Search (4 results, page 1 of 1)

  • × classification_ss:"06.00 / Information und Dokumentation: Allgemeines"
  1. ASIS&T Thesaurus of Information Science, Technology and Librarianship (2005) 0.02
    0.01647574 = product of:
      0.057665087 = sum of:
        0.016620126 = weight(_text_:based in 41) [ClassicSimilarity], result of:
          0.016620126 = score(doc=41,freq=4.0), product of:
            0.11767787 = queryWeight, product of:
              3.0129938 = idf(docFreq=5906, maxDocs=44218)
              0.03905679 = queryNorm
            0.14123408 = fieldWeight in 41, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.0129938 = idf(docFreq=5906, maxDocs=44218)
              0.0234375 = fieldNorm(doc=41)
        0.04104496 = weight(_text_:great in 41) [ClassicSimilarity], result of:
          0.04104496 = score(doc=41,freq=2.0), product of:
            0.21992016 = queryWeight, product of:
              5.6307793 = idf(docFreq=430, maxDocs=44218)
              0.03905679 = queryNorm
            0.18663573 = fieldWeight in 41, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.6307793 = idf(docFreq=430, maxDocs=44218)
              0.0234375 = fieldNorm(doc=41)
      0.2857143 = coord(2/7)
    
    Footnote
    Rez. in: KO 32(2005) no.4, S.159-160 (G.J.A. Riesthuis): "This thesaurus is a revised edition of: ASIS thesaurus of information science and librarianship, edited by Jessica L. Milstead, 2nd ed. (1998). The change in the title is result of the change of the name of the ASIS (American Society of Information Science) into American Society for Information Science and Technology. Since 2002 the 2nd edition was used by Information Science Abstracts (now Information Science & Technology Abstracts). In the 2nd edition the goal of the thesaurus was formulated as "[include concepts from] information science and librarianship to a depth that will adequately support indexing in those fields with [...] related fields [...] computer science, linguistics and cognitive sciences [...]" (p. vii). The present editors started to update the thesaurus to reflect "the current state of the field and to implement it for indexing the Society's publications for the ASIS&T Digital Library" (p. v). The draft 3rd edition is used to index a great part of the Society's four publications. This means that the 3`1 edition is, more than its predecessors, based on literary warrant as far as this warrant is reflected in ASIS&T publications. The Netherlands have a descriptor, but Romania or Portugal not. The Bliss Bibliographic Classification is mentioned, but the far more often used Russian Library Bibliographical Classification (BBK) is missing. The thesaurus is presented in three parts: 1. An alphabetical listing of all terms. Here one finds the preferred and non-preferred terms with their relations denoted in the customary form (SN, BT, NT, RT, USE and UF). The ordering is word-byword. 2. An hierarchical display of the terms. This display contains the preferred terms only. 3. A permuted display of all terms. Unlike the 2nd edition, this list contains the non-preferred terms too. The thesaurus is like its predecessors a faceted one. There are seven main facets: 1. People and organizations, 2. Actions, events, and processes, 3. Physical objects, 4. Theoretical concepts and influences on information, 5. Information, information delivery formats and channels, 6. Methods of study, 7. Geographic information. The first five facets are subdivided in subfacets, the last have just one subfacet each. In total there arc 18 subfacets, referred to as "top terms" in the language of the thesaurus. This structure is not very different from the structure of the second edition, although the number of subfacets and the terminology has changed. There is one new facet "geographic information" with one subfacet: "countries and regions". In this facet one can see very clearly see that the thesaurus is based on literary warrant: only relatively few countries arc mentioned. The facet "methods of study" is expanded strongly. Under each of the top terms additional concepts are presented in a hierarchical structure. The maximum depth of the hierarchy is nine, although most subfacets have no more than four or five levels. The record for the "bibliometrics" entry shows clearly the changes. The domain and the main structure have not changed, but narrower terms not previously mentioned are added."
  2. Information ethics : privacy, property, and power (2005) 0.01
    0.012445299 = product of:
      0.043558545 = sum of:
        0.034204133 = weight(_text_:great in 2392) [ClassicSimilarity], result of:
          0.034204133 = score(doc=2392,freq=2.0), product of:
            0.21992016 = queryWeight, product of:
              5.6307793 = idf(docFreq=430, maxDocs=44218)
              0.03905679 = queryNorm
            0.15552977 = fieldWeight in 2392, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.6307793 = idf(docFreq=430, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.0093544135 = product of:
          0.018708827 = sum of:
            0.018708827 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
              0.018708827 = score(doc=2392,freq=4.0), product of:
                0.13677022 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03905679 = queryNorm
                0.13679022 = fieldWeight in 2392, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2392)
          0.5 = coord(1/2)
      0.2857143 = coord(2/7)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
  3. ¬The information literacy cookbook : ingredients, recipes and tips for success (2007) 0.00
    0.001399072 = product of:
      0.009793503 = sum of:
        0.009793503 = weight(_text_:based in 2100) [ClassicSimilarity], result of:
          0.009793503 = score(doc=2100,freq=2.0), product of:
            0.11767787 = queryWeight, product of:
              3.0129938 = idf(docFreq=5906, maxDocs=44218)
              0.03905679 = queryNorm
            0.083222985 = fieldWeight in 2100, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.0129938 = idf(docFreq=5906, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2100)
      0.14285715 = coord(1/7)
    
