首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
Over the past 2 years, shelf-ready services, the outsourcing of cataloging and processing services, has become the hot topic in the library world. This article examines the implications of shelf-ready service, both operationally and organizationally, for both library and vendor. Using the format of a dialog between librarian and vendor, the article discusses the following questions: Why are you interested in contracting for (or providing) these services? What do you hope to gain? What are the stumbling blocks to implementing a shelf-ready program? What is the impact on workflow and staffing in your organization? How many and what kinds of jobs are affected? How do library/vendor responsibilities change when shelf-ready procedures are applied to an approval plan … to firm orders … to standing orders? How can quality control be assured? Which errors really matter? Are the same standards applied to vendor staff as to in-house staff? How are standards affected by shelf-ready? How do both library and vendor know when they’re “ready for shelf-ready” in a given situation?  相似文献   

2.
Abstract

A growing yet unresolved problem in access services today is controlling user access to resources in a networked environment. This paper describes the history of network authentication, explores the issues involved in selecting an authentication method, discusses the benefits and drawbacks of the various methods, identifies efforts by some integrated library services vendors and academic institutions to address this problem, and makes recommendations for selecting an authentication scheme for a college library. The discussions are based in part upon the results of a survey conducted with California community college libraries, various integrated library system vendors, and online resource companies. Technical terms are defined in a glossary.  相似文献   

3.
This article summarizes the conclusions from a series of two-day seminars of professional library executives on the future of libraries. The provocative element in this summary is the groups’ promises to not get caught up in library “nostalgia, platitudes, and clichés.” The result is a clear-cut set of questions that all librarians but especially public librarians need to face as they prepare for the many questions of adaptation of their profession to the issues they already face in keeping or making their libraries successful through the remaining decades of the 21st century.  相似文献   

4.
Interviews with women working as sports journalists showed that they must negotiate several tensions, including balancing their conflicting identities as woman and as professional journalist. Nevertheless, in the end, they also saw the two as compatible. They fell along a spectrum of resistance to traditional values in sports and journalism, providing evidence of cracks in hegemonic notions of what it means to be a woman covering sports.  相似文献   

5.
6.
This is a review of twelve bibliographies that reflect the holdings of the Russian collection in Hamilton Library at the University of Hawaii focusing on Siberia, the Soviet/Russian Far East, and Russia in Asia and the Pacific, especially Russians in China. The chosen titles represent a mixture of the great, the average, and not-so-good that the author has used over the past four decades. While there is a question about the usefulness of bibliographies in this digital age, most of the old standards should still play a role in academic scholarship.  相似文献   

7.
Self-service is the trend of today's libraries. The Run Run Shaw Library at the City University of Hong Kong therefore is transforming itself in the same direction and offers to its users what it calls the Easy-service. However, the need to handle cash-based micropayments at the service counter is a stumbling block. There is an urgent need for the Library to choose, out of the different payment technologies available, the most suitable one to automate these administrative costly but small-valued payment transactions. The Library's different attempts in this regard and ultimately the integration of the most popular e-purse in Hong Kong in its different payment transactions are therefore mentioned. Overdue fine payments are identified as the micropayments that must be automated if the administration costs are to be reduced and manpower is to be released to make Easy-service a total success.  相似文献   

8.
A new compliance-gaining technique is introduced called the “just-one-more” (JOM) technique that increases compliance rates by including the phrase “I just need one more person to help.” Two studies are reported (N = 160 in each). The first established the effectiveness of the technique as compared to a direct request. The second tested the hypothesis that goal difficulty moderates the technique's effectiveness in a 2 (JOM or direct request) × 2 (requester needs five surveys or 100). Results indicate that the JOM was substantially more effective than a direct request in the 100 surveys condition but not the five.  相似文献   

9.
Abstract

The author describes her experiences in compiling and editing a book of contributed chapters, titled The Successful Academic Librarian. The process includes writing the book proposal, finding contributors, editing their work, and working with the publisher. A timeline of the process is presented, and the challenges and rewards of the project are discussed.  相似文献   

10.
No More Sources?     
From June 2013, documents leaked by the National Security Agency (NSA) dissident Edward Snowden revealed that Western intelligence agencies are capable of bulk collection of electronic communications flowing through global telecommunication systems. Surveillance data shared by the “Five Eyes” eavesdropping agencies of the United States, United Kingdom, Canada, Australia and New Zealand include journalist’s communications. In the wake of the Snowden leak, Zygmunt Bauman and colleagues called for a systematic assessment of the scale, reach and character of contemporary surveillance practices. This paper explores a specific part of Bauman’s task by assessing the impact of the Snowden revelations on confidential source-based journalism. Interviews were conducted with a range of investigative journalists who have experience of covering national security in Five Eyes countries. All expressed serious concern over the intelligence agencies’ greatly enhanced capability to track journalists and to identify and neutralise their sources. The paper concludes that there is clear evidence of a paradigmatic shift in journalist–source relations as those interviewed regard Five Eyes mass surveillance as a most serious threat to the fourth estate model of journalism as practised in Western democratic countries.  相似文献   

