Search (4 results, page 1 of 1)

  • × subject_ss:"Information science"
  1. Theories of information behavior (2005) 0.01
    0.014010604 = product of:
      0.04203181 = sum of:
        0.027248835 = weight(_text_:wide in 68) [ClassicSimilarity], result of:
          0.027248835 = score(doc=68,freq=4.0), product of:
            0.19679762 = queryWeight, product of:
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.044416238 = queryNorm
            0.1384612 = fieldWeight in 68, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.015625 = fieldNorm(doc=68)
        0.0147829745 = weight(_text_:web in 68) [ClassicSimilarity], result of:
          0.0147829745 = score(doc=68,freq=4.0), product of:
            0.14495286 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.044416238 = queryNorm
            0.1019847 = fieldWeight in 68, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.015625 = fieldNorm(doc=68)
      0.33333334 = coord(2/6)
    
    Content
    Perspectives on the Tasks in which Information Behaviors Are Embedded (Barbara M. Wildemuth and Anthony Hughes) - Phenomenography (Louise Limberg) - Practice of Everyday Life (Paulette Rothbauer) - Principle of Least Effort (Donald O. Case) - Professions and Occupational Identities (Olof Sundin and Jenny Hedman) - Radical Change (Eliza T. Dresang) - Reader Response Theory (Catherine Sheldrick Ross) - Rounding and Dissonant Grounds (Paul Solomon) - Serious Leisure (Jenna Hartel) - Small-World Network Exploration (Lennart Björneborn) - Nan Lin's Theory of Social Capital (Catherine A. Johnson) - The Social Constructionist Viewpoint on Information Practices (Kimmo Tuominen, Sanna Talja, and Reijo Savolainen) - Social Positioning (Lisa M. Given) - The Socio-Cognitive Theory of Users Situated in Specific Contexts and Domains (Birger Hjoerland) - Strength of Weak Ties (Christopher M. Dixon) - Symbolic Violence (Steven Joyce) - Taylor's Information Use Environments (Ruth A. Palmquist) - Taylor's Question-Negotiation (Phillip M. Edwards) - Transtheoretical Model of the Health Behavior Change (C. Nadine Wathen and Roma M. Harris) - Value Sensitive Design (Batya Friedman and Nathan G. Freier) - Vygotsky's Zone of Proximal Development (Lynne (E. E) McKechnie) - Web Information Behaviors of Organizational Workers (Brian Detlor) - Willingness to Return (Tammara Combs Turner and Joan C. Durrance) - Women's Ways of Knowing (Heidi Julien) - Work Task Information-Seeking and Retrieval Processes (Preben Hansen) - World Wide Web Information Seeking (Don Turnbull)
    Footnote
    Weitere Rez. in: JASIST 58(2007) no.2, S.303 (D.E. Agosto): "Due to the brevity of the entries, they serve more as introductions to a wide array of theories than as deep explorations of a select few. The individual entries are not as deep as those in more traditional reference volumes, such as The Encyclopedia of Library and Information Science (Drake, 2003) or The Annual Review of Information Science and Technology (ARIST) (Cronin, 2005), but the overall coverage is much broader. This volume is probably most useful to doctoral students who are looking for theoretical frameworks for nascent research projects or to more veteran researchers interested in an introductory overview of information behavior research, as those already familiar with this subfield also will probably already be familiar with most of the theories presented here. Since different authors have penned each of the various entries, the writing styles vary somewhat, but on the whole, this is a readable, pithy volume that does an excellent job of encapsulating this important area of information research."
  2. Covert and overt : recollecting and connecting intelligence service and information science (2005) 0.01
    0.007206131 = product of:
      0.021618392 = sum of:
        0.013107955 = weight(_text_:computer in 69) [ClassicSimilarity], result of:
          0.013107955 = score(doc=69,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.08075401 = fieldWeight in 69, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.015625 = fieldNorm(doc=69)
        0.008510436 = product of:
          0.017020872 = sum of:
            0.017020872 = weight(_text_:22 in 69) [ClassicSimilarity], result of:
              0.017020872 = score(doc=69,freq=4.0), product of:
                0.1555381 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.044416238 = queryNorm
                0.109432176 = fieldWeight in 69, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.015625 = fieldNorm(doc=69)
          0.5 = coord(1/2)
      0.33333334 = coord(2/6)
    
