首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Dissertation advising is an important form of mentoring. To investigate the impact of dissertation advising over time, advisor and committee member names were collected for 2400 dissertations completed over a 40-year period (1964–2004) in 32 North American information and library science schools. Several mentoring impact metrics are reported for a subset of the data, including the number of dissertations advised, the number of dissertation committees served on, the ratio of advising to committee membership, and the fractional “mpact” that weights advising and committee membership. The subset consists of data for six schools that produced at least three dozen dissertations and for which complete data is available. The data and resulting “mpact” metrics offer new ways to assess faculty impact and to investigate the nature and growth of a field.  相似文献   

2.
ABSTRACT

Charles J. Kappler (1868–1946) is known almost exclusively for his Indian Affairs: Laws and Treaties compilation, yet his life and his career were much fuller. Besides serving as Clerk for the Senate Committee on Indian Affairs, he was co-counsel for the Pious Fund of the Californias v. Mexico proceedings before the Permanent Court of Arbitration in The Hague and, in one role or another, played a substantial part in many significant federal Indian law cases before the United States Supreme Court in the years leading up to the establishment of the Indian Claims Commission. A digital Web site has been developed to present lesser known aspects of his personal and professional life.  相似文献   

3.
Design-based research for LIS   总被引:2,自引:0,他引:2  
Design-based research is a methodology emerging from the field of education that may hold potential for research in library and information science (LIS). Based upon the assumption that learning is situated in a real-world context, design-based research combines research, design, and practice into one process. It results in usable products that are supported by a theoretical framework. While definitional and methodological issues do exist, the method holds some promise for research into “user-centered” information systems and services. In the field of LIS, design-based research might contribute to our understanding of how people find, choose, understand, and use information in context. The method is also of interest to professionals concerned with “evidence-based practice.” This article will first explain and describe the method as it has been used in the allied field of education. Issues related to definition and methodology will be explored, as well as some of the solutions that have been proposed. The method will then be related to LIS, using the bonded design work of Large, Nesset, Beheshti, and Bowler [Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006a). Bonded design: a methodology for designing with children. In S. Kurniawan & P. Saphiris (Eds.), Advances in Universal Web Design and Evaluation: Research, Trends and Opportunities. London: Idea Group., Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006b). “Bonded design”: a novel approach to intergenerational information technology design. Library and Information Science Research, 28, 64–82] as a case study to demonstrate the applicability of design-based research to LIS inquiry.  相似文献   

4.
Five participants completed retrospective and concurrent verbal protocols (Think Afters and Think Alouds) to evaluate the methods for the study of the information-seeking processes of 12–15-year-old students using Microsoft Encarta 98. After a short training session in the Think Aloud Method, they completed four activities of differing complexity. The data provided support for the use of verbal protocol analysis to uncover information-seeking processes of these students. The amount of data generated during Think Alouds and Think Afters depended on the difficulty of the questions and the number of “dead ends” encountered by the students. The Think Alouds and Think Afters provided data about the behavioral, cognitive, and affective processes. Think Afters provide different data than the Think Alouds, and both are important to understanding how adolescents interact with CD-ROM encyclopedias. Participants were able to find the information to answer each of the four search activity questions but used a variety of search terms, categories, and strategies. Some participants reached a level of frustration after a number of “dead ends” and needed encouragement from the researcher. The frustration was more apparent in the younger participants. Effective reading strategies are very important to successful location and evaluation of information in CD-ROM encyclopedias.  相似文献   

5.
The inconsistent spelling of American Indian tribal names at the end of the nineteenth century led in part to the development within the Office of Indian Affairs of an array of 270 standardized identifiers, ranging from Absaroka to Zuñi. These efforts paralleled the simultaneous improvement of a large suite of relevant terms by the United States Board on Geographic Names. Both compilations were included in style manuals published by the Government Printing Office beginning in 1900 and approved for the use of federal agencies. In 1903 and 1904, Charles J. Kappler, in the preparation of his multi-volume Indian Affairs: Laws and Treaties, made particular use of this orthography when he created new individual titles for the recognized treaties between the federal government and the Indian Nations. Even with these coordinated attempts, however, versions of the “Names of Indian tribes and bands” register during the last century suffered both exclusions from, and an addition to, the original document from the Office of Indian Affairs.  相似文献   

