首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Although considerable attention has been focused on information users in recent years, little phenomenographic research into the word “information” has been conducted, perhaps because cursory consideration may suggest that work of this type is less useful than explorations of areas such as information-seeking. The lack of an established methodological framework discourages inquiry and, if understandings of the term are unique to each individual, there seems little scope to develop even broad principles for practice. Nevertheless, phenomenographic research helps professionals to learn how far users’ attitudes to the term “information” are consistent with their own and can reduce confusion between information providers and their clientele. Despite the absence of an accepted framework, several individual techniques are available. Ultimately, the research findings may prove highly instructive. They may, for example, influence the use of the word “information” by professionals when they interact with clients, whilst also offering insights into information behavior and information worlds.  相似文献   

2.
The paper deals with theoretical and practical challenges of the information society in the 21st century. In the first part an overview of past and current activities in the field of information ethics at UNESCO is provided (Virtual Forum, Second International Congress on Information Ethics, Observatory on the information Society). The second part presents a historical interpretation of the development of modern information society with the emerging networked world society with its characteristics of interactivity and decentralization. The diversity of moral norms and traditions within this global medium gives rise to the question concerning an Internet-morality as a challenge to ethical thinking. The third part deals with the question of our identity within the framework of a digital ontology. The concepts of “net” and “information” are analysed. A future information ethics is based on a digital ontology. Living in the information age is considered from the point of view of both an ethical imperative and the art of living.  相似文献   

3.
Design-based research for LIS   总被引:2,自引:0,他引:2  
Design-based research is a methodology emerging from the field of education that may hold potential for research in library and information science (LIS). Based upon the assumption that learning is situated in a real-world context, design-based research combines research, design, and practice into one process. It results in usable products that are supported by a theoretical framework. While definitional and methodological issues do exist, the method holds some promise for research into “user-centered” information systems and services. In the field of LIS, design-based research might contribute to our understanding of how people find, choose, understand, and use information in context. The method is also of interest to professionals concerned with “evidence-based practice.” This article will first explain and describe the method as it has been used in the allied field of education. Issues related to definition and methodology will be explored, as well as some of the solutions that have been proposed. The method will then be related to LIS, using the bonded design work of Large, Nesset, Beheshti, and Bowler [Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006a). Bonded design: a methodology for designing with children. In S. Kurniawan & P. Saphiris (Eds.), Advances in Universal Web Design and Evaluation: Research, Trends and Opportunities. London: Idea Group., Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006b). “Bonded design”: a novel approach to intergenerational information technology design. Library and Information Science Research, 28, 64–82] as a case study to demonstrate the applicability of design-based research to LIS inquiry.  相似文献   

4.
The U.S. patent system and the body of issued patents are key elements in meeting information needs related to technology and innovation. Most librarians, however, have little understanding of the value of patents as sources of technological information—and less knowledge about how to help users tap what has been called, “the largest and most comprehensive body of technological literature in the world.” This article attempts to provide a sufficient background on patent fundamentals to allow librarians to assist or refer users who would benefit by the use of patents. Detailed patent searching instructions are provided for staff in Government Printing Office depository libraries to use materials available through the depository program. The value of utilizing one of the 58 Patent depository libraries to enhance and expedite the search process is highlighted, and online searching options are introduced.  相似文献   

5.
6.
Somewhere in the vicinity of 80 percent of all governmental information has some “geographic” element, and the vast majority is called “geospatial” because of the nature of describing spatial phenomena of the earth. Geospatial information has been increasing steadily in popularity and use since the advent of geographic information systems in the 1960s. From the early 1990s until the present, research libraries have seen an increase in the availability of geospatial information, and they have also seen a substantial change in the services provided to support the needs of clients seeking that information. However, recent events have altered the “access landscape.” September 11, 2001, and subsequent events, caused many policy shifts to take place as to how, or whether, access to governmental geospatial information should be granted. This paper explores those policy developments with the goal of prognosticating on the future of access to governmental geospatial information.  相似文献   

