Copyrights Morally Justified," however, uses historical examples to show how intellectual and physical properties differ.
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
    LCSH
    Freedom of information
    Information society
    Information technology / Social aspects
    Subject
    Freedom of information
    Information society
    Information technology / Social aspects
  9. Design and usability of digital libraries : case studies in the Asia-Pacific (2005) 0.12
    0.12131071 = product of:
      0.15163839 = sum of:
        0.11476816 = weight(_text_:section in 93) [ClassicSimilarity], result of:
          0.11476816 = score(doc=93,freq=28.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.436292 = fieldWeight in 93, product of:
              5.2915025 = tf(freq=28.0), with freq of:
                28.0 = termFreq=28.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.015625 = fieldNorm(doc=93)
        0.017673058 = weight(_text_:on in 93) [ClassicSimilarity], result of:
          0.017673058 = score(doc=93,freq=22.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.16119017 = fieldWeight in 93, product of:
              4.690416 = tf(freq=22.0), with freq of:
                22.0 = termFreq=22.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.015625 = fieldNorm(doc=93)
        0.010734746 = weight(_text_:information in 93) [ClassicSimilarity], result of:
          0.010734746 = score(doc=93,freq=20.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.12266775 = fieldWeight in 93, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.015625 = fieldNorm(doc=93)
        0.008462408 = product of:
          0.016924815 = sum of:
            0.016924815 = weight(_text_:technology in 93) [ClassicSimilarity], result of:
              0.016924815 = score(doc=93,freq=6.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.11399264 = fieldWeight in 93, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.015625 = fieldNorm(doc=93)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    Abstract
    Design and Usability of Digital Libraries: Case Studies in the Asia Pacific showcases some of the best digital library practices from organizations in the Asia Pacific. Particular emphasis has been placed on the design, use and usability of digital libraries. Not only are digital libraries examined, but related technologies, the management of knowledge in digital libraries, and the associated usability and social issues surrounding digital libraries are all examined. Design and Usability of Digital Libraries will benefit practitioners, researchers, educators and policy makers from a variety of disciplines. In particular developers/designers of digital libraries, librarians, users and researchers will all find this collection of case studies a valuable tool to understanding digital libraries.
    Footnote
    Rez. in: JASIST 58(2007) no.1, S.152-153 (J.P. Bolstad): "Over the past decade, digital library research and technology have evolved and progressed rapidly. The desire to create new and better digital library systems has inspired researchers and academics worldwide to join forces and work together to develop more efficient and user-friendly technologies. Primarily inspired by ideas presented at the Fourth International Conference on Asian Digital Libraries, which was held in 2002 in Singapore, this book illustrates a selection of diverse digital library systems that have been created in recent years, as researchers have continued to further their ideas about new developments and trends in digital libraries. In Design and Usability of Digital Libraries, the editors, Theng and Foo, compile a collection of 20 valuable case studies written by various researchers. These case studies address not only the successes that have been achieved in improving digital library research and technology, but also the problems and failures that have been discovered. Thus, researchers can perhaps learn from the errors that have occurred in these case studies and prevent the same mistakes from happening in the future. This book also demonstrates the large amount of collaboration that has occurred among various research groups throughout different countries in the Asia Pacific region. The representation of such diverse perspectives from different places is what makes the book interesting because it is particularly enlightening to read about what other countries have developed in terms of digital libraries. In general, the book is organized uniformly and is easy to follow. Each chapter represents one case study and the order of the chapters makes complete sense, as the text flows smoothly from beginning to end. The first chapter begins with a basic history of digital libraries, which helps to familiarize readers with the concept of what a digital library is and provides a brief introduction to how digital libraries came to be. The next few chapters touch on such topics as the design architecture and systems of digital libraries, implementation issues and challenges when designing digital libraries, use and impact of these libraries in societies, considerations that need to be taken into account regarding users and usability, as well as projections of future trends of digital libraries. The editors brilliantly piece together all of the chapters to make the entire book cohesive.
    The chapters are generally less than 20 pages, which allows for concise presentations of each case study. Each chapter contains, more or less, a brief abstract, introduction, related works section, methodology section, conclusion, and references. The chapters are further categorized into six thematic sections. Section I focuses on the history of digital libraries in the Asia Pacific. Section II, composed of four chapters, focuses on the design architecture and systems of digital libraries. The next five chapters, in section III, examine challenges in implementing digital library systems. This section is particularly interesting because issues such as multicultural and multilingual barriers are discussed. Section IV is about the use of and impact of digital libraries in a society. All four chapters in this section emphasize improvements that need to be made to digital libraries regarding different types of users. Particularly important is chapter 14, which discusses digital libraries and their effects on youth. The conclusion of this case study revealed that digital libraries need to support peer learning, as there are many social benefits for youth from interacting with peers. Section V, which focuses on users and usability, consists of five chapters. This section relates directly to the implementation challenges that are mentioned in section III, providing specific examples of cross-cultural issues among users that need to be taken into consideration. In addition, section V discusses the differences in media types and the difficulties with transforming these resources into digital formats. For example, chapter 18, which is about designing a music digital library, demonstrates the difficulties in selecting from the numerous types of technologies that can be used to digitize library collections. Finally, the chapter in section VI discusses the future trends of digital libraries. The editors successfully present diverse perspectives about digital libraries, by including case studies performed in numerous different countries throughout the Asia Pacific region. Countries represented in the case studies include Indonesia, Taiwan, India, China, Singapore, New Zealand, Hong Kong, Philippines, Japan, and Malaysia. The diversity of the users in these countries helps to illustrate the numerous differences and similarities that digital library designers need to take into consideration in the future when developing a universal digital library system. In order to create a successful digital library system that can benefit all users, there must be a sense of balance in the technology used, and the authors of the case studies in this book have definitely proved that there are distinct barriers that need to be overcome in order to achieve this harmony.
    Even though each chapter is short, the entire book covers a vast amount of information. This book is meant to provide an introductory sampling of issues discovered through various case studies, not provide an in-depth report on each of them. The references included at the end of each chapter are particularly helpful because they lead to more information about issues that the particular case study raises. By including a list of references at the end of each chapter, the authors want to encourage interested readers to pursue more about the topics presented. This book clearly offers many opportunities to explore issues on the same topics further. The appendix at the end of the book also contains additional useful information that readers might want to consult if they are interested in finding out more about digital libraries. Selected resources are provided in the form of a list that includes such topics as journal special issues, digital library conference proceedings, and online databases. A key issue that this book brings up is how to include different cultural materials in digital libraries. For example, in chapter 16, the concerns and issues surrounding Maori heritage materials are introduced. The terms and concepts used when classifying Maori resources are so delicate that the meaning behind them can completely change with even a slight variation. Preserving other cultures correctly is important, and researchers need to consider the consequences of any errors made during digitization of resources. Another example illustrating the importance of including information about different cultures is presented in chapter 9. The authors talk about the various different languages used in the world and suggest ways to integrate them into information retrieval systems. As all digital library researchers know, the ideal system would allow all users to retrieve results in their own languages. The authors go on to discuss a few approaches that can be taken to assist with overcoming this challenge.
