On the heels of the rapid growth of the World Wide Web have come advances in multimedia document formats and the hardware and software to support them. As a result of this combination of factors, the electronic journal is, at last, economically and aesthetically viable.
The proliferation of networks is a significant factor in the development and growth of computer conferencing. The authors examine this form of communication and the…
The proliferation of networks is a significant factor in the development and growth of computer conferencing. The authors examine this form of communication and the behavioural and psychological factors which determine its success or otherwise as an effective means of information transfer. In particular, an examination of a computer conferencing experiment using a local area network in the Department of Information Science. University of Strathclyde demonstrated that, despite problems—ergonomic and technical—computer conferencing and electronic journal production have considerable potential and appeal.
High speed networks, such as the UK′s SuperJANET, presentopportunities for new dissemination. The SuperJournal project in 1993explored the possibilities with electronic…
High speed networks, such as the UK′s SuperJANET, present opportunities for new dissemination. The SuperJournal project in 1993 explored the possibilities with electronic versions of journal articles from nine publishers using four different interfaces. To support user retrieval strategies (hierarchic selection, searching, browsing, network speeds need to be very fast and supported end‐to‐end, more tools for production support for SGML need to be developed, and a move made away from text‐led systems to the more visual. Finally, briefly undertakes a study of the changing role of paper in the context of multimedia systems.
The purpose of this paper is to set out a structured meta‐methodology, named DIODE, for the ethical assessment of new and emerging technologies. DIODE has been designed by…
The purpose of this paper is to set out a structured meta‐methodology, named DIODE, for the ethical assessment of new and emerging technologies. DIODE has been designed by a mixture of academics, governmental people and commercial practitioners. It is designed to help diverse organisations and individuals conduct ethical assessments of new and emerging technologies.
A framework discussion paper was developed for consultation to ensure that DIODE addresses fundamental ethical concerns, has appropriate and manageable scope and is comprehensive in its ethical compass. The resulting DIODE meta‐methodology uses flowcharts and templates, encompassing the use of diverse tools and techniques.
There are two different angles for the ethical assessment of new technologies; a strategic/abstract angle and a project/application specific angle. DIODE includes two channels to accommodate this distinction. Early stage testing yielded positive feedback and mostly favourable comment. Additional guidance materials are being developed in response to the feedback.
Without training and guidance, it is difficult for technologists to take ethical concerns into account during the development and deployment of new technologies. DIODE can provide that training and guidance through a practical meta‐methodology which should help ICT professionals, policy makers and academics.
There is very little structured methodology material available on the ethical assessment of new technologies. The depth and sophistication contained in DIODE is therefore believed to be unique. DIODE provides practical help while remaining rooted in the philosophical and theoretical concepts of ethics.
This paper provides a high‐level overview of some of the main research themes and preoccupations that are reported in this special ciber issue of Aslib Proceedings: New…
This paper provides a high‐level overview of some of the main research themes and preoccupations that are reported in this special ciber issue of Aslib Proceedings: New Information Perspectives. The research activities of ciber are drawn together in the quest for a better understanding of the policy implications of large‐scale knowledge production systems against the backdrop of profound technical change, uncertainty over business models, and new forms of consumer behaviour. The paper presents a series of conceptual frameworks that aim to contextualise ciber’s work in bibliometrics, cybermetrics, research evaluation, scholarly communication, user studies, publishing strategies and policy analysis. The transparency that metrics can bring to the evaluation debate and the pivotal role of human information behaviour in determining those metrics, are discussed.
This paper examines the general value to users of a range of electronic journal functions and their usefulness in the specific context of the SuperJournal Project. For the…
This paper examines the general value to users of a range of electronic journal functions and their usefulness in the specific context of the SuperJournal Project. For the evaluation of each of the functions three types of data were analysed in relation to each other and in light of other contextual data: logged data of usage, survey data on user satisfaction, and survey data on the perceived importance of the function. The analysis shows that basic browsing, printing and search make up the core functions of electronic journals; other functions, such as saving of bibliographic data, alerting, customising, links with external resources and communication, serve as peripheral functions. The usefulness of both the core functions and the peripheral functions in a specific service is influenced by various implementation factors. However, it is the realised usefulness of the core functions which determines the use of a service.
The most inspiring ideal of librarianship, embodied in the public library service is of free access to information for all. On the face of it security is part of the more…
The most inspiring ideal of librarianship, embodied in the public library service is of free access to information for all. On the face of it security is part of the more niggardly side of library work, conjuring up images of closed access shelves and books on chains. In practice of course making sure one user does not steal or damage books is essential to guarantee access to the next user. Balancing the two needs for security and open access is a key part of the function of the librarian.