首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
How do we engage with our community in a more meaningful way? How do we make the user experience the center of all we do? What impact are we having and how do we measure it? In an effort to better answer these questions and make a tighter connection between library objectives and the broader needs of the community, the Oak Park Public Library embarked on a journey to “turn outward.” Following the Harwood model for community engagement, Oak Park has made strides in unifying its internal operations and strengthening strategic partnerships. Its intention is wider and deeper community impact.  相似文献   

2.
BACKGROUND: Information and Communication Technologies (ICTs) are important tools for development. Despite its significant growth on a global scale, Internet access is limited in sub-Saharan Africa (SSA). Few studies have explored Internet access, use of electronic resources and ICT training among health information professionals in Africa. OBJECTIVE: The study assessed Internet access, use of electronic resources and ICT training among health information professionals in SSA. METHODS: A 26-item self-administered questionnaire in English and French was used for data collection. The questionnaire was completed by health information professionals from five Listservs and delegates at the 10th biannual Congress of the Association of Health Information and Libraries in Africa (AHILA). RESULTS: A total of 121 respondents participated in the study and, of those, 68% lived in their countries' capital. The majority (85.1%) had Internet access at work and 40.8% used cybercafes as alternative access points. Slightly less than two-thirds (61.2%) first learned to use ICT through self-teaching, whilst 70.2% had not received any formal training in the previous year. Eighty-eight per cent of respondents required further ICT training. CONCLUSIONS AND RECOMMENDATIONS: In SSA, freely available digital information resources are underutilized by health information professionals. ICT training is recommended to optimize use of digital resources. To harness these resources, intergovernmental and non-governmental organizations must play a key role.  相似文献   

3.
《情报学报》已成为汇聚情报学研究人员的旗帜,是我国情报学非正式学术共同体的主要纽带与平台,在情报学非正式学术共同体的形成与构建中发挥了重要作用。本文利用相关数据库收录的1998——2012年间《情报学报》所发论文和引文数据,对情报学非正式学术共同体的知识资源、核心主体、主题领域和学科交流等进行分析,结果表明,《情报学报》已形成一个情报学研究的非正式学术共同体。  相似文献   

4.
In January 2008, Dr. Robert Hauptman, Editor, Journal of Information Ethics, and Professor Emeritus, St. Cloud University, sat down with Elizabeth Buchanan, from the University of Wisconsin-Milwaukee School of Information Studies' Center for Information Policy Research, to talk about the field of information ethics, its major issues, and the state of librarianship. As is widely known, Robert Hauptman, the author of hundreds of articles, is considered one of the founders of the field of information ethics. The formal application of ethical theory to information is termed “information ethics,” concurrently coined such by Robert Hauptman in the United States and Dr. Rafael Capurro in Germany in the mid 1980s. Laying the groundwork for the discipline of information ethics, was Hauptman's 1976 experiment. This was a seminal moment in reference, information ethics, and professional ethics, a moment to which information professionals, today, in the age of the Patriot Act, mass surveillance, and mass privacy violations, consider instrumental in understanding privacy, responsibility, and professional duties. This interview provides some insights on information ethics past, present, and future, from this transcendent scholar.  相似文献   

5.
网络信息过滤系统研究   总被引:22,自引:0,他引:22  
黄晓斌  邱明辉 《情报学报》2004,23(3):326-332
网络信息过滤是根据一定的标准和利用一定的工具从动态的网络信息流中选取相关的信息或剔除不相关信息的一系列过程。本文论述了网络信息过滤的原理 ,概述了网络信息过滤系统的主要类型 ,分析网络信息过滤软件的结构和功能、介绍了过滤软件的评价与选择方法  相似文献   

6.
[目的/意义]本文系统梳理了中国图书情报与档案管理学界在2019年的主要研究热点。[方法/过程]论文采用内容分析法,辅助以简单定量分析,全面而有重点地回顾了在新中国成立一级学科事业、研究和教育中的历史研究,数字人文研究,数据驱动下的核心知识、技术和服务变化研究成果;分别综述了图书馆学、情报学和档案学在2019年重点领域中的研究进展。[结果/结论]论文认为图书情报与档案管理学科坚持在贴近国家重大需求,延续学科内核和使命,主动将信息职业的实践、研究和教育三个领域融合到学术中取得突破。  相似文献   

