Search (5 results, page 1 of 1)

  • × language_ss:"e"
  • × classification_ss:"06.35 / Informationsmanagement"
  1. Information ethics : privacy, property, and power (2005) 0.05
    0.05485584 = product of:
      0.10971168 = sum of:
        0.035240363 = weight(_text_:social in 2392) [ClassicSimilarity], result of:
          0.035240363 = score(doc=2392,freq=6.0), product of:
            0.1847249 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046325076 = queryNorm
            0.19077215 = fieldWeight in 2392, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.07447132 = sum of:
          0.052280862 = weight(_text_:aspects in 2392) [ClassicSimilarity], result of:
            0.052280862 = score(doc=2392,freq=8.0), product of:
              0.20938325 = queryWeight, product of:
                4.5198684 = idf(docFreq=1308, maxDocs=44218)
                0.046325076 = queryNorm
              0.2496898 = fieldWeight in 2392, product of:
                2.828427 = tf(freq=8.0), with freq of:
                  8.0 = termFreq=8.0
                4.5198684 = idf(docFreq=1308, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
          0.022190453 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
            0.022190453 = score(doc=2392,freq=4.0), product of:
              0.16222252 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.046325076 = queryNorm
              0.13679022 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
      0.5 = coord(2/4)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    LCSH
    Communication / Moral and ethical aspects
    Information technology / Social aspects
    Subject
    Communication / Moral and ethical aspects
    Information technology / Social aspects
  2. Pirolli, P.: Information foraging theory : adaptive interaction with information (2007) 0.01
    0.011509455 = product of:
      0.04603782 = sum of:
        0.04603782 = weight(_text_:social in 4005) [ClassicSimilarity], result of:
          0.04603782 = score(doc=4005,freq=4.0), product of:
            0.1847249 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046325076 = queryNorm
            0.24922368 = fieldWeight in 4005, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.03125 = fieldNorm(doc=4005)
      0.25 = coord(1/4)
    
    Abstract
    Although much of the hubris and hyperbole surrounding the 1990's Internet has softened to a reasonable level, the inexorable momentum of information growth continues unabated. This wealth of information provides resources for adapting to the problems posed by our increasingly complex world, but the simple availability of more information does not guarantee its successful transformation into valuable knowledge that shapes, guides, and improves our activity. When faced with something like the analysis of sense-making behavior on the web, traditional research models tell us a lot about learning and performance with browser operations, but very little about how people will actively navigate and search through information structures, what information they will choose to consume, and what conceptual models they will induce about the landscape of cyberspace. Thus, it is fortunate that a new field of research, Adaptive Information Interaction (AII), is becoming possible. AII centers on the problems of understanding and improving human-information interaction. It is about how people will best shape themselves to their information environments, and how information environments can best be shaped to people. Its roots lie in human-computer interaction (HCI), information retrieval, and the behavioral and social sciences. This book is about Information Foraging Theory (IFT), a new theory in Adaptive Information Interaction that is one example of a recent flourish of theories in adaptationist psychology that draw upon evolutionary-ecological theory in biology. IFT assumes that people (indeed, all organisms) are ecologically rational, and that human information-seeking mechanisms and strategies adapt the structure of the information environments in which they operate. Its main aim is to create technology that is better shaped to users. Information Foraging Theory will be of interest to student and professional researchers in HCI and cognitive psychology.
    Content
    Inhalt: 1. Information Foraging Theory: Framework and Method 2. Elementary Foraging Models 3. The Ecology of Information Foraging on the World Wide Web 4. Rational Analyses of Information Scent and Web Foraging 5. A Cognitive Model of Information Foraging on the Web 6. A Rational Analysis and Computational Cognitive Model of the Scatter/Gather Document Cluster Browser 7. Stochastic Models of Information Foraging by Information Scent 8. Social Information Foraging 9. Design Heuristics, Engineering Models, and Applications 10. Future Directions: Upward, Downward, Inward, and Outward
  3. Marchionini, G.: Information concepts : from books to cyberspace identities (2010) 0.01
    0.008138414 = product of:
      0.032553654 = sum of:
        0.032553654 = weight(_text_:social in 2) [ClassicSimilarity], result of:
          0.032553654 = score(doc=2,freq=2.0), product of:
            0.1847249 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046325076 = queryNorm
            0.17622775 = fieldWeight in 2, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.03125 = fieldNorm(doc=2)
      0.25 = coord(1/4)
    