7.
Technology has transformed the way people live. Current day information seekers are empowered with multiple choices of information sources and libraries no longer remain the primary centre for information seekers. With diminishing time and geographical barriers the world has become a global village and information seekers are stressed with time constraints. It is the duty of library and information professionals to address these tech-savvy library users' needs and align their services to satisfy them.Recently, the author of this paper conducted a research study on the “Impact of technology on quality of services in technical and management libraries in Karnataka” sponsored by the Department of Scientific and Industrial Research (DSIR), Government of India, New Delhi. The study was approved in 2005 and the final report was submitted to the government in 2007. This paper carries some of the results of this research study conducted by the author in Karnataka state in Southern India.  相似文献   

8.
Objective:While studies from the early 1990s show that library staff in nonlibrarian roles interpret the term “paraprofessional” as being demeaning to their roles, no recent research has been conducted on this topic. This study aims to investigate if health sciences library staff continue to have similar negative associations with the term “paraprofessional” and to determine if another term is preferred.Methods:The authors conducted a literature review to identify terms used to categorize library staff in nonlibrarian roles. Using these terms, we created an online Qualtrics survey asking participants to rank terms by preference. We distributed the survey via thirty-six professional email discussion lists, including MEDLIB-L, thirty-three MLA chapter and caucus email discussion lists, DOCLINE-L, and ACRL-HSIG-L. Survey participants included full-time and part-time health sciences library staff in any nonlibrarian position. Responses from librarians were not accepted.Results:Based on 178 completed surveys, “library staff” was the top choice of 49% of participants, over “other” (19%), “paraprofessional” (13%), “library support staff” (11%), “paralibrarian” (7%), and “nonprofessional” (1%). Although “library staff” was the top choice of participants across all ages, older participants (aged 45–75) preferred “library support staff” and “paraprofessional” to a greater degree than younger participants (aged 18–44), while younger participants preferred “other” to a greater degree. Out of 36 participants who specifically mentioned the terms “paraprofessional” or “paralibrarian,” 32 (89%) of those comments were negative, indicating that the “para” in “paraprofessional” and “paralibrarian” is either insulting, inapplicable, or unfamiliar.Conclusions:Our results suggest that although the term “paraprofessional” may not intentionally be used to demean library staff, many library staff interpret the term to be demeaning to their roles. Instead, “library staff,” a more inclusive and less divisive term, was preferred by survey participants. In accordance with our results, we believe the term “paraprofessional” should no longer be used in library and information scholarly literature or professional discourse.  相似文献   

9.
This is the first guest column for “Managing Technology”. We hope it typifies the central theme of challenges to managers presented by information technology and the lessons we may share from their application. This essay is of signal interest, appearing as it does at a watershed in library automation. We may expect a wholesale shift in the next several years from single machine integrated systems to distributed computing technologies and a client/server model. The five “lessons learned” in the Oklahoma State experience will be broadly applicable in the next wave of library automation.—C.B.L.  相似文献   

10.
Objective:The decisions and processes that may compose a systematic search strategy have not been formally identified and categorized. This study aimed to (1) identify all decisions that could be made and processes that could be used in a systematic search strategy and (2) create a hierarchical framework of those decisions and processes.Methods:The literature was searched for documents or guides on conducting a literature search for a systematic review or other evidence synthesis. The decisions or processes for locating studies were extracted from eligible documents and categorized into a structured hierarchical framework. Feedback from experts was sought to revise the framework. The framework was revised iteratively and tested using recently published literature on systematic searching.Results:Guidance documents were identified from expert organizations and a search of the literature and Internet. Data were extracted from 74 eligible documents to form the initial framework. The framework was revised based on feedback from 9 search experts and further review and testing by the authors. The hierarchical framework consists of 119 decisions or processes sorted into 17 categories and arranged under 5 topics. These topics are “Skill of the searcher,” “Selecting information to identify,” “Searching the literature electronically,” “Other ways to identify studies,” and “Updating the systematic review.”Conclusions:The work identifies and classifies the decisions and processes used in systematic searching. Future work can now focus on assessing and prioritizing research on the best methods for successfully identifying all eligible studies for a systematic review.  相似文献   

