首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
《The Reference Librarian》2013,54(75-76):11-22
Summary

Library staff and other patrons encounter patrons who are one or a combination of the following: mentally ill/disturbed, homeless, street persons, angry, aggressive, unreasonable, rude. Commonly referred to as “problem patrons,” they appear in any type of library: public, academic, institutional, corporate and special. Most of them behave poorly because of their own troubles. The history of “problem patrons,” various types of problem patrons and their identifying behaviors are discussed in this paper. In attempting to define “problem patrons” the information provides a framework for understanding the problems of challenging patrons and for learning to discriminate between problem patrons and patrons who have problems.  相似文献   

2.
宛玲  张月 《图书情报工作》2020,64(12):144-150
[目的/意义]对国内外隐私素养研究现状进行分析,归纳总结学术界的理论建议,分析研究中存在的漏缺和不足,为后续的研究提供借鉴。[方法/过程]对文献文本内容进行分析,归纳总结出目前学术界比较关注且有一定研究成果的主题,包括:隐私素养含义、隐私素养测量、隐私素养与其他影响因素的相互作用、公众隐私素养现状及教育策略,进一步按这4个主题范畴解析国内外研究现状。[结果/结论]目前隐私素养的研究已有一些进展,但总体还处于起步阶段,很多不同的观点和建议需要达成共识,研究的场景和内容还需要扩展,要加强隐私素养教育的研究。  相似文献   

3.
国外网络隐私权保护的基本模式分析   总被引:8,自引:1,他引:8  
本文系统介绍并深入分析了以美国和欧盟为代表的国外网络隐私权保护的二种基本模式。  相似文献   

4.
信息资源公共获取的隐私权保护探析   总被引:1,自引:0,他引:1  
通过分析信息资源公共获取与隐私权保护的联系与冲突,从制定隐私权保护法、建立考量原则、倡导自律和完善配套法律措施四个方面探讨推进信息资源公共获取的隐私权保护策略.  相似文献   

5.
Oregon State University Libraries piloted a one-year interlibrary loan purchase on demand service beginning in February 2009. An online survey was used to measure patron satisfaction and determine future borrowing and recommendation behavior. These results, along with patron comments, were used to explore future success of the service and ways to enhance the permanent service. Results provide context for the success of purchase-on-demand programs and support the development of innovative tools that increase the efficiency of purchase-on-demand workflow. Oregon State University Libraries permanently adopted the successful service and is working to incorporate patron input on purchase decisions.  相似文献   

6.
WEB2.0网站隐私权保护条款研究   总被引:1,自引:0,他引:1  
随着Web2.0模式的出现,网上个人信息被滥用的风险加大,制定网络隐私权保护条款是目前国内外Web2.0网站普遍采用的措施之一。根据Web2.0的特征提出加强个人网络隐私权保护的紧迫性,分析了国外Web2.0网站隐私保护条款的现状并针对条款的制定提出了相应建议。  相似文献   

7.
8.
Abstract

The author contends, based on articles published in recent years discounting the legal obligation of law librarians to pro se patrons, that law librarians have a paramount ethical obligation not to cause harm, and thus to avoid the practice of law from the reference desk. As a result, the attorney patron and the pro se patron cannot be afforded the same level of legal reference service. The attorney is the conversant intermediary between the legal materials (and the librarian) and the client, whereas the pro se patron is the client with a layman's dearth of basic legal knowledge.  相似文献   

9.
《The Reference Librarian》2013,54(75-76):55-66
Summary

Faculty members depend on the resources and services provided by the libraries to teach, satisfy the curricular needs of the students, and conduct their research. Students need the library for many reasons, among which are to complete their assignments and to expand on what faculty covers in class. The patron/librarian relationship in the academic library is not always perfect. Issues which students and faculty face in the academic library environment are completely different from those in the public library. Identifying the characteristics of the difficult or problem patron in academia is a little more difficult than in the public library. Are what librarians face when dealing with faculty and students more issue-related than just dealing with problem patrons? The authors will identify, from the librarians' perspectives, some of these often called difficult patron issues and offer solutions to try and preempt these issues before they become problems.  相似文献   

10.
国内读者决策采购实践研究述评   总被引:1,自引:0,他引:1  
[目的/意义] 通过对国内读者决策采购研究现状的综述,分析和讨论读者决策采购研究取得的成果和存在的问题,为未来的研究和实践开展提供思路和建议。[方法/过程] 采用文献计量和主题分析相结合的方法对国内读者决策采购研究成果进行评述,侧重主题内容的分析。[结果/结论] 集中从读者决策采购的外部环境、基本特点和组织实施3个方面对目前国内读者决策采购研究进行分析;未来应围绕图书馆发展和服务创新整体需要,立足于实践性这一基本特征开展相关研究;以具体项目实施为依托,积累本土化经验。  相似文献   

