首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
实时参考咨询服务下的参考馆员   总被引:8,自引:1,他引:8  
实时参考咨询服务是一种效率非常高的交互式的虚拟咨询服务方式。本就此简要分析了他的一些特点以及图书馆参考馆员所面临的问题,提出了参考馆员应采取各种方式提高自己的素质和能力。  相似文献   

2.
远程协助在图书馆网上实时参考咨询中的应用   总被引:1,自引:0,他引:1  
实时咨询服务是虚拟参考咨询服务的重要组成部分之一,是一种效率非常高的交互式虚拟咨询服务方式。本文将远程协助技术应用于图书馆网上实时参考咨询的业务整合、创新当中,构建一个远程协助网上实时参考咨询平台,更好地满足高校信息用户的参考咨询需求。  相似文献   

3.
免费聊天工具在图书馆实时虚拟参考咨询中的应用探讨   总被引:5,自引:0,他引:5  
图书馆可以利用免费聊天工具为用户提供实时虚拟参考咨询服务。在文中,笔者以QQ为例对免费聊天工具在图书馆实时虚拟参考咨询服务中的应用进行了探讨,并针对其非专业性提出了一些弥补性的对策和应用的原则。  相似文献   

4.
“偷拍”是电视记者隐匿自己的身份,运用隐藏的摄像设备拍摄并记录一般显性采访中不易获得的信息和材料的一种手段。在采访实践中,一些舆论监督的对象往往对记者有着防范心理,在这种情况下,记者公开身份就可能使正常的采访拍摄无法进行。从增强新闻评论性节目的真实性和现场感角度看,如果要想得到真实的情况,记者必须隐匿真实的身份,使采访对象在一种不被干扰的情况下按照常态进行。因此,记者只能采用“偷拍”的手段去揭示事实的真相。但是,在法制日益健全,权利界限越来越明晰的今天,“偷拍”不仅唤起了人们对新闻伦理道德的关注,也引起了对“偷拍”的合法性讨论。2002年4月1日,最高人民法院颁布的《关于民事诉讼证据的若干规定》提出:在民事诉讼中,有其他证据佐证并以合法手段取得的无疑点的视听资料或者与视听资料核对无误的复制体,对方当事人提出异议但没有足以反驳的相反证据的,人民法院应当确认其证明力。同时也规定,以侵害他人合法权益或者违反法律禁止性规定的方法取得的证据,不能作为认定案件事实的依据。新的司法解释有条件地让“偷拍”合法化,而且对“偷拍”得来的证据由绝对否定变为相对否定。  相似文献   

5.
钱沣这个名字过去除了专治明清史和书画史的人外,知道的不多;近年来,由于清代"历史"的影视剧(如中央电视台播放的《大清御史》等)不断放映,特别是京剧《瘦马御史》、《宰相刘罗锅》等相继演出,作为大贪官和珅的对立面,渐为人们知晓.但是影视剧的钱沣与历史上的钱沣相距很大.  相似文献   

6.
In the United States we cannot avoid the impact of television on domestic politics. On all sides, every election year, we are buffeted by such developments as the “great debates,” “pre‐election predictions” by computers, arguments over Sec. 315, and various partisan uses of TV. Overseas, many nations have experienced the political effects of television, some similar and some more subtle than our own.  相似文献   

7.
This article examines ethics of consultants from the perspective of counter‐rational organizational theory. First, a set of four ethical questions, derived from Kohlberg, are presented. Second, a real consulting scenario is described, and the author's intervention is outlined. Finally, the implications of the case to consulting practice are discussed.  相似文献   

8.
林亚平 《编辑学报》2002,14(Z1):78-79
探讨知识经济时代高校学报编辑应具备的基本素质.为迎接挑战,编辑人员只有不断提高自身素质,才能使高校学报体现先进文化的方向.  相似文献   

9.
10.
《Research Strategies》2001,18(3):181-190
Case-based, problem-based learning (CBPBL) is a student-centered approach that uses tightly focused minicases to help students demonstrate their ability to identify their information needs. It has been used successfully in science and medical learning, and lends itself easily to helping students develop the critical thinking skills that lead to information literacy. In this approach, after students are provided with a minicase, they control the chalkboard and direct their own learning by initiating the topics and setting the agenda that will lead to solving the case. The instructor's task is to serve as a facilitator, asking questions only when it serves to help clarify students' thinking, and guiding group processes when necessary.  相似文献   

11.
同行评议时间控制应贯穿学术期刊专家审稿前、中、后全过程,而“审稿中”的时间控制是同行评议全程管理中易忽视的薄弱环节。对于该阶段的进度控制,编辑部可通过扩充专家邀请数量、提前设置增审、压缩增审周期来影响审稿进度。本文将围绕这3种方法调研其实施现状,以反映审稿进度控制现状并发现问题。结果显示,大多数期刊首次邀请专家人数仅等于要求回收意见的份数,审稿异常稿件需消耗1个审稿周期后才会被设置增审,审稿周期较长期刊的增审周期也未适当缩短,这些反映编辑部对处在“审稿中”稿件的时间管理处于近乎“虚空”的低干预状态。本文基于调研结果提出,期刊首次邀请专家人数宜大于要求回收意见份数但不是越多越好;分类确定提前增审对象及时间点;增审周期可控制在≤21 d;挖掘采编系统智能化辅助功能,减轻人力负担。多措并举,优化审稿进度控制效果,提升审稿运行效率,助力我国世界一流学术期刊建设。  相似文献   

