首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 921 毫秒
1.
Somewhere in the vicinity of 80 percent of all governmental information has some “geographic” element, and the vast majority is called “geospatial” because of the nature of describing spatial phenomena of the earth. Geospatial information has been increasing steadily in popularity and use since the advent of geographic information systems in the 1960s. From the early 1990s until the present, research libraries have seen an increase in the availability of geospatial information, and they have also seen a substantial change in the services provided to support the needs of clients seeking that information. However, recent events have altered the “access landscape.” September 11, 2001, and subsequent events, caused many policy shifts to take place as to how, or whether, access to governmental geospatial information should be granted. This paper explores those policy developments with the goal of prognosticating on the future of access to governmental geospatial information.  相似文献   

2.
Wireless is changing the policy calculus for municipal broadband   总被引:1,自引:0,他引:1  
Historically, the justification for municipal provisioning of “last-mile” communications infrastructure has focused on the natural monopoly aspect of wireline infrastructure. Growing interest in wireless ISPs, municipal hot spots, and access to public space for siting wireless infrastructure suggests new and expanded opportunities for local government participation in telecommunication services. This paper examines the implications of emerging wireless technologies for the policy debate over whether municipalities should be playing an active role in providing last-mile broadband services and, if so, what the nature of that role should be.  相似文献   

3.
The Constitution establishes that the apportionment of the U.S. House of Representatives shall be based upon an enumeration of the population. Every 10 years, the Bureau of the Census conducts that enumeration, and using the Method of Equal Proportions designated by the Congress, furnishes to the President the number of Representatives to which each state is entitled. “Rules of residence” have been developed to determine who should be counted and where persons should be counted in the census.Following the 1970 census, because of the Supreme Court's decisions requiring population equality in districts used for electoral purposes, census data became vital to the redistricting processes carried out by the individual states. The Congress enacted Public Law 94–171 which authorized the Bureau of the Census to make special preparations for the provision of redistricting data needed by the 50 states. The 1980 program established by the Census Bureau enabled state redistricting to be accomplished far more smoothly than in the 1970s. The Census Bureau is already working with the states on its 1990 program, an essential element of which is based upon its plan to provide block data for the entire country.  相似文献   

4.
This paper was presented as the keynote address at the Ohio Library Council, Technical Services Division conference,“Technical Services, 2003: Inspiration, Example, Synthesis” at Mohican State Park, Ohio, May 7, 2003. The keynote was to fill the role of “inspiration.” The author considers why technical services personnel may feel isolated, misunderstood, or dispensable; why technical services personnel may be misunderstood or underappreciated by others; the nature and mission of librarianship and how technical services relates to them; the consequences of having a bad image and a bad self-image; and how harmful opinions and actions might be countered.  相似文献   

5.
Government secrecy has a long history in the American federal experience. Several kinds of government secrecy policy are reviewed here, beginning with their origins, or “policy depths,” and extending to their most recent expressions or “dimensions.” It is a rich history which, in this brief overview, is explored only in terms of its highlights, but offers, nonetheless, a roadmap for pursuing research in this area. It concludes with the observation that, in a democracy, representatives of the citizenry, whether elected or appointed, may momentarily cloak their decisionmaking and their policies in secrecy for the good of the nation—to protect it from enemies and to assure its survival. Those representatives must remember that the secrecy they impose is only momentary and that the shrouded decisions and policies they make, once made known to the citizenry, must be acceptable to them. The citizenry, in turn, accept such secrecy only in limited instances and on a momentary basis in order to have the confidence that their representatives are making decisions and policies acceptable to them. A government failing to honor these arrangements may well be regarded as one “not worth the cost of preservation.”  相似文献   

6.
The presence–or absence–of locus sigilli “[L.S.]” or “[SEAL]” indicators, to validate the signatures in those texts of American Indian treaties collated by Charles J. Kappler in his Indian Affairs: Laws and Treaties, is examined. The results of this inquiry suggest that Kappler spent far more time examining the original treaty documents than Deloria and DeMallie proposed in their Documents of American Indian Diplomacy: Treaties, Agreements, and Conventions, 1775–1979.  相似文献   

7.
Much of information policy is focused on establishing the parameters of information access—ensuring or limiting access to certain types of information. Given how central information access is to virtually every aspect of society, policy can be seen as one of the most significant forces influencing the information society. Recent events, however, have fueled changes in the ways that some governments use policy to shape access, none more significantly than the United States. This paper examines the meanings of and relationships between policy and access, as well as their key roles in society and democratic participation. Following an examination of the historical and social impacts of policies about access, the article analyzes the perspectives of the Bush administration on how policy should shape information access as an illustration of the relationships between policy and access. The paper examines the issues raised by the Bush administration’s views on access and policy and the implications of their policies for the United States, for the global information society, and for research related to information. Ultimately, the paper raises questions about the extent to which information policies about access can be used for overtly political purposes, what might be described as “information politics,” without significantly altering the meaning of information access in a society.  相似文献   