    Ultimately, the book emphasizes that universal access to a worldwide digital library is the common goal among all digital library designers. Being able to view the same information, no matter what format the material is in, is one of the next steps toward reaching this goal. This book also addresses various additional problems with designing and using digital libraries, such as pricing and costs, and the range of media types that currently exist. The writing styles differ from chapter to chapter because each is written by a different set of authors. In addition, the material in the chapters is presented quite diversely. For example, in chapter 5, the methodology section of the case study is explained in the form of mathematical equations, algorithms, and charts, and chapter 13 contains complex figures and diagrams, whereas on the other hand, chapter 16 is completely written in text. Although the different ways that the case studies are presented could be considered confusing to some, the entire book remains consistent and truly comes together as a whole because the chapters are organized so sensibly. Many figures, graphs, and tables are also provided throughout the chapters to guide readers visually. Particularly helpful are the sample screen shots of digital libraries in chapter 11. Here, readers can see exactly what would be seen when viewing a digital library catalog. In general, the language and style of the book are easy to understand, and any uncommon words and phrases are always clearly defined and explained. The authors mention that the book is primarily written for academics, college students, and practitioners who may want to learn more about the design and development of digital libraries. The authors do seem to target this audience because the language and writing style seem to be geared toward members of academia, although they may represent a wide variety of disciplines. As well, computer scientists and software developers who are interested in and have been researching digital libraries will find this book useful and applicable to their current research. In conclusion, this book provides a wide variation of case studies that prove to be informative to researchers interested in the development and future progress of digital libraries. In the information world that we live in today, digital libraries are becoming more and more prominent, and the case studies presented demonstrate that the vision for the future of digital libraries is to be able to include all types of materials, cultures, and languages within a single system. All in all, this book instills value to society and all members of the academic world can learn from it."
    Imprint
    Hershey, Pa. : Information Science Publ.
    LCSH
    Information storage and retrieval systems / Case studies
    Subject
    Information storage and retrieval systems / Case studies
  10. Women and information technology : research on underrepresentation (2006) 0.12
    0.11501709 = product of:
      0.14377137 = sum of:
        0.092019245 = weight(_text_:section in 592) [ClassicSimilarity], result of:
          0.092019245 = score(doc=592,freq=8.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.34981182 = fieldWeight in 592, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.0234375 = fieldNorm(doc=592)
        0.023978824 = weight(_text_:on in 592) [ClassicSimilarity], result of:
          0.023978824 = score(doc=592,freq=18.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.21870299 = fieldWeight in 592, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.0234375 = fieldNorm(doc=592)
        0.011385918 = weight(_text_:information in 592) [ClassicSimilarity], result of:
          0.011385918 = score(doc=592,freq=10.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.1301088 = fieldWeight in 592, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0234375 = fieldNorm(doc=592)
        0.016387383 = product of:
          0.032774765 = sum of:
            0.032774765 = weight(_text_:technology in 592) [ClassicSimilarity], result of:
              0.032774765 = score(doc=592,freq=10.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.2207458 = fieldWeight in 592, product of:
                  3.1622777 = tf(freq=10.0), with freq of:
                    10.0 = termFreq=10.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0234375 = fieldNorm(doc=592)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    Abstract
    Experts investigate the reasons for low female participation in computing and suggest strategies for moving toward parity through studies of middle and high school girls, female students and postsecondary computer science programs, and women in the information technology workforce. Computing remains a heavily male-dominated field even after 25 years of extensive efforts to promote female participation. The contributors to "Women and Information Technology" look at reasons for the persistent gender imbalance in computing and explore some strategies intended to reverse the downward trend. The studies included are rigorous social science investigations; they rely on empirical evidence - not rhetoric, hunches, folk wisdom, or off-the-cuff speculation about supposed innate differences between men and women. Taking advantage of the recent surge in research in this area, the editors present the latest findings of both qualitative and quantitative studies. Each section begins with an overview of the literature on current research in the field, followed by individual studies. The first section investigates the relationship between gender and information technology among preteens and adolescents, with each study considering what could lead girls' interest in computing to diverge from boys'; the second section, on higher education, includes a nationwide study of computing programs and a cross-national comparison of computing education; the final section, on pathways into the IT workforce, considers both traditional and non-traditional paths to computing careers.
    Footnote
    Rez. in: JASIST 58(2007) no.11, S.1704 (D.E. Agosto): "Student participation in computer science (CS) has dropped significantly over the past few years in the United States. As the Computing Research Association (Vegso, 2006) recently noted, "After five years of decline, the number of new CS majors in fall 2005 was half of what it was in fall 2000 (15,958 vs. 7,952)." Many computing educators and working professionals worry that this reduced level of participation might result in slowed technological innovation in future years. Adding to the problem is especially low female participation in the computer-related disciplines. For example, Cohoon (2003) showed that the percentage of high school girls indicating intent to study CS in college dropped steadily from 1991 to 2001, from a high of 37% to a low of 20%. The National Science Foundation's most recent report on Women, Minorities, and Persons with Disabilities in Science and Engineering (National Science Foundation, 2004) indicates that while females obtained 57% of all bachelor's degrees in 2001, they obtained just 28% of computer-related undergraduate degrees. These low percentages of female participation are reflected in the computing workforce as well. Women and Information Technology: Research on Underrepresentation provides an overview of research projects and research trends relating to gender and computing. The book takes a proactive general stance; the ultimate goal of publishing the research included in the volume is to lead to significant gains in female representation in the study and practice of the computing-related fields. ... The volume as a whole does not offer a clear-cut solution to the problem of female underrepresentation, but a number of the chapters do indicate that recruitment and retention must be dealt with jointly, as each is dependent on the other. Another recurring theme is the importance of role models from early on in girls' lives, in the form of both female faculty and female computing professionals as role models. Still another recurring theme is the importance of female mentoring before and during the college years, including both informal peer mentoring and formal faculty mentoring. Taken as a whole, this is a successful work that is probably most useful as a background reference tool. As such, it should assist students and scholars interested in continuing this undeniably important area of research."
  11. Olsen, K.A.: ¬The Internet, the Web, and eBusiness : formalizing applications for the real world (2005) 0.10
    0.10440011 = product of:
      0.13050014 = sum of:
        0.04337829 = weight(_text_:section in 149) [ClassicSimilarity], result of:
          0.04337829 = score(doc=149,freq=4.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.16490288 = fieldWeight in 149, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.015625 = fieldNorm(doc=149)
        0.02768836 = weight(_text_:on in 149) [ClassicSimilarity], result of:
          0.02768836 = score(doc=149,freq=54.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.25253645 = fieldWeight in 149, product of:
              7.3484693 = tf(freq=54.0), with freq of:
                54.0 = termFreq=54.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.015625 = fieldNorm(doc=149)
        0.010183874 = weight(_text_:information in 149) [ClassicSimilarity], result of:
          0.010183874 = score(doc=149,freq=18.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.11637284 = fieldWeight in 149, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.015625 = fieldNorm(doc=149)
        0.049249627 = sum of:
          0.025853083 = weight(_text_:technology in 149) [ClassicSimilarity], result of:
            0.025853083 = score(doc=149,freq=14.0), product of:
              0.14847288 = queryWeight, product of:
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.049850095 = queryNorm
              0.17412664 = fieldWeight in 149, product of:
                3.7416575 = tf(freq=14.0), with freq of:
                  14.0 = termFreq=14.0
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.015625 = fieldNorm(doc=149)
          0.023396542 = weight(_text_:22 in 149) [ClassicSimilarity], result of:
            0.023396542 = score(doc=149,freq=6.0), product of:
              0.17456654 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.049850095 = queryNorm
              0.1340265 = fieldWeight in 149, product of:
                2.4494898 = tf(freq=6.0), with freq of:
                  6.0 = termFreq=6.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.015625 = fieldNorm(doc=149)
      0.8 = coord(4/5)
    
