Search (6 results, page 1 of 1)

  • × subject_ss:"Information science"
  1. Covert and overt : recollecting and connecting intelligence service and information science (2005) 0.01
    0.012605185 = product of:
      0.033613827 = sum of:
        0.0051302956 = product of:
          0.015390887 = sum of:
            0.015390887 = weight(_text_:t in 69) [ClassicSimilarity], result of:
              0.015390887 = score(doc=69,freq=4.0), product of:
                0.12502089 = queryWeight, product of:
                  3.9394085 = idf(docFreq=2338, maxDocs=44218)
                  0.031735957 = queryNorm
                0.12310652 = fieldWeight in 69, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.9394085 = idf(docFreq=2338, maxDocs=44218)
                  0.015625 = fieldNorm(doc=69)
          0.33333334 = coord(1/3)
        0.022402717 = weight(_text_:geschichte in 69) [ClassicSimilarity], result of:
          0.022402717 = score(doc=69,freq=4.0), product of:
            0.15083465 = queryWeight, product of:
              4.7528 = idf(docFreq=1036, maxDocs=44218)
              0.031735957 = queryNorm
            0.148525 = fieldWeight in 69, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              4.7528 = idf(docFreq=1036, maxDocs=44218)
              0.015625 = fieldNorm(doc=69)
        0.006080813 = product of:
          0.012161626 = sum of:
            0.012161626 = weight(_text_:22 in 69) [ClassicSimilarity], result of:
              0.012161626 = score(doc=69,freq=4.0), product of:
                0.11113391 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031735957 = queryNorm
                0.109432176 = fieldWeight in 69, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.015625 = fieldNorm(doc=69)
          0.5 = coord(1/2)
      0.375 = coord(3/8)
    
    Classification
    327.12 22
    Content
    Intelligence work and the information professions / Robert S. Taylor -- Spies of the airwaves / Norman Horrocks -- Intelligence work and information science : two men in a boat / David Batty -- The intelligence game : seeing is believing? / Robert Lee Chartrand -- Applications of information science to U.S. naval intelligence and narcotics intelligence, 1974-1992 / Emil Levine -- A life in the information trade / Charles T. Meadow -- Information management in MI5 before the age of the computer / Alistair Black and Rodney Brunt -- Some aspects of indexing in British intelligence, 1939-1945 / Rodney Brunt -- Intelligence agencies, librarians, and information scientists / Colin Burke -- Historical note on information science in wartime : pioneer documentation activities in World War II / Pamela Spence Richards -- Technology for open source government information and business intelligence / George L. Marling -- Knowledge transfer : information science shapes intelligencein the cold war era / Lee S. Strickland -- The information science and intelligence literature : an overview / Robert V. Williams -- Defining what information science is or should be : a survey and review of a half-century of published pronouncements / Ben-Ami Lipetz -- Wanted : a definition of "intelligence" / Michael Warner -- Evidence and inference in foreign intelligence / Maurice H. Hellner -- The zoo and the jungle : a comparison of the information practices of intelligence analysts and of scientists / Harold Wooster.
    DDC
    327.12 22
    Footnote
    The role of technology in both intelligence and information science is just one question explored in Covert and Overt, which takes on more fundamental issues as well. Even the ubiquitous "What is information?" debate is revisited. But the questions asked are always subordinate to the overarching theme of bringing concepts and techniques of intelligence and information science together and examining the results. The process and lifecycle of intelligence is explored and mapped to information science methods, primarily indexing and information retrieval. In more historical explorations undertaken by contributors, it becomes apparent that intelligence and information science have always been closely aligned, but that this alignment is not always perceived by those engaged in intelligence work. Interestingly, and probably not surprisingly, a general consensus seems to be that library and information science practitioners involved in intelligence were (and are) more capable of seeing the complementary nature of the techniques information science brings to intelligence services than many intelligence professionals, who often needed demonstrations of efficacy to be convinced. Structurally, the book is divided into four parts, moving from anecdotal accounts through to discussions of definition and theory. Part 1, "Information Science and Intelligence: Reminiscences and Reflections from World War II to Today" is comprised of the personal stories of information scientists who also served as intelligence professionals at various times during and since World War II, collected from special panel presentations at the 2001 and 2002 American Society for Information Science and Technology (ASIS&T) annual conferences. These contributors include former American and British servicemen and intelligence officers who all relate a common experience of dealing with information, documents, and other records in the pursuit of intelligence goals.
    RSWK
    Geheimdienst / Aufsatzsammlung / Geschichte
    Subject
    Geheimdienst / Aufsatzsammlung / Geschichte
  2. Vickery, B.C.; Vickery, A.: Information science in theory and practice (2004) 0.00
    0.002475174 = product of:
      0.019801391 = sum of:
        0.019801391 = weight(_text_:geschichte in 4320) [ClassicSimilarity], result of:
          0.019801391 = score(doc=4320,freq=2.0), product of:
            0.15083465 = queryWeight, product of:
              4.7528 = idf(docFreq=1036, maxDocs=44218)
              0.031735957 = queryNorm
            0.1312788 = fieldWeight in 4320, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.7528 = idf(docFreq=1036, maxDocs=44218)
              0.01953125 = fieldNorm(doc=4320)
      0.125 = coord(1/8)
    
