Search (2 results, page 1 of 1)

  • × classification_ss:"06.00 / Information und Dokumentation: Allgemeines"
  1. Information ethics : privacy, property, and power (2005) 0.04
    0.039585114 = product of:
      0.098962784 = sum of:
        0.07466118 = weight(_text_:mail in 2392) [ClassicSimilarity], result of:
          0.07466118 = score(doc=2392,freq=6.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.26534313 = fieldWeight in 2392, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.024301602 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
          0.024301602 = score(doc=2392,freq=4.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.13679022 = fieldWeight in 2392, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
      0.4 = coord(2/5)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
  2. Crowley, W.: Spanning the theory-practice divide in library and information science (2005) 0.01
    0.006896904 = product of:
      0.03448452 = sum of:
        0.03448452 = weight(_text_:mail in 439) [ClassicSimilarity], result of:
          0.03448452 = score(doc=439,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.12255673 = fieldWeight in 439, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.015625 = fieldNorm(doc=439)
      0.2 = coord(1/5)
    
    Footnote
    "Theory and Revelation" is devoted to encouraging LIS researchers, in any capacity, not to dismiss the role of faith, beliefs, and religion. The ending section presents "A Nine-Step Model for Pragmatic Research," which stops just short of being a "how-to" by not elucidating on the methodological considerations for each step. The model, while textual, bears a striking resemblance to the flow charts for approaching research found in many research instructional works, even though the entertaining of "solutions" to problems is an iterative element of the process. The text concludes with "The Foundations for Building Bridges," a fivepage summary section, almost woefully inadequate given the substantial issues developed and presented throughout the work. Crowley must be commended for his comprehensive approach to the subject, the detailed annotations, the glossary, the summary of works cited, and the index. The format of starting each chapter with a themed scenario prevented the writing from becoming dry and sleepinducing. Most of the chapters end with a specific section addressing how the issues relate to LIS. The overall structure of the text follows logically from the more theoretical to the more applicable. However, there is a definite bias towards occurrences where practitioners and academicians tend to co-exist and function in a research environment, i.e., library science and academic institutions. Information professionals working in public and community college libraries are discussed in a rather superficial manner. How cultural pragmatism can influence research and theory centered in the information science domain must still be considered in more depth than presented in this text. Further expansion on, and a critical analysis of, cultural pragmatism as a metatheoretical perspective is definitely in order. Hopefully, Spanning the Theory-Practice Divide in Library and Information Science will be an introduction to the use of cultural pragmatism in LIS research and in the development of useful theory. In response to an e-mail from me upon first reading the text, the author informed me of his contact with several other doctoral students interested in furthering their understanding of cultural pragmatism. Inspiring other professionals is certainly a testament to the value of the work and supports my recommendation for this text as essential reading for LIS professionals interested in producing research and theory that are truly useful."