首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
Access to government records is increasingly shifting to a nether world-governed neither by the FOIA and the Privacy Act, nor by an executive order on classification. Instead, new categories of records, labeled “sensitive but unclassified,” “for official use only,” or “critical infrastructure information,” are being created in a variety of agencies, and are governed by agency regulations. Statutory authority is found in a number of separate laws, such as the Homeland Security Act and the Aviation and Transportation Security Act. These categories can be assigned by agency officials, contractors, or those in the private sector who originated the records; many records categorized this way are not subject to appeal or review by agencies or the courts, or to any automatic “declassification” process that has applied to documents withheld under the FOIA or subject to classification. Trends toward increased secrecy at all levels of government have become sufficiently alarming that individuals across the political spectrum have begun to speak out, and members of the access community (e.g., newspaper editors and public interest groups) have formed coalitions to focus debate on the need to rethink the balance of access with privacy and records protection, and to lobby actively for reinstatement of principles of access that have governed records policy for the past 35 years.  相似文献   

2.
Using the theoretical frameworks of Erving Goffman and Michael Lipsky, an example of school library staff and student interactions is examined, using functional discourse analysis to reveal how practice is produced as a clerical control routine which upholds institutional authority over users, rather than legitimate service work. The study, which consists of a single interaction between a middle school library clerk and a young adolescent with overdue books, is an example of what Goffman calls a “remedial interchange” in which the clerk, with the use of the library's computer, identifies the student's “offense” of keeping books overdue, despite repeated notices. Upon admission of the student's virtual transgression, the clerk provides an “offering” to hold his desired books until he returns the others, thus redressing the balance of the interaction while still retaining asymmetrical institutional control over the student.  相似文献   

3.
Replacing the ineffective Federal Reports Act of 1942, the Paperwork Reduction Act of 1980 (PRA) was enacted largely to relieve the public of the mounting information collection and reporting requirements of the federal government. It also promoted coordinated information management activities on a governmentwide basis by the director of the Office of Management and Budget (OMB) and prescribed information management responsibilities for the executive agencies. The management focus of the PRA was sharpened with the 1986 amendments which refined the concept of “information resources management” (IRM), defined as “the planning, budgeting, organizing, directing, training, promoting, controlling, and management activities associated with the burden, collection, creation, use, and dissemination of information by agencies, and includes the management of information and related resources such as automatic data processing equipment.” This key term and its subset concepts received further definition and explanation in the PRA of 1995, making IRM a tool for managing the contribution of information activities to program performance, and for managing related resources, such as personnel, equipment, funds, and technology. The PRA currently authorizes appropriations for its administration by the Office of Information and Regulatory Affairs (OIRA), located within OMB, through FY2001 (44 U.S.C. 3520). Reauthorization of OIRA appropriations provides an opportunity to upgrade the PRA’s provisions and to address prevailing government information management issues.  相似文献   

4.
The changes in the global information landscape, as epitomized by the reaction of governments to the 9/11 attacks, resulted in legislation, policy, and the formation of agencies that have affected many issues related to information and its use. This article examines the recent multiplicity of challenges that affect citizens' control and use of information. In the name of the war on terror, greater national security, and globalization trends, information laws, and policies often go further than is necessary and impact on the information rights of citizens. In this article, we advocate for bringing together what are at times disparate information issues under one label, namely, “information rights” (which include privacy, freedom of expression, access, etc.). Information rights are apprehended from a user-centered perspective (i.e., users as citizens, not just consumers). They cover many different aspects of the information life cycle and the roles and responsibilities of individuals and communities. Such an approach provides an alternative way of framing current information issues as they relate to national security policies and civil liberties in the broader sense.  相似文献   

5.
Part of the promise of electronic government (e-government) is its ability to transform the delivery of information services and products from government to users. E-government allows federal agencies to supplement and even supplant private sector roles intermediating between government agencies and users, creating unintended consequences in terms of policy, theory, and practice. The problem is called “channel conflict” in the marketing literature, and the typical response is called distribution channel management (DCM). After reviewing the literatures of e-government, information policy, and DCM, the paper explores differing DCM philosophies of two federal agencies: the Internal Revenue Service and the U.S. Census Bureau. An examination of these two DCM programs provides insights on how federal agencies may be able to manage their various channels for e-government offerings despite tensions in the current legal and policy context. The paper concludes by using DCM literature to help frame options for dealing with these tensions.  相似文献   

6.
Federal open records laws, executive orders on national security classification, and similar policy instruments in the states require that most records at government agencies be available to the public upon request—subject to exemptions which may entail review. Traditionally, this review has been accomplished by redaction (purging) of hardcopy. Resource limitations and increases in the number of requests demand a rethinking of the process. Offices are experimenting with optical scanning, onscreen purging, and online dissemination. Statutory and common law trends may soon require disclosure of database reports in electronic form, when so requested, rather than printouts. The dissemination of manipulable data of commercial value requires a rationale broader than the “citizenship rights” that justified the Freedom of Information Act. Online publication of agency-controlled records also demands careful planning of information systems and public networks. The issues discussed in this article are central to the establishment of an adequate policy for electronic freedom of information.  相似文献   

