首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 54 毫秒
1.
《The Reference Librarian》2013,54(49-50):105-121
The Americans with Disabilities Act of 1990 (ADA) prohibits discrimination with respect to the disabled in public entities and in "public accommodations and services operated by private entities." Passage of the ADA has prompted libraries all over the country to evaluate services to these users and has generated a vast number of resources on the ADA and on services to disabled patrons. This article examines the burgeoning literature and presents a case study of The University of Alabama Libraries' efforts to meet these users' needs. The case study focuses on the establishment of an adaptive technologies lab to serve the needs of blind, visually impaired and learning disabled students, and upon the continual efforts to heighten staff awareness.  相似文献   

2.
In America’s state houses small yet powerful collections of policy leaders, in the public and private sector, are guiding the initial conception and early implementation of advanced communication networks. This article investigates how the beliefs of leading actors collide to produce two distinctive state networks. Rather than focus exclusively on the simple dichotomous “yes” or “no” decision regarding the adoption or nonadoption of an advanced telecommunications system, like a statewide information highway, this article focuses on the critical role of debate imbedded within that decision. Analysis and presentation of interviews and extensive literature reviews of the development of information highways, in North Carolina and Iowa, provide the setting for the generation of hypotheses suggesting the future trajectory of technology policymaking. While praised for their bold, visionary leadership and innovative system designs, the accounts of network development in these two American states also provide a cautionary tale for other subnational governments and for private sector telecommunications firms interested in the business of building public sector information highways.  相似文献   

3.
许晓彤 《档案学研究》2022,36(3):108-116
本文对电子文件管理业务链条与电子证据应用实践环节进行综合分析,发现二者在整体工作流程和具体业务活动方面均存在一定关联,基于此构建了电子文件-电子证据保管链,以系统揭示电子文件到电子证据的变化过程和运动规律。该保管链包含规划预备、形成流转、取证、结案四个固定阶段,以及归档管理、保存利用、调解、法庭使用四个机动阶段。在此基础上,进一步探讨了电子文件-电子证据保管链对提升电子文件证据保留工作的指导意义:丰富前端控制内涵、明确归档固化节点、拓展全程管理环节、重视后端驱动思路及强化证据保留能力。  相似文献   

4.
Some public entities in South Africa have implemented digital records systems over a period of 20 years. In terms of the South African archival legal framework, there is a need for such entities to transfer the records into archival custody. However, there is consensus among researchers that there is no infrastructure to ingest digital records into archival custody in South Africa. Furthermore, some public entities have migrated from one system to another since implementation and there is a possibility that records might have been lost during migration. This study demonstrates through literature review the unconscious archival orthodoxy of post-custodial realities in South Africa. The study recommends that public entities should apply for exemption from archival legislation in order to develop an interim solution for the preservation of digital records. The National Archives and Records Service of South Africa (NARSSA) is also encouraged to develop a policy on distributed custody to allow government entities to create interim solutions for preserving digital records. Both public entities and NARSSA should invest in capacity development, including training and provision of sustainable infrastructure required to preserve digital records. It is hoped that this study will influence policy-making with regard to custody of digital records.  相似文献   

5.
This article focuses on a recent enhancement to the WorldCat Collection Analysis tool, the Interlibrary Loan Analyses module, exploring the possibilities that this enhancement offers for strategic collection development. The study concentrates on the tool as a way to assess the impact of the recent growth at North Carolina State University in biomedicine and human medicine programs. The research contained in this article originated from a session presented at XXVII Annual Charleston Conference, which was held in Charleston, South Carolina, on November 8, 2007.  相似文献   

6.
电子档案管理系统的安全保障需求主要源于档案管理流程的两个特点:一是电子档案管理系统从其他业务系统接收电子文件并提供利用,其所管理的数据相对复杂而集中;二是电子档案管理系统要为电子档案移交奠定基础。据此,本文从档案管理需求出发,明确电子政务环境下档案保管和利用阶段的安全保障目标,并对两个阶段及贯穿全流程的安全保障需求和现有措施进行了梳理。在保管阶段,现有的电子档案真实性与长期可读性安全保障措施存在一定矛盾,应进一步协调统一;在利用阶段,应通过副本利用和利用跟踪审计来保障电子档案实体与信息的安全;电子档案管理全流程的支撑性安全保障主要通过四性检验和档案备份来实现。  相似文献   

