Search (3 results, page 1 of 1)

  • × subject_ss:"Information science"
  1. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.01
    0.0070123314 = product of:
      0.014024663 = sum of:
        0.014024663 = product of:
          0.028049326 = sum of:
            0.028049326 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.028049326 = score(doc=566,freq=2.0), product of:
                0.18124348 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.051756795 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
  2. Warner, J.: Humanizing information technology (2004) 0.01
    0.0055512623 = product of:
      0.011102525 = sum of:
        0.011102525 = product of:
          0.02220505 = sum of:
            0.02220505 = weight(_text_:cataloging in 438) [ClassicSimilarity], result of:
              0.02220505 = score(doc=438,freq=2.0), product of:
                0.20397975 = queryWeight, product of:
                  3.9411201 = idf(docFreq=2334, maxDocs=44218)
                  0.051756795 = queryNorm
                0.10885909 = fieldWeight in 438, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.9411201 = idf(docFreq=2334, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=438)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Footnote
    Rez. in: JASIST. 56(2003) no.12, S.1360 (C.Tomer): "Humanizing Information Technology is a collection of essays that represent what are presumably Julian Warner's best efforts to understand the perpetually nascent discipline of information science and its relationship to information technology. It is clearly a formidable task. Warner succeeds occasionally in this endeavor; more often, he fails. Yet, it would be wrong to mark Humanizing Information Technology as a book not worth reading. On the contrary, though much fault was found and this review is far from positive, it was nevertheless a book well-worth reading. That Humanizing Information Technology succeeds at all is in some ways remarkable, because Warner's prose tends to be dense and graceless, and understanding his commentaries often relies an close readings of a wide array of sources, some of them familiar, many of them less so. The inaccessibility of Warner's prose is unfortunate; there is not a single idea in Humanizing Information Technology so complicated that it could not have been stated in a clear, straightforward manner. The failure to establish a clear, sufficiently füll context for the more obscure sources is an even more serious problem. Perhaps the most conspicuous example of this problem stems from the frequent examination of the concept of the "information society" and the related notion of information as an autonomous variable, each of them ideas drawn largely from Frank Webster's 1995 book, Theories of the Information Society. Several of Warner's essays contain passages in Humanizing Information Technology whose meaning and value are largely dependent an a familiarity with Webster's work. Yet, Warner never refers to Theories of the Information Society in more than cursory terms and never provides a context füll enough to understand the particular points of reference. Suffice it to say, Humanizing Information Technology is not a book for readers who lack patience or a thorough grounding in modern intellectual history. Warner's philosophical analyses, which frequently exhibit the meter, substance, and purpose of a carefully crafted comprehensive examination, are a large part of what is wrong with Humanizing Information Technology. Warner's successes come when he turns his attention away from Marxist scholasticism and toward historical events and trends. "Information Society or Cash Nexus?" the essay in which Warner compares the role of the United States as a "copyright haven" for most of the 19th century to modern China's similar status, is successful because it relies less an abstruse analysis and more an a sharply drawn comparison of the growth of two economies and parallel developments in the treatment of intellectual property. The essay establishes an illuminating context and cites historical precedents in the American experience suggesting that China's official positions toward intellectual property and related international conventions are likely to evolve and grow more mature as its economy expands and becomes more sophisticated. Similarly, the essay entitled "In the Catalogue Ye Go for Men" is effective because Warner comes dangerously close to pragmatism when he focuses an the possibility that aligning cataloging practice with the "paths and tracks" of discourse and its analysis may be the means by which to build more information systems that furnish a more direct basis for intellectual exploration.
  3. Covert and overt : recollecting and connecting intelligence service and information science (2005) 0.00
    0.004958467 = product of:
      0.009916934 = sum of:
        0.009916934 = product of:
          0.019833868 = sum of:
            0.019833868 = weight(_text_:22 in 69) [ClassicSimilarity], result of:
              0.019833868 = score(doc=69,freq=4.0), product of:
                0.18124348 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.051756795 = queryNorm
                0.109432176 = fieldWeight in 69, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.015625 = fieldNorm(doc=69)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Classification
    327.12 22
    DDC
    327.12 22