    BK
    85.20 Betriebliche Information und Kommunikation
    Classification
    004.678 22
    85.20 Betriebliche Information und Kommunikation
    DDC
    004.678 22
    Footnote
    Rez. in: JASIST 57(2006) no.14, S.1979-1980 (J.G. Williams): "The Introduction and Part I of this book presents the world of computing with a historical and philosophical overview of computers, computer applications, networks, the World Wide Web, and eBusiness based on the notion that the real world places constraints on the application of these technologies and without a formalized approach, the benefits of these technologies cannot be realized. The concepts of real world constraints and the need for formalization are used as the cornerstones for a building-block approach for helping the reader understand computing, networking, the World Wide Web, and the applications that use these technologies as well as all the possibilities that these technologies hold for the future. The author's building block approach to understanding computing, networking and application building makes the book useful for science, business, and engineering students taking an introductory computing course and for social science students who want to understand more about the social impact of computers, the Internet, and Web technology. It is useful as well for managers and designers of Web and ebusiness applications, and for the general public who are interested in understanding how these technologies may impact their lives, their jobs, and the social context in which they live and work. The book does assume some experience and terminology in using PCs and the Internet but is not intended for computer science students, although they could benefit from the philosophical basis and the diverse viewpoints presented. The author uses numerous analogies from domains outside the area of computing to illustrate concepts and points of view that make the content understandable as well as interesting to individuals without any in-depth knowledge of computing, networking, software engineering, system design, ebusiness, and Web design. These analogies include interesting real-world events ranging from the beginning of railroads, to Henry Ford's mass produced automobile, to the European Space Agency's loss of the 7 billion dollar Adriane rocket, to travel agency booking, to medical systems, to banking, to expanding democracy. The book gives the pros and cons of the possibilities offered by the Internet and the Web by presenting numerous examples and an analysis of the pros and cons of these technologies for the examples provided. The author shows, in an interesting manner, how the new economy based on the Internet and the Web affects society and business life on a worldwide basis now and how it will affect the future, and how society can take advantage of the opportunities that the Internet and the Web offer.
    The book is organized into six sections or parts with several chapters within each part. Part 1, does a good job of building an understanding some of the historical aspects of computing and why formalization is important for building computer-based applications. A distinction is made between formalized and unformalized data, processes, and procedures, which the author cleverly uses to show how the level of formalization of data, processes, and procedures determines the functionality of computer applications. Part I also discusses the types of data that can be represented in symbolic form, which is crucial to using computer and networking technology in a virtual environment. This part also discusses the technical and cultural constraints upon computing, networking, and web technologies with many interesting examples. The cultural constraints discussed range from copyright to privacy issues. Part 1 is critical to understanding the author's point of view and discussions in other sections of the book. The discussion on machine intelligence and natural language processing is particularly well done. Part 2 discusses the fundamental concepts and standards of the Internet and Web. Part 3 introduces the need for formalization to construct ebusiness applications in the business-to-consumer category (B2C). There are many good and interesting examples of these B2C applications and the associated analyses of them using the concepts introduced in Parts I and 2 of the book. Part 4 examines the formalization of business-to-business (B2B) applications and discusses the standards that are needed to transmit data with a high level of formalization. Part 5 is a rather fascinating discussion of future possibilities and Part 6 presents a concise summary and conclusion. The book covers a wide array of subjects in the computing, networking, and Web areas and although all of them are presented in an interesting style, some subjects may be more relevant and useful to individuals depending on their background or academic discipline. Part 1 is relevant to all potential readers no matter what their background or academic discipline but Part 2 is a little more technical; although most people with an information technology or computer science background will not find much new here with the exception of the chapters on "Dynamic Web Pages" and "Embedded Scripts." Other readers will find this section informative and useful for understanding other parts of the book. Part 3 does not offer individuals with a background in computing, networking, or information science much in addition to what they should already know, but the chapters on "Searching" and "Web Presence" may be useful because they present some interesting notions about using the Web. Part 3 gives an overview of B2C applications and is where the author provides examples of the difference between services that are completely symbolic and services that have both a symbolic portion and a physical portion. Part 4 of the book discusses B2B technology once again with many good examples. The chapter on "XML" in Part 4 is not appropriate for readers without a technical background. Part 5 is a teacher's dream because it offers a number of situations that can be used for classroom discussions or case studies independent of background or academic discipline.
    Each chapter provides suggestions for exercises and discussions, which makes the book useful as a textbook. The suggestions in the exercise and discussion section at the end of each chapter are simply delightful to read and provide a basis for some lively discussion and fun exercises by students. These exercises appear to be well thought out and are intended to highlight the content of the chapter. The notes at the end of chapters provide valuable data that help the reader to understand a topic or a reference to an entity that the reader may not know. Chapter 1 on "formalism," chapter 2 on "symbolic data," chapter 3 on "constraints on technology," and chapter 4 on "cultural constraints" are extremely well presented and every reader needs to read these chapters because they lay the foundation for most of the chapters that follow. The analogies, examples, and points of view presented make for some really interesting reading and lively debate and discussion. These chapters comprise Part 1 of the book and not only provide a foundation for the rest of the book but could be used alone as the basis of a social science course on computing, networking, and the Web. Chapters 5 and 6 on Internet protocols and the development of Web protocols may be more detailed and filled with more acronyms than the average person wants to deal with but content is presented with analogies and examples that make it easier to digest. Chapter 7 will capture most readers attention because it discusses how e-mail works and many of the issues with e-mail, which a majority of people in developed countries have dealt with. Chapter 8 is also one that most people will be interested in reading because it shows how Internet browsers work and the many issues such as security associated with these software entities. Chapter 9 discusses the what, why, and how of the World Wide Web, which is a lead-in to chapter 10 on "Searching the Web" and chapter 11 on "Organizing the Web-Portals," which are two chapters that even technically oriented people should read since it provides information that most people outside of information and library science are not likely to know.
    Chapter 12 on "Web Presence" is a useful discussion of what it means to have a Web site that is indexed by a spider from a major Web search engine. Chapter 13 on "Mobile Computing" is very well done and gives the reader a solid basis of what is involved with mobile computing without overwhelming them with technical details. Chapter 14 discusses the difference between pull technologies and push technologies using the Web that is understandable to almost anyone who has ever used the Web. Chapters 15, 16, and 17 are for the technically stout at heart; they cover "Dynamic Web Pages," " Embedded Scripts," and "Peer-to-Peer Computing." These three chapters will tend to dampen the spirits of anyone who does not come from a technical background. Chapter 18 on "Symbolic Services-Information Providers" and chapter 19 on "OnLine Symbolic Services-Case Studies" are ideal for class discussion and students assignments as is chapter 20, "Online Retail Shopping-Physical Items." Chapter 21 presents a number of case studies on the "Technical Constraints" discussed in chapter 3 and chapter 22 presents case studies on the "Cultural Constraints" discussed in chapter 4. These case studies are not only presented in an interesting manner they focus on situations that most Web users have encountered but never really given much thought to. Chapter 24 "A Better Model?" discusses a combined "formalized/unformalized" model that might make Web applications such as banking and booking travel work better than the current models. This chapter will cause readers to think about the role of formalization and the unformalized processes that are involved in any application. Chapters 24, 25, 26, and 27 which discuss the role of "Data Exchange," "Formalized Data Exchange," "Electronic Data Interchange-EDI," and "XML" in business-to-business applications on the Web may stress the limits of the nontechnically oriented reader even though it is presented in a very understandable manner. Chapters 28, 29, 30, and 31 discuss Web services, the automated value chain, electronic market places, and outsourcing, which are of high interest to business students, businessmen, and designers of Web applications and can be skimmed by others who want to understand ebusiness but are not interested in the details. In Part 5, the chapters 32, 33, and 34 on "Interfacing with the Web of the Future," "A Disruptive Technology," "Virtual Businesses," and "Semantic Web," were, for me, who teaches courses in IT and develops ebusiness applications the most interesting chapters in the book because they provided some useful insights about what is likely to happen in the future. The summary in part 6 of the book is quite well done and I wish I had read it before I started reading the other parts of the book.
    The book is quite large with over 400 pages and covers a myriad of topics, which is probably more than any one course could cover but an instructor could pick and choose those chapters most appropriate to the course content. The book could be used for multiple courses by selecting the relevant topics. I enjoyed the first person, rather down to earth, writing style and the number of examples and analogies that the author presented. I believe most people could relate to the examples and situations presented by the author. As a teacher in Information Technology, the discussion questions at the end of the chapters and the case studies are a valuable resource as are the end of chapter notes. I highly recommend this book for an introductory course that combines computing, networking, the Web, and ebusiness for Business and Social Science students as well as an introductory course for students in Information Science, Library Science, and Computer Science. Likewise, I believe IT managers and Web page designers could benefit from selected chapters in the book."
  12. Guidelines for subject authority and reference entries (1993) 0.10
    0.10080478 = product of:
      0.25201195 = sum of:
        0.21471158 = weight(_text_:section in 6317) [ClassicSimilarity], result of:
          0.21471158 = score(doc=6317,freq=2.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.81622756 = fieldWeight in 6317, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.109375 = fieldNorm(doc=6317)
        0.03730039 = weight(_text_:on in 6317) [ClassicSimilarity], result of:
          0.03730039 = score(doc=6317,freq=2.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.34020463 = fieldWeight in 6317, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.109375 = fieldNorm(doc=6317)
      0.4 = coord(2/5)
    