7.
The application of information and communication technologies and management strategies to ensure reasonable court times in different legal contexts presents a significant challenge. This article compares the duration of 62,157 tax enforcement cases filed by public and private organizations in the traditional manner and in a fully electronic system in an attempt to clarify some of the reasons for congestion, because the stakes are high: in Brazil approximately US$ 415.1 billion pertaining to the federal government are disputed in 3.6 million of these cases. No significant difference was found between the duration of physical and electronic cases, and physical cases are occasionally swifter than electronic cases; consequently, the solutions to this congestion will depend on actions by the legal system, managers and judges, and litigant strategies.  相似文献   

8.
The annals of modern history are replete with examples of how state agencies have constructed mechanisms to observe and document the subversive activities of internal parties or individuals as well as perceived foreign influences or threats. While the definition of “subversive” changes with governing parties, the documentation of previous systems persists in the custody of archival repositories. These files represent the lives and work of individuals, and archivists face significant moral and ethical challenges regarding their disposition. This comparative study examines cases from across the globe and throughout the twentieth century to reveal the dispositions of surveillance records. More specifically, the study identifies the main variables that impact how these files are handled. This study begins with a theoretical framework that identifies common trends in the archival literature regarding surveillance files and their place in recovery and reconciliation efforts. Definitions are provided to establish the boundaries of this work within a broad categorization of levels of access that emerged from the case studies. Each level of access is then explored more deeply using specific examples to illustrate the complexities of custody and access encountered with these records. Ultimately, the study of the disposition and access to surveillance files uncovers three interrelated themes: the power of records, the impact of archival practice and the need to fully explore the context in which those files are created and retained.  相似文献   

9.
ABSTRACT

This study sought to investigate the opioid epidemic impact on North Carolina public libraries. Libraries in half of all 100 counties were chosen through a random, geographically systematic process, and structured interviews were completed with library directors. Twenty directors were interviewed, representing 28 counties. All reported their communities were affected; nine reported direct impacts on library function. Fifteen directors felt libraries should be involved in response; some felt Narcan administration was beyond library purview. Two libraries reported having Narcan available; five reported providing staff training. Given librarians’ willingness to respond, it is time to provide necessary support for those efforts.  相似文献   

10.
11.
Outreach     
《The Reference Librarian》2013,54(82):199-213
Abstract

Academic libraries have often participated in outreach to their surrounding communities. This article focuses on independent outreach efforts of academic libraries to move beyond their walls or traditional clientele. Academic libraries determine their interaction with their communities based on three factors: whether a need is expressed from outside the academy, whether they see their mission as an invitation to pursue an action on their own accord, or whether they construct a form of outreach in response to a specific problem or crisis. Most libraries, public and private, recognize outreach as part of their mission and obligation to the community. This article examines why libraries choose to initiate outreach programs.  相似文献   

12.
The North Carolina Foreign Language Center is a centralized multilingual public library which serves all residents of North Carolina. Local library patrons have direct access to its materials and services. Residents elsewhere can borrow materials and use its reference capabilities via InterLibrary Loan. The NCFLC is funded by the North Carolina State Library using L.S.C.A. funds. The NCFLC can serve as a model for other states with a low population density of non‐English or limited‐English speaking people. By making foreign language resources available through one library, North Carolina provides a wide selection of such materials and can afford the services of a full‐time librarian to manage the collection.  相似文献   

13.
It has been well documented that forms of media help create new communities, such as the public sphere and the nation. However, the origin of one major political institution has rarely been considered in this light: the political party. This paper brings together the theory on early party formation in North America and the theory on mediated communities to argue that the first public political organizations in Canada, which resembled modern parties in many ways, should be seen as constituted by the media. The paper presents the case of Upper Canada (1820–1841) where newspaper distribution linked partisans into new communities, and editors and politicians ‘imagined’ new political communities in the pages of their newspapers. Modern political parties should thus be seen as essentially mediated communities.  相似文献   

14.
The AIDS (Acquired Immune Deficiency Syndrome) virus has had a profound impact upon the lives of people everywhere. One aspect of this impact can be seen in the invasion into areas that had hitherto been believed by most to be private: sexual activity/preferences, medical records/testing, etc. An intensely personal and private tragedy has become, because of its nature, a matter of public concern. The bibliography which follows addresses the privacy concerns of those infected with the AIDS virus.  相似文献   

