Search (6 results, page 1 of 1)

  • × subject_ss:"Information science"
  1. Theories of information behavior (2005) 0.01
    0.0070205703 = product of:
      0.028082281 = sum of:
        0.018205484 = weight(_text_:wide in 68) [ClassicSimilarity], result of:
          0.018205484 = score(doc=68,freq=4.0), product of:
            0.13148437 = queryWeight, product of:
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.029675366 = queryNorm
            0.1384612 = fieldWeight in 68, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.015625 = fieldNorm(doc=68)
        0.009876797 = weight(_text_:web in 68) [ClassicSimilarity], result of:
          0.009876797 = score(doc=68,freq=4.0), product of:
            0.096845865 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.029675366 = queryNorm
            0.1019847 = fieldWeight in 68, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.015625 = fieldNorm(doc=68)
      0.25 = coord(2/8)
    
    Content
    Perspectives on the Tasks in which Information Behaviors Are Embedded (Barbara M. Wildemuth and Anthony Hughes) - Phenomenography (Louise Limberg) - Practice of Everyday Life (Paulette Rothbauer) - Principle of Least Effort (Donald O. Case) - Professions and Occupational Identities (Olof Sundin and Jenny Hedman) - Radical Change (Eliza T. Dresang) - Reader Response Theory (Catherine Sheldrick Ross) - Rounding and Dissonant Grounds (Paul Solomon) - Serious Leisure (Jenna Hartel) - Small-World Network Exploration (Lennart Björneborn) - Nan Lin's Theory of Social Capital (Catherine A. Johnson) - The Social Constructionist Viewpoint on Information Practices (Kimmo Tuominen, Sanna Talja, and Reijo Savolainen) - Social Positioning (Lisa M. Given) - The Socio-Cognitive Theory of Users Situated in Specific Contexts and Domains (Birger Hjoerland) - Strength of Weak Ties (Christopher M. Dixon) - Symbolic Violence (Steven Joyce) - Taylor's Information Use Environments (Ruth A. Palmquist) - Taylor's Question-Negotiation (Phillip M. Edwards) - Transtheoretical Model of the Health Behavior Change (C. Nadine Wathen and Roma M. Harris) - Value Sensitive Design (Batya Friedman and Nathan G. Freier) - Vygotsky's Zone of Proximal Development (Lynne (E. E) McKechnie) - Web Information Behaviors of Organizational Workers (Brian Detlor) - Willingness to Return (Tammara Combs Turner and Joan C. Durrance) - Women's Ways of Knowing (Heidi Julien) - Work Task Information-Seeking and Retrieval Processes (Preben Hansen) - World Wide Web Information Seeking (Don Turnbull)
    Footnote
    Weitere Rez. in: JASIST 58(2007) no.2, S.303 (D.E. Agosto): "Due to the brevity of the entries, they serve more as introductions to a wide array of theories than as deep explorations of a select few. The individual entries are not as deep as those in more traditional reference volumes, such as The Encyclopedia of Library and Information Science (Drake, 2003) or The Annual Review of Information Science and Technology (ARIST) (Cronin, 2005), but the overall coverage is much broader. This volume is probably most useful to doctoral students who are looking for theoretical frameworks for nascent research projects or to more veteran researchers interested in an introductory overview of information behavior research, as those already familiar with this subfield also will probably already be familiar with most of the theories presented here. Since different authors have penned each of the various entries, the writing styles vary somewhat, but on the whole, this is a readable, pithy volume that does an excellent job of encapsulating this important area of information research."
  2. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.01
    0.0052885255 = product of:
      0.021154102 = sum of:
        0.013112898 = weight(_text_:data in 566) [ClassicSimilarity], result of:
          0.013112898 = score(doc=566,freq=2.0), product of:
            0.093835 = queryWeight, product of:
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.029675366 = queryNorm
            0.1397442 = fieldWeight in 566, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.03125 = fieldNorm(doc=566)
        0.008041205 = product of:
          0.01608241 = sum of:
            0.01608241 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.01608241 = score(doc=566,freq=2.0), product of:
                0.103918076 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.029675366 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.25 = coord(2/8)
    
