Search (8 results, page 1 of 1)

  • × subject_ss:"Information science"
  1. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.02
    0.024714613 = product of:
      0.061786532 = sum of:
        0.033464003 = weight(_text_:it in 566) [ClassicSimilarity], result of:
          0.033464003 = score(doc=566,freq=6.0), product of:
            0.15115225 = queryWeight, product of:
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.052260913 = queryNorm
            0.22139269 = fieldWeight in 566, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.03125 = fieldNorm(doc=566)
        0.02832253 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
          0.02832253 = score(doc=566,freq=2.0), product of:
            0.18300882 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.052260913 = queryNorm
            0.15476047 = fieldWeight in 566, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.03125 = fieldNorm(doc=566)
      0.4 = coord(2/5)
    
    Abstract
    Knowledge Architectures reviews traditional approaches to managing information and explains why they need to adapt to support 21st-century information management and discovery. Exploring the rapidly changing environment in which information is being managed and accessed, the book considers how to use knowledge architectures, the basic structures and designs that underlie all of the parts of an effective information system, to best advantage. Drawing on 40 years of work with a variety of organizations, Bedford explains that failure to understand the structure behind any given system can be the difference between an effective solution and a significant and costly failure. Demonstrating that the information user environment has shifted significantly in the past 20 years, the book explains that end users now expect designs and behaviors that are much closer to the way they think, work, and act. Acknowledging how important it is that those responsible for developing an information or knowledge management system understand knowledge structures, the book goes beyond a traditional library science perspective and uses case studies to help translate the abstract and theoretical to the practical and concrete. Explaining the structures in a simple and intuitive way and providing examples that clearly illustrate the challenges faced by a range of different organizations, Knowledge Architectures is essential reading for those studying and working in library and information science, data science, systems development, database design, and search system architecture and engineering.
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
  2. Covert and overt : recollecting and connecting intelligence service and information science (2005) 0.02
    0.019603092 = product of:
      0.04900773 = sum of:
        0.028980678 = weight(_text_:it in 69) [ClassicSimilarity], result of:
          0.028980678 = score(doc=69,freq=18.0), product of:
            0.15115225 = queryWeight, product of:
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.052260913 = queryNorm
            0.19173169 = fieldWeight in 69, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.015625 = fieldNorm(doc=69)
        0.020027053 = weight(_text_:22 in 69) [ClassicSimilarity], result of:
          0.020027053 = score(doc=69,freq=4.0), product of:
            0.18300882 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.052260913 = queryNorm
            0.109432176 = fieldWeight in 69, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.015625 = fieldNorm(doc=69)
      0.4 = coord(2/5)
    