15.
The internet and social media sites are used extensively by violent extremist actors, providing new areas of inquiry for journalists reporting violent extremism. Based on 26 in-depth interviews with Norwegian media professionals, the present article describes how journalists monitor, assess, and make use of online information in investigative reporting of violent extremist groups in today’s networked media environment, characterized by complex interaction patterns, a plurality of voices, and blurred boundaries between private and public communication. While existing research on journalists’ use of social media as a source has tended to emphasize breaking news, the present article focuses on longer-term investigative efforts of journalists. The article gives insights into journalistic investigative practices in the networked media environment, in general, and in reporting violent extremism, in particular.  相似文献   

16.
Public agencies have a strong interest in artificial intelligence (AI) systems. However, many public agencies lack tools and frameworks to articulate a viable business model and evaluate public value as they consider investing in AI systems. The business model canvas used extensively in the private sector offers us a foundation for designing a public AI canvas (PAIC). Employing a design science approach, this study reports on the design and evaluation of PAIC. The PAIC comprises three distinctive layers: (1) the public value-oriented AI-enablement layer; (2) the public value logic layer; and (3) the public value-oriented social guidance layer. PAIC offers guidance on innovating the business models of public agencies to create and capture AI-enabled value. For practitioners, PAIC presents a validated tool to guide AI deployment in public agencies.  相似文献   

17.
This article offers a test of the records continuum model. As a case study I use the Foreign and Commonwealth Office “Migrated Archives”, those records first made known to the public in 2011 during the court case against the British government. Through this case, records from over 30 former colonies were found to have been stored away by the FCO, since the colonies had become independent. While testing the continuum model with this case, I simultaneously use the records continuum model to tell the history of the Migrated Archives. My research finds that by highlighting the hidden moments—the shadows of the continuum—the Migrated Archives reveals that the continuum model can be too dependent on pluralization and a culture of openness and accessibility. Using the term “shadow continuum,” I attempt to rectify this situation by allowing for continuum model processes to continue, albeit in the shadows.  相似文献   

18.
Far too often, one comes upon people who are unwilling or unable to tear down the artificial walls between “academic research” and “practical broadcasting.” Naturally, many of the most fruitful researchers recognize the advantages of tying their work to the “real world,” and many of the most efficient broadcasters rely strongly upon rigorous research rather than “seat of the pants” intuition. In the following article yet another link between research and broadcasting is demonstrated: the use of research, conducted by or on behalf of a station, to provide a wealth of newsworthy stories for the broadcaster. Whereas most journal articles emphasize the substantive results of a research, here they serve primarily as examples, with emphasis on reporting and the application of research techniques in the newsroom.

Dr. McCombs is an associate professor of journalism in the University of North Carolina at Chapel Hill. Mr. Waters is assistant news manager of station WBTV in Charlotte, North Carolina.  相似文献   

19.
《The Reference Librarian》2013,54(79-80):215-224
Summary

This article examines the history (2000-2003) of the virtual reference program at Duke University and covers the efforts involved at determining need, evaluating and selecting software, implementing policies and experimenting with the applications. Attention is paid to librarians' perception of virtual reference service as compared to other services. Future trends and consortium possibilities, both academic and across North Carolina, are also considered.  相似文献   

20.
ABSTRACT

In early 2014, the Electronic Resource Committee (ERC) of the Triangle Research Libraries Network, which includes Duke University, North Carolina Central University, North Carolina State University, and the University of North Carolina at Chapel Hill, began work to replace a database previously used to assess the value of consortially negotiated serial packages with a more accessible tool. Over the course of the next two years, the ERC collaborated with Matthew Harrington, a library technician at North Carolina State University, to create a Microsoft Access database capable of presenting title-level analyses, collection-level graphs, and institutional-level comparisons in addition to the higher-level summary statistics stemming from its original purpose. The database incorporates built-in functions to look for data integrity issues, reconcile title lists, and calculate what the package might look like with a different title set. This presentation focuses on the design and construction of this database tool in the context of its original intention, namely to show value. Therefore, rather than presenting an analysis of the data, I intend to demonstrate what can be done to transform data into information that displays value.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号