    Footnote
    Rez. in: BuB 56(2004) H.12, S.743 (H, Meinhardt): "1987 erstmals erschienen und seitdem ein Klassiker unter den Lehrbüchern im Feld der Information Science, liegt nunmehr die dritte, deutlich veränderte Auflage vor. Notwendig geworden war die Überarbeitung vor allem durch die Dynamik im Bereich der Informationstechnologien und deren Auswirkungen sowohl auf die Praxis der Informationsspezialisten wie auch die Disziplin selber. Augenfälligste Veränderung ist denn auch ein neues Kapitel zu »Internet und Informationswissenschaft«. »Chemical librarians« Zunächst einige Worte zu den Autoren, die dem einen oder anderen vielleicht nicht bekannt sind: Brian C. Vickery und Alina Vickery sind beide von ihrer Ausbildung her Chemiker und waren als Ehepartner (Alina Vickery starb Ende 2001) auch beruflich vielfältig gemeinsam tätig. Wie viele Chemiker (man denke nur Eugene Garfield, den Begründer der modernen Szientometrie) sensibilisiert für den Umgang mit enormen Informationsmengen und damit Informationsproblemen, zudem als »chemical librarian« (Brian C. Vickery) und Mitarbeiter von chemischen Fachzeitschriften auch professionell beschäftigt mit Fragen des Fachinformationstransfers, haben sie sich (insbesondere Brian C. Vickery) frühzeitig und kontinuierlich informationswissenschaftlich betätigt. Resultat ist eine Fülle von Publikationen, vor allem zu den Bereichen Indexieren, Klassifizieren, Information Retrieval, auch zur Geschichte der wissenschaftlichen Kommunikation (alle Arbeiten sind im Anhang aufgelistet). Brian C. Vickery war außerdem, das dürfte für Bibliothekare von Interesse sein, als Deputy beim Aufbau der National Lending Library for Science and Technology (NLLST) in Boston Spa beteiligt, die ihre Arbeit 1961 aufnahm und 1973 mit in die neu gegründete British Library einging. Und es sei hier schon vorab bemerkt, dass der immer wiederkehrende Bezug von informationswissenschaftlichen Fragestellungen auf die bibliothekarische Praxis ein Vorzug dieses Buches ist.
  3. Introduction to information science and technology (2011) 0.00
    0.0011336459 = product of:
      0.009069167 = sum of:
        0.009069167 = product of:
          0.027207501 = sum of:
            0.027207501 = weight(_text_:t in 4045) [ClassicSimilarity], result of:
              0.027207501 = score(doc=4045,freq=2.0), product of:
                0.12502089 = queryWeight, product of:
                  3.9394085 = idf(docFreq=2338, maxDocs=44218)
                  0.031735957 = queryNorm
                0.21762364 = fieldWeight in 4045, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.9394085 = idf(docFreq=2338, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=4045)
          0.33333334 = coord(1/3)
      0.125 = coord(1/8)
    
    Series
    ASIS&T Monograph Series
  4. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.00
    0.001074946 = product of:
      0.008599568 = sum of:
        0.008599568 = product of:
          0.017199136 = sum of:
            0.017199136 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.017199136 = score(doc=566,freq=2.0), product of:
                0.11113391 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031735957 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.125 = coord(1/8)
    