8.
Access to government records is increasingly shifting to a nether world-governed neither by the FOIA and the Privacy Act, nor by an executive order on classification. Instead, new categories of records, labeled “sensitive but unclassified,” “for official use only,” or “critical infrastructure information,” are being created in a variety of agencies, and are governed by agency regulations. Statutory authority is found in a number of separate laws, such as the Homeland Security Act and the Aviation and Transportation Security Act. These categories can be assigned by agency officials, contractors, or those in the private sector who originated the records; many records categorized this way are not subject to appeal or review by agencies or the courts, or to any automatic “declassification” process that has applied to documents withheld under the FOIA or subject to classification. Trends toward increased secrecy at all levels of government have become sufficiently alarming that individuals across the political spectrum have begun to speak out, and members of the access community (e.g., newspaper editors and public interest groups) have formed coalitions to focus debate on the need to rethink the balance of access with privacy and records protection, and to lobby actively for reinstatement of principles of access that have governed records policy for the past 35 years.  相似文献   

9.
It is no longer effective to provide information literacy instruction that is thought to be “good for” college students, but rather, instruction must focus on the learning styles and preferences of the target population. This case study reports a series of hands-on/minds-on information literacy activities that dissolve student's misconception that “techno-savvy” is synonymous with information literate. Careful and thorough instruction in the mining of popular Internet search engines for authoritative information was coupled with instruction in the use of traditional library resources. It was found that the college students studied possess a high need for clarity and a low tolerance for ambiguity, and therefore any activities assigned must be thoroughly, yet succinctly, described in order to achieve success. Combining traditional information literacy instruction with novel approaches appeals to the confidence in and reliance on Internet search engines that college students exhibit, while it moves this microcosm toward a higher level of information literacy and commitment to life long learning.  相似文献   

10.
Although considerable attention has been focused on information users in recent years, little phenomenographic research into the word “information” has been conducted, perhaps because cursory consideration may suggest that work of this type is less useful than explorations of areas such as information-seeking. The lack of an established methodological framework discourages inquiry and, if understandings of the term are unique to each individual, there seems little scope to develop even broad principles for practice. Nevertheless, phenomenographic research helps professionals to learn how far users’ attitudes to the term “information” are consistent with their own and can reduce confusion between information providers and their clientele. Despite the absence of an accepted framework, several individual techniques are available. Ultimately, the research findings may prove highly instructive. They may, for example, influence the use of the word “information” by professionals when they interact with clients, whilst also offering insights into information behavior and information worlds.  相似文献   

11.
This is the first guest column for “Managing Technology”. We hope it typifies the central theme of challenges to managers presented by information technology and the lessons we may share from their application. This essay is of signal interest, appearing as it does at a watershed in library automation. We may expect a wholesale shift in the next several years from single machine integrated systems to distributed computing technologies and a client/server model. The five “lessons learned” in the Oklahoma State experience will be broadly applicable in the next wave of library automation.—C.B.L.  相似文献   

12.
A continuing theme of the archival literature from the “New World Countries” of the Australia, Canada and the United States is the lack of understanding and appreciation of archivists and archival work. The author posits that this situation can be ameliorated if archivists understand the temperament characteristics that shape their own attitudes and behaviours and thus influence their interactions with significant others in the workplace and wider community. This essay reports and interprets major findings of a survey of temperament types present among members of the Australian Society of Archivists, conducted as part of a 1998 three-country [Australia, Canada and the USA] study.A version of this paper was presented at the 1999 Australian Society of Archivists Annual Conference in Brisbane, Queensland, Australia. It is the first of two essays that report the results of national surveys of temperament types of archivists in three countries: Australia, Canada and the USA. The second essay, “The Influence of Temperament Type in the Perceptions of Archivists in Three New World Countries” will appear in the next issue of Archival Science.  相似文献   

13.
The paper deals with theoretical and practical challenges of the information society in the 21st century. In the first part an overview of past and current activities in the field of information ethics at UNESCO is provided (Virtual Forum, Second International Congress on Information Ethics, Observatory on the information Society). The second part presents a historical interpretation of the development of modern information society with the emerging networked world society with its characteristics of interactivity and decentralization. The diversity of moral norms and traditions within this global medium gives rise to the question concerning an Internet-morality as a challenge to ethical thinking. The third part deals with the question of our identity within the framework of a digital ontology. The concepts of “net” and “information” are analysed. A future information ethics is based on a digital ontology. Living in the information age is considered from the point of view of both an ethical imperative and the art of living.  相似文献   

14.
As security and safety requirements were not considered during the creation of networks, there is a growing number of threats for individuals, enterprises, government agencies and organizations. This paper reviews these threats and the difficulties of dealing with them now. The Internet, as a consequence, is hardly adequate for processing sensitive information, because it can be protected neither by technology nor by law. In this situation, future “information societies” will be more risk-oriented than today: individual rights will be less significant and traditional legal instruments will need to be adapted to different sets of values.  相似文献   