    Classification
    327.12 22
    Content
    Intelligence work and the information professions / Robert S. Taylor -- Spies of the airwaves / Norman Horrocks -- Intelligence work and information science : two men in a boat / David Batty -- The intelligence game : seeing is believing? / Robert Lee Chartrand -- Applications of information science to U.S. naval intelligence and narcotics intelligence, 1974-1992 / Emil Levine -- A life in the information trade / Charles T. Meadow -- Information management in MI5 before the age of the computer / Alistair Black and Rodney Brunt -- Some aspects of indexing in British intelligence, 1939-1945 / Rodney Brunt -- Intelligence agencies, librarians, and information scientists / Colin Burke -- Historical note on information science in wartime : pioneer documentation activities in World War II / Pamela Spence Richards -- Technology for open source government information and business intelligence / George L. Marling -- Knowledge transfer : information science shapes intelligencein the cold war era / Lee S. Strickland -- The information science and intelligence literature : an overview / Robert V. Williams -- Defining what information science is or should be : a survey and review of a half-century of published pronouncements / Ben-Ami Lipetz -- Wanted : a definition of "intelligence" / Michael Warner -- Evidence and inference in foreign intelligence / Maurice H. Hellner -- The zoo and the jungle : a comparison of the information practices of intelligence analysts and of scientists / Harold Wooster.
    DDC
    327.12 22
  3. Warner, J.: Humanizing information technology (2004) 0.00
    0.0040141325 = product of:
      0.024084795 = sum of:
        0.024084795 = weight(_text_:wide in 438) [ClassicSimilarity], result of:
          0.024084795 = score(doc=438,freq=2.0), product of:
            0.19679762 = queryWeight, product of:
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.044416238 = queryNorm
            0.122383565 = fieldWeight in 438, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.01953125 = fieldNorm(doc=438)
      0.16666667 = coord(1/6)
    
    Footnote
    Rez. in: JASIST. 56(2003) no.12, S.1360 (C.Tomer): "Humanizing Information Technology is a collection of essays that represent what are presumably Julian Warner's best efforts to understand the perpetually nascent discipline of information science and its relationship to information technology. It is clearly a formidable task. Warner succeeds occasionally in this endeavor; more often, he fails. Yet, it would be wrong to mark Humanizing Information Technology as a book not worth reading. On the contrary, though much fault was found and this review is far from positive, it was nevertheless a book well-worth reading. That Humanizing Information Technology succeeds at all is in some ways remarkable, because Warner's prose tends to be dense and graceless, and understanding his commentaries often relies an close readings of a wide array of sources, some of them familiar, many of them less so. The inaccessibility of Warner's prose is unfortunate; there is not a single idea in Humanizing Information Technology so complicated that it could not have been stated in a clear, straightforward manner. The failure to establish a clear, sufficiently füll context for the more obscure sources is an even more serious problem. Perhaps the most conspicuous example of this problem stems from the frequent examination of the concept of the "information society" and the related notion of information as an autonomous variable, each of them ideas drawn largely from Frank Webster's 1995 book, Theories of the Information Society. Several of Warner's essays contain passages in Humanizing Information Technology whose meaning and value are largely dependent an a familiarity with Webster's work. Yet, Warner never refers to Theories of the Information Society in more than cursory terms and never provides a context füll enough to understand the particular points of reference. Suffice it to say, Humanizing Information Technology is not a book for readers who lack patience or a thorough grounding in modern intellectual history. Warner's philosophical analyses, which frequently exhibit the meter, substance, and purpose of a carefully crafted comprehensive examination, are a large part of what is wrong with Humanizing Information Technology. Warner's successes come when he turns his attention away from Marxist scholasticism and toward historical events and trends. "Information Society or Cash Nexus?" the essay in which Warner compares the role of the United States as a "copyright haven" for most of the 19th century to modern China's similar status, is successful because it relies less an abstruse analysis and more an a sharply drawn comparison of the growth of two economies and parallel developments in the treatment of intellectual property. The essay establishes an illuminating context and cites historical precedents in the American experience suggesting that China's official positions toward intellectual property and related international conventions are likely to evolve and grow more mature as its economy expands and becomes more sophisticated. Similarly, the essay entitled "In the Catalogue Ye Go for Men" is effective because Warner comes dangerously close to pragmatism when he focuses an the possibility that aligning cataloging practice with the "paths and tracks" of discourse and its analysis may be the means by which to build more information systems that furnish a more direct basis for intellectual exploration.
  4. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.00
    0.0020059291 = product of:
      0.012035574 = sum of:
        0.012035574 = product of:
          0.024071148 = sum of:
            0.024071148 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.024071148 = score(doc=566,freq=2.0), product of:
                0.1555381 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.044416238 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.16666667 = coord(1/6)
    
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together