    Classification
    327.12 22
    DDC
    327.12 22
    Footnote
    Rez. in: JASIST 58(2007) no.2, S.303-305 (L. Hayden): "Part history and part call to action, Covert and Overt examines the relationship between the disciplines of intelligence service and information science. The book is significant in that it captures both the rich history of partnership between the fields, and because it demonstrates clearly the incomplete nature of our understanding of that partnership. In the post-9/11 world, such understanding is increasingly important, as we struggle with the problem of transforming information into intelligence and intelligence into effective policy. Information science has an important role to play in meeting these challenges, but the sometimesambiguous nature of the field combined with similar uncertainties over what constitutes intelligence, makes any attempt at definitive answers problematic. The book is a collection of works from different contributors, in the words of one editor "not so much a created work as an aggregation" (p. 1). More than just an edited collection of papers, the book draws from the personal experiences of several prominent information scientists who also served as intelligence professionals from World War II onward. The result is a book that feels very personal and at times impassioned. The contributors attempt to shed light on an often-closed community of practice, a discipline that depends simultaneously on access to information and on secrecy. Intelligence, like information science, is also a discipline that finds itself increasingly attracted to and dependent upon technology, and an underlying question of the book is where and how technology benefits intelligence (as opposed to only masking more fundamental problems of process and analysis and providing little or no actual value).
    The role of technology in both intelligence and information science is just one question explored in Covert and Overt, which takes on more fundamental issues as well. Even the ubiquitous "What is information?" debate is revisited. But the questions asked are always subordinate to the overarching theme of bringing concepts and techniques of intelligence and information science together and examining the results. The process and lifecycle of intelligence is explored and mapped to information science methods, primarily indexing and information retrieval. In more historical explorations undertaken by contributors, it becomes apparent that intelligence and information science have always been closely aligned, but that this alignment is not always perceived by those engaged in intelligence work. Interestingly, and probably not surprisingly, a general consensus seems to be that library and information science practitioners involved in intelligence were (and are) more capable of seeing the complementary nature of the techniques information science brings to intelligence services than many intelligence professionals, who often needed demonstrations of efficacy to be convinced. Structurally, the book is divided into four parts, moving from anecdotal accounts through to discussions of definition and theory. Part 1, "Information Science and Intelligence: Reminiscences and Reflections from World War II to Today" is comprised of the personal stories of information scientists who also served as intelligence professionals at various times during and since World War II, collected from special panel presentations at the 2001 and 2002 American Society for Information Science and Technology (ASIS&T) annual conferences. These contributors include former American and British servicemen and intelligence officers who all relate a common experience of dealing with information, documents, and other records in the pursuit of intelligence goals.
    This book is a successful and realistic examination of the current state of inquiry into the relationship between intelligence and information science, and does not flinch from the limits of this inquiry to date. The book can be viewed as a deliberate attempt to stimulate further interest in these studies, and serves as an excellent roadmap for future researchers (like this reviewer) who also have moved from intelligence service into information science. Many of the stories and studies in the book could easily provide fresh and vital avenues of research to new and veteran scholars. If there are limitations to the impact of the book, most must be viewed in the context of the lack of literature from which to draw. Contributions come from a variety of sources and although some new studies are included, for the most part, the chapters are not original to this publication. This results at times in a sense of the editors taking what they could get on the topic. The reader must determine whether this is viewed as a flaw or as reinforcement of the editors' conclusion that more research into the subject matter is important and necessary. It becomes a question of whether or not one wishes to answer the call. One interesting limitation, however, is the lack of a critical stance on the part of most of the contributors. The chapters tend to describe the relationship between intelligence and information science, but few question the nature of that relationship, the social construction of the two disciplines, or moral and ethical concerns associated with spying and information operations. In general, a reader is left with the impression that intelligence service is a good thing, and that information science as a discipline can both improve it as well as learn from it. Little insight is offered into the value and direction of intelligence in the 21 st century, or the impact that our technologies may have. One exception comes from Colin Burke who, in his chapter, "Intelligence Agencies, Librarians, and Information Scientists," touches on some of these issues with his claim that library and information science practitioners must "help bring the information advances from the intelligence communities to an industry that can be committed to distributing information at the lowest cost to the most people" (p. 112). Nevertheless, no serious questions regarding issues of control, power, or resistance are raised. Given recent debates over surveillance, privacy, and the erosion of civil liberties in the wake of 9-11, it would seem that this is an area of intelligence and information studies that also deserves attention. Covert and Overt is an excellent historical overview of the close relationship between intelligence and information science. The book is also intriguing and timely in its argument for further research and study into these areas. Despite the limitations of subject matter and the challenges that come with the disciplines that it explores, it is required reading for practitioners in either world who wish to gain a greater understanding of the operations of the other."
  3. Abbott, R.: ¬The world as information : overload and personal design (1999) 0.01
    0.011592272 = product of:
      0.057961356 = sum of:
        0.057961356 = weight(_text_:it in 5939) [ClassicSimilarity], result of:
          0.057961356 = score(doc=5939,freq=8.0), product of:
            0.15115225 = queryWeight, product of:
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.052260913 = queryNorm
            0.38346338 = fieldWeight in 5939, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.046875 = fieldNorm(doc=5939)
      0.2 = coord(1/5)
    
    Abstract
    This book takes the broadest view of information, considering it as a phenomenon in its own roght, rather than exploring the technology for handling it. It is very much concerned with the meaning of information - and what we as individuals do with it
  4. Theory development in the information sciences (2016) 0.01
    0.0066928007 = product of:
      0.033464003 = sum of:
        0.033464003 = weight(_text_:it in 3701) [ClassicSimilarity], result of:
          0.033464003 = score(doc=3701,freq=6.0), product of:
            0.15115225 = queryWeight, product of:
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.052260913 = queryNorm
            0.22139269 = fieldWeight in 3701, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.03125 = fieldNorm(doc=3701)
      0.2 = coord(1/5)
    