6.
Government secrecy has a long history in the American federal experience. Several kinds of government secrecy policy are reviewed here, beginning with their origins, or “policy depths,” and extending to their most recent expressions or “dimensions.” It is a rich history which, in this brief overview, is explored only in terms of its highlights, but offers, nonetheless, a roadmap for pursuing research in this area. It concludes with the observation that, in a democracy, representatives of the citizenry, whether elected or appointed, may momentarily cloak their decisionmaking and their policies in secrecy for the good of the nation—to protect it from enemies and to assure its survival. Those representatives must remember that the secrecy they impose is only momentary and that the shrouded decisions and policies they make, once made known to the citizenry, must be acceptable to them. The citizenry, in turn, accept such secrecy only in limited instances and on a momentary basis in order to have the confidence that their representatives are making decisions and policies acceptable to them. A government failing to honor these arrangements may well be regarded as one “not worth the cost of preservation.”  相似文献   

7.
Recently, the Korean government instituted a reform in its archives with the goal of increasing transparency in government and meeting the challenges of the new digital environment in records management. President Roh's administration focused on a “process and system” reform through a shift from paper-based records management to electronic records management. The E-jiwon task management system of the Office of the President, invented by President Roh himself, served as the archetype for the reform. This study explores and critiques the administration's choice of a “process and system” reform over institutional reform, examines the legal framework used to enact the reform and its shortcomings, and analyzes the benefits and deficiencies of the E-jiwon as a tool for democracy in the archives. It concludes that while the new digital environment can assist in promoting government transparency, technological change by itself is inadequate; ultimately, institutional change is necessary for true reform.  相似文献   

8.
Modeling a century of citation distributions   总被引:1,自引:1,他引:0  
The prevalence of uncited papers or of highly cited papers, with respect to the bulk of publications, provides important clues as to the dynamics of scientific research. Using 25 million papers and 600 million references from the Web of Science over the 1900–2006 period, this paper proposes a simple model based on a random selection process to explain the “uncitedness” phenomenon and its decline over the years. We show that the proportion of cited papers is a function of (1) the number of articles available (the competing papers), (2) the number of citing papers and (3) the number of references they contain. Using uncitedness as a departure point, we demonstrate the utility of the stretched-exponential function and a form of the Tsallis q-exponential function to fit complete citation distributions over the 20th century. As opposed to simple power-law fits, for instance, both these approaches are shown to be empirically well-grounded and robust enough to better understand citation dynamics at the aggregate level. On the basis of these models, we provide quantitative evidence and provisional explanations for an important shift in citation practices around 1960. We also propose a revision of the “citation classic” category as a set of articles which is clearly distinguishable from the rest of the field.  相似文献   

9.
A continuing theme of the archival literature from the “New World Countries” of the Australia, Canada and the United States is the lack of understanding and appreciation of archivists and archival work. The author posits that this situation can be ameliorated if archivists understand the temperament characteristics that shape their own attitudes and behaviours and thus influence their interactions with significant others in the workplace and wider community. This essay reports and interprets major findings of a survey of temperament types present among members of the Australian Society of Archivists, conducted as part of a 1998 three-country [Australia, Canada and the USA] study.A version of this paper was presented at the 1999 Australian Society of Archivists Annual Conference in Brisbane, Queensland, Australia. It is the first of two essays that report the results of national surveys of temperament types of archivists in three countries: Australia, Canada and the USA. The second essay, “The Influence of Temperament Type in the Perceptions of Archivists in Three New World Countries” will appear in the next issue of Archival Science.  相似文献   

10.
The Annual Reports of the Commissioner of Indian Affairs, for the years 1824 through 1920, described the interactions between the American Indian tribes and the federal government. J. A. Jones (Jones, J. A. (1955). Key to the annual reports of the Commissioner of Indian Affairs. Ethnohistory, 2, 58–64). Provided a key to these documents found in the United States Congressional Serial Set, but this tool contained a number of errors. This article provides a fresh look at this key, with particular focus upon the availability of these materials through the Readex Serial Set digital collection.  相似文献   

11.
This paper was presented as the keynote address at the Ohio Library Council, Technical Services Division conference,“Technical Services, 2003: Inspiration, Example, Synthesis” at Mohican State Park, Ohio, May 7, 2003. The keynote was to fill the role of “inspiration.” The author considers why technical services personnel may feel isolated, misunderstood, or dispensable; why technical services personnel may be misunderstood or underappreciated by others; the nature and mission of librarianship and how technical services relates to them; the consequences of having a bad image and a bad self-image; and how harmful opinions and actions might be countered.  相似文献   