    Abstract
    Information is essential to all human activity, and information in electronic form both amplifies and augments human information interactions. This lecture surveys some of the different classical meanings of information, focuses on the ways that electronic technologies are affecting how we think about these senses of information, and introduces an emerging sense of information that has implications for how we work, play, and interact with others. The evolutions of computers and electronic networks and people's uses and adaptations of these tools manifesting a dynamic space called cyberspace. Our traces of activity in cyberspace give rise to a new sense of information as instantaneous identity states that I term proflection of self. Proflections of self influence how others act toward us. Four classical senses of information are described as context for this new form of information. The four senses selected for inclusion here are the following: thought and memory, communication process, artifact, and energy. Human mental activity and state (thought and memory) have neurological, cognitive, and affective facets.The act of informing (communication process) is considered from the perspective of human intentionality and technical developments that have dramatically amplified human communication capabilities. Information artifacts comprise a common sense of information that gives rise to a variety of information industries. Energy is the most general sense of information and is considered from the point of view of physical, mental, and social state change. This sense includes information theory as a measurable reduction in uncertainty. This lecture emphasizes how electronic representations have blurred media boundaries and added computational behaviors that yield new forms of information interaction, which, in turn, are stored, aggregated, and mined to create profiles that represent our cyber identities.
  4. Nicholas, D.: Assessing information needs : tools and techniques (1996) 0.01
    0.007845511 = product of:
      0.031382043 = sum of:
        0.031382043 = product of:
          0.062764086 = sum of:
            0.062764086 = weight(_text_:22 in 5941) [ClassicSimilarity], result of:
              0.062764086 = score(doc=5941,freq=2.0), product of:
                0.16222252 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046325076 = queryNorm
                0.38690117 = fieldWeight in 5941, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.078125 = fieldNorm(doc=5941)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Date
    26. 2.2008 19:22:51
  5. Information: Droge, Ware oder Commons? : Wertschöpfungs- und Transformationsprozesse auf den Informationsmärkten ; Proceedings des 11. Internationalen Symposiums für Informationswissenschaft (ISI 2009) ; Konstanz, 1. - 3. April 2009 / [Hochschulverband für Informationswissenschaft (HI) e.V., Konstanz] (2009) 0.01
    0.0071211113 = product of:
      0.028484445 = sum of:
        0.028484445 = weight(_text_:social in 2930) [ClassicSimilarity], result of:
          0.028484445 = score(doc=2930,freq=2.0), product of:
            0.1847249 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046325076 = queryNorm
            0.15419927 = fieldWeight in 2930, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.02734375 = fieldNorm(doc=2930)
      0.25 = coord(1/4)
    
    Content
    - Recherche und Web Rita Strebe: Empirische Untersuchung von emotionalen Reaktionen im Prozess der Informationsrecherche im Web Teresa Märt!, Christa Womser-Hacker, Thomas Mandl: Mehrsprachige Suche in Social-Tagging-Systemen Christian Maaß, Dirk Lewandowski: Frage-Antwort-Dienste als alternativer Suchansatz? Jürgen Reischer: EXCERPT - a Within-Document Retrieval System Using Summarization Techniques - Fachportale - Open Access I Stefan Baerisch, Peter Mutschke, Maximilian Stempfliuber: Informationstechnologische Aspekte der Heterogenitätsbehandlung in Fachportalen Doris Bambey: Open Access in der Erziehungswissenschaft - Voraussetzungen und Modelle der Funktionsteilung und der Verwertung von Wissen Patrick Lay: Integration heterogener Anwendungen in Fachportalen am Beispiel Sowiport Martin Uhl, Erich Weichselgartner: Aufbau einer innovativen Publikations-Infrastrukrur für die europäische Psychologie