11.
Government secrecy has a long history in the American federal experience. Several kinds of government secrecy policy are reviewed here, beginning with their origins, or “policy depths,” and extending to their most recent expressions or “dimensions.” It is a rich history which, in this brief overview, is explored only in terms of its highlights, but offers, nonetheless, a roadmap for pursuing research in this area. It concludes with the observation that, in a democracy, representatives of the citizenry, whether elected or appointed, may momentarily cloak their decisionmaking and their policies in secrecy for the good of the nation—to protect it from enemies and to assure its survival. Those representatives must remember that the secrecy they impose is only momentary and that the shrouded decisions and policies they make, once made known to the citizenry, must be acceptable to them. The citizenry, in turn, accept such secrecy only in limited instances and on a momentary basis in order to have the confidence that their representatives are making decisions and policies acceptable to them. A government failing to honor these arrangements may well be regarded as one “not worth the cost of preservation.”  相似文献   

12.
Much consumer health information addresses issues of disease risk or treatment risks and benefits, addressing questions such as “How effective is this treatment?” or “What is the likelihood that this test will give a false positive result?” Insofar as it addresses outcome likelihood, this information is essentially quantitative in nature, which is of critical importance, because quantitative information tends to be difficult to understand and therefore inaccessible to consumers. Information professionals typically examine reading level to determine the accessibility of consumer health information, but this measure does not adequately reflect the difficulty of quantitative information, including materials addressing issues of risk and benefit. As a result, different methods must be used to evaluate this type of consumer health material. There are no standard guidelines or assessment tools for this task, but research in cognitive psychology provides insight into the best ways to present risk and benefit information to promote understanding and minimize interpretation bias. This paper offers an interdisciplinary bridge that brings these results to the attention of information professionals, who can then use them to evaluate consumer health materials addressing risks and benefits.  相似文献   

13.
The general aim of this paper is to show the results of a study in which we combined bibliometric mapping and citation network analysis to investigate the process of creation and transfer of knowledge through scientific publications. The novelty of this approach is the combination of both methods. In this case we analyzed the citations to a very influential paper published in 1990 that contains, for the first time, the term Absorptive Capacity. A bibliometric map identified the terms and the theories associated with the term while two techniques from the citation network analysis recognized the main papers during 15 years. As a result we identified the articles that influenced the research for some time and linked them into a research tradition that can be considered the backbone of the “Absorptive Capacity Field”.  相似文献   

14.
Access to government records is increasingly shifting to a nether world-governed neither by the FOIA and the Privacy Act, nor by an executive order on classification. Instead, new categories of records, labeled “sensitive but unclassified,” “for official use only,” or “critical infrastructure information,” are being created in a variety of agencies, and are governed by agency regulations. Statutory authority is found in a number of separate laws, such as the Homeland Security Act and the Aviation and Transportation Security Act. These categories can be assigned by agency officials, contractors, or those in the private sector who originated the records; many records categorized this way are not subject to appeal or review by agencies or the courts, or to any automatic “declassification” process that has applied to documents withheld under the FOIA or subject to classification. Trends toward increased secrecy at all levels of government have become sufficiently alarming that individuals across the political spectrum have begun to speak out, and members of the access community (e.g., newspaper editors and public interest groups) have formed coalitions to focus debate on the need to rethink the balance of access with privacy and records protection, and to lobby actively for reinstatement of principles of access that have governed records policy for the past 35 years.  相似文献   