    Abstract
    Knowledge Architectures reviews traditional approaches to managing information and explains why they need to adapt to support 21st-century information management and discovery. Exploring the rapidly changing environment in which information is being managed and accessed, the book considers how to use knowledge architectures, the basic structures and designs that underlie all of the parts of an effective information system, to best advantage. Drawing on 40 years of work with a variety of organizations, Bedford explains that failure to understand the structure behind any given system can be the difference between an effective solution and a significant and costly failure. Demonstrating that the information user environment has shifted significantly in the past 20 years, the book explains that end users now expect designs and behaviors that are much closer to the way they think, work, and act. Acknowledging how important it is that those responsible for developing an information or knowledge management system understand knowledge structures, the book goes beyond a traditional library science perspective and uses case studies to help translate the abstract and theoretical to the practical and concrete. Explaining the structures in a simple and intuitive way and providing examples that clearly illustrate the challenges faced by a range of different organizations, Knowledge Architectures is essential reading for those studying and working in library and information science, data science, systems development, database design, and search system architecture and engineering.
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
  3. Information cultures in the digital age : a Festschrift in Honor of Rafael Capurro (2016) 0.00
    0.0021292693 = product of:
      0.017034154 = sum of:
        0.017034154 = weight(_text_:data in 4127) [ClassicSimilarity], result of:
          0.017034154 = score(doc=4127,freq=6.0), product of:
            0.093835 = queryWeight, product of:
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.029675366 = queryNorm
            0.18153305 = fieldWeight in 4127, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.0234375 = fieldNorm(doc=4127)
      0.125 = coord(1/8)
    
    Content
    Inhalt: Super-Science, Fundamental Dimension, Way of Being: Library and Information Science in an Age of Messages / Bawden, David (et al.) (S.31-43) - The "Naturalization" of the Philosophy of Rafael Capurro: Logic, Information and Ethics / Brenner, Joseph E. (S.45-64) - Turing's Cyberworld / Eldred, Michael (S.65-81) - Hermeneutics and Information Science: The Ongoing Journey From Simple Objective Interpretation to Understanding Data as a Form of Disclosure / Kelly, Matthew (S.83-110) - The Epistemological Maturity of Information Science and the Debate Around Paradigms / Ribeiro, Fernanda (et al.) (S.111-124) - A Methodology for Studying Knowledge Creation in Organizational Settings: A Phenomenological Viewpoint / Suorsa, Anna (et al.) (S.125-142) - The Significance of Digital Hermeneutics for the Philosophy of Technology / Tripathi, Arun Kumar (S.143-157) - Reconciling Social Responsibility and Neutrality in LIS Professional Ethics: A Virtue Ethics Approach / Burgess, John T F (S.161-172) - Information Ethics in the Age of Digital Labour and the Surveillance-Industrial Complex / Fuchs, Christian (S.173-190) - Intercultural Information Ethics: A Pragmatic Consideration / Hongladarom, Soraj (S.191-206) - Ethics of European Institutions as Normative Foundation of Responsible Research and Innovation in ICT / Stahl, Bernd Carsten (S.207-219) - Raphael's / Holgate, John D. (S.223-245) - Understanding the Pulse of Existence: An Examination of Capurro's Angeletics / Morador, Fernando Flores (S.247-252) - The Demon in the Gap of Language: Capurro, Ethics and language in Divided Germany / Saldanha, Gustavo Silva (S.253-268) - General Intellect, Communication and Contemporary Media Theory / Frohmann, Bernd (S.271-286) - "Data": The data / Furner, Jonathan (S.287-306) - On the Pre-History of Library Ethics: Documents and Legitimacy / Hansson, Joacim (S.307-319) -
  4. Warner, J.: Humanizing information technology (2004) 0.00
    0.0020114407 = product of:
      0.016091526 = sum of:
        0.016091526 = weight(_text_:wide in 438) [ClassicSimilarity], result of:
          0.016091526 = score(doc=438,freq=2.0), product of:
            0.13148437 = queryWeight, product of:
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.029675366 = queryNorm
            0.122383565 = fieldWeight in 438, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.01953125 = fieldNorm(doc=438)
      0.125 = coord(1/8)
    