    Editor
    IFLA Division of Bibliographic Control / Section on Classification and Indexing
  13. Library resources on the Internet : strategies for selection and use (1992) 0.10
    0.09792586 = product of:
      0.16320975 = sum of:
        0.12269233 = weight(_text_:section in 4837) [ClassicSimilarity], result of:
          0.12269233 = score(doc=4837,freq=2.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.46641576 = fieldWeight in 4837, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.0625 = fieldNorm(doc=4837)
        0.02131451 = weight(_text_:on in 4837) [ClassicSimilarity], result of:
          0.02131451 = score(doc=4837,freq=2.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.19440265 = fieldWeight in 4837, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.0625 = fieldNorm(doc=4837)
        0.019202897 = weight(_text_:information in 4837) [ClassicSimilarity], result of:
          0.019202897 = score(doc=4837,freq=4.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.21943474 = fieldWeight in 4837, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=4837)
      0.6 = coord(3/5)
    
    Abstract
    A project of Direct Patron Access to Computer-based Reference Systems Committee, Machine-assisted Reference Section, Reference and Adult Services Division, American Library Association.
    LCSH
    Library information networks / United States
    Subject
    Library information networks / United States
  14. Haravu, L.J.: Lectures on knowledge management : paradigms, challenges and opportunities (2002) 0.10
    0.09670785 = product of:
      0.12088481 = sum of:
        0.054222863 = weight(_text_:section in 2048) [ClassicSimilarity], result of:
          0.054222863 = score(doc=2048,freq=4.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.2061286 = fieldWeight in 2048, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2048)
        0.013321568 = weight(_text_:on in 2048) [ClassicSimilarity], result of:
          0.013321568 = score(doc=2048,freq=8.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.121501654 = fieldWeight in 2048, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2048)
        0.015299367 = weight(_text_:information in 2048) [ClassicSimilarity], result of:
          0.015299367 = score(doc=2048,freq=26.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.17482844 = fieldWeight in 2048, product of:
              5.0990195 = tf(freq=26.0), with freq of:
                26.0 = termFreq=26.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2048)
        0.038041018 = sum of:
          0.021156019 = weight(_text_:technology in 2048) [ClassicSimilarity], result of:
            0.021156019 = score(doc=2048,freq=6.0), product of:
              0.14847288 = queryWeight, product of:
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.049850095 = queryNorm
              0.1424908 = fieldWeight in 2048, product of:
                2.4494898 = tf(freq=6.0), with freq of:
                  6.0 = termFreq=6.0
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2048)
          0.016885 = weight(_text_:22 in 2048) [ClassicSimilarity], result of:
            0.016885 = score(doc=2048,freq=2.0), product of:
              0.17456654 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.049850095 = queryNorm
              0.09672529 = fieldWeight in 2048, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2048)
      0.8 = coord(4/5)
    
