Search (4 results, page 1 of 1)

  • × subject_ss:"Information science"
  1. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.01
    0.006073163 = product of:
      0.012146326 = sum of:
        0.012146326 = product of:
          0.024292652 = sum of:
            0.024292652 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.024292652 = score(doc=566,freq=2.0), product of:
                0.15696937 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.044824958 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
  2. Warner, J.: Humanizing information technology (2004) 0.01
    0.00583013 = product of:
      0.01166026 = sum of:
        0.01166026 = product of:
          0.02332052 = sum of:
            0.02332052 = weight(_text_:2003 in 438) [ClassicSimilarity], result of:
              0.02332052 = score(doc=438,freq=2.0), product of:
                0.19453894 = queryWeight, product of:
                  4.339969 = idf(docFreq=1566, maxDocs=44218)
                  0.044824958 = queryNorm
                0.11987585 = fieldWeight in 438, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.339969 = idf(docFreq=1566, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=438)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Rez. in: JASIST. 56(2003) no.12, S.1360 (C.Tomer): "Humanizing Information Technology is a collection of essays that represent what are presumably Julian Warner's best efforts to understand the perpetually nascent discipline of information science and its relationship to information technology. It is clearly a formidable task. Warner succeeds occasionally in this endeavor; more often, he fails. Yet, it would be wrong to mark Humanizing Information Technology as a book not worth reading. On the contrary, though much fault was found and this review is far from positive, it was nevertheless a book well-worth reading. That Humanizing Information Technology succeeds at all is in some ways remarkable, because Warner's prose tends to be dense and graceless, and understanding his commentaries often relies an close readings of a wide array of sources, some of them familiar, many of them less so. The inaccessibility of Warner's prose is unfortunate; there is not a single idea in Humanizing Information Technology so complicated that it could not have been stated in a clear, straightforward manner. The failure to establish a clear, sufficiently füll context for the more obscure sources is an even more serious problem. Perhaps the most conspicuous example of this problem stems from the frequent examination of the concept of the "information society" and the related notion of information as an autonomous variable, each of them ideas drawn largely from Frank Webster's 1995 book, Theories of the Information Society. Several of Warner's essays contain passages in Humanizing Information Technology whose meaning and value are largely dependent an a familiarity with Webster's work. Yet, Warner never refers to Theories of the Information Society in more than cursory terms and never provides a context füll enough to understand the particular points of reference. Suffice it to say, Humanizing Information Technology is not a book for readers who lack patience or a thorough grounding in modern intellectual history. Warner's philosophical analyses, which frequently exhibit the meter, substance, and purpose of a carefully crafted comprehensive examination, are a large part of what is wrong with Humanizing Information Technology. Warner's successes come when he turns his attention away from Marxist scholasticism and toward historical events and trends. "Information Society or Cash Nexus?" the essay in which Warner compares the role of the United States as a "copyright haven" for most of the 19th century to modern China's similar status, is successful because it relies less an abstruse analysis and more an a sharply drawn comparison of the growth of two economies and parallel developments in the treatment of intellectual property. The essay establishes an illuminating context and cites historical precedents in the American experience suggesting that China's official positions toward intellectual property and related international conventions are likely to evolve and grow more mature as its economy expands and becomes more sophisticated. Similarly, the essay entitled "In the Catalogue Ye Go for Men" is effective because Warner comes dangerously close to pragmatism when he focuses an the possibility that aligning cataloging practice with the "paths and tracks" of discourse and its analysis may be the means by which to build more information systems that furnish a more direct basis for intellectual exploration.
  3. Theories of information behavior (2005) 0.00
    0.004664104 = product of:
      0.009328208 = sum of:
        0.009328208 = product of:
          0.018656416 = sum of:
            0.018656416 = weight(_text_:2003 in 68) [ClassicSimilarity], result of:
              0.018656416 = score(doc=68,freq=2.0), product of:
                0.19453894 = queryWeight, product of:
                  4.339969 = idf(docFreq=1566, maxDocs=44218)
                  0.044824958 = queryNorm
                0.09590068 = fieldWeight in 68, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.339969 = idf(docFreq=1566, maxDocs=44218)
                  0.015625 = fieldNorm(doc=68)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Weitere Rez. in: JASIST 58(2007) no.2, S.303 (D.E. Agosto): "Due to the brevity of the entries, they serve more as introductions to a wide array of theories than as deep explorations of a select few. The individual entries are not as deep as those in more traditional reference volumes, such as The Encyclopedia of Library and Information Science (Drake, 2003) or The Annual Review of Information Science and Technology (ARIST) (Cronin, 2005), but the overall coverage is much broader. This volume is probably most useful to doctoral students who are looking for theoretical frameworks for nascent research projects or to more veteran researchers interested in an introductory overview of information behavior research, as those already familiar with this subfield also will probably already be familiar with most of the theories presented here. Since different authors have penned each of the various entries, the writing styles vary somewhat, but on the whole, this is a readable, pithy volume that does an excellent job of encapsulating this important area of information research."
  4. Covert and overt : recollecting and connecting intelligence service and information science (2005) 0.00
    0.004294375 = product of:
      0.00858875 = sum of:
        0.00858875 = product of:
          0.0171775 = sum of:
            0.0171775 = weight(_text_:22 in 69) [ClassicSimilarity], result of:
              0.0171775 = score(doc=69,freq=4.0), product of:
                0.15696937 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.044824958 = queryNorm
                0.109432176 = fieldWeight in 69, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.015625 = fieldNorm(doc=69)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Classification
    327.12 22
    DDC
    327.12 22