11.
国外信息隐私研究述评   总被引:3,自引:1,他引:3  
张玥  朱庆华 《图书情报工作》2014,58(13):140-148
以国外期刊发表的信息隐私相关文献为研究对象,重点从隐私关注和隐私行为两个方面对已有研究成果进行梳理。研究发现:隐私关注是体现用户隐私态度的重要指标,较多学者倾向使用IUICP量表对隐私关注进行测量;目前学界主要是从信息差异、信任差异、个体差异和文化差异等方面探索影响隐私关注的相关因素;隐私披露行为、隐私计算行为和隐私悖论行为是目前学界考察最多的三类隐私行为。认为过往研究多从个人层面、非交互式的静态环境中对信息隐私进行探讨,而群体交互性决策对于隐私行为的影响和多情境信息隐私动态研究将是今后值得关注的研究方向。  相似文献   

12.
基于用户体验的移动阅读终端可用性评价   总被引:2,自引:0,他引:2  
文章在分析用户使用体验的基础上,建立移动阅读终端可用性评价指标体系,涉及硬件性能、技术、内容、阅读功能与综合评价五个方面。文章选取部分指标对易博士阅读器的可用性进行研究,对设备的优势和存在的问题进行分析,并提出建议。  相似文献   

13.
许一明  李贺  余璐 《图书情报工作》2019,63(17):128-136
[目的/意义]数据泄露事件频频发生,越来越多的社交网络用户对自己隐私保护行为的有效性产生了质疑,甚至因此放弃对隐私信息的保护策略。本文试图从隐私保护自我效能的角度,探寻社交网络用户放弃隐私保护行为的原因。[方法/过程]通过对自我效能相关文献的梳理,引入隐私疲劳作为中介变量,建立结构方程模型,通过问卷调查法获取数据进行分析。[结果/结论]社交网络用户的隐私保护自我效能并不能直接对其隐私保护脱离行为产生影响,需要通过完全中介变量隐私疲劳来产生间接影响。不同来源的隐私保护自我效能会产生不同的影响。  相似文献   

14.
数字参考咨询个性化服务中用户隐私权保护机制的构建   总被引:2,自引:0,他引:2  
建立健全数字参考咨询(DRS)个性化服务用户隐私权保护机制,保护用户合法权益,是当代中国图书馆法制健全的必然选择。DRS个性化服务中用户信息的获取主要有显式和隐式两种方法。针对DRS个性化服务实现过程中涉及的用户隐私问题,从行业自律、政策标准、法律法规、用户自身隐私保护、网络安全环境、隐私权保护的限制6个方面构建数字参考咨询个性化服务中的隐私权保护机制,以维护用户权益。  相似文献   

15.
[目的/意义]人工智能、大数据等领域的快速发展使得商业发展与隐私保护之间的矛盾愈发尖锐.通过对不同类型的网络隐私争议事件微博评论进行情感及话题对比分析,以探究不同情境下网络用户的隐私态度的异同点与背后机理.[方法/过程]采集2012年至2019年网络隐私争议事件的相关微博评论,对其进行预处理,作为实验数据;基于情感词典...  相似文献   

16.
Predictive analytics and machine learning are burgeoning areas of professional practice for large corporations especially businesses that offer products and services to customers. The power to better understand the movement of large amounts of data in a company and the capability to deploy that data to meet a customer's needs is invaluable from a services standpoint. Some in libraries have theorized that this type of data usage could possibly be used in a library service environment as well. In this article, we demonstrate how you can develop and use machine learning algorithms and predictive analytics to proactively understand library behavior. Although libraries are good at data collection, we often rely on statics or old data for assessment. Utilizing a machine learning system, called the Automated Library Information Exchange Network (ALIEN), we can better understand the movement of the items in the collection and better serve the needs of our customers the library patrons.  相似文献   

17.
《资料收集管理》2013,38(2):15-31
Abstract

Library consortia offer expanded access to shared collections through patron-initiated borrowing of materials. This article looks at two primary questions regarding patron-initiated borrowing: Is it possible to improve delivery time of materials within the constraints of current staffing? Is it necessary for patrons' satisfaction to improve delivery time? Answers to these two questions were sought through two studies: a series of interviews with library circulation staff and a survey of library patrons. The results of these studies provided answers to these questions and additional information that could be used to improve the current service.  相似文献   

18.
计算机信息网络技术的迅猛发展使得网络隐私权受到前所未有的严峻挑战,这种状况已经严重阻碍了电子商务和网络经济的进一步发展,强化对网络空间的隐私权的法律保护,已成为国际社会网络立法的当务之急.本文借鉴先进法域的立法经验并结合我国当前现状,提出了网络隐私权保护的对策.  相似文献   

19.
一种敏感信息共享隐私保护框架   总被引:1,自引:0,他引:1  
刘小波 《图书情报工作》2011,55(13):116-120
通过对敏感信息共享中的隐私威胁分析,探讨敏感信息共享的隐私保护技术策略,并在此基础上提出一种敏感信息共享隐私保护框架,该框架可实现隐私访问策略的形式化表示以及基于语义的信息匿名化计算。最后,对实现该框架的关键技术进行简要介绍。  相似文献   

20.
The case for digital information privacy has taken on new urgency for a 21st-century population reliant on personal digital devices. As smartphones and social media use become more ubiquitous, users must consider the security risks related to these devices and outlets. This article considers the legal “right” to digital information privacy, and the historical reaction of the American Library Association in cases of privacy protection and violation. This topic is considered through the example of the debate between Apple, Inc. and the Federal Bureau of Investigation regarding iPhone privacy rights in relation to the suspected terrorist attack in San Bernardino, California in December 2015.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号