Search results
1 – 10 of 54Takes a broad look at Computer‐Mediated Communication (CMC) norms.Examines some of the simpler procedural norms as well as broader normsfor social behaviour in particular types of…
Abstract
Takes a broad look at Computer‐Mediated Communication (CMC) norms. Examines some of the simpler procedural norms as well as broader norms for social behaviour in particular types of networked communities.
Details
Keywords
Identifies key activities that network users can perform in orderto use the network effectively. Offers recommended reading, frombeginner to expert user status. Explains some…
Abstract
Identifies key activities that network users can perform in order to use the network effectively. Offers recommended reading, from beginner to expert user status. Explains some commonly used terms (e.g. Turbo Gopher with Veronica!). Lists useful Internet resources.
The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…
Abstract
The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.
The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis…
Abstract
The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis (TLA). Transaction logs supply unequivocal information about what a user typed while searching. All other methods rely on self‐reporting, which, as Nielsen points out, is not always corroborated by the logs. Regardless of where in an institution information retrieval (IR) system evaluation takes place, TLA is a method that enables library staff at all levels to examine a variety of system and user‐related activities that are recorded on the log. Dominick suggested that TLA can enable the examination of three broad categories of activity: 1) system performance and resource utilization, 2) information retrieval performance, and 3) user interaction with the IR system. This article has been divided into several sections corresponding to functional areas in a library to suggest useful applications of TLA.
An introduction is given to some of the resources on the Internet that may be used in academic libraries in Europe. Particular reference is made to accessing other libraries'…
Abstract
An introduction is given to some of the resources on the Internet that may be used in academic libraries in Europe. Particular reference is made to accessing other libraries' catalogues, document delivery services, shared information products and campus wide information systems. Several figures of screen outputs are included to provide the reader with an insight into the range of information available. The use of the Bulletin Board for Libraries (BUBL) as a starting point for finding out about resources on the Internet is suggested.
International New copyright provisions for digital transmission. Two new treaties relating to copyright in digital transmissions have been agreed by the World Intellectual…
Abstract
International New copyright provisions for digital transmission. Two new treaties relating to copyright in digital transmissions have been agreed by the World Intellectual Property Organisation's (WIPO) Diplomatic Conference. WIPO is a UN agency with a membership of 159 states.
This paper describes an ethnographic study of the electronic communityformed during an intensive summer school seminar on networking. Theseminar, conducted in a mostly electronic…
Abstract
This paper describes an ethnographic study of the electronic community formed during an intensive summer school seminar on networking. The seminar, conducted in a mostly electronic environment, was comprised of master′s and doctoral students involved in various fields of study. Ethnographic research techniques facilitated the observation and description of the actions and events of this networked learning community, where events reflect both individual personalities and shared knowledge. This exploration of the cultural meanings of class pedagogical events led to an enhanced understanding of both the nature of the online educational environment and the applicability of ethnographic research techniques to networked communities.
Details
Keywords
Claretha Hughes, Lionel Robert, Kristin Frady and Adam Arroyos