7.
Government secrecy has a long history in the American federal experience. Several kinds of government secrecy policy are reviewed here, beginning with their origins, or “policy depths,” and extending to their most recent expressions or “dimensions.” It is a rich history which, in this brief overview, is explored only in terms of its highlights, but offers, nonetheless, a roadmap for pursuing research in this area. It concludes with the observation that, in a democracy, representatives of the citizenry, whether elected or appointed, may momentarily cloak their decisionmaking and their policies in secrecy for the good of the nation—to protect it from enemies and to assure its survival. Those representatives must remember that the secrecy they impose is only momentary and that the shrouded decisions and policies they make, once made known to the citizenry, must be acceptable to them. The citizenry, in turn, accept such secrecy only in limited instances and on a momentary basis in order to have the confidence that their representatives are making decisions and policies acceptable to them. A government failing to honor these arrangements may well be regarded as one “not worth the cost of preservation.”  相似文献   

8.
Design-based research for LIS   总被引:2,自引:0,他引:2  
Design-based research is a methodology emerging from the field of education that may hold potential for research in library and information science (LIS). Based upon the assumption that learning is situated in a real-world context, design-based research combines research, design, and practice into one process. It results in usable products that are supported by a theoretical framework. While definitional and methodological issues do exist, the method holds some promise for research into “user-centered” information systems and services. In the field of LIS, design-based research might contribute to our understanding of how people find, choose, understand, and use information in context. The method is also of interest to professionals concerned with “evidence-based practice.” This article will first explain and describe the method as it has been used in the allied field of education. Issues related to definition and methodology will be explored, as well as some of the solutions that have been proposed. The method will then be related to LIS, using the bonded design work of Large, Nesset, Beheshti, and Bowler [Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006a). Bonded design: a methodology for designing with children. In S. Kurniawan & P. Saphiris (Eds.), Advances in Universal Web Design and Evaluation: Research, Trends and Opportunities. London: Idea Group., Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006b). “Bonded design”: a novel approach to intergenerational information technology design. Library and Information Science Research, 28, 64–82] as a case study to demonstrate the applicability of design-based research to LIS inquiry.  相似文献   

9.
As security and safety requirements were not considered during the creation of networks, there is a growing number of threats for individuals, enterprises, government agencies and organizations. This paper reviews these threats and the difficulties of dealing with them now. The Internet, as a consequence, is hardly adequate for processing sensitive information, because it can be protected neither by technology nor by law. In this situation, future “information societies” will be more risk-oriented than today: individual rights will be less significant and traditional legal instruments will need to be adapted to different sets of values.  相似文献   

10.
Dissertation advising is an important form of mentoring. To investigate the impact of dissertation advising over time, advisor and committee member names were collected for 2400 dissertations completed over a 40-year period (1964–2004) in 32 North American information and library science schools. Several mentoring impact metrics are reported for a subset of the data, including the number of dissertations advised, the number of dissertation committees served on, the ratio of advising to committee membership, and the fractional “mpact” that weights advising and committee membership. The subset consists of data for six schools that produced at least three dozen dissertations and for which complete data is available. The data and resulting “mpact” metrics offer new ways to assess faculty impact and to investigate the nature and growth of a field.  相似文献   

11.
Mass Digitization of Books   总被引:1,自引:1,他引:1  
Mass digitization of the bound volumes that we generally call “books” has begun, and, thanks to the interest in Google and all that it does, it is getting widespread media attention. The Open Content Alliance (OCA), a library initiative formed after Google announced its library book digitization project, has brought library digitization projects into the public eye, even though libraries were experimenting with digitization for at least a decade. What is different today from some earlier digitization of books is not just the scale of these new initiatives, but the quality of “mass.”  相似文献   

12.
13.
Although considerable attention has been focused on information users in recent years, little phenomenographic research into the word “information” has been conducted, perhaps because cursory consideration may suggest that work of this type is less useful than explorations of areas such as information-seeking. The lack of an established methodological framework discourages inquiry and, if understandings of the term are unique to each individual, there seems little scope to develop even broad principles for practice. Nevertheless, phenomenographic research helps professionals to learn how far users’ attitudes to the term “information” are consistent with their own and can reduce confusion between information providers and their clientele. Despite the absence of an accepted framework, several individual techniques are available. Ultimately, the research findings may prove highly instructive. They may, for example, influence the use of the word “information” by professionals when they interact with clients, whilst also offering insights into information behavior and information worlds.  相似文献   