    Footnote
    Rez. in: Knowledge organization 30(2003) no.1, S.42-44 (D. Mercier): "This work is a collection of lecture notes following the 22"d Sarada Ranganathan Endowment Lectures which took place in Bangalore, India, from 4-6 December 2000. This compilation has been divided into four sections: historical introduction, compilation of several definitions about knowledge and its management, impacts of knowledge management (KM) an information professionals and, review of information technologies as tools for knowledge management. The aim of this book is to provide "a succinct overview of various aspects of knowledge management, particularly in companies" (p. v). Each chapter focuses an a dominant text in a specific area. Most of the quoted authors are known consultants in KM. Each chapter is similarly handled: a review of a dominant book, some subject matter from a few other consultants and, last but not least, comments an a few broadly cited cases. Each chapter is uneven with regards to the level of detail provided, and ending summaries, which would have been useful, are missing. The book is structured in two parts containing five chapters each. The first part is theoretical, the second deals with knowledge workers and technologies. Haravu begins the first chapter with a historical overview of information and knowledge management (IKM) essentially based an the review previously made by Drucker (1999). Haravu emphasises the major facts and events of the discipline from the industrial revolution up to the advent of the knowledge economy. On the whole, this book is largely technology-oriented. The lecturer presents micro-economic factors contributing to the economic perspective of knowledge management, focusing an the existing explicit knowledge. This is Haravu's prevailing perspective. He then offers a compilation of definitions from Allee (1997) and Sveiby (1997), both known for their contribution in the area of knowledge evaluation. As many others, Haravu confirms his assumption regarding the distinction between information and knowledge, and the knowledge categories: explicit and tacit, both actions oriented and supported by rules (p. 43). The SECI model (Nonaka & Takeuchi, 1995), also known as "knowledge conversion spiral" is described briefly, and the theoretically relational dimension between individual and collectivities is explained. Three SECI linked concepts appear to be missing: contexts in movement, intellectual assets and leadership.
    Haravu makes a rather original analogy with Ranganathan's theory of "spiral of subjects development". This will be of particular interest for those working in knowledge organisation. The last third of this chapter covers the Allee's "Knowledge Complexity Framework", defining the Knowledge Archetype, the learning and performance framework, and twelve principles of knowledge management (p. 55-66). In the third chapter, Haravu describes at first and extensively KM interdisciplinary features and its contributive disciplines (and technologies): cognitive science, expert systems, artificial intelligence, knowledge-based systems, computer-supported collaborative work, library and information science, technical writing, document management, decision support systems, semantic networks, relational and object databases, Simulation and organisational science. This combination of disciplines and technologies is aligned with the systematic approach chosen in the first chapter. After a combined definition of knowledge management (Malhotra, 1998; Sveiby, 1997), Haravu surveys three specific approaches of the knowledge economic perspective: core-competency (Godbout, 1998), leveraging and managing intangible assets (Sveiby, 1997), and expanding an organisationas capacity to learn and share knowledge (Allee, 1997). Then, he describes again Sveiby's and Allee's frameworks, largely borrowing from the Sveiby's "six KM strategies" (p. 101). For each approach, he summarizes a case study from the reviewed authors. The final section section is a summary of broadly cited case studies (Buchman Laboratories and Hoffman-Laroche). On a practical basis, Haravu underlines the Impacts of KM practices an knowledge workers, particularly information professionals. The major activity of information professionals is adding value to information: filtering, validating, analysing, synthesising, presenting and prevading facilities to access and use. Leadership in knowledge management processes is rapidly detailed. At the end of this chapter, the author describes information professionals' core competencies required in organisational knowledge management and refer to the Andersen Consulting and Chevron's cases. From this perspective, new collaborative roles in KM for information professionals are omitted.
    On the other hand, from the economic perspective of knowledge management, the role of technology is dominant. The last chapter presents, in details, tools and technologies used by, or potentially useful to, KM practitioners. This chapter discusses the Tiwana (2000) framework and cases. This framework has several meta-component categories: knowledge flow, information mapping, information sources, information and knowledge exchange, and intelligent agent and network mining. In summarizing the Tiwana (2000) study, Haravu gives generic characteristics to the most prevailing tools. To downplay the predominance of technologies, Haravu concludes his book with a discussion of three KM technology myths. This compilation of notes is a real patchwork with some sewing mistakes. In order to be able to read and understand it better, one would have to rewrite a detailed table of contents since many numbering errors and incoherence appear in all the chapters. Levels of details are different in each chapter. As one reads along, many details are repeated. Bibliographic references are incomplete and there are no citations for figures or tables. This book looks like a draft companion for those who attended the lecture, but it is not clear why it becomes available as late as two years after the event. KM is a new discipline in constant evolution. In contrast, the book seems to be a demonstration of a mature and stable discipline. In this publication, Haravu fails to display the plurality of paradigmatic KM dimensions, challenges and opportunities. The compilation is not original and reflects the very traditional style of the first generation of KM specialists. Following thousands of books and articles written about KM, this compilation still Shows a systematic or economic perspective of KM, in which the systemic approach is omitted and KM duality ignored. Annotated bibliographies are to be preferred to Haravu's patchwork."
  15. Online information services in the social sciences : from practice to need, from need to service (2004) 0.09
    0.09416572 = product of:
      0.15694286 = sum of:
        0.12269233 = weight(_text_:section in 4504) [ClassicSimilarity], result of:
          0.12269233 = score(doc=4504,freq=8.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.46641576 = fieldWeight in 4504, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.03125 = fieldNorm(doc=4504)
        0.024478985 = weight(_text_:information in 4504) [ClassicSimilarity], result of:
          0.024478985 = score(doc=4504,freq=26.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.2797255 = fieldWeight in 4504, product of:
              5.0990195 = tf(freq=26.0), with freq of:
                26.0 = termFreq=26.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=4504)
        0.009771545 = product of:
          0.01954309 = sum of:
            0.01954309 = weight(_text_:technology in 4504) [ClassicSimilarity], result of:
              0.01954309 = score(doc=4504,freq=2.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.13162735 = fieldWeight in 4504, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.03125 = fieldNorm(doc=4504)
          0.5 = coord(1/2)
      0.6 = coord(3/5)
    
