首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
The paper deals with theoretical and practical challenges of the information society in the 21st century. In the first part an overview of past and current activities in the field of information ethics at UNESCO is provided (Virtual Forum, Second International Congress on Information Ethics, Observatory on the information Society). The second part presents a historical interpretation of the development of modern information society with the emerging networked world society with its characteristics of interactivity and decentralization. The diversity of moral norms and traditions within this global medium gives rise to the question concerning an Internet-morality as a challenge to ethical thinking. The third part deals with the question of our identity within the framework of a digital ontology. The concepts of “net” and “information” are analysed. A future information ethics is based on a digital ontology. Living in the information age is considered from the point of view of both an ethical imperative and the art of living.  相似文献   

2.
This article is a preliminary analysis of the first few years of the Computer Matching and Privacy Protection Act of 1988 (CMPPA). The act requires Federal agencies to establish Data Integrity Boards (DIBs) with responsibility to approve written agreements for computer matches in which their agencies are involved. Information for this analysis was collected from the annual reports on computer matching submitted by agencies to the Office of Management and Budget (OMB) for 1990 and 1991 and from 108 matching agreements. The secretaries of several DIBs were also interviewed. The effectiveness of DIBs and matching agreements are analyzed using McCubbins and Schwartz's distinction between “police-patrol” and “fire- alarm” oversight. The article concludes that more active and direct oversight, which would occur through an independent data protection or privacy board, is necessary.  相似文献   

3.
This paper demonstrates the divergent requestor privacy policies of professional librarians and the administration of the Freedom of Information Act (FOIA), and urges the federal government to adhere to librarian ethics in order to protect FOIA requestors. Section 1 of the paper provides information about the origins and purpose of the FOIA. Section 2 offers an overview of the philosophical and historical origins of library patron privacy ethics, discussing both the ethical basis for patron privacy and actual instances where library records have been sought for government surveillance of private citizens. Section 3 describes the state library laws that protect library requestors, as well as federal laws that protect non-FOIA requestor privacy rights, including the Video Privacy Protection Act (VPPA), which protects video rental records. Section 4 of the paper warns that, in the digital era, it is more important than ever to safeguard personal information like that contained in FOIA requests to prevent the stifling of information seeking activities in the United States. By modifying laws tomeet the needs of the “information age,” the United States government can embrace and utilize the ethical standards that are at the foundation of librarianship, and protect the principle that information should be free and available to the American populace.  相似文献   

4.
Access to government records is increasingly shifting to a nether world-governed neither by the FOIA and the Privacy Act, nor by an executive order on classification. Instead, new categories of records, labeled “sensitive but unclassified,” “for official use only,” or “critical infrastructure information,” are being created in a variety of agencies, and are governed by agency regulations. Statutory authority is found in a number of separate laws, such as the Homeland Security Act and the Aviation and Transportation Security Act. These categories can be assigned by agency officials, contractors, or those in the private sector who originated the records; many records categorized this way are not subject to appeal or review by agencies or the courts, or to any automatic “declassification” process that has applied to documents withheld under the FOIA or subject to classification. Trends toward increased secrecy at all levels of government have become sufficiently alarming that individuals across the political spectrum have begun to speak out, and members of the access community (e.g., newspaper editors and public interest groups) have formed coalitions to focus debate on the need to rethink the balance of access with privacy and records protection, and to lobby actively for reinstatement of principles of access that have governed records policy for the past 35 years.  相似文献   

5.
This paper examines the need for re-evaluating archival principles and practices. Opportunities created to enhance and enrich archival work and difficulties of archiving digital information, because of its nature, are reviewed. “Records series” are used to illustrate the consequences in terms of selection and appraisal of records. The preservation of digital information also raises new challenges. The impact of digital information on the ethical, legal and societal issues (protection, confidentiality, privacy, etc.) is emphasized.  相似文献   

6.
Design-based research for LIS   总被引:2,自引:0,他引:2  
Design-based research is a methodology emerging from the field of education that may hold potential for research in library and information science (LIS). Based upon the assumption that learning is situated in a real-world context, design-based research combines research, design, and practice into one process. It results in usable products that are supported by a theoretical framework. While definitional and methodological issues do exist, the method holds some promise for research into “user-centered” information systems and services. In the field of LIS, design-based research might contribute to our understanding of how people find, choose, understand, and use information in context. The method is also of interest to professionals concerned with “evidence-based practice.” This article will first explain and describe the method as it has been used in the allied field of education. Issues related to definition and methodology will be explored, as well as some of the solutions that have been proposed. The method will then be related to LIS, using the bonded design work of Large, Nesset, Beheshti, and Bowler [Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006a). Bonded design: a methodology for designing with children. In S. Kurniawan & P. Saphiris (Eds.), Advances in Universal Web Design and Evaluation: Research, Trends and Opportunities. London: Idea Group., Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006b). “Bonded design”: a novel approach to intergenerational information technology design. Library and Information Science Research, 28, 64–82] as a case study to demonstrate the applicability of design-based research to LIS inquiry.  相似文献   