12.
The time evolution of mean received citations is calculated on a sample of journals from two ISI subject categories (“Chemistry, multidisciplinary”, ISI Science Edition, and “Management”, ISI Social Science edition) with the use of an original methodology. Mean received citations are plotted against the time gap in years existing between publication of the cited article and received citations. For most Chemistry journals in the sample the maximum number of average received citations occurs two years after publication, and then a decrease is experimented. Some peculiar cases present a different trend. Management journals, conversely, do not present in most cases a peak of citations: average received citations instead grow from year of publication to the age of 10 years (maximum time gap studied). A subsample of journals show similar results for longer time series (up to 23 years). Medians of average received citations per year partly show a similar behavior. Results suggest that citedness follows very different trends in very different fields, and partly suggest why differences in Journal Impact Factor exist between different categories. At the end of the work conclusions are drawn, together with suggestions for future research.  相似文献   

13.
Knowledge acquisition is a modeling activity for the development of knowledge-based systems. Developers can take advantage of domain-specific knowledge-acquisition tools for the construction of knowledge bases. Modeling for the development of such tools is an activity that is analogous to the modeling for knowledge-based systems. However, there are important differences between the appropriate models for these two goals. The models for the development of domain-specific knowledge-acquisition tools involved can be divided into three major classes: knowledge-structure models, knowledge-acquisition models and design models. These models can help developers to create domain-specific tools for new application domains.  相似文献   

14.
Twenty years ago, the International Commission for the Study of Communication Problems determined that 68 per cent of the world's population, comprising the developing world, accounted for only 10 to 30 per cent of reported world news. This imbalance in the flow of international news, combined with a Western news ethic that tends to emphasize the aberrational, has been blamed for presenting a skewed view of the developing world. This paper employs content analysis conducted at ten year intervals to determine how Time magazine has stood in the light of this argument over the years.  相似文献   

15.
This paper deals with the management of a mass storage unit in a minicomputer system. The memory unit is constituted of two devices, each one containing two hard disks. The mass storage controller (based on an Intel 8086 microprocessor) is described first, considering both hardware and software aspects. Then the structure of the memory medium is shown, with emphasis on the main capability offered by this kind of hard disk.Finally the COPY VOLUME program is presented. The purpose of this program is to copy the content of one disk to another one fully. The main features of this program and the error management during I/O operations on the disks are also described.Particular emphasis is on the operations performed by the program to correctly execute the COPY VOLUME function.  相似文献   

16.
Within the perimeter of patent collaboration networks, the average distance of collaborations and the number of countries involved per each collaboration have been shown to have increased steadily in time. Less attention, though, has been devoted to assessing whether this growth of cross-country collaborations is stable in time. To address this scientific question we focus on the identification of long-term correlations (i.e. temporal persistence). Our data set consists of time series of yearly average collaboration radii and of cross-border links in the Euro-American subsystem of the global collaboration network for the period 1978–2014. To investigate the fundamental persistence properties of these time series, we use Detrended Fluctuation Analysis, a method that allows us to measure long-term correlations in detrended signals. Also, we devise a general and original procedure to assess the statistical significance of results for short time series. Our results, showing that long-term correlations do exist in the majority of our signals, reinforce the hypothesis of a diminishing role of geographical distance in technological collaborations. Results at national level show that a significant degree of heterogeneity in persistence parameters can be detected within Europe, irrespectively of the efforts towards the set-up of an integrated European Research Area.  相似文献   

17.
18.
19.
The key methods for testing network-intrusion detection systems are considered. The advantages and drawbacks of different testing methods are analyzed. The main prerequisites for developing a statistically consistent technique for testing and certification of network intrusion detection systems are formulated. The conclusion is made that it is necessary to develop a model of a complex computer attack that could be used for synthesis of the network traffic of the attacking action.  相似文献   

20.
This paper describes a nuanced methodological approach that responds to the notion that knowledge is socially positioned.MethodFour researchers sought to answer: How can Contributive Research Method be employed in a workshop with participants to build knowledge, provide trustworthy data collection, and leverage the opportunity to revise open content? Using an Adapted Interactive Model of Research Design (adapted from Maxwell, 2009) for engaging in the Contributive Research Method (Puig et al., 2018), data was gathered from an online satellite event, involving 34 institutions from Australia, New Zealand and Asia. Of the 97 participants, 57 contributed data. The presentation utilized digital tools (Mentimeter, and Hypothes.is) with an online learning community to promote the wellbeing of librarians.ResultsAn Adapted Interactive Research Design (AIRD) together with a Contributive Research Method (CRM) (Puig et al., 2018) and CAST analysis (AIRD with CRM + CAST) were effective as a nuanced research design.ConclusionsContributive Research creates an opportunity to truly blend research with the scholarship of learning and teaching where it could be used in Higher Education during lectures and potentially in classrooms. Findings contribute to the body of literature on methodology and may be applicable to similar studies.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号