    Abstract
    Information professionals are increasingly responsible not only for running traditional information and library services but also for providing an online presence for their organisation. This book shows how best practice in delivering online information services should be based an actual user needs and behaviour. A series of case studies provide real life examples of how social science information is being used in the community. The book then draws an these case studies to outline the main issues facing service providers: such as usability, meta-data and management. The book concludes with a look to the future and how both technological and organisational changes will shape online information services.
    Content
    Key features - Case studies show how - in practical terms - information science issues relate to users' behaviour - The book is written by experts in the field, with each chapter drawing an both case studies and extensive experience in the field - The book can be used as a detailed reference or an overview The Authors The contributors to the book are based at the Institute for Learning and Research Technology, University of Bristol, UK and are responsible for developing and running national online services. The book is edited by Dr Jacobs, an experienced information professional who has worked both in traditional libraries and an national projects and online services. Readership The book is aimed at anyone providing an online service to Chose using social science information, including information officers, librarians and knowledge managers, together with related IT managers and students of LIS at undergraduate and postgraduate level. Contents Section 1 - case studies, describing how information is used in the health, government, academic, trades union, media and other sectors, with particular attention to online information practices. Section 2 - drawing the lessons from the case studies. Section 3 - the major issues facing service providers, including selection, metadata, usability, accessibility, management, and building user skills. Section 4 - the future, covering both technological developments such as the semantic web and portals, and organisational issues such as the changing role of the information professional.
  16. Kavouras, M.; Kokla, M.: Theories of geographic concepts : ontological approaches to semantic integration (2008) 0.09
    0.08706535 = product of:
      0.14510891 = sum of:
        0.12269233 = weight(_text_:section in 3275) [ClassicSimilarity], result of:
          0.12269233 = score(doc=3275,freq=8.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.46641576 = fieldWeight in 3275, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.03125 = fieldNorm(doc=3275)
        0.010657255 = weight(_text_:on in 3275) [ClassicSimilarity], result of:
          0.010657255 = score(doc=3275,freq=2.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.097201325 = fieldWeight in 3275, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.03125 = fieldNorm(doc=3275)
        0.011759326 = weight(_text_:information in 3275) [ClassicSimilarity], result of:
          0.011759326 = score(doc=3275,freq=6.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.1343758 = fieldWeight in 3275, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=3275)
      0.6 = coord(3/5)
    
    Abstract
    Written by experts in the field, this book addresses theoretical, formal, and pragmatic issues of geographic knowledge representation and integration based on an ontological approach. The first section sets the context by emphasizing the importance of philosophical, cognitive, and formal theories in preserving the semantics of geographic concepts during ontology development and integration. Section two exhausts all theoretical issues related to the subject and section three introduces a number of formal tools. Section four introduces a general method with the necessary steps to ontology integration and applies it to a number of ontology integration cases.
    Content
    Introduction -- Geographic ontologies -- Semantic interoperability -- Ontologies -- Concepts -- Semantics -- Knowledge representation instruments -- Formal concept analysis -- Conceptual graphs -- Channel theory -- Description logics -- Natural language and semantic information extraction -- Similarity -- Integration framework -- Integration approaches -- Integration guidelines -- Epilogue.
    LCSH
    Geographic information systems
    Subject
    Geographic information systems
  17. Guidelines for Online Public Access Catalogue (OPAC) Displays : Final Report May 2005. Recommended by the IFLA Task Force on Guidelines for OPACD Displays. Approved by the Standing Committee of the IFLA Cataloguing Section (2005) 0.09
    0.086240284 = product of:
      0.1437338 = sum of:
        0.10844573 = weight(_text_:section in 5067) [ClassicSimilarity], result of:
          0.10844573 = score(doc=5067,freq=4.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.4122572 = fieldWeight in 5067, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5067)
        0.023073634 = weight(_text_:on in 5067) [ClassicSimilarity], result of:
          0.023073634 = score(doc=5067,freq=6.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.21044704 = fieldWeight in 5067, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5067)
        0.012214432 = product of:
          0.024428863 = sum of:
            0.024428863 = weight(_text_:technology in 5067) [ClassicSimilarity], result of:
              0.024428863 = score(doc=5067,freq=2.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.16453418 = fieldWeight in 5067, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=5067)
          0.5 = coord(1/2)
      0.6 = coord(3/5)
    
    Abstract
    Existing Online Public Access Catalogues (OPACs) demonstrate differences in the range and complexity of their functional features, terminology, and help facilities. Many libraries already have OPACs and many of them have a need for guidelines that help them to design or redesign the displays for their OPACs, taking their users' needs into account. This book provides such guidelines, recommendations and a corpus of good practice to assist libraries in this process. The audience for these guidelines is librarians charged with customising OPAC software and vendors and producers of this software. The guidelines are mainly designed for general libraries with collections of resources in the humanities, the social sciences, and the pure and applied sciences. They are intended to apply to any type of catalogue, independently of the kind of interface and technology used. This is the Final Report of a Task Force an the matter, which was approved by the Standing Committee of the IFLA Cataloguing Section.
    Editor
    IFLA Task Force on Guidelines for OPACD Displays
    Series
    IFLA series on bibliographic control; vol. 27
  18. Nicholas, D.: Assessing information needs : tools, techniques and concepts for the Internet age (2000) 0.09
    0.08506873 = product of:
      0.14178121 = sum of:
        0.092019245 = weight(_text_:section in 1745) [ClassicSimilarity], result of:
          0.092019245 = score(doc=1745,freq=2.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.34981182 = fieldWeight in 1745, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.046875 = fieldNorm(doc=1745)
        0.015985882 = weight(_text_:on in 1745) [ClassicSimilarity], result of:
          0.015985882 = score(doc=1745,freq=2.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.14580199 = fieldWeight in 1745, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.046875 = fieldNorm(doc=1745)
        0.03377609 = weight(_text_:information in 1745) [ClassicSimilarity], result of:
          0.03377609 = score(doc=1745,freq=22.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.38596505 = fieldWeight in 1745, product of:
              4.690416 = tf(freq=22.0), with freq of:
                22.0 = termFreq=22.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.046875 = fieldNorm(doc=1745)
      0.6 = coord(3/5)
    