    Abstract
    Emerging as a discipline in the first half of the twentieth century, the information sciences study how people, groups, organizations, and governments create, share, disseminate, manage, search, access, evaluate, and protect information, as well as how different technologies and policies can facilitate and constrain these activities. Given the broad span of the information sciences, it is perhaps not surprising that there is no consensus regarding its underlying theory the purposes of it, the types of it, or how one goes about developing new theories to talk about new research questions. Diane H. Sonnenwald and the contributors to this volume seek to shed light on these issues by sharing reflections on the theory-development process. These reflections are not meant to revolve around data collection and analysis; rather, they focus on the struggles, challenges, successes, and excitement of developing theories. The particular theories that the contributors explore in their essays range widely, from theories of literacy and reading to theories of design and digital search. Several chapters engage with theories of the behavior of individuals and groups; some deal with processes of evaluation; others reflect on questions of design; and the rest treat cultural and scientific heritage. The ultimate goal, Sonnenwald writes in her introduction, is to "encourage, inspire, and assist individuals striving to develop and/or teach theory development.""
  5. Warner, J.: Humanizing information technology (2004) 0.01
    0.006389639 = product of:
      0.031948194 = sum of:
        0.031948194 = weight(_text_:it in 438) [ClassicSimilarity], result of:
          0.031948194 = score(doc=438,freq=14.0), product of:
            0.15115225 = queryWeight, product of:
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.052260913 = queryNorm
            0.21136433 = fieldWeight in 438, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.01953125 = fieldNorm(doc=438)
      0.2 = coord(1/5)
    
    Footnote
    Rez. in: JASIST. 56(2003) no.12, S.1360 (C.Tomer): "Humanizing Information Technology is a collection of essays that represent what are presumably Julian Warner's best efforts to understand the perpetually nascent discipline of information science and its relationship to information technology. It is clearly a formidable task. Warner succeeds occasionally in this endeavor; more often, he fails. Yet, it would be wrong to mark Humanizing Information Technology as a book not worth reading. On the contrary, though much fault was found and this review is far from positive, it was nevertheless a book well-worth reading. That Humanizing Information Technology succeeds at all is in some ways remarkable, because Warner's prose tends to be dense and graceless, and understanding his commentaries often relies an close readings of a wide array of sources, some of them familiar, many of them less so. The inaccessibility of Warner's prose is unfortunate; there is not a single idea in Humanizing Information Technology so complicated that it could not have been stated in a clear, straightforward manner. The failure to establish a clear, sufficiently füll context for the more obscure sources is an even more serious problem. Perhaps the most conspicuous example of this problem stems from the frequent examination of the concept of the "information society" and the related notion of information as an autonomous variable, each of them ideas drawn largely from Frank Webster's 1995 book, Theories of the Information Society. Several of Warner's essays contain passages in Humanizing Information Technology whose meaning and value are largely dependent an a familiarity with Webster's work. Yet, Warner never refers to Theories of the Information Society in more than cursory terms and never provides a context füll enough to understand the particular points of reference. Suffice it to say, Humanizing Information Technology is not a book for readers who lack patience or a thorough grounding in modern intellectual history. Warner's philosophical analyses, which frequently exhibit the meter, substance, and purpose of a carefully crafted comprehensive examination, are a large part of what is wrong with Humanizing Information Technology. Warner's successes come when he turns his attention away from Marxist scholasticism and toward historical events and trends. "Information Society or Cash Nexus?" the essay in which Warner compares the role of the United States as a "copyright haven" for most of the 19th century to modern China's similar status, is successful because it relies less an abstruse analysis and more an a sharply drawn comparison of the growth of two economies and parallel developments in the treatment of intellectual property. The essay establishes an illuminating context and cites historical precedents in the American experience suggesting that China's official positions toward intellectual property and related international conventions are likely to evolve and grow more mature as its economy expands and becomes more sophisticated. Similarly, the essay entitled "In the Catalogue Ye Go for Men" is effective because Warner comes dangerously close to pragmatism when he focuses an the possibility that aligning cataloging practice with the "paths and tracks" of discourse and its analysis may be the means by which to build more information systems that furnish a more direct basis for intellectual exploration.
    Like Daniel Bell, the author of The Coming of Post-Industrial Society (1973), who used aspects of Marx's thinking as the basis for his social forecasting models, Warner uses Marxist thought as a tool for social and historical analysis. Unlike Bell, Warner's approach to Marx tends to be doctrinaire. As a result, "An Information View of History" and "Origins of the Human Brain," two of the essays in which Warner sets out to establish the connections between information science and information technology, are less successful. Warner argues, "the classic source for an understanding of technology as a human construction is Marx," and that "a Marxian perspective an information technology could be of high marginal Utility," noting additionally that with the exception of Norbert Wiener and John Desmond Bernal, "there has only been a limited penetration of Marxism into information science" (p. 9). But Warner's efforts to persuade the reader that these views are cogent never go beyond academic protocol. Nor does his support for the assertion that the second half of the 19th century was the critical period for innovation and diffusion of modern information technologies. The closing essay, "Whither Information Science?" is particularly disappointing, in part, because the preface and opening chapters of the book promised more than was delivered at the end. Warner asserts that the theoretical framework supporting information science is negligible, and that the discipline is limited even further by the fact that many of its members do not recognize or understand the effects of such a limitation. However cogent the charges may be, none of this is news. But the essay fails most notably because Warner does not have any new directions to offer, save that information scientists should pay closer artention to what is going an in allied disciplines. Moreover, he does not seem to understand that at its heart the "information revolution" is not about the machines, but about the growing legions of men and women who can and do write programming code to exert control over and find new uses for these devices. Nor does he seem to understand that information science, in the grip of what he terms a "quasi-global crisis," suffers grievously because it is a community situated not at the center but rather an the periphery of this revolution."
  6. Introduction to information science and technology (2011) 0.00
    0.004830113 = product of:
      0.024150565 = sum of:
        0.024150565 = weight(_text_:it in 4045) [ClassicSimilarity], result of:
          0.024150565 = score(doc=4045,freq=2.0), product of:
            0.15115225 = queryWeight, product of:
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.052260913 = queryNorm
            0.15977642 = fieldWeight in 4045, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.0390625 = fieldNorm(doc=4045)
      0.2 = coord(1/5)
    
