Search (6 results, page 1 of 1)

  • × classification_ss:"54.08 / Informatik in Beziehung zu Mensch und Gesellschaft"
  1. Keen, A.: ¬Die Stunde der Stümper : wie wir im Internet unsere Kultur zerstören (2008) 0.00
    0.0025043357 = product of:
      0.012521679 = sum of:
        0.00418839 = weight(_text_:information in 2667) [ClassicSimilarity], result of:
          0.00418839 = score(doc=2667,freq=2.0), product of:
            0.05398669 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.030753274 = queryNorm
            0.0775819 = fieldWeight in 2667, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=2667)
        0.008333288 = product of:
          0.016666576 = sum of:
            0.016666576 = weight(_text_:22 in 2667) [ClassicSimilarity], result of:
              0.016666576 = score(doc=2667,freq=2.0), product of:
                0.107692726 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.030753274 = queryNorm
                0.15476047 = fieldWeight in 2667, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=2667)
          0.5 = coord(1/2)
      0.2 = coord(2/10)
    
    Abstract
    Das Internet und besonders das Web 2.0 sind ein Segen für die Meinungsfreiheit, so heißt es: Endlich können alle bestimmen, worüber diskutiert wird - nicht nur wenige Experten, Top-Journalisten und wortgewaltige Autoren, die das Meinungsmonopol für sich beanspruchen. Doch was haben wir uns da eingehandelt? Forumsbeiträge, die vor Dummheit und falschen Fakten strotzen, und an Idiotie kaum zu überbietende Videoclips bei YouTube. Es kommt noch schlimmer: - Politische Splitterparteien und verschrobene Wirrköpfe maskieren sich immer häufiger als harmlose Blogger, um demokratiefeindliche Hetzkampagnen zu verbreiten. Betroffene können sich kaum dagegen wehren. - Unternehmen betreiben auf subtile Weise "virales Marketing", um ihre Produkte von vermeintlich begeisterten Kunden empfehlen zu lassen. - Clevere Lobbyisten mischen sich unter falscher Identität in Diskussionen ein, um ihre fragwürdigen Interessen durchzusetzen. Wir befinden uns auf einem gefährlichen Irrweg, sagt Andrew Keen: Wo Halbwissen und blanke Lügen herrschen statt verlässlicher Information, da fehlt auch die Basis für vernünftige und tragfähige politische Entscheidungen, da ist unsere Kultur in ihren Grundfesten erschüttert. Ein scharf formuliertes Plädoyer gegen die absurden Auswüchse der großen Verdummungsmaschine, die sich Internet nennt.
    Date
    22. 2.2009 12:33:37
  2. Dueck, G.: Dueck's Panopticon : Gesammelte Kultkolumnen (2007) 0.00
    0.0017935754 = product of:
      0.017935753 = sum of:
        0.017935753 = product of:
          0.035871506 = sum of:
            0.035871506 = weight(_text_:evaluation in 650) [ClassicSimilarity], result of:
              0.035871506 = score(doc=650,freq=2.0), product of:
                0.12900078 = queryWeight, product of:
                  4.1947007 = idf(docFreq=1811, maxDocs=44218)
                  0.030753274 = queryNorm
                0.278072 = fieldWeight in 650, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.1947007 = idf(docFreq=1811, maxDocs=44218)
                  0.046875 = fieldNorm(doc=650)
          0.5 = coord(1/2)
      0.1 = coord(1/10)
    
    Abstract
    In der IT-Welt, unter den "Techies" und Ingenieuren, genießen die Kolumnen des IBM-Vordenkers Gunter Dueck einen fast legendären Ruf. Leidenschaftlich subjektiv wird jeweils Aktuelles und besonders Zukünftiges aufs Korn genommen und scharf-humorig auf den Punkt gebracht. Der vorliegende Band vereint 42 assoziative Feuerwerke des Kultautors und bietet ein kunterbuntes Potpourri: Artgerechte Haltung von Menschen unter besonderer Berücksichtigung von "Techies", Unfreiheit der Forschung, Plattwürmer Mensch, Softwarepatente, Aufrufe an Manager, endlich die Versuche einzustellen, Naturgesetze zu umgehen. Gegen zwanghafte Evaluation, kindhafte Begeisterung über viel zu Neues, gegen jährlich wechselnde Managementfehler und Beraterhypes ("Triebrichtungen") usw. usw. Dueck: "Ich muss und will Ihnen nicht immer aus der Seele sprechen - aber was spricht gegen einen gelegentlichen Neuronensturm?"
  3. Women and information technology : research on underrepresentation (2006) 0.00
    7.0241437E-4 = product of:
      0.007024144 = sum of:
        0.007024144 = weight(_text_:information in 592) [ClassicSimilarity], result of:
          0.007024144 = score(doc=592,freq=10.0), product of:
            0.05398669 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.030753274 = queryNorm
            0.1301088 = fieldWeight in 592, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0234375 = fieldNorm(doc=592)
      0.1 = coord(1/10)
    