15.
Dissertation advising is an important form of mentoring. To investigate the impact of dissertation advising over time, advisor and committee member names were collected for 2400 dissertations completed over a 40-year period (1964–2004) in 32 North American information and library science schools. Several mentoring impact metrics are reported for a subset of the data, including the number of dissertations advised, the number of dissertation committees served on, the ratio of advising to committee membership, and the fractional “mpact” that weights advising and committee membership. The subset consists of data for six schools that produced at least three dozen dissertations and for which complete data is available. The data and resulting “mpact” metrics offer new ways to assess faculty impact and to investigate the nature and growth of a field.  相似文献   

16.
Five participants completed retrospective and concurrent verbal protocols (Think Afters and Think Alouds) to evaluate the methods for the study of the information-seeking processes of 12–15-year-old students using Microsoft Encarta 98. After a short training session in the Think Aloud Method, they completed four activities of differing complexity. The data provided support for the use of verbal protocol analysis to uncover information-seeking processes of these students. The amount of data generated during Think Alouds and Think Afters depended on the difficulty of the questions and the number of “dead ends” encountered by the students. The Think Alouds and Think Afters provided data about the behavioral, cognitive, and affective processes. Think Afters provide different data than the Think Alouds, and both are important to understanding how adolescents interact with CD-ROM encyclopedias. Participants were able to find the information to answer each of the four search activity questions but used a variety of search terms, categories, and strategies. Some participants reached a level of frustration after a number of “dead ends” and needed encouragement from the researcher. The frustration was more apparent in the younger participants. Effective reading strategies are very important to successful location and evaluation of information in CD-ROM encyclopedias.  相似文献   

17.
This article is a preliminary analysis of the first few years of the Computer Matching and Privacy Protection Act of 1988 (CMPPA). The act requires Federal agencies to establish Data Integrity Boards (DIBs) with responsibility to approve written agreements for computer matches in which their agencies are involved. Information for this analysis was collected from the annual reports on computer matching submitted by agencies to the Office of Management and Budget (OMB) for 1990 and 1991 and from 108 matching agreements. The secretaries of several DIBs were also interviewed. The effectiveness of DIBs and matching agreements are analyzed using McCubbins and Schwartz's distinction between “police-patrol” and “fire- alarm” oversight. The article concludes that more active and direct oversight, which would occur through an independent data protection or privacy board, is necessary.  相似文献   

18.
高校图书馆员职业倦怠与干预模式分析   总被引:11,自引:0,他引:11  
探讨高校图书管理员职业倦怠现象的形成原因和干预措施,通过理论阐述分析的方法,得出结论:个人的不当评价、细小的负性生活事件的堆积、职业压力、缺少工作必需的各种控制能力、缺乏社会支持及工作资源等原因都可能导致高校图书管理员的职业倦怠;针对不同的形成原因,高校图书馆组织和馆员个人都要积极采取不同的措施,有针对性地防范和干预职业倦怠,减少职业倦怠的危害,提高工作绩效。  相似文献   

19.
Using the theoretical frameworks of Erving Goffman and Michael Lipsky, an example of school library staff and student interactions is examined, using functional discourse analysis to reveal how practice is produced as a clerical control routine which upholds institutional authority over users, rather than legitimate service work. The study, which consists of a single interaction between a middle school library clerk and a young adolescent with overdue books, is an example of what Goffman calls a “remedial interchange” in which the clerk, with the use of the library's computer, identifies the student's “offense” of keeping books overdue, despite repeated notices. Upon admission of the student's virtual transgression, the clerk provides an “offering” to hold his desired books until he returns the others, thus redressing the balance of the interaction while still retaining asymmetrical institutional control over the student.  相似文献   

20.
Design-based research for LIS   总被引:2,自引:0,他引:2  
Design-based research is a methodology emerging from the field of education that may hold potential for research in library and information science (LIS). Based upon the assumption that learning is situated in a real-world context, design-based research combines research, design, and practice into one process. It results in usable products that are supported by a theoretical framework. While definitional and methodological issues do exist, the method holds some promise for research into “user-centered” information systems and services. In the field of LIS, design-based research might contribute to our understanding of how people find, choose, understand, and use information in context. The method is also of interest to professionals concerned with “evidence-based practice.” This article will first explain and describe the method as it has been used in the allied field of education. Issues related to definition and methodology will be explored, as well as some of the solutions that have been proposed. The method will then be related to LIS, using the bonded design work of Large, Nesset, Beheshti, and Bowler [Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006a). Bonded design: a methodology for designing with children. In S. Kurniawan & P. Saphiris (Eds.), Advances in Universal Web Design and Evaluation: Research, Trends and Opportunities. London: Idea Group., Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006b). “Bonded design”: a novel approach to intergenerational information technology design. Library and Information Science Research, 28, 64–82] as a case study to demonstrate the applicability of design-based research to LIS inquiry.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号