    Abstract
    The information age is empowered by being connected and knowing the best options for the job. "Introduction to Information Science and Technology" discusses how to maximize the use of such technology in today's importance of connecting information to all those involved. Chapters grant a comprehensive overview of information technology, who needs the information, organization, use of the internet, and theories for more effective use in our future. "Introduction to Information Science and Technology" is a fine delve into the fast combining concepts of information and technology, and how to apply it to one's own endeavors, a core addition for community and college library technology collections.
  7. Arafat, S.; Ashoori, E.: Search foundations : toward a science of technology-mediated experience (2018) 0.00
    0.0038640907 = product of:
      0.019320453 = sum of:
        0.019320453 = weight(_text_:it in 158) [ClassicSimilarity], result of:
          0.019320453 = score(doc=158,freq=2.0), product of:
            0.15115225 = queryWeight, product of:
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.052260913 = queryNorm
            0.12782113 = fieldWeight in 158, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.03125 = fieldNorm(doc=158)
      0.2 = coord(1/5)
    
    Abstract
    This book contributes to discussions within Information Retrieval and Science (IR&S) by improving our conceptual understanding of the relationship between humans and technology. A call to redirect the intellectual focus of information retrieval and science (IR&S) toward the phenomenon of technology-mediated experience. In this book, Sachi Arafat and Elham Ashoori issue a call to reorient the intellectual focus of information retrieval and science (IR&S) away from search and related processes toward the more general phenomenon of technology-mediated experience. Technology-mediated experience accounts for an increasing proportion of human lived experience; the phenomenon of mediation gets at the heart of the human-machine relationship. Framing IR&S more broadly in this way generalizes its problems and perspectives, dovetailing them with those shared across disciplines dealing with socio-technical phenomena. This reorientation of IR&S requires imagining it as a new kind of science: a science of technology-mediated experience (STME). Arafat and Ashoori not only offer detailed analysis of the foundational concepts underlying IR&S and other technical disciplines but also boldly call for a radical, systematic appropriation of the sciences and humanities to create a better understanding of the human-technology relationship. Arafat and Ashoori discuss the notion of progress in IR&S and consider ideas of progress from the history and philosophy of science. They argue that progress in IR&S requires explicit linking between technical and nontechnical aspects of discourse. They develop a network of basic questions and present a discursive framework for addressing these questions. With this book, Arafat and Ashoori provide both a manifesto for the reimagining of their field and the foundations on which a reframed IR&S would rest.
  8. Crowley, W.: Spanning the theory-practice divide in library and information science (2005) 0.00
    0.0027323244 = product of:
      0.013661622 = sum of:
        0.013661622 = weight(_text_:it in 439) [ClassicSimilarity], result of:
          0.013661622 = score(doc=439,freq=4.0), product of:
            0.15115225 = queryWeight, product of:
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.052260913 = queryNorm
            0.09038319 = fieldWeight in 439, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.892262 = idf(docFreq=6664, maxDocs=44218)
              0.015625 = fieldNorm(doc=439)
      0.2 = coord(1/5)
    