12.
Researchers in LIS have called for the study of the social practices out of which informing is achieved. This article analyzes the informed choice discussion (ICD) between midwives and childbearing women as a form of institutional interaction that accomplishes informing. The ICD institutionally presumes a woman to have information needs that must be met before she can make a decision. Conversation analysis, a method commonly used to study practitioner–client interaction but little used in LIS, is employed to identify the unique “fingerprint” of the ICD. Analysis shows how participants develop a joint sense of the interactional tasks of informing and deciding. As an ideal, informed choice divides the cognitive labor: informing is midwife-led and deciding is client-led. In practice, however, informing and deciding are intertwined to such an extent that their resolution is neither automatic nor straightforward but must be negotiated. To be accepted as adequate, a decision must also be deemed adequately informed. Difficulties in negotiating transitions can result in one speaker treating a decision as resolved while another treats it as still open. Analyzing the fingerprints of institutional informing interactions can provide a starting point for analyzing the interactional accomplishment of informing in other settings.  相似文献   

13.
Analysis of a survey of the types and extent of tools and techniques related to semi-automatic metadata generation applied in real-world library settings indicates that practical applications in libraries seem to be at an incipient stage. More than half (n  = 149, 52.5%) of the survey participants (n  = 285) specify that semi-automatic metadata generation has not been utilized for metadata creation and management in their libraries. This figure becomes even higher when adding the response “don't know,” constituting an additional 13.7%. The results of the survey also show that the semi-automatic metadata generation tools described by participants mostly concern metadata format conversion (38.6%) and metadata templates and forms (27%) for populating certain metadata values. Complex tools and the generation and extraction of metadata directly from the content and context of the digital objects are rarely applied in libraries. This indicates that more research is needed on the development of automatic metadata generation for semantic metadata in usable and practical settings.  相似文献   

14.
Access to government records is increasingly shifting to a nether world-governed neither by the FOIA and the Privacy Act, nor by an executive order on classification. Instead, new categories of records, labeled “sensitive but unclassified,” “for official use only,” or “critical infrastructure information,” are being created in a variety of agencies, and are governed by agency regulations. Statutory authority is found in a number of separate laws, such as the Homeland Security Act and the Aviation and Transportation Security Act. These categories can be assigned by agency officials, contractors, or those in the private sector who originated the records; many records categorized this way are not subject to appeal or review by agencies or the courts, or to any automatic “declassification” process that has applied to documents withheld under the FOIA or subject to classification. Trends toward increased secrecy at all levels of government have become sufficiently alarming that individuals across the political spectrum have begun to speak out, and members of the access community (e.g., newspaper editors and public interest groups) have formed coalitions to focus debate on the need to rethink the balance of access with privacy and records protection, and to lobby actively for reinstatement of principles of access that have governed records policy for the past 35 years.  相似文献   

15.
This article is a preliminary analysis of the first few years of the Computer Matching and Privacy Protection Act of 1988 (CMPPA). The act requires Federal agencies to establish Data Integrity Boards (DIBs) with responsibility to approve written agreements for computer matches in which their agencies are involved. Information for this analysis was collected from the annual reports on computer matching submitted by agencies to the Office of Management and Budget (OMB) for 1990 and 1991 and from 108 matching agreements. The secretaries of several DIBs were also interviewed. The effectiveness of DIBs and matching agreements are analyzed using McCubbins and Schwartz's distinction between “police-patrol” and “fire- alarm” oversight. The article concludes that more active and direct oversight, which would occur through an independent data protection or privacy board, is necessary.  相似文献   

16.
Somewhere in the vicinity of 80 percent of all governmental information has some “geographic” element, and the vast majority is called “geospatial” because of the nature of describing spatial phenomena of the earth. Geospatial information has been increasing steadily in popularity and use since the advent of geographic information systems in the 1960s. From the early 1990s until the present, research libraries have seen an increase in the availability of geospatial information, and they have also seen a substantial change in the services provided to support the needs of clients seeking that information. However, recent events have altered the “access landscape.” September 11, 2001, and subsequent events, caused many policy shifts to take place as to how, or whether, access to governmental geospatial information should be granted. This paper explores those policy developments with the goal of prognosticating on the future of access to governmental geospatial information.  相似文献   