7.
The changes in the global information landscape, as epitomized by the reaction of governments to the 9/11 attacks, resulted in legislation, policy, and the formation of agencies that have affected many issues related to information and its use. This article examines the recent multiplicity of challenges that affect citizens' control and use of information. In the name of the war on terror, greater national security, and globalization trends, information laws, and policies often go further than is necessary and impact on the information rights of citizens. In this article, we advocate for bringing together what are at times disparate information issues under one label, namely, “information rights” (which include privacy, freedom of expression, access, etc.). Information rights are apprehended from a user-centered perspective (i.e., users as citizens, not just consumers). They cover many different aspects of the information life cycle and the roles and responsibilities of individuals and communities. Such an approach provides an alternative way of framing current information issues as they relate to national security policies and civil liberties in the broader sense.  相似文献   

8.
Information-seeking behaviour by university academics at Moi University, Kenya, is analysed. A survey, in the form of a pilot study, was conducted and data collected through questionnaires and interviews among 27 academics randomly sampled from four faculties: Health Sciences, Information Sciences, Environmental Studies and Education. The results obtained established that a great number of academics depend on libraries and colleagues for information and that although the academics heavily depend on textbooks for information, they display great interest in, and use, current and research-oriented information sources. It was also established that the nature of discipline and level of programme influence the information-seeking behaviour of academics and that lack of awareness of information services, and non-use of current awareness services and sources available at the university contribute to limited access and use of the information resources. In addition, academics indicated that they need information mainly for career development to circumvent the “publish or perish syndrome”, but also for their professional and occupational needs. It is concluded that despite insufficient relevant information resources at the university library due to budget cuts, academics still depend on the library for their information needs. Work colleagues are also an important source of intra-university information. It is suggested that the library would benefit the academics if equal attention were paid to current awareness services as well as publicity and promotion of information products and services. Similarly, methods should be devised by the university to strengthen the academics' overall accessibility to information. In this way, the circulation of information between academic colleagues can be maintained.  相似文献   

9.
Somewhere in the vicinity of 80 percent of all governmental information has some “geographic” element, and the vast majority is called “geospatial” because of the nature of describing spatial phenomena of the earth. Geospatial information has been increasing steadily in popularity and use since the advent of geographic information systems in the 1960s. From the early 1990s until the present, research libraries have seen an increase in the availability of geospatial information, and they have also seen a substantial change in the services provided to support the needs of clients seeking that information. However, recent events have altered the “access landscape.” September 11, 2001, and subsequent events, caused many policy shifts to take place as to how, or whether, access to governmental geospatial information should be granted. This paper explores those policy developments with the goal of prognosticating on the future of access to governmental geospatial information.  相似文献   

10.
从职业伦理的角度,阐述信息咨询职业伦理应包含服务、效益、公平、隐私、版权、个人信念与专业义务区分、自律与他律相结合等原则,并探讨培养信息咨询职业伦理的途径。  相似文献   

11.
A global perspective on library association codes of ethics   总被引:1,自引:0,他引:1  
This study of 28 countries involves comparative content analysis of the English versions of codes of ethics proposed by professional associations. It yielded an empirically grounded typology of principles arranged in twenty categories. The most frequently identified principles were professional development, integrity, confidentiality or privacy, and free and equal access to information. While confidentiality and privacy, and equal access to information, appear in all existing typologies of library and information science ethics, other principles, such as copyright and intellectual property, democracy, and responsibility toward society, which appear in almost all other typologies, were evident in fewer than half of the codes. This empirical study provides a global perspective on library association code of ethics.  相似文献   

12.
Replacing the ineffective Federal Reports Act of 1942, the Paperwork Reduction Act of 1980 (PRA) was enacted largely to relieve the public of the mounting information collection and reporting requirements of the federal government. It also promoted coordinated information management activities on a governmentwide basis by the director of the Office of Management and Budget (OMB) and prescribed information management responsibilities for the executive agencies. The management focus of the PRA was sharpened with the 1986 amendments which refined the concept of “information resources management” (IRM), defined as “the planning, budgeting, organizing, directing, training, promoting, controlling, and management activities associated with the burden, collection, creation, use, and dissemination of information by agencies, and includes the management of information and related resources such as automatic data processing equipment.” This key term and its subset concepts received further definition and explanation in the PRA of 1995, making IRM a tool for managing the contribution of information activities to program performance, and for managing related resources, such as personnel, equipment, funds, and technology. The PRA currently authorizes appropriations for its administration by the Office of Information and Regulatory Affairs (OIRA), located within OMB, through FY2001 (44 U.S.C. 3520). Reauthorization of OIRA appropriations provides an opportunity to upgrade the PRA’s provisions and to address prevailing government information management issues.  相似文献   