15.
Using the theoretical frameworks of Erving Goffman and Michael Lipsky, an example of school library staff and student interactions is examined, using functional discourse analysis to reveal how practice is produced as a clerical control routine which upholds institutional authority over users, rather than legitimate service work. The study, which consists of a single interaction between a middle school library clerk and a young adolescent with overdue books, is an example of what Goffman calls a “remedial interchange” in which the clerk, with the use of the library's computer, identifies the student's “offense” of keeping books overdue, despite repeated notices. Upon admission of the student's virtual transgression, the clerk provides an “offering” to hold his desired books until he returns the others, thus redressing the balance of the interaction while still retaining asymmetrical institutional control over the student.  相似文献   

16.
Replacing the ineffective Federal Reports Act of 1942, the Paperwork Reduction Act of 1980 (PRA) was enacted largely to relieve the public of the mounting information collection and reporting requirements of the federal government. It also promoted coordinated information management activities on a governmentwide basis by the director of the Office of Management and Budget (OMB) and prescribed information management responsibilities for the executive agencies. The management focus of the PRA was sharpened with the 1986 amendments which refined the concept of “information resources management” (IRM), defined as “the planning, budgeting, organizing, directing, training, promoting, controlling, and management activities associated with the burden, collection, creation, use, and dissemination of information by agencies, and includes the management of information and related resources such as automatic data processing equipment.” This key term and its subset concepts received further definition and explanation in the PRA of 1995, making IRM a tool for managing the contribution of information activities to program performance, and for managing related resources, such as personnel, equipment, funds, and technology. The PRA currently authorizes appropriations for its administration by the Office of Information and Regulatory Affairs (OIRA), located within OMB, through FY2001 (44 U.S.C. 3520). Reauthorization of OIRA appropriations provides an opportunity to upgrade the PRA’s provisions and to address prevailing government information management issues.  相似文献   

17.
As security and safety requirements were not considered during the creation of networks, there is a growing number of threats for individuals, enterprises, government agencies and organizations. This paper reviews these threats and the difficulties of dealing with them now. The Internet, as a consequence, is hardly adequate for processing sensitive information, because it can be protected neither by technology nor by law. In this situation, future “information societies” will be more risk-oriented than today: individual rights will be less significant and traditional legal instruments will need to be adapted to different sets of values.  相似文献   

18.
19.
It is no longer effective to provide information literacy instruction that is thought to be “good for” college students, but rather, instruction must focus on the learning styles and preferences of the target population. This case study reports a series of hands-on/minds-on information literacy activities that dissolve student's misconception that “techno-savvy” is synonymous with information literate. Careful and thorough instruction in the mining of popular Internet search engines for authoritative information was coupled with instruction in the use of traditional library resources. It was found that the college students studied possess a high need for clarity and a low tolerance for ambiguity, and therefore any activities assigned must be thoroughly, yet succinctly, described in order to achieve success. Combining traditional information literacy instruction with novel approaches appeals to the confidence in and reliance on Internet search engines that college students exhibit, while it moves this microcosm toward a higher level of information literacy and commitment to life long learning.  相似文献   

20.
In January 2008, Dr. Robert Hauptman, Editor, Journal of Information Ethics, and Professor Emeritus, St. Cloud University, sat down with Elizabeth Buchanan, from the University of Wisconsin-Milwaukee School of Information Studies' Center for Information Policy Research, to talk about the field of information ethics, its major issues, and the state of librarianship. As is widely known, Robert Hauptman, the author of hundreds of articles, is considered one of the founders of the field of information ethics. The formal application of ethical theory to information is termed “information ethics,” concurrently coined such by Robert Hauptman in the United States and Dr. Rafael Capurro in Germany in the mid 1980s. Laying the groundwork for the discipline of information ethics, was Hauptman's 1976 experiment. This was a seminal moment in reference, information ethics, and professional ethics, a moment to which information professionals, today, in the age of the Patriot Act, mass surveillance, and mass privacy violations, consider instrumental in understanding privacy, responsibility, and professional duties. This interview provides some insights on information ethics past, present, and future, from this transcendent scholar.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号