首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
深入的教学需求分析和良好的教学设计是<信息检索与利用>网络课件开发的核心内容.在充分挖掘和科学定义教学需求的基础上,以建构主义教育理念为指导进行课件的教学模式设计,为学生创设自主学习和协作学习的网络学习环境,不但有利于构筑学生在学习过程中的主体地位,同时亦能充分发挥教师的指导作用,并符合现代社会信息素质教育发展的需要.  相似文献   

4.
图书馆文化构建的时代解读   总被引:2,自引:0,他引:2  
杨军宁 《图书馆学研究》2006,(8):98-100,F0003
本文人物质、制度和精神层面表述图书馆文化内涵的基本构架,并阐释每个层面的建构活动。  相似文献   

5.
A comparison of the 1976 and 1984 debates revealed that shot pacing was substantially quicker in 1984, that the panel of reporters received more visual attention in 1984, and that shot patterns depicting the candidates in the 1984 debates changed after the “critical incident”; of each debate. These changes potentially interfere with the comprehension of verbal content of the debates, undermine the political purpose of the encounters, and promote unequal visual treatment of candidates.  相似文献   

6.
This paper describes the topical-thematic structure of the “Political Science” Database created at the Institute for Scientific Information on Social Sciences (INION) of the RAS. The principles of conceptual processing of political science documents are considered. The properties are uncovered of how the complex of linguistic instruments (branch information-retrieval thesaurus, rubricator of political science, and subject headings) is developed and applied to indexing and classification of documents and queries.  相似文献   

7.
The inextricably linked concepts of “information” and “information communication” are discussed. Information about some entity is defined as details about its properties reflected in material processes and objects or in the response of systems with purposeful activity. It is asserted that information is manifested only in the process of information communication. The steps of this process are considered. In particular, the processes of information transfer studied by C. Shannon are presented as elements of the stage of reflection of information communication. The aspects of “information support” of typical processes of activity, inherent in a particular subject domain, that must be recognized and studied, are determined. The list of the basic concepts connected with the concept of “information” is given.  相似文献   

8.
在信息时代,社会信息化步伐日益加快,伴随着社会信息意识的不断增强,涌现出了各种信息思潮,信息增值理念就是其中之一。一些专家认为,信息的增值过程是信息向智慧的跃迁过程。其中,不乏信息价值链理论,信息金字塔理论、信息价值跃迁理论等等。信息价值的增值和实现过程表现为信息价值形态的变化过程,有人认为信息的价值形态依次表现为由数据价值形态向知识价值形态、情报价值形态和智慧形态的递进;也有人认为信息是创造性思维的条件,与数据、知识和智慧不同。总而言之,信息价值引起了社会各界极大的关注,并且作为价值理论的重要组成部分从信…  相似文献   

9.
在信息时代,社会信息化步伐日益加快,伴随着社会信息意识的不断增强,涌现出了各种信息思潮,信息增值理念就是其中之一。一些专家认为,信息的增值过程是信息向智慧的跃迁过程。其中,不乏信息价值链理论,信息金字塔理论、信息价值跃迁理论等等。信息价值的增值和实现过程表现为信息价值形态的变化过程,有人认为信息的价值形态依次表现为由数据价值形态向知识价值形态、  相似文献   

10.
信息科学和信息产业   总被引:2,自引:0,他引:2  
本文讨论了信息科学和信息产业的几个基本概念,以及信息科学和信息产业、文献信息产业和信息产业之间的关系.  相似文献   

11.
竞争情报工作如何识别信息,如何在浩瀚的信息贵源中找出自己需要的内容,进行信息过滤;如何鉴别信息的真实性及其价值。由此,竞争情报需要.信息甄别。竞争情报的信息甄别包括:竞争情报的信息过滤、竞争情报的智能化甄别、网络竞争情报信息鉴别与网络数据挖掘、竞争情报的信度与效度评估。  相似文献   

12.
信息素养是现代社会中必需的基本素养,也是现代人才必备的基本素质。高校图书馆是信息素养教育的主要承担者。而信息共享空间作为一种新兴的服务模式和服务平台,其资源体系以及相应的服务体系的建设为信息素养教育提供了新的方式和内容。文章首先分析了信息共享空间与信息素养的关系,然后探讨了在IC如何利用其资源和服务提升信息素养教育的质量,从而实现信息素养教育的目标。  相似文献   

13.
信息组织与信息构建   总被引:2,自引:0,他引:2  
文章对信息构建进行了简要介绍,并对信息构建和信息组织之间的关系进行了比较,指出两者在本质、研究对象、研究目的上存在一致性,同时指出信息构建与信息组织在其产生的社会背景、所采用的技术方法以及两者与情报学的关系方面存在差异性,最后提出信息构建与信息组织辩证统一、相辅相成,应与时俱进,共同为人类信息利用服务.  相似文献   

14.
《Communication monographs》2012,79(3):254-272

A general question that communication theories seek to answer is what kinds of resources and knowledge must be drawn upon for communication to take place. This essay proposes that the question may usefully be pursued through investigation of personal address. It elucidates ten address terms in Colombian Spanish derived from the central term madre, “mother.” From the data, a functional model of personal address is generated which incorporates both universal resources for communication (the ubiquitous phenomenon of personal address, universal semantic principles that reflect basic human experiences, and metaphorical usage) and cultural resources (a particular set of address terms, a range of intention and interpretation that may be realized, and a system of cultural premises that organizes and makes sensible the terms and actions that constitute the system). Extensions of the study to other forms of personal address and other kinds of communication behavior are suggested.  相似文献   

15.
16.
This article outlines some of the requirements for decision‐making based on arguments from probability and deals, in depth, with the major considerations. Classical Theory, Frequency Theory, and the Logical Implication Theory are explored and their contribution to probability is discussed.  相似文献   

17.
《The Reference Librarian》2013,54(25-26):411-429
Information service professionals face two fundamental challenges that, taken together, point a direction for service development. The first of these is information overload caused by the proliferation of available data and publications and ever-morecomorehensive and wides~reada utomated means of access to them. The 'second is the fact thai most information seeking transpires with little help from librarians, who have ccnsistently failed to establish themselves as primary information professionals. The following discussion, limited in its implications to public and academic libraries, considers the relationship of these challenges to one another and describes a vision of the future mission of information services, made concrete through specific recommendations. Central to this vision are ideas set forth in two recent books: Value-Added Processes in Information Systems, by Robert S. Taylor, and New Priorities for the Universiv: Meeting Society's Needs for Applied Knowledge and Competent Individuals, by Ernest A. Lynton and Sandra E. Elrnan.  相似文献   

18.
情报科学与情报学会   总被引:1,自引:0,他引:1  
探讨了情报科学与情报学会在创建中的相差促进关系,并说明只有不断创新,才能保持二者旺盛的生命力。  相似文献   

19.
产业链视角下国内信息服务业的发展定位研究   总被引:13,自引:1,他引:13  
本文从产业链角度分析了信息服务业的产业构成、产业链的各个环节,并在分析信息服务产业链现状与演变趋势的基础上,基于产业链理论探讨了国内信息服务业的发展定位问题。  相似文献   

20.
信息犯罪、信息安全与信息防范的路径分析   总被引:2,自引:0,他引:2  
信息安全问题自因特网诞生之日起就与日俱来。信息安全涉及到国家的政治、经济、军事、文化等方方面面,并随着网络的发展与应用而日益严重,已成为影响国家安全和社会稳定的重大问题,引起了各国政府的高度重视。从信息犯罪的分析入手,对信息安全的现状进行了分析,并提出我国信息安全防范的对策。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号