13.
14.
图书馆职业伦理研究   总被引:48,自引:1,他引:48  
重视职业伦理是现代图书馆运动引人注目的成果之一。图书馆职业伦理守则体现了 图书馆的基本职业理念、职业精神和职业规范。图书馆信息服务中应遵循公共存取、客观公正、 尊重隐私权与知识产权、精益服务及人文关怀等基本伦理原则。参考文献11。  相似文献   

15.
Many libraries have sought the best approach to allocating the collections budget. “History plus increment” is the standard for many libraries in the allocation of any new dollars to collections budgets. Other libraries have identified factors that help make the process of disbursing new money more objective including counts of faculty and students, literature size and costs, and program changes on campus.The Library of the University of Illinois at Urbana-Champaign is striving toward a more open and understandable allocation process that uses an allocation formula, professional judgment of its librarians, and input from campus faculty and administration. Through this process, we work to achieve balance between formula and professional judgment, between decisions made outside the Library and within the Library, between competing disciplines and old and emerging fields for budget dollars.  相似文献   

16.
The Internet is a convenient but complex source for health information used by an increasing number of health consumers. Especially for people suffering from a chronic illness (e.g., diabetes), information seeking forms a part of the daily management of the disease, a “project of life.” This study of Web texts examines the citation patterns for a specific and controversial health issue: the beneficial or hazardous use of dietary chromium supplementation in diabetes self-management. Texts from different categories of Web sources (scientific, professional, educational, and commercial sources, as well as diabetes discussion groups) were analyzed in order to study how knowledge is transferred between sources, and how diabetics participating in discussion groups refer to and make sense of the information from different sources on the Internet. The citation patterns suggest that deviations from the traditional models of scientific knowledge dissemination can occur in the Internet environment.  相似文献   

17.
This is the first guest column for “Managing Technology”. We hope it typifies the central theme of challenges to managers presented by information technology and the lessons we may share from their application. This essay is of signal interest, appearing as it does at a watershed in library automation. We may expect a wholesale shift in the next several years from single machine integrated systems to distributed computing technologies and a client/server model. The five “lessons learned” in the Oklahoma State experience will be broadly applicable in the next wave of library automation.—C.B.L.  相似文献   

18.
Dissertation advising is an important form of mentoring. To investigate the impact of dissertation advising over time, advisor and committee member names were collected for 2400 dissertations completed over a 40-year period (1964–2004) in 32 North American information and library science schools. Several mentoring impact metrics are reported for a subset of the data, including the number of dissertations advised, the number of dissertation committees served on, the ratio of advising to committee membership, and the fractional “mpact” that weights advising and committee membership. The subset consists of data for six schools that produced at least three dozen dissertations and for which complete data is available. The data and resulting “mpact” metrics offer new ways to assess faculty impact and to investigate the nature and growth of a field.  相似文献   

19.
In this paper the authors present a preliminary discussion on some of the results from a survey aimed to explore, describe and explain some of the usability characteristics in digital libraries evaluation in the Mexican context. The study is framed in the evaluation of a multinational and monolingual digital library: the Miguel de Cervantes Virtual Library, from the University of Alicante in Spain. The evaluators were Mexican “expert” users (i.e. Spanish-speaking professional university librarians specialized in electronic reference services) who were asked to carry on an evaluation instrument based on usability criteria as taken from some models in developed countries. Some questions that might be answered with future research are outlined in this paper.  相似文献   

20.
It is no longer effective to provide information literacy instruction that is thought to be “good for” college students, but rather, instruction must focus on the learning styles and preferences of the target population. This case study reports a series of hands-on/minds-on information literacy activities that dissolve student's misconception that “techno-savvy” is synonymous with information literate. Careful and thorough instruction in the mining of popular Internet search engines for authoritative information was coupled with instruction in the use of traditional library resources. It was found that the college students studied possess a high need for clarity and a low tolerance for ambiguity, and therefore any activities assigned must be thoroughly, yet succinctly, described in order to achieve success. Combining traditional information literacy instruction with novel approaches appeals to the confidence in and reliance on Internet search engines that college students exhibit, while it moves this microcosm toward a higher level of information literacy and commitment to life long learning.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号