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
  5. Information cultures in the digital age : a Festschrift in Honor of Rafael Capurro (2016) 0.00
    6.801876E-4 = product of:
      0.005441501 = sum of:
        0.005441501 = product of:
          0.016324501 = sum of:
            0.016324501 = weight(_text_:t in 4127) [ClassicSimilarity], result of:
              0.016324501 = score(doc=4127,freq=2.0), product of:
                0.12502089 = queryWeight, product of:
                  3.9394085 = idf(docFreq=2338, maxDocs=44218)
                  0.031735957 = queryNorm
                0.13057418 = fieldWeight in 4127, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.9394085 = idf(docFreq=2338, maxDocs=44218)
                  0.0234375 = fieldNorm(doc=4127)
          0.33333334 = coord(1/3)
      0.125 = coord(1/8)
    
    Content
    Inhalt: Super-Science, Fundamental Dimension, Way of Being: Library and Information Science in an Age of Messages / Bawden, David (et al.) (S.31-43) - The "Naturalization" of the Philosophy of Rafael Capurro: Logic, Information and Ethics / Brenner, Joseph E. (S.45-64) - Turing's Cyberworld / Eldred, Michael (S.65-81) - Hermeneutics and Information Science: The Ongoing Journey From Simple Objective Interpretation to Understanding Data as a Form of Disclosure / Kelly, Matthew (S.83-110) - The Epistemological Maturity of Information Science and the Debate Around Paradigms / Ribeiro, Fernanda (et al.) (S.111-124) - A Methodology for Studying Knowledge Creation in Organizational Settings: A Phenomenological Viewpoint / Suorsa, Anna (et al.) (S.125-142) - The Significance of Digital Hermeneutics for the Philosophy of Technology / Tripathi, Arun Kumar (S.143-157) - Reconciling Social Responsibility and Neutrality in LIS Professional Ethics: A Virtue Ethics Approach / Burgess, John T F (S.161-172) - Information Ethics in the Age of Digital Labour and the Surveillance-Industrial Complex / Fuchs, Christian (S.173-190) - Intercultural Information Ethics: A Pragmatic Consideration / Hongladarom, Soraj (S.191-206) - Ethics of European Institutions as Normative Foundation of Responsible Research and Innovation in ICT / Stahl, Bernd Carsten (S.207-219) - Raphael's / Holgate, John D. (S.223-245) - Understanding the Pulse of Existence: An Examination of Capurro's Angeletics / Morador, Fernando Flores (S.247-252) - The Demon in the Gap of Language: Capurro, Ethics and language in Divided Germany / Saldanha, Gustavo Silva (S.253-268) - General Intellect, Communication and Contemporary Media Theory / Frohmann, Bernd (S.271-286) - "Data": The data / Furner, Jonathan (S.287-306) - On the Pre-History of Library Ethics: Documents and Legitimacy / Hansson, Joacim (S.307-319) -
  6. Theories of information behavior (2005) 0.00
    6.4128696E-4 = product of:
      0.0051302956 = sum of:
        0.0051302956 = product of:
          0.015390887 = sum of:
            0.015390887 = weight(_text_:t in 68) [ClassicSimilarity], result of:
              0.015390887 = score(doc=68,freq=4.0), product of:
                0.12502089 = queryWeight, product of:
                  3.9394085 = idf(docFreq=2338, maxDocs=44218)
                  0.031735957 = queryNorm
                0.12310652 = fieldWeight in 68, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.9394085 = idf(docFreq=2338, maxDocs=44218)
                  0.015625 = fieldNorm(doc=68)
          0.33333334 = coord(1/3)
      0.125 = coord(1/8)
    
