首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
This paper explores the common nature of bibliographic information and metadata based on their comparative analysis and the narrative reconstruction of their genesis. An ontological definition of metadata is proposed.  相似文献   

2.
Somewhere in the vicinity of 80 percent of all governmental information has some “geographic” element, and the vast majority is called “geospatial” because of the nature of describing spatial phenomena of the earth. Geospatial information has been increasing steadily in popularity and use since the advent of geographic information systems in the 1960s. From the early 1990s until the present, research libraries have seen an increase in the availability of geospatial information, and they have also seen a substantial change in the services provided to support the needs of clients seeking that information. However, recent events have altered the “access landscape.” September 11, 2001, and subsequent events, caused many policy shifts to take place as to how, or whether, access to governmental geospatial information should be granted. This paper explores those policy developments with the goal of prognosticating on the future of access to governmental geospatial information.  相似文献   

3.
This paper examines the role of trust in the information continuum. It argues that in the context of Canadian federal government records, an analogous ??trust continuum?? is a useful model for analysing the relationships that exist between creator, archives and user in the information-abundant environment. The paper borrows from sociological theory to posit that creator, archives and user are bound together in a complex expert system that facilitates trust and mitigates risk in a broad societal context and contends that these interactions are shaped at the macro level by a dominant public discourse of accountability. These points are illustrated through three recent examples at Library and Archives Canada. First, the relationship between Canadian society and the archives is explored by interrogating the concept of relevance and assessing the feasibility of managing a pan-Canadian collection via a national network of knowledge institutions. Then, the role of trust between the archives and the creator in the management of government digital information resources is examined in light of the recently issued Directive on Recordkeeping, and in the context of LAC??s Trusted Digital Repository. Finally, Commissions of Inquiry??and the Indian Specific Claims Commission in particular??demonstrate both the power of archival records in repairing trust between a society and its government and the iterative nature of the relationship between the user and the archives.  相似文献   

4.
A new phrase—“homeland security”—has come into popular parlance in the aftermath of recent terrorist attacks on the World Trade Center and the Pentagon. As an evolving concept, it draws definition from, and has implications for, various policy areas and actions. This introductory essay reviews the development of two similar policy concepts—national security and internal security—before exploring homeland security, and the significance of each for information policy and practice.  相似文献   

5.
Unnecessary and unwarranted classification adversely affects both information and personnel security systems in a variety of ways. This study explores the range of possible repercussions and identifies the findings and recommendations of major examinations of these systems over the past thirty years. Although consensus exists that Overclassification poses problems for information and personnel security, wide disagreement is evident over the perceived centrality and seriousness of Overclassification, its principal causes, and its remedies. Nowhere are these differences more manifest than in the assumptions, conclusions, and recommendations emerging from the Reagan Administration and Congress in 1985.  相似文献   

6.
The main factors that currently contribute to the increase of the vulnerability of computer information are considered. The dynamics of a number of promising scientific research areas in the field of information security (cryptography, computer steganography, and biometric information-protection systems) are analyzed based on Russian and foreign publications from VINITI databases over the past decade. The obtained data to a certain extent reflect the direction of the development of these research areas, which is defined by corresponding publication streams.  相似文献   

7.
8.
In examining national security as a new rationale for government regulation, this article summarizes recent developments in research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It concludes that regulation as a policy strategy turns on how one defines national security.  相似文献   

9.
National security controls on information and communication have been realized in Australia through various intelligence agencies and acts of the Parliament which, to varying degrees, restrict public access to documents regarded as essential to the “national interest.” This overview describes these entities and laws as well as the role of the Freedom of Information Act. It concludes that, in stark contrast to the United States, there has been a “freeing-up” of national security controls on information and communication in Australia in recent years.  相似文献   

10.
This paper considers the aspects of the interactions between people and the information environment and problems of the information security of a personality and society as a whole with allowance for such factors as the globalization of the world economy, introduction of new information technologies (including robotic systems and artificial intelligence systems), and the development of the semantic Internet and mass media. The problems of using the Internet network and mass media due to the psychological impact of negative information on people and society are discussed. Some recommendations, conclusions, and the most urgent tasks of supporting the information security of society are formulated.  相似文献   

11.
The legal support for information security is found in two conditionally independent areas: the macro area, which is external in relation to organizational factors, and the micro area, which includes internal legal factors. In this paper the federal legislation is examined and the fundamental and private principles of construction of a legal basis of information in Russia are noted. It is underlined that the legal macro support of an organization is incomplete and does not protect the interests of the private owner of information. The author reviews micro support and the approximate structure and content of internal legal regulations of an organization are proposed as well. The principles of organizational support for the protection of information are made. The role of the human factor in the support of security of information is justified.  相似文献   

12.
13.
14.
通过对我国农业院校图书馆网站的信息资源建设情况进行调查分析,找出其共性和特点及存在的问题,并对如何建好网站信息资源提出有关建议.  相似文献   

15.
16.
The Matheson Report sees the medical library as playing a key role in a network of interlocking information bases that will extend from central repositories of medical information to each physician's personal records. It appears, however, that the role of security in this vision has not been fully delineated. This paper discusses problems in maintaining the security of confidential medical information, the state of the applicable law, and techniques for security (with special emphasis on the UNIX operating system). It is argued that the absence of security threatens any plan to build an information network, as there will be resistance to any system that may give intruders access to confidential data.  相似文献   

17.
期刊信息化的现状、问题与发展战略   总被引:7,自引:0,他引:7  
分析了期刊信息化的发展现状,提出了图书馆期刊信息化面临的主要问题,探讨了发展期刊信息化的几项策略与措施。  相似文献   

18.
National security controls on information and communication in the United States arise from a variegated body of Executive Branch measures, statutes, and court decisions, as well as shifting opinions concerning the application of such authorities. After a discussion of the current national security atmosphere in the country, a brief history of Federal controls will be followed by an in-depth presentation of the current framework of controls on information and communication. Lastly, this review concludes with a discussion of the major implications of current conditions upon constitutional rights and democratic values in the United States.  相似文献   

19.
电子文件的信息安全问题已成为当今信息技术领域的一个研究热点,各种安全技术层出不穷,但每种技术随着时代的发展都显示出有缺陷的一面。本文认为密码技术、数字签名技术在结合数字水印技术后,将构成当前比较完整的电子文件保护方案。  相似文献   

20.
This article discusses the results of a large-scale Internet survey (with 1156 respondents) that investigated the cues and factors that could positively influence Dutch Internet users' trust in government organizations in terms of their usage and processing of citizens' personal data. Confidence in online privacy statements, as indicated by the results of this study, significantly influences trust in government organizations among Dutch Internet users with and without previous e-government experience. Among those with e-government experience, the quality of their online government transaction experience and a positive government organizational reputation can also increase their trust in government organizations, specifically in terms of how they process and use citizens' personal data.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号