    Abstract
    This work tackles one of the fundamental problems of information management - how to get the right information to the right person at the right time. It provides a practical framework to enable information services to gather information from users in order to aid information system design, and to monitor the effectiveness of an information service. This new edition has been fully revised and now has increased coverage of the Internet. The Web raises many problems when it comes to meeting information needs - authority and overload, for example - and these problems make an effective information needs analysis even more crucial. There is a new methodology section on Web log analysis and focus group interviews. Practical advice is given concerning interview technique and an interview schedule is included.
    LCSH
    Information services
    Subject
    Information services
  19. Shaping the network society : the new role of civil society in cyberspace (2004) 0.08
    0.081871234 = product of:
      0.102339044 = sum of:
        0.06640917 = weight(_text_:section in 441) [ClassicSimilarity], result of:
          0.06640917 = score(doc=441,freq=6.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.25245494 = fieldWeight in 441, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.01953125 = fieldNorm(doc=441)
        0.013321568 = weight(_text_:on in 441) [ClassicSimilarity], result of:
          0.013321568 = score(doc=441,freq=8.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.121501654 = fieldWeight in 441, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.01953125 = fieldNorm(doc=441)
        0.010393873 = weight(_text_:information in 441) [ClassicSimilarity], result of:
          0.010393873 = score(doc=441,freq=12.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.11877254 = fieldWeight in 441, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.01953125 = fieldNorm(doc=441)
        0.012214432 = product of:
          0.024428863 = sum of:
            0.024428863 = weight(_text_:technology in 441) [ClassicSimilarity], result of:
              0.024428863 = score(doc=441,freq=8.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.16453418 = fieldWeight in 441, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=441)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    Footnote
    Rez. in: JASIST 57(2006) no.5, S.724-725 (P.K. Nayar): "The network society (Castells, 1996) calls for radically new definitions of the public sphere. and this is what Shaping the Network Society's essays set out to do. The first section lays out the essential issues at stake here: human rights, the sociology of cyberspace. and globalization. Oliver BoydBarrett characterizes cyberspace as exclusive. Pointing to the almost total corporate control of the technologies of cyberspace. Boyd-Barrett argues that any attempt of huge corporate bodies to get into grassroots democracy should be viewed with suspicion. The institution of a public sphere. argues Boyd-Barrett, must begin with an assessment of how far the Internet at fords a space of contestation of elitist governing frameworks. Gary Chapman looks at Italy's slow food movement as a counter to the technoglobalist trends, and suggests that the globaltechnological imperative must not be allowed to occlude human values. Rather we need a social imperative here. one which thinks about technology as "malleable, as capable of serving human-determined ends" (p. 64). Cees Hamelink discusses how four rights-right to speech. democratic order, equal participation in social life. and cultural identity are threatened by what he terms the billboardization of society in the networked age. In the second section a range of case studies are presented. Kate Williams and Abdul Alkalimat survey every public computing facility in Toledo (Ohio) to map the parameters of public access to information and decision-making. They conclude that government public computing sites arc situated randomly, community sites are in economically rich or poor (but not middle-stratum) localities, and that commercial and university sites are influenced by market forces. They suggest that future research must necessarily focus on what forms of cyberpower emerge through such use of public computing.
    Geert Lovnik and Patrice Riemens explore the digital culture of Amsterdam to show how. despite the techno-social idealism of the early years of the public sphere Digital City project. the culture ran into problems. Susan Finquelievich studies the practices of civic networks in Buenos Aires and Montevideo to demonstrate how local sociohistorical conditions have shaped the technology's development. Veran Matic focuses on the role of media in defending human rights in a hostile environment (former Yugoslavia). Media, she notes, need not necessarily he (or become) a tool of fascist forces, but can he used to generate resistance and to forge a democratic public sphere. Scott Robinson looks at Mexico's telecenter movement to argue that these cybercafes are likely to become an institution for the new Second World of immigrants and refugees. through socially relevant functions. Fiorella de Cindio looks at one of the worlds most significant community networks that of Milan. She demonstrates how local citizens have used information and communication technologies to build a viable. and potentially empowering, participatory public sphere in academia, computer-supported cooperative work, participatory design, and civil engagement (what she calls genes). The third section, -'Building a New Public Sphere in Cyberspace," pros- ides a series of suggestions and frameworks for the spacing of public space through information and communications technologies. Craig Calhoun argues that a global public sphere is indispensable to the formation of a global democracy. Public discourse can still fight commercialism and violence to form a more democratic civil society. Howard Rheingold the great enthusiast of virtual worlds-performs an intricate mix of autobiographical reflection and speculation when he writes of the role of the new technologies. Rheingold, despite his fetishistic enthusiasm for technology and online community, is cautious when it comes to crucial issues such as the creation of democratic public spheres, arguing that we require a great deal more serious thinking on matters of ownership and control (over the technology). He argues that if citizens lose our freedom to communicate, then even the powerful potential of the Net to create electronic democracy will be fatal illusion (p. 275). Nancy Kranich turns to public libraries as the site of potential democratic society, arguing that as sites of informationdissemination. public libraries can become a commons for the exchange of ideas and social interaction. David Silver compares the Blacksburg Electronic Village (BEV) to the Seattle Community Network the former funded by corporations and the state, the latter built essentially out of and through volunteer efforts. Silver, in characteristic style. looks at the historical archaeologies of the networks to show how sociohistorical contexts shape certain kinds of public spheres (and public discourse). going on to ask how, these networks can overcome these contexts to achieve their original goals. He warns that we need to uncover the histories of such networks because they inform the kinds of interactions of communities that exist within them. Douglas Morris analyzes the Independent Media Centre (IMO) Movement of antiglobalization activists to argue that alternative viewpoints and ideological differences can he aired, debated, and appropriated through the new technologies in order to fight corporate and commercial forces.
    Peter Day and Douglas Schuler wind up the book by taking a close look at the sociotechnical context in the 1990s. They argue that utopian schemes for the development of civil society and/or the public sphere may entail a degree of risk. However. Day and Schuler argue that community networks should be ''networks of awareness. advocacy and action" with a high degree of grassroots involvement. This can be done through more responsive policies. Local citizens-the first beneficiaries or victims of policy-should he brought into the decision-making process via civic dialogue. Public funding must be provided for projects that enable dissemination of information about a variety of cultures and belief systems. Shaping the Network Society is understandably more cautious than earlier accounts of cyberculture in its reception of new information and communications technology. Haunted by post 9/11 security measures. increasing surveillance, the faster erosion of liberal humanist ideals, and the internationalization/ commercialization of the media, the essays prefer to be wary about the potential of cyberpower. However, the optimist tone of every essay is unmistakable. While admitting that much more needs to be done to overcome the digital divide and the (mis)appropriation of cyberpower. the essays and ease studies draw attention to the potential for public debate and alternative ideologies. The case studies demonstrate success stories, but invariably conclude with a moral: about the need for vigilance against appropriation and fascist control! What emerges clearly is that the new media have achieved considerable progress in opening up the space for greater citizen involvement, more locally-responsive policy decisions. and socially relevant information-dissemination. Shaping the Network Society, with a strangely messianic slant, is a useful step in the mapping of the present and future cyberspace as the space of new democracies to come of a justice to he worked and prepared for."
  20. Kochtanek, T.R.; Matthews, J.R.: Library information systems : from library automation to distributed information systems (2002) 0.08
    0.0815414 = product of:
      0.101926744 = sum of:
        0.054222863 = weight(_text_:section in 1792) [ClassicSimilarity], result of:
          0.054222863 = score(doc=1792,freq=4.0), product of:
            0.26305357 = queryWeight, product of:
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.049850095 = queryNorm
            0.2061286 = fieldWeight in 1792, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.276892 = idf(docFreq=613, maxDocs=44218)
              0.01953125 = fieldNorm(doc=1792)
        0.006660784 = weight(_text_:on in 1792) [ClassicSimilarity], result of:
          0.006660784 = score(doc=1792,freq=2.0), product of:
            0.109641045 = queryWeight, product of:
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.049850095 = queryNorm
            0.060750827 = fieldWeight in 1792, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.199415 = idf(docFreq=13325, maxDocs=44218)
              0.01953125 = fieldNorm(doc=1792)
        0.020787746 = weight(_text_:information in 1792) [ClassicSimilarity], result of:
          0.020787746 = score(doc=1792,freq=48.0), product of:
            0.08751074 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.049850095 = queryNorm
            0.23754507 = fieldWeight in 1792, product of:
              6.928203 = tf(freq=48.0), with freq of:
                48.0 = termFreq=48.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.01953125 = fieldNorm(doc=1792)
        0.020255346 = product of:
          0.04051069 = sum of:
            0.04051069 = weight(_text_:technology in 1792) [ClassicSimilarity], result of:
              0.04051069 = score(doc=1792,freq=22.0), product of:
                0.14847288 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.049850095 = queryNorm
                0.2728491 = fieldWeight in 1792, product of:
                  4.690416 = tf(freq=22.0), with freq of:
                    22.0 = termFreq=22.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=1792)
          0.5 = coord(1/2)
      0.8 = coord(4/5)
    