7.
Staff involvemcnt with community information starts at the administrative level with planning and commitment. Part of the planning process is assessing what other agencies in the community are doing to provide community information, and determining the library's role in this process. It should be clear to staff that providing information about community resources is a legitimate part of the total information service offered by the library, not a nonEssential extra-work addition. Staff training is an ongoing process, and an essential part of becoming comfortable in using this community resource file. The skills which administrators bring to the implementation of a new service say a great deal about how they manage any change. If initial planning has been well thought out, adequate training offered, and communication good between public service staff and those responsible for coordinating the service, staff acceptance and use of the new service should be high.  相似文献   

8.
论网上隐私权的法律保护问题   总被引:11,自引:0,他引:11  
网上个人信息的保护问题已成为网络使用者最为关切的问题。网上出现的隐私权问题主要表现在个人信息的搜集、分析、传输、使用和存储方面。保护网上隐私权有直接保护和间接保护两种。探讨了法律保护过程中遇到的问题。参考文献 4。  相似文献   

9.
The advent of the Internet and networked communications in the last 15 years has arguably considerably changed the information behaviors of doctoral students, including the discovery process. Information seeking includes initiating a search, constructing search strategies, and locating and evaluating the identified sources. Current research on information-seeking behaviors is focusing on understanding how the Internet, social media, and other technological and communication-based changes, including mobile technologies, have changed the way students seek information in order to understand the information behaviors of the students of tomorrow. This article offers a review of the literature on information-seeking behaviors, with a particular focus on recent years (2010–2015). It aims to determine whether notable changes in the information-seeking behavior of doctoral students have emerged in recent years. The study shows that the information-seeking behaviors of doctoral students follow a steady trend, with some subtle changes, particularly in the (patchy) use of social media and networking sites. There appears to be more similarities than differences across disciplines in the information-seeking behaviors of doctoral students. Considerations to their information literacy skills are given to understand better the role supervisors and library staff can play to support the doctoral students population in the early stages of the research process.  相似文献   

10.
[目的/意义]个人信息被遗忘权作为一种新型私权,是平衡言论自由和隐私自主的重要途径,其在欧美国家的立法进程中均有重要体现。[方法/过程]从欧盟与美国对“个人信息被遗忘权”法理逻辑和立法进程的历史考察入手,探讨欧盟与美国“个人信息被遗忘权”法理逻辑差异的缘由,并对大数据时代背景下“个人信息被遗忘权”的法理逻辑再定位进行考量,以法律逻辑再定位为切入点,对被遗忘权的权利空间布局进行细分,以应对数字时代的新挑战。[结果/结论]信息控制者在收集和处理公民个人信息过程中必须履行审慎义务,构建个人信息利用中的主动保护模式,不断与国际个人信息保护趋势接轨,为互联网行业的发展保驾护航。  相似文献   

11.
[目的/意义]社会化媒体信息隐私泄露事件频繁发生,加剧了用户对信息隐私的担忧,用户在使用社会化媒体过程中是否愿意向平台披露个人信息成为推动社会化媒体平台健康发展的关键。[方法/过程]利用隐私计算理论和沟通隐私管理理论为框架,结合隐私关注,构建社会化媒体用户信息披露意愿影响模型。以微信平台为例,通过问卷调查的方式收集样本数据,使用Smart PLS软件对模型合理性进行验证。[结果/结论]研究发现,感知收益、信任、感知信息控制均正向影响信息披露意愿,隐私关注负向影响信息披露意愿;信任负向影响感知风险;感知信息控制负向影响隐私关注;隐私倾向正向影响隐私关注和感知风险。  相似文献   

12.
Concern and even conflict over information privacy and access to personal, sensitive, information owns a lengthy, complex, and disputed history in the information professions. A historical case study, this research explores the ethical tensions between information access for (re)use and information privacy regarding queer archival materials. It engages with small worlds and normative behavior, with codes of ethics, and with issues of power and social justice. Various small worlds' definitions of normative behavior condition and potentially determine their positions on access to perceived sensitive information. Further, information professionals may overlook codes of ethics even when addressing ethical challenges. Finally, the power of information professionals to effect social justice may be overestimated. Implications for practice and directions for future research are suggested.  相似文献   

13.
浅议网络隐私权的法律保护   总被引:1,自引:0,他引:1  
计算机和网络技术的发展,使得我国公民网络隐私权的法律保护受到了严峻的挑战,这也严重阻碍了我国网络经济的发展。近年来侵犯网络隐私权已成为一个突出的社会问题并受到国际社会的关注。笔者立足于我国国情,对我国网络隐私权的法律保护现状以及完善我国网络隐私权的相关对策作了论述。  相似文献   

