By Gloria J. Leckie, John E. Buschman
In the final 15 years, the floor - either when it comes to technological improve and within the sophistication of analyses of expertise - has shifted. while, librarianship as a box has followed a extra skeptical standpoint; libraries are feeling industry strain to undertake and use new techniques; and their librarians boast a better expertise of the socio-cultural, monetary, and moral issues of data and communications applied sciences. inside of this kind of context, a clean and important research of the principles and purposes of expertise in librarianship is lengthy overdue.
Read or Download Information Technology in Librarianship: New Critical Approaches PDF
Best library management books
Each seven seconds, a toddler boomer turns 50. So. .. who makes up the fastest-growing section of capability library clients? because the inhabitants ways fifty five and above, libraries are confronted with an untapped chance to serve a regularly underserved inhabitants. As she explains the bits and bobs of making plans, constructing, advertising and marketing, and investment winning courses and providers to the graying inhabitants, longtime outreach and entry recommend Barbara friends demonstrates how libraries can reap the benefits of supplying top-notch courses and providers for older adults.
By way of targeting supply and regulate technique actions, ITIL carrier Operation describes how a hugely fascinating regular nation of dealing with prone might be accomplished on a daily foundation. Key good points The up to date ITIL guides proportion the same common constitution (including usual content material in Chapters 1, 2 and six) to enhance consistency and reduction navigation.
This ebook discusses the advance of library and knowledge providers in China and the influence of the nation's political and social stipulations on that develpment. the writer in short experiences the historical past of chinese language libraries and librarianship, then describes chinese language library providers within the first 1/2 the 20 th century.
This ebook explores discrete-time dynamic optimization and gives an in depth creation to either deterministic and stochastic versions. protecting issues of finite and endless horizon, in addition to Markov renewal courses, Bayesian keep an eye on versions and partly observable tactics, the publication specializes in the correct modelling of purposes in numerous parts, together with operations examine, machine technological know-how, arithmetic, information, engineering, economics and finance.
- Electronic Resources in the Virtual Learning Environment: A Guide for Librarians (Chandos Information Professional Series)
- Risk Analysis and the Security Survey, Fourth Edition
- Continuous Average Control of Piecewise Deterministic Markov Processes (SpringerBriefs in Mathematics)
- Creating the Customer-Driven Academic Library
- The Top Technologies Every Librarian Needs to Know: A LITA Guide
- Cloud Computing for Libraries (THE TECH SETÂ® #11)
Extra info for Information Technology in Librarianship: New Critical Approaches
K. (2007). Re-envisioning libraries in the information society: A critical theory of library technology. Unpublished doctoral dissertation, University of California, Los Angeles. , & Webster, F. (2004). The long history of the information revolution. In F. ), The information society reader (pp. 62–80). New York: Routledge. Roszak, T. (1986). The cult of information: The folklore of computers and the true art of thinking. New York: Pantheon. Roszak, T. (1993, Winter/Spring). The politics of information and the fate of the Earth.
Philadelphia: New Society Publishers. , & O’Day, V. L. (1999). Information ecologies: Using technology with heart. Cambridge, MA: MIT Press. Noble, D. (1984). Forces of production: A social history of industrial automation. New York: Alfred A. Knopf. Noble, D. (2001). Digital diploma mills: The automation of higher education. New York: Monthly Review Press. Norris, P. (2004). The digital divide. In F. ), The information society reader (pp. 273–286). New York: Routledge. OCLC. (2007). Sharing, privacy and trust in our networked world.
It is realized through designs that narrow the range of interests and concerns that can be represented by the normal functioning of the technology and the institutions that depend on it. This narrowing distorts the structure of experience and causes human suffering and damage to the natural environment. The exercise of technical power evokes resistances of a new type immanent to the one-dimensional technical system. Those excluded from the design process eventually suffer the undesirable consequences of technologies and protest.