    Abstract
    Specifically designed for core units in library automation and information systems, this long awaited new text gives students a comprehensive overview of one of the most critical areas of library operations. Produced by two internationally known scholars, Thomas Kochtanek and Joseph Matthews, this book will enable students to take the lead in managing an immense diversity of information resources and at the same time handle the complexities that information technology brings to the library. Giving important insight into library information systems-from the historical background to the latest technological trends and developments-the book is organized into 14 chapters, each presenting helpful information on such topics as systems design, types of systems, coverage of standards and standards organizations, technology axioms, system selection and implementation, usability of systems, library information systems management, technology trends, digital libraries, and more. New to the acclaimed Library and Information Science Text Series, this book will prove an indispensable resource to students preparing for a career in today's ever-evolving library environment. Complete with charts and illustrations, chapter summaries, suggested print and electronic resources, a glossary of terms, and an index, this text will be of central importance to libraries and library schools everywhere.
    Footnote
    Rez. in: JASIST 54(2003) no.12, S.1166-1167 (Brenda Chawner): "Kochtanek and Matthews have written a welcome addition to the small set of introductory texts an applications of information technology to library and information Services. The book has fourteen chapters grouped into four sections: "The Broader Context," "The Technologies," "Management Issues," and "Future Considerations." Two chapters provide the broad content, with the first giving a historical overview of the development and adoption of "library information systems." Kochtanek and Matthews define this as "a wide array of solutions that previously might have been considered separate industries with distinctly different marketplaces" (p. 3), referring specifically to integrated library systems (ILS, and offen called library management systems in this part of the world), and online databases, plus the more recent developments of Web-based resources, digital libraries, ebooks, and ejournals. They characterize technology adoption patterns in libraries as ranging from "bleeding edge" to "leading edge" to "in the wedge" to "trailing edge"-this is a catchy restatement of adopter categories from Rogers' diffusion of innovation theory, where they are more conventionally known as "early adopters," "early majority," "late majority," and "laggards." This chapter concludes with a look at more general technology trends that have affected library applications, including developments in hardware (moving from mainframes to minicomputers to personal Computers), changes in software development (from in-house to packages), and developments in communications technology (from dedicated host Computers to more open networks to the current distributed environment found with the Internet). This is followed by a chapter describing the ILS and online database industries in some detail. "The Technologies" begins with a chapter an the structure and functionality of integrated library systems, which also includes a brief discussion of precision versus recall, managing access to internal documents, indexing and searching, and catalogue maintenance. This is followed by a chapter an open systems, which concludes with a useful list of questions to consider to determine an organization's readiness to adopt open source solutions. As one world expect, this section also includes a detailed chapter an telecommunications and networking, which includes types of networks, transmission media, network topologies, switching techniques (ranging from dial up and leased lines to ISDN/DSL, frame relay, and ATM). It concludes with a chapter an the role and importance of standards, which covers the need for standards and standards organizations, and gives examples of different types of standards, such as MARC, Dublin Core, Z39.50, and markup standards such as SGML, HTML, and XML. Unicode is also covered but only briefly. This section world be strengthened by a chapter an hardware concepts-the authors assume that their reader is already familiar with these, which may not be true in all cases (for example, the phrase "client-Server" is first used an page 11, but only given a brief definition in the glossary). Burke's Library Technology Companion: A Basic Guide for Library Staff (New York: Neal-Schuman, 2001) might be useful to fill this gap at an introductory level, and Saffady's Introduction to Automation for Librarians, 4th ed. (Chicago: American Library Association, 1999) world be better for those interested in more detail. The final two sections, however, are the book's real strength, with a strong focus an management issues, and this content distinguishes it from other books an this topic such as Ferguson and Hebels Computers for Librarians: an Introduction to Systems and Applications (Waggawagga, NSW: Centre for Information Studies, Charles Sturt University, 1998). ...
    Though the book definitely meets a need for an up-to-date introduction to library information systems and associated management issues, and the emphasis an management issues means that it will not date too quickly, there is room for improvement. Some topics are described too briefly to be useful, such as customization/personalization, which is covered in a single paragraph, and does not mention recent developments such as the MyLibrary concept. Other topics seem to have only a peripheral connection to the main chapter theme-for example, it is surprising to find a discussion of information literacy at the end of the chapter an system selection and implementation, and the material an personalization/customization is at the end of the discussion of intranets. Despite these comments, 1 would consider using this as a textbook in an introductory course an library automation or information technology, and practitioners who want to upgrade their knowledge of current practices and issues will also find it useful. People who are primarily interested in a specific topic, such as information systems planning or system selection and implementation are likely to find more specialized books such as Planning for Integrated Systems and Technologies: A How-to-Do-It Manual for Librarians by John M. Cohn, Anne L. Kelsey, and Keith Michael Fiels (New York: Neal-Schuman, 2001) more useful."
    LCSH
    Library information networks
    Information storage and retrieval systems
    Information technology
    Series
    Library and information science text series
    Subject
    Library information networks
    Information storage and retrieval systems
    Information technology

Languages

Types

  • s 396
  • i 81
  • b 27
  • el 18
  • x 11
  • d 6
  • r 5
  • n 4
  • u 2
  • More… Less…

Themes

Subjects

Classifications