14.
This is the first guest column for “Managing Technology”. We hope it typifies the central theme of challenges to managers presented by information technology and the lessons we may share from their application. This essay is of signal interest, appearing as it does at a watershed in library automation. We may expect a wholesale shift in the next several years from single machine integrated systems to distributed computing technologies and a client/server model. The five “lessons learned” in the Oklahoma State experience will be broadly applicable in the next wave of library automation.—C.B.L.  相似文献   

15.
“NEP: New Economics Papers”, the current awareness service for the Research Papers in Economics (RePEc) digital library, is made possible by volunteer editors who filter new additions to RePEc into subject-specific reports. The official purpose of current awareness service is to filter working papers by subject matter without any judgment of its academic quality. In this article, binary logistic regression analysis (BLRA) estimates the probability of a paper being included in any of the subject reports as a function of a range of observable values. The analysis suggests that, contrary to their claims, editors use quality criteria: the series the paper is coming from and the reputation of the authors. The findings suggest that a current awareness service can issue quality signals.  相似文献   

16.
Five participants completed retrospective and concurrent verbal protocols (Think Afters and Think Alouds) to evaluate the methods for the study of the information-seeking processes of 12–15-year-old students using Microsoft Encarta 98. After a short training session in the Think Aloud Method, they completed four activities of differing complexity. The data provided support for the use of verbal protocol analysis to uncover information-seeking processes of these students. The amount of data generated during Think Alouds and Think Afters depended on the difficulty of the questions and the number of “dead ends” encountered by the students. The Think Alouds and Think Afters provided data about the behavioral, cognitive, and affective processes. Think Afters provide different data than the Think Alouds, and both are important to understanding how adolescents interact with CD-ROM encyclopedias. Participants were able to find the information to answer each of the four search activity questions but used a variety of search terms, categories, and strategies. Some participants reached a level of frustration after a number of “dead ends” and needed encouragement from the researcher. The frustration was more apparent in the younger participants. Effective reading strategies are very important to successful location and evaluation of information in CD-ROM encyclopedias.  相似文献   

17.
This paper discusses the factors affecting the adoption of electronic tax-filing systems. Using the technology acceptance model (TAM) as a theoretical framework, this study introduces “perceived credibility” as a new factor that reflects the user's intrinsic belief in the electronic tax-filing systems, and examines the effect of computer self-efficacy on the intention to use an electronic tax-filing system. Based on a sample of 260 users from a telephone interview, the results strongly support the extended TAM in predicting the intention of users to adopt electronic tax-filing systems. The results also demonstrate the significant effect that computer self-efficacy has on behavioral intention through perceived ease of use, perceived usefulness, and perceived credibility. Based on the findings of this study, implications for electronic tax filing in particular and for e-government services in general are discussed. Finally, this paper concludes by discussing limitations that could be addressed in future studies.  相似文献   

18.
The unique three-way partnership formed by the University of Illinois at Chicago’s federal depository library, the U.S. State Department, and the Government Printing Office (GPO) to deliver and preserve foreign policy information through servers housed at the University’s library offers some critical insights into the assumptions and policies of the GPO’s Federal Depository Library Program. Ultimately, the Internet’s explosive growth, combined with powerful graphical interfaces of the major Web browsers, undermines several recently enacted laws that attempt to standardize (or centralize) effective information resource management within the federal government. Not only has GPO steadily lost political and economic support over the last decade from both legislative and executive leaders for its production and distribution programs, many agencies now consider their “.gov Webspaces” the natural successors to the GPO and its depository library program. As a result, a new model of government information distribution is being forged within the highly decentralized and interactive environment of the World Wide Web.  相似文献   

19.
Research indicates significant levels of burnout in academic teaching librarians. This article describes parallels with other “helping professions” and examines characteristics, causes, and solutions of burnout, inside and outside the classroom. Solutions should be sought in research on similar professions and their effectiveness should be measured.  相似文献   

20.
Modeling a century of citation distributions   总被引:1,自引:1,他引:0  
The prevalence of uncited papers or of highly cited papers, with respect to the bulk of publications, provides important clues as to the dynamics of scientific research. Using 25 million papers and 600 million references from the Web of Science over the 1900–2006 period, this paper proposes a simple model based on a random selection process to explain the “uncitedness” phenomenon and its decline over the years. We show that the proportion of cited papers is a function of (1) the number of articles available (the competing papers), (2) the number of citing papers and (3) the number of references they contain. Using uncitedness as a departure point, we demonstrate the utility of the stretched-exponential function and a form of the Tsallis q-exponential function to fit complete citation distributions over the 20th century. As opposed to simple power-law fits, for instance, both these approaches are shown to be empirically well-grounded and robust enough to better understand citation dynamics at the aggregate level. On the basis of these models, we provide quantitative evidence and provisional explanations for an important shift in citation practices around 1960. We also propose a revision of the “citation classic” category as a set of articles which is clearly distinguishable from the rest of the field.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号