    Abstract
    This book, aimed at an international audience, provides an overview of information literacy (IL) in practice; what it is, why it's become so important in the library profession and demonstrates how librarians can cultivate a better understanding of IL in their own organisations. It uses the 'Cookbook' theme throughout to provide a more informal approach, which will appeal to practitioners, and also reflects the need to provide guidance in the form of recipes, tips for success, regional variations, and possible substitutions if ingredients aren't available. This approach makes it easy to read and highly valuable for the busy information professional. It includes an overview of information literacy in higher education, the schools sector, public libraries, the health service and the commercial sector. It also includes contributions from international authors. Key Features: 1. Highly readable for busy information professionals 2. Contains advice, case studies and examples of good practice particularly useful for practitioners 3. Relevant to librarians from all sectors 4.Suitable for an international audience The Editors: Dr Jane Secker is Learning Technology Librarian at the Centre for Learning Technology, based at the London School of Economics.
  4. Crowley, W.: Spanning the theory-practice divide in library and information science (2005) 0.00
    0.0011192575 = product of:
      0.007834802 = sum of:
        0.007834802 = weight(_text_:based in 439) [ClassicSimilarity], result of:
          0.007834802 = score(doc=439,freq=2.0), product of:
            0.11767787 = queryWeight, product of:
              3.0129938 = idf(docFreq=5906, maxDocs=44218)
              0.03905679 = queryNorm
            0.06657839 = fieldWeight in 439, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.0129938 = idf(docFreq=5906, maxDocs=44218)
              0.015625 = fieldNorm(doc=439)
      0.14285715 = coord(1/7)
    
    Footnote
    Rez. in: JASIST. 58(2007) no.4, S.606-607 (L.E. Harris): "Spanning is not a methodological "how-to"; rather it is a "how-tothink" book, intended for academicians and practitioners, on developing useful theory. Each chapter opens with a brief scenario, generally derived from Crowley's extensive personal experience as a librarian, university professor, and consultant, exemplifying the theme for that chapter. In chapter one, "Theorizing for Diverging Contexts: Why Research Results and Theory Development are So Little Used Outside the Campus," Crowley describes a doctoral candidate's experience in presenting her research at a national conference of working professionals. When the presentation is negatively received, the student's mentor rationalized the response by stating, "You have to remember, most of the people in the audience only have a master's degree" (p. 2). From this example, a cogent argument is distilled on how pervasive the theorypractice divide is in various academic domains, such as business, law, sociology, and LIS. What is useful research and theory for academicians seeking career and professional advancement does not translate into for practitioners engaged in specific institutional/organizational environments. Cultural pragmatism is introduced as an aid to researchers in both camps for its inclusion of context specificity and the need for testing a theory's usefulness through continually analyzed experience. Herein, the structural foundation for the bridge is constructed in the section on communication. The development of an interlanguage between academicians and practitioners will minimize incommensurability, "the perceived inability of humans to communicate effectively with one another due to a lack of common standards for meaning and other shared foundations" (p. 15). In this vein, Crowley presents five maxims, based on the works of John Stuart Mill, for developing useful, real world theory. The chapter ends, as do several others, addressing the divide specifically in the LIS domain. One of the most thought-provoking chapters is "Developing a Research Philosophy," which includes sections on inductive reasoning, how people really think, and a discussion of the battle between intellectual formations and internalized models. As a teacher of experienced and/or mature students in an LIS program, I instantly recognized the description of a reoccurring classroom event: what happens when introducing theory or research results that contradict students' experiences, and therefore, their internalized models of "how things really work in the field." Crowley suggests that in seeking a research philosophy, persuasion should not be a primary concern. This simple suggestion encouraged me to reconsider my posture when faced with this classroom issue. However, this chapter may be considered one of the weakest in the book, because of its rather slim treatment of considerations for selecting a useful research philosophy, despite the emphasis on the importance of the concept. Nevertheless, this chapter is foundational to the work presented in the remaining chapters.