    Content
    Inhalt: An Introduction to Metatheories, Theories, and Models (Marcia J. Bates) - What Methodology Does to Theory: Sense-Making Methodology as Exemplar (Brenda Dervin) Evolution in Information Behavior Modeling Wilson's Model (T.D. Wilson) - Affective Load (Diane Nahl) - Anomalous State of Knowledge (Nicholas J. Belkin) - Archival Intelligence (Elizabeth Yakel) - Bandura's Social Cognition (Makiko Miwa) - Berrypicking (Marcia J. Bates) - Big6 Skills for Information Literacy (Carrie A. Lowe and Michael B. Eisenberg) - Chang's Browsing (Chan-Ju L. Chang) - Chatman's Information Poverty (Julie Hersberger) - Chatman's Life in the Round (Crystal Fulton) - Cognitive Authority (Soo Young Rieh) - Cognitive Work Analysis (Raya Fidel and Annelise Mark Pejtersen) - Collective Action Dilemma (Marc Smith and Howard T. Weiser) - Communicative Action (Gerald Benoît) - Communities of Practice (Elisabeth Davies) - Cultural Models of Hall and Hofstede (Anita Komlodi) - Dervin's Sense-Making (Tonyia J. Tidline) - Diffusion Theory (Darian Lajoie-Paquette) - The Domain Analytic Approach to Scholars' Information Practices (Sanna Talja) - Ecological Theory of Human Information Behavior (Kirsty Williamson) - Elicitation as Micro-Level Information Seeking (Mei-Mei Wu) - Ellis's Model of InformationSeeking Behavior (David Ellis) - Everyday Life Information Seeking (Reijo Savolainen) - Face Threat (Lorri Mon) - Flow Theory (Charles Naumer) - General Model of the Information Seeking of Professionals (Gloria J. Leckie) - The Imposed Query (Melissa Gross) - Information Acquiringand-Sharing (Kevin Rioux) - Information Activities in Work Tasks (Katriina Byström) - Information Encountering (Sanda Erdelez) - Information Grounds (Karen E. Fisher) - Information Horizons (Diane H. Sonnenwald) - Information Intents (Ross J. Todd) - Information Interchange (Rita Marcella and Graeme Baxter) - Institutional Ethnography (Roz Stooke) - Integrative Framework for Information Seeking and Interactive Information Retrieval (Peter Ingwersen) - Interpretative Repertoires (Pamela J. McKenzie) - Krikelas's Model of Information Seeking (Jean Henefer and Crystal Fulton) - Kuhlthau's Information Search Process (Carol Collier Kuhlthau) - Library Anxiety (Patricia Katopol) - Monitoring and Blunting (Lynda M. Baker) - Motivational Factors for Interface Design (Carolyn Watters and Jack Duffy) - Network Gatekeeping (Karine Barzilai-Nahon) - Nonlinear Information Seeking (Allen Foster) - Optimal Foraging (JoAnn Jacoby) - Organizational Sense Making and Information Use (Anu Maclntosh-Murray) - The PAIN Hypothesis (Harry Bruce) -
    Perspectives on the Tasks in which Information Behaviors Are Embedded (Barbara M. Wildemuth and Anthony Hughes) - Phenomenography (Louise Limberg) - Practice of Everyday Life (Paulette Rothbauer) - Principle of Least Effort (Donald O. Case) - Professions and Occupational Identities (Olof Sundin and Jenny Hedman) - Radical Change (Eliza T. Dresang) - Reader Response Theory (Catherine Sheldrick Ross) - Rounding and Dissonant Grounds (Paul Solomon) - Serious Leisure (Jenna Hartel) - Small-World Network Exploration (Lennart Björneborn) - Nan Lin's Theory of Social Capital (Catherine A. Johnson) - The Social Constructionist Viewpoint on Information Practices (Kimmo Tuominen, Sanna Talja, and Reijo Savolainen) - Social Positioning (Lisa M. Given) - The Socio-Cognitive Theory of Users Situated in Specific Contexts and Domains (Birger Hjoerland) - Strength of Weak Ties (Christopher M. Dixon) - Symbolic Violence (Steven Joyce) - Taylor's Information Use Environments (Ruth A. Palmquist) - Taylor's Question-Negotiation (Phillip M. Edwards) - Transtheoretical Model of the Health Behavior Change (C. Nadine Wathen and Roma M. Harris) - Value Sensitive Design (Batya Friedman and Nathan G. Freier) - Vygotsky's Zone of Proximal Development (Lynne (E. E) McKechnie) - Web Information Behaviors of Organizational Workers (Brian Detlor) - Willingness to Return (Tammara Combs Turner and Joan C. Durrance) - Women's Ways of Knowing (Heidi Julien) - Work Task Information-Seeking and Retrieval Processes (Preben Hansen) - World Wide Web Information Seeking (Don Turnbull)