Search (5 results, page 1 of 1)

  • × subject_ss:"Information science"
  1. Covert and overt : recollecting and connecting intelligence service and information science (2005) 0.02
    0.01865352 = product of:
      0.03730704 = sum of:
        0.03730704 = sum of:
          0.02015615 = weight(_text_:2007 in 69) [ClassicSimilarity], result of:
            0.02015615 = score(doc=69,freq=2.0), product of:
              0.20205033 = queryWeight, product of:
                4.514535 = idf(docFreq=1315, maxDocs=44218)
                0.044755515 = queryNorm
              0.099758066 = fieldWeight in 69, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                4.514535 = idf(docFreq=1315, maxDocs=44218)
                0.015625 = fieldNorm(doc=69)
          0.017150886 = weight(_text_:22 in 69) [ClassicSimilarity], result of:
            0.017150886 = score(doc=69,freq=4.0), product of:
              0.15672618 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.044755515 = queryNorm
              0.109432176 = fieldWeight in 69, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.015625 = fieldNorm(doc=69)
      0.5 = coord(1/2)
    
    Classification
    327.12 22
    DDC
    327.12 22
    Footnote
    Rez. in: JASIST 58(2007) no.2, S.303-305 (L. Hayden): "Part history and part call to action, Covert and Overt examines the relationship between the disciplines of intelligence service and information science. The book is significant in that it captures both the rich history of partnership between the fields, and because it demonstrates clearly the incomplete nature of our understanding of that partnership. In the post-9/11 world, such understanding is increasingly important, as we struggle with the problem of transforming information into intelligence and intelligence into effective policy. Information science has an important role to play in meeting these challenges, but the sometimesambiguous nature of the field combined with similar uncertainties over what constitutes intelligence, makes any attempt at definitive answers problematic. The book is a collection of works from different contributors, in the words of one editor "not so much a created work as an aggregation" (p. 1). More than just an edited collection of papers, the book draws from the personal experiences of several prominent information scientists who also served as intelligence professionals from World War II onward. The result is a book that feels very personal and at times impassioned. The contributors attempt to shed light on an often-closed community of practice, a discipline that depends simultaneously on access to information and on secrecy. Intelligence, like information science, is also a discipline that finds itself increasingly attracted to and dependent upon technology, and an underlying question of the book is where and how technology benefits intelligence (as opposed to only masking more fundamental problems of process and analysis and providing little or no actual value).
  2. New directions in human information behavior (2006) 0.01
    0.0062987967 = product of:
      0.0125975935 = sum of:
        0.0125975935 = product of:
          0.025195187 = sum of:
            0.025195187 = weight(_text_:2007 in 577) [ClassicSimilarity], result of:
              0.025195187 = score(doc=577,freq=2.0), product of:
                0.20205033 = queryWeight, product of:
                  4.514535 = idf(docFreq=1315, maxDocs=44218)
                  0.044755515 = queryNorm
                0.12469758 = fieldWeight in 577, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.514535 = idf(docFreq=1315, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=577)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Weitere Rez. in: JASIST 58(2007) no.10, S.1553 (C. Wang)
  3. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.01
    0.006063754 = product of:
      0.012127508 = sum of:
        0.012127508 = product of:
          0.024255017 = sum of:
            0.024255017 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.024255017 = score(doc=566,freq=2.0), product of:
                0.15672618 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.044755515 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
  4. Theories of information behavior (2005) 0.01
    0.0050390377 = product of:
      0.010078075 = sum of:
        0.010078075 = product of:
          0.02015615 = sum of:
            0.02015615 = weight(_text_:2007 in 68) [ClassicSimilarity], result of:
              0.02015615 = score(doc=68,freq=2.0), product of:
                0.20205033 = queryWeight, product of:
                  4.514535 = idf(docFreq=1315, maxDocs=44218)
                  0.044755515 = queryNorm
                0.099758066 = fieldWeight in 68, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.514535 = idf(docFreq=1315, maxDocs=44218)
                  0.015625 = fieldNorm(doc=68)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Weitere Rez. in: JASIST 58(2007) no.2, S.303 (D.E. Agosto): "Due to the brevity of the entries, they serve more as introductions to a wide array of theories than as deep explorations of a select few. The individual entries are not as deep as those in more traditional reference volumes, such as The Encyclopedia of Library and Information Science (Drake, 2003) or The Annual Review of Information Science and Technology (ARIST) (Cronin, 2005), but the overall coverage is much broader. This volume is probably most useful to doctoral students who are looking for theoretical frameworks for nascent research projects or to more veteran researchers interested in an introductory overview of information behavior research, as those already familiar with this subfield also will probably already be familiar with most of the theories presented here. Since different authors have penned each of the various entries, the writing styles vary somewhat, but on the whole, this is a readable, pithy volume that does an excellent job of encapsulating this important area of information research."