    Footnote
    Rez. in: JASIST. 58(2007) no.4, S.606-607 (L.E. Harris): "Spanning is not a methodological "how-to"; rather it is a "how-tothink" book, intended for academicians and practitioners, on developing useful theory. Each chapter opens with a brief scenario, generally derived from Crowley's extensive personal experience as a librarian, university professor, and consultant, exemplifying the theme for that chapter. In chapter one, "Theorizing for Diverging Contexts: Why Research Results and Theory Development are So Little Used Outside the Campus," Crowley describes a doctoral candidate's experience in presenting her research at a national conference of working professionals. When the presentation is negatively received, the student's mentor rationalized the response by stating, "You have to remember, most of the people in the audience only have a master's degree" (p. 2). From this example, a cogent argument is distilled on how pervasive the theorypractice divide is in various academic domains, such as business, law, sociology, and LIS. What is useful research and theory for academicians seeking career and professional advancement does not translate into for practitioners engaged in specific institutional/organizational environments. Cultural pragmatism is introduced as an aid to researchers in both camps for its inclusion of context specificity and the need for testing a theory's usefulness through continually analyzed experience. Herein, the structural foundation for the bridge is constructed in the section on communication. The development of an interlanguage between academicians and practitioners will minimize incommensurability, "the perceived inability of humans to communicate effectively with one another due to a lack of common standards for meaning and other shared foundations" (p. 15). In this vein, Crowley presents five maxims, based on the works of John Stuart Mill, for developing useful, real world theory. The chapter ends, as do several others, addressing the divide specifically in the LIS domain. One of the most thought-provoking chapters is "Developing a Research Philosophy," which includes sections on inductive reasoning, how people really think, and a discussion of the battle between intellectual formations and internalized models. As a teacher of experienced and/or mature students in an LIS program, I instantly recognized the description of a reoccurring classroom event: what happens when introducing theory or research results that contradict students' experiences, and therefore, their internalized models of "how things really work in the field." Crowley suggests that in seeking a research philosophy, persuasion should not be a primary concern. This simple suggestion encouraged me to reconsider my posture when faced with this classroom issue. However, this chapter may be considered one of the weakest in the book, because of its rather slim treatment of considerations for selecting a useful research philosophy, despite the emphasis on the importance of the concept. Nevertheless, this chapter is foundational to the work presented in the remaining chapters.
    In the next four chapters, Crowley takes on the particulars involved in the divide by looking at library and information professionals engaged in and transitioning to various research and theory development roles. In "The Academic as Practitioner," he examines how the publishing world influences how academics communicate with practitioners and the difficulties in writing for practitioner-oriented publications. The history of religion in the development of higher education in general, and the research focus of doctoral-degree granting institutions, is offered to explain the dominance of the academic practitioner. The paradoxical edicts of the Ohio legislature, which sought to balance classroom time for professors by law, paint a vivid picture of the results-oriented public and the research-oriented academic institution. In "The Practitioner as Academic: Adjunct Faculty/Lecturers," the question of the perceived lack of "rigor" in practitioner-conducted research is illustrated and illuminated. While Crowley points out the value of "how we did it good" research, as providing material for qualitative analysis, I found myself desiring a bit more methodological instruction. Given where and when such articles are published, how such qualitative analysis could be conducted called the value of this research into question, given the prior treatise on conducting research in an academic environment. "Other Worlds of Practice: The Field Practitioner" and "Other Worlds of Practice: The Consultant" are extremely short expositions which, while addressing alternative professionals' roles, do not significantly further the premise of the work. Nonetheless, Crowley might have been considered remiss if he had excluded these professionals.

Years

Types