17.
Objective:While studies from the early 1990s show that library staff in nonlibrarian roles interpret the term “paraprofessional” as being demeaning to their roles, no recent research has been conducted on this topic. This study aims to investigate if health sciences library staff continue to have similar negative associations with the term “paraprofessional” and to determine if another term is preferred.Methods:The authors conducted a literature review to identify terms used to categorize library staff in nonlibrarian roles. Using these terms, we created an online Qualtrics survey asking participants to rank terms by preference. We distributed the survey via thirty-six professional email discussion lists, including MEDLIB-L, thirty-three MLA chapter and caucus email discussion lists, DOCLINE-L, and ACRL-HSIG-L. Survey participants included full-time and part-time health sciences library staff in any nonlibrarian position. Responses from librarians were not accepted.Results:Based on 178 completed surveys, “library staff” was the top choice of 49% of participants, over “other” (19%), “paraprofessional” (13%), “library support staff” (11%), “paralibrarian” (7%), and “nonprofessional” (1%). Although “library staff” was the top choice of participants across all ages, older participants (aged 45–75) preferred “library support staff” and “paraprofessional” to a greater degree than younger participants (aged 18–44), while younger participants preferred “other” to a greater degree. Out of 36 participants who specifically mentioned the terms “paraprofessional” or “paralibrarian,” 32 (89%) of those comments were negative, indicating that the “para” in “paraprofessional” and “paralibrarian” is either insulting, inapplicable, or unfamiliar.Conclusions:Our results suggest that although the term “paraprofessional” may not intentionally be used to demean library staff, many library staff interpret the term to be demeaning to their roles. Instead, “library staff,” a more inclusive and less divisive term, was preferred by survey participants. In accordance with our results, we believe the term “paraprofessional” should no longer be used in library and information scholarly literature or professional discourse.  相似文献   

18.
Objective:The decisions and processes that may compose a systematic search strategy have not been formally identified and categorized. This study aimed to (1) identify all decisions that could be made and processes that could be used in a systematic search strategy and (2) create a hierarchical framework of those decisions and processes.Methods:The literature was searched for documents or guides on conducting a literature search for a systematic review or other evidence synthesis. The decisions or processes for locating studies were extracted from eligible documents and categorized into a structured hierarchical framework. Feedback from experts was sought to revise the framework. The framework was revised iteratively and tested using recently published literature on systematic searching.Results:Guidance documents were identified from expert organizations and a search of the literature and Internet. Data were extracted from 74 eligible documents to form the initial framework. The framework was revised based on feedback from 9 search experts and further review and testing by the authors. The hierarchical framework consists of 119 decisions or processes sorted into 17 categories and arranged under 5 topics. These topics are “Skill of the searcher,” “Selecting information to identify,” “Searching the literature electronically,” “Other ways to identify studies,” and “Updating the systematic review.”Conclusions:The work identifies and classifies the decisions and processes used in systematic searching. Future work can now focus on assessing and prioritizing research on the best methods for successfully identifying all eligible studies for a systematic review.  相似文献   

19.
Using the theoretical frameworks of Erving Goffman and Michael Lipsky, an example of school library staff and student interactions is examined, using functional discourse analysis to reveal how practice is produced as a clerical control routine which upholds institutional authority over users, rather than legitimate service work. The study, which consists of a single interaction between a middle school library clerk and a young adolescent with overdue books, is an example of what Goffman calls a “remedial interchange” in which the clerk, with the use of the library's computer, identifies the student's “offense” of keeping books overdue, despite repeated notices. Upon admission of the student's virtual transgression, the clerk provides an “offering” to hold his desired books until he returns the others, thus redressing the balance of the interaction while still retaining asymmetrical institutional control over the student.  相似文献   

20.
Supplemental articles and supplementary treaties were used as tools to modify American Indian treaties. In general, supplemental articles were adjustments to the parameters of a treaty, frequently made as quickly as the same – or the next – day of negotiations, whereas the task of a supplementary treaty was to affect the conditions created in a previous treaty(s).As the law of the land, these materials have been referenced in the opinions of the federal, state, and territorial court systems. This article identifies those 80 documents – a combination of 39 initial treaties and their 41 supplements – cited in the opinions of 101 cases between 1831 and 2000 that bind together these instruments, their modifications, and their application within these various venues.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号