    Abstract
    Experts investigate the reasons for low female participation in computing and suggest strategies for moving toward parity through studies of middle and high school girls, female students and postsecondary computer science programs, and women in the information technology workforce. Computing remains a heavily male-dominated field even after 25 years of extensive efforts to promote female participation. The contributors to "Women and Information Technology" look at reasons for the persistent gender imbalance in computing and explore some strategies intended to reverse the downward trend. The studies included are rigorous social science investigations; they rely on empirical evidence - not rhetoric, hunches, folk wisdom, or off-the-cuff speculation about supposed innate differences between men and women. Taking advantage of the recent surge in research in this area, the editors present the latest findings of both qualitative and quantitative studies. Each section begins with an overview of the literature on current research in the field, followed by individual studies. The first section investigates the relationship between gender and information technology among preteens and adolescents, with each study considering what could lead girls' interest in computing to diverge from boys'; the second section, on higher education, includes a nationwide study of computing programs and a cross-national comparison of computing education; the final section, on pathways into the IT workforce, considers both traditional and non-traditional paths to computing careers.
    Footnote
    Rez. in: JASIST 58(2007) no.11, S.1704 (D.E. Agosto): "Student participation in computer science (CS) has dropped significantly over the past few years in the United States. As the Computing Research Association (Vegso, 2006) recently noted, "After five years of decline, the number of new CS majors in fall 2005 was half of what it was in fall 2000 (15,958 vs. 7,952)." Many computing educators and working professionals worry that this reduced level of participation might result in slowed technological innovation in future years. Adding to the problem is especially low female participation in the computer-related disciplines. For example, Cohoon (2003) showed that the percentage of high school girls indicating intent to study CS in college dropped steadily from 1991 to 2001, from a high of 37% to a low of 20%. The National Science Foundation's most recent report on Women, Minorities, and Persons with Disabilities in Science and Engineering (National Science Foundation, 2004) indicates that while females obtained 57% of all bachelor's degrees in 2001, they obtained just 28% of computer-related undergraduate degrees. These low percentages of female participation are reflected in the computing workforce as well. Women and Information Technology: Research on Underrepresentation provides an overview of research projects and research trends relating to gender and computing. The book takes a proactive general stance; the ultimate goal of publishing the research included in the volume is to lead to significant gains in female representation in the study and practice of the computing-related fields. ... The volume as a whole does not offer a clear-cut solution to the problem of female underrepresentation, but a number of the chapters do indicate that recruitment and retention must be dealt with jointly, as each is dependent on the other. Another recurring theme is the importance of role models from early on in girls' lives, in the form of both female faculty and female computing professionals as role models. Still another recurring theme is the importance of female mentoring before and during the college years, including both informal peer mentoring and formal faculty mentoring. Taken as a whole, this is a successful work that is probably most useful as a background reference tool. As such, it should assist students and scholars interested in continuing this undeniably important area of research."
  4. Höflich, J.R.: Mensch, Computer und Kommunikation : Theoretische Verortungen und empirische Befunde (2001) 0.00
    5.2354875E-4 = product of:
      0.005235487 = sum of:
        0.005235487 = weight(_text_:information in 3140) [ClassicSimilarity], result of:
          0.005235487 = score(doc=3140,freq=2.0), product of:
            0.05398669 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.030753274 = queryNorm
            0.09697737 = fieldWeight in 3140, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=3140)
      0.1 = coord(1/10)
    
    Theme
    Information
  5. Winograd, T.; Flores, F.: Erkenntnis, Maschinen, Verstehen : zur Neugestaltung von Computersystemen (1992) 0.00
    4.1883902E-4 = product of:
      0.00418839 = sum of:
        0.00418839 = weight(_text_:information in 1524) [ClassicSimilarity], result of:
          0.00418839 = score(doc=1524,freq=2.0), product of:
            0.05398669 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.030753274 = queryNorm
            0.0775819 = fieldWeight in 1524, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=1524)
      0.1 = coord(1/10)
    
    Theme
    Information
  6. Dueck, G.: E-Man : die neuen virtuellen Herrscher (2002) 0.00
    3.1412925E-4 = product of:
      0.0031412924 = sum of:
        0.0031412924 = weight(_text_:information in 655) [ClassicSimilarity], result of:
          0.0031412924 = score(doc=655,freq=2.0), product of:
            0.05398669 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.030753274 = queryNorm
            0.058186423 = fieldWeight in 655, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0234375 = fieldNorm(doc=655)
      0.1 = coord(1/10)
    
    Theme
    Information Resources Management

Languages

Types