11.
Have You Heard?     
This study seeks to understand “listening” as a practice and norm of journalism in the context of an eruption of journalistic discourse about listening surrounding the 2016 US election. An examination of US journalists’ own discourse about listening pointed to an understanding of the need to listen more, better, and to a more diverse set of voices. The widespread criticism of journalism’s performance frequently pointed to failures of listening as a root cause of the more general failure to adequately cover the campaign. Thus, listening involved a set of skills, but was also sometimes construed as a moral obligation. Overall, however, the discourse showed an anemic understanding of listening, often pointing to the public’s inability to listen to journalists.  相似文献   

12.
13.
Publishing agreements have long operated with certain assumptions about what books are and what publishers do. These assumptions are increasingly at odds with the new technological forms in which books are created and marketed, from e-books and Kindle 2 read-aloud works to so-called “vooks” that incorporate on-demand streaming video and other internet-based features in conjunction with hard copy books. Publishers’ contracts need to be re-thought in light of these changed circumstances. Specifically, publishing contracts today should focus on the activities in which the publisher may engage, and not the form in which the work may be presented, a point that was made clear several years ago in the Random House v. RosettaBooks litigation. In defining these activities, contracts should track the language of the exclusive rights enumerated in §106 of the Copyright Act. Finally, to the extent that books are becoming “audiovisual works” publishers may be able to shift to a work-made-for-hire model for obtaining ownership, rather than relying on grants from individual authors.  相似文献   

14.
Both classical and contemporary interpersonal theories have identified the social networks surrounding a couple as integral players in relational development and maintenance. The current project extends this line of research by designing (Study 1) and implementing (Study 2) a measurement of social network interdependence. Scales of network interference and facilitation are developed and probed using exploratory and confirmatory factor analysis. Results support distinct measures of network interference and facilitation. Invariance between differencing samples is tested for using multi-factor CFA. Results showed that measures of network interference and facilitation significantly vary between married and dating couples. Finally, convergent, divergent, and concurrent validity is tested for subscales using variables in relational turbulence theory. Results demonstrate that network interference and facilitation uniquely impact outcome variables above and beyond experiences of partner interference and facilitation. Results are discussed in terms of theory development.  相似文献   

15.
For almost three decades now, the University of California (UC) libraries have worked together closely to ensure that all UC faculty, students, and staff have access to eminent library collections. To this end, UC's libraries have pursued a variety of initiatives for coordinating the acquisition, sharing, and preservation of campus collection resources. The Shared Purchase Program (now known as the Shared Collections and Access Program or SCAP) was established in 1976 to provide joint funding for library materials too costly for a single campus to buy. Since the mid-1980s, groups of bibliographers have worked to coordinate acquisitions activities system-wide, and the early 1990s saw the development of licensing for shared bibliographic databases to journal literature. This paper will discuss UC's latest initiative—the investigation of how the campus' two regional storage facilities (Regional Library Facilities or RLFs) can serve as repositories for both shared and stored collections.  相似文献   

16.
17.
If democracy is a platform for many voices, and the voices of the many, journalists serve democracy by bringing these voices to the forefront of governance by asking difficult questions to those in power. It can be argued that journalists engage in the broader form of surveillance of power from below, or sousveillance [Mann, Steve, and Joseph Ferenbok. 2013. “New media and the power politics of sousveillance in a surveillance-dominated world.” Surveillance and Society 11 (1-2): 18–34.], which aims towards a form of relative equilibrium. In democracies, the institutional system of checks and balances forms the basis on which journalism pursues its watchdog function. This paper explores the experiences of journalists with surveillance and their impact on journalists’ sense of freedom to fulfil their watchdog role. The paper contributes to increasing research interest in “journalism after Snowden” by addressing the intangible conditions under which journalists may or should work, and ultimately also how widely accepted standards of democratic liberties are challenged.  相似文献   

18.
ABSTRACT

In developing and teaching a new first-year psychology course that integrates information literacy skills, a librarian and a psychologist learned the importance of teaching critical thinking skills explicitly, rather than implicitly. Students learned how to use the library resources and learned concepts in psychology, but until critical thinking was taught explicitly, students did not understand the value of what they were learning. In this article, implicit versus explicit learning is defined, and psychological principles are applied to demonstrate how critical thinking can be used to teach library and information skills.  相似文献   

19.
王煊 《网络传播》2006,(9):36-37
2006年5、6月间,一个由一位香港人用手机拍的视频短片《巴士阿叔》在网上传播开来之后,一时间成为中文网络世界的最大热点,这个视频的点击率扶摇直上,短短时间居然超过500万。这件事情甚至引起了美联社、纽约时报、英国卫报等著名媒体的关注,也让提供这个视频存放的网站YouTube在中国网民中迅速窜红。  相似文献   

20.
Social media has become a key medium for discussion and dissemination of news stories, fuelled by the low barrier to entry and the ease of interaction. News stories may be propagated through these networks either by official news organisation accounts, by individual journalists or by members of the public, through link sharing, endorsing or commenting. This preliminary research aims to show how computational analysis of large-scale data-sets allows us to investigate the means by which news stories are spread through social media, and how the conversation around them is shaped by journalists and news organisations. Through the capture of more than 11 million tweets relating to 2303 Twitter accounts connected to journalism and news organisations, we are able to analyse the conversation within and around journalism, examining who spreads information about news articles and who interacts in the discussion around them. Capturing the tweets of news organisations and journalists and the replies and retweets of these micro-blogs allows us to build a rich picture of interaction around news media.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号