    Footnote
    Rez. in: JASIST. 56(2003) no.12, S.1360 (C.Tomer): "Humanizing Information Technology is a collection of essays that represent what are presumably Julian Warner's best efforts to understand the perpetually nascent discipline of information science and its relationship to information technology. It is clearly a formidable task. Warner succeeds occasionally in this endeavor; more often, he fails. Yet, it would be wrong to mark Humanizing Information Technology as a book not worth reading. On the contrary, though much fault was found and this review is far from positive, it was nevertheless a book well-worth reading. That Humanizing Information Technology succeeds at all is in some ways remarkable, because Warner's prose tends to be dense and graceless, and understanding his commentaries often relies an close readings of a wide array of sources, some of them familiar, many of them less so. The inaccessibility of Warner's prose is unfortunate; there is not a single idea in Humanizing Information Technology so complicated that it could not have been stated in a clear, straightforward manner. The failure to establish a clear, sufficiently füll context for the more obscure sources is an even more serious problem. Perhaps the most conspicuous example of this problem stems from the frequent examination of the concept of the "information society" and the related notion of information as an autonomous variable, each of them ideas drawn largely from Frank Webster's 1995 book, Theories of the Information Society. Several of Warner's essays contain passages in Humanizing Information Technology whose meaning and value are largely dependent an a familiarity with Webster's work. Yet, Warner never refers to Theories of the Information Society in more than cursory terms and never provides a context füll enough to understand the particular points of reference. Suffice it to say, Humanizing Information Technology is not a book for readers who lack patience or a thorough grounding in modern intellectual history. Warner's philosophical analyses, which frequently exhibit the meter, substance, and purpose of a carefully crafted comprehensive examination, are a large part of what is wrong with Humanizing Information Technology. Warner's successes come when he turns his attention away from Marxist scholasticism and toward historical events and trends. "Information Society or Cash Nexus?" the essay in which Warner compares the role of the United States as a "copyright haven" for most of the 19th century to modern China's similar status, is successful because it relies less an abstruse analysis and more an a sharply drawn comparison of the growth of two economies and parallel developments in the treatment of intellectual property. The essay establishes an illuminating context and cites historical precedents in the American experience suggesting that China's official positions toward intellectual property and related international conventions are likely to evolve and grow more mature as its economy expands and becomes more sophisticated. Similarly, the essay entitled "In the Catalogue Ye Go for Men" is effective because Warner comes dangerously close to pragmatism when he focuses an the possibility that aligning cataloging practice with the "paths and tracks" of discourse and its analysis may be the means by which to build more information systems that furnish a more direct basis for intellectual exploration.
  5. Theory development in the information sciences (2016) 0.00
    0.0016391122 = product of:
      0.013112898 = sum of:
        0.013112898 = weight(_text_:data in 3701) [ClassicSimilarity], result of:
          0.013112898 = score(doc=3701,freq=2.0), product of:
            0.093835 = queryWeight, product of:
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.029675366 = queryNorm
            0.1397442 = fieldWeight in 3701, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.03125 = fieldNorm(doc=3701)
      0.125 = coord(1/8)
    
    Abstract
    Emerging as a discipline in the first half of the twentieth century, the information sciences study how people, groups, organizations, and governments create, share, disseminate, manage, search, access, evaluate, and protect information, as well as how different technologies and policies can facilitate and constrain these activities. Given the broad span of the information sciences, it is perhaps not surprising that there is no consensus regarding its underlying theory the purposes of it, the types of it, or how one goes about developing new theories to talk about new research questions. Diane H. Sonnenwald and the contributors to this volume seek to shed light on these issues by sharing reflections on the theory-development process. These reflections are not meant to revolve around data collection and analysis; rather, they focus on the struggles, challenges, successes, and excitement of developing theories. The particular theories that the contributors explore in their essays range widely, from theories of literacy and reading to theories of design and digital search. Several chapters engage with theories of the behavior of individuals and groups; some deal with processes of evaluation; others reflect on questions of design; and the rest treat cultural and scientific heritage. The ultimate goal, Sonnenwald writes in her introduction, is to "encourage, inspire, and assist individuals striving to develop and/or teach theory development.""
  6. Covert and overt : recollecting and connecting intelligence service and information science (2005) 0.00
    7.1074883E-4 = product of:
      0.0056859907 = sum of:
        0.0056859907 = product of:
          0.011371981 = sum of:
            0.011371981 = weight(_text_:22 in 69) [ClassicSimilarity], result of:
              0.011371981 = score(doc=69,freq=4.0), product of:
                0.103918076 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.029675366 = queryNorm
                0.109432176 = fieldWeight in 69, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.015625 = fieldNorm(doc=69)
          0.5 = coord(1/2)
      0.125 = coord(1/8)
    
    Classification
    327.12 22
    DDC
    327.12 22