首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到11条相似文献,搜索用时 15 毫秒
1.
立足上海交通大学图书馆所负责的CALIS三期“馆员素养培训与资质认证”项目实践,从培训目标、培训方式、课程内容、考核办法与组织管理机制5个方面,重点阐述学科馆员培训体系的设计思路与主要内容.结合 CALIS 学科馆员培训的实施情况,分析、总结学科馆员培训的特色以及需要注意的问题.  相似文献   

2.
ABSTRACT

Libraries have been struggling for years to move beyond 1-shot library training. In spite of efforts in the last decade to promote information literacy for undergraduate and graduate students alike, libraries more often than not are still not reaching the goals articulated in the Association of College & Research Libraries's information literacy standards. The problems are compounded when institutions serve students who also happen to be taking part or all of their classes online or at field-based sites. The model for providing a library training program for students in the Doctor of Education (EdD) program in a distance program focuses on providing students with training that builds sequentially and developmentally at the points of need for students in the 1st year of classes and provides additional support for students once they have completed their course work. This multistepped approach is designed to help doctoral students throughout the doctoral process.  相似文献   

3.
4.
Cyber attacks are becoming commonplace in the business world today. But, it isn't just affecting the large businesses and conglomerates. Computer experts are indicating that it is affecting millions of computers worldwide and is causing professionals, academics, and government officials to rethink computer information's security. But how are these new age criminals gaining their skills? Many are suggesting it is the hallowed halls of the nation's and world's universities and colleges, and even the lower educational levels, which are providing the skills. As technology is exponentially increasing, so is the incidence of cyber attacks. In the recent episodes of computer espionage and attacks, hackers have become much more sophisticated and more alarmingly, much younger. The computer is a man-made device that requires political, legal, and ethical responsibilities. In assessing the social responsibilities associated with information technology as we move into the new millennium, the organization must address three simple questions: (1) Is it legal?; (2) Is it balanced?; and (3) How will it make me feel? An ethical environment within an organization utilizing information technology can be easily established, with or without an ethics officer, if the organization follows the guide of these questions. This ethical environment will demonstrate a corporate and educational conscience that could lead the organization into the next century. Colleges and universities call for proactivity rather than reactivity.  相似文献   

5.
Abstract

This essay broadly analyzes the history and current state of media archival education through a case study of two graduate degrees previously and currently offered at UCLA: the interdepartmental Moving Image Archive Studies (MIAS) MA degree and the MLIS degree with specialization in Media Archival Studies.  相似文献   

6.
Past studies of international students and academic libraries have often focused on students' own characteristics and experiences. Using an online survey, this study instead investigated librarians' teaching skills for serving this population. The analysis reveals that participants perceived an importance in developing skills specifically for international students. They tried to accommodate students' unique needs and optimize teaching approaches using their own experience working with the students. Although they reported having obtained knowledge of students' backgrounds as well as communication and teaching techniques, they showed strong interest in having further training opportunities to improve their teaching. The survey results thus give insight into recommendations for the provision of training to improve teaching in the context of serving international students.  相似文献   

7.
ABSTRACT

This study explores the idea of creating a knowledge base from shared online accounts to use in training librarians who perform distance reference services. Through a survey, follow-up interviews and a case study, the investigators explored current and potential use of shared online accounts as training tools. This study revealed that the participants viewed the concept positively, but many encountered barriers to effectively employing a local knowledge base as a training tool.  相似文献   

8.
9.
10.
QR codes, or “Quick Response” codes, are two-dimensional barcodes that can be scanned by mobile smartphone cameras. These codes can be used to provide fast access to URLs, telephone numbers, and short passages of text. With the rapid adoption of smartphones, librarians are able to use QR codes to promote services and help library users find materials quickly and independently. This article will explain what QR codes are, discuss how they can be used in the library, and describe issues surrounding their use. A list of resources for generating and scanning QR codes is also provided.  相似文献   

11.
The purpose of this article is to explore the use of mixed methods research (MMR) in articles published in library and information science (LIS) journals in Sub-Saharan Africa (SSA) from 2004 to 2008. A mixed methods research framework provided in the methodological literature is used to determine how this method was practiced within the LIS scientific community in SSA. Six hundred and eighty five articles published in nine peer-reviewed LIS journals in SAA were reviewed, finding the dominant research methods in these journals to be survey designs and historical research. The use of MMR was limited: 48 out of 685 articles used the mixed methods approaches that were identified in the methodological literature. A paradigm shift and a change of mindset are recommended for LIS researchers in SSA so that they may exploit the advantages offered by mixed methods research in conducting their studies.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号