  5. Crowley, W.: Spanning the theory-practice divide in library and information science (2005) 0.01
    0.0050390377 = product of:
      0.010078075 = sum of:
        0.010078075 = product of:
          0.02015615 = sum of:
            0.02015615 = weight(_text_:2007 in 439) [ClassicSimilarity], result of:
              0.02015615 = score(doc=439,freq=2.0), product of:
                0.20205033 = queryWeight, product of:
                  4.514535 = idf(docFreq=1315, maxDocs=44218)
                  0.044755515 = queryNorm
                0.099758066 = fieldWeight in 439, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.514535 = idf(docFreq=1315, maxDocs=44218)
                  0.015625 = fieldNorm(doc=439)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Rez. in: JASIST. 58(2007) no.4, S.606-607 (L.E. Harris): "Spanning is not a methodological "how-to"; rather it is a "how-tothink" book, intended for academicians and practitioners, on developing useful theory. Each chapter opens with a brief scenario, generally derived from Crowley's extensive personal experience as a librarian, university professor, and consultant, exemplifying the theme for that chapter. In chapter one, "Theorizing for Diverging Contexts: Why Research Results and Theory Development are So Little Used Outside the Campus," Crowley describes a doctoral candidate's experience in presenting her research at a national conference of working professionals. When the presentation is negatively received, the student's mentor rationalized the response by stating, "You have to remember, most of the people in the audience only have a master's degree" (p. 2). From this example, a cogent argument is distilled on how pervasive the theorypractice divide is in various academic domains, such as business, law, sociology, and LIS. What is useful research and theory for academicians seeking career and professional advancement does not translate into for practitioners engaged in specific institutional/organizational environments. Cultural pragmatism is introduced as an aid to researchers in both camps for its inclusion of context specificity and the need for testing a theory's usefulness through continually analyzed experience. Herein, the structural foundation for the bridge is constructed in the section on communication. The development of an interlanguage between academicians and practitioners will minimize incommensurability, "the perceived inability of humans to communicate effectively with one another due to a lack of common standards for meaning and other shared foundations" (p. 15). In this vein, Crowley presents five maxims, based on the works of John Stuart Mill, for developing useful, real world theory. The chapter ends, as do several others, addressing the divide specifically in the LIS domain. One of the most thought-provoking chapters is "Developing a Research Philosophy," which includes sections on inductive reasoning, how people really think, and a discussion of the battle between intellectual formations and internalized models. As a teacher of experienced and/or mature students in an LIS program, I instantly recognized the description of a reoccurring classroom event: what happens when introducing theory or research results that contradict students' experiences, and therefore, their internalized models of "how things really work in the field." Crowley suggests that in seeking a research philosophy, persuasion should not be a primary concern. This simple suggestion encouraged me to reconsider my posture when faced with this classroom issue. However, this chapter may be considered one of the weakest in the book, because of its rather slim treatment of considerations for selecting a useful research philosophy, despite the emphasis on the importance of the concept. Nevertheless, this chapter is foundational to the work presented in the remaining chapters.