14.
《The Reference Librarian》2013,54(75-76):115-127
Summary

Due to the nature of the Internet, a disconnect exists between observed and actual usage in libraries. A variety of problems may arise surrounding Internet access in academic settings. However, the speed with which transactions occur, the privacy issues involved, and the vast amounts of information and services available make it impossible to assess the extent of any problem. With Internet tracking software, librarians may acquire data that will assist them in tracking problems, and in assessing user Internet behavior. This article reports on a study conducted with LittleBrother software at Northwestern University Main Library's General Information Center.  相似文献   

15.
《The Reference Librarian》2013,54(94):139-162
Abstract

The National Commission on Libraries and Information Science published recommendations for a national information policy in 1976, and concerns regarding the protection of privacy and equal public access to online information were introduced. From the mid 1970s to the early 1990s, federal government agencies were beginning to publish materials and maintain records electronically. Most current U.S. government information was available on the Internet by the late 1990s, and depository libraries were required to provide workstations that would facilitate access to documents. Documents librarians, already concerned with the lack of attention to archiving online federal information, were provided with an example of the vulnerability of online publications in the early 2000s when federal agency Web sites were made inaccessible-quickly and easily. The possibility that too much government information was available to anyone with access to the Internet was becoming a national concern. Using government documents as resources, this article retraces the events that were occurring in federal government agencies during the movement of government information to the Internet.  相似文献   

16.
The controversial Escrowed Encryption Standard, recently adopted as a Federal Information Processing Standard (FIPS), has polarized some stakeholders both within and outside government and has also raised disturbing questions about the role of Federal agencies in the standards-setting process. This article explores the relationship between standards and Federal information policy and examines the balance between national security and law enforcement concerns, on the one hand, and privacy rights and U.S. economic competitiveness, on the other.  相似文献   

17.
Background: The relationship between health information seeking, patient engagement and health literacy is not well understood. This is especially true in medically underserved populations, which are often viewed as having limited access to health information. Objective: To improve communication between an urban health centre and the community it serves, a team of library and information science researchers undertook an assessment of patients’ level and methods of access to and use of the Internet. Methods: Data were collected in 53 face‐to‐face anonymous interviews with patients at the centre. Interviews were tape‐recorded for referential accuracy, and data were analysed to identify patterns of access and use. Results: Seventy‐two percentage of study participants reported having access to the Internet through either computers or cell phones. Barriers to Internet access were predominantly lack of equipment or training rather than lack of interest. Only 21% of those with Internet access reported using the Internet to look for health information. Conclusion: The findings suggest that lack of access to the Internet in itself is not the primary barrier to seeking health information in this population and that the digital divide exists not at the level of information access but rather at the level of information use.  相似文献   

18.
《The Reference Librarian》2013,54(44):161-172
Guidelines developed by the American Association of School of Librarians and the Reference and Adult Services Division of the American Library Association can aid school library media specialists in the planning, implementation, and evaluation of reference and information services for the school community. This article discusses the value of such professionally sanctioned guidelines and uses two documents, Information Power and "Information Services for Information Consumers," as the basis for a checklist for assessing building-level school library media reference services. Media specialists can use this checklist in evaluating and upgrading reference services within their schools.  相似文献   

19.
作者拟利用互联网信息整合系统 ( Internet Information Integration System,3 I)从 Internet上遴选、下载、收集各种有价值的性病艾滋病信息 ,经过自动分类、过滤、排重和知识网络构建等智能化的处理整合后 ,建立性病艾滋病综合信息资源网络数据库并为用户提供检索服务 ,也可以个性化的形式提供给用户。  相似文献   

20.
This research examines privacy law and Human Flesh Search (HFS) on the Chinese Internet. HFS is spontaneous, widely participated search and publication of targeted individuals’ personal information on the Internet. This research sees HFS as an important form of non-institutional information gathering and publication, and argues that the regulation of HFS is not only about privacy but also line-drawing for information collection and dissemination in the digital setting. Therefore, legal instruments and court cases in relation to HFS and online privacy must be assessed as important components of the Chinese state’s Internet regulatory scheme. This research finds that the paired concepts of ‘flexibility and populism,’ key features of legal reform and development in contemporary China, are highly relevant to analyze the growth of digital privacy laws in China. The political-legal authorities’ experimentation and innovation in the development of the law shed important light on how China’s Internet governance adapts to changing circumstances and strives to keep pace with profound social transformations in new technological environments.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号