Updating search results...

Information Science

1341 affiliated resources

Search Resources

View
Selected filters:
Information Literacy in Action: Cognitive Biases
Unrestricted Use
CC BY
Rating
0.0 stars

Can we really trust our perception? This post outlines some common ways that our brains perceive or interpret information in a way that does not produce accurate knowledge.

Subject:
Applied Science
Information Science
Psychology
Social Science
Material Type:
Interactive
Lesson
Reading
Author:
Marla Lobley
Date Added:
01/29/2021
Information Literacy in Action: Evaluating Medical Information
Unrestricted Use
CC BY
Rating
0.0 stars

Learn how to evaluate medical information as a non-medical expert using information literacy principles such as currency, noting research questions and methods and verifying claims with multiple sources.

Subject:
Applied Science
English Language Arts
Health, Medicine and Nursing
Information Science
Reading Informational Text
Material Type:
Activity/Lab
Interactive
Lesson
Reading
Author:
Marla Lobley
Date Added:
07/22/2020
Information Literacy in Art History
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Word Count: 2714

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Information Science
Material Type:
Textbook
Author:
Anne McClanan
Elsa Loftis
Date Added:
10/01/2019
Information Security (06:02): Physical Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:04): Protecting Your Data
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.

Data is always priceless

Three topics:
-Data migration
-Data backup
-Data disposal

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Date Added:
09/26/2014
Information Security (06:05): Network Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.

Links from Video:
-The System Administrator Song http://youtu.be/OpGN3oT1thA

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:06): Internet Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.

Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:07): Malware
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.

Links from Video:
-AVG by Grisoft: http://free.avg.com/us-en/homepage
-AVAST: http://www.avast.com
-ClamWin: http://www.clamwin.com/
-Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:08): Social Engineering
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.

I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.

Links from Video:
•Internet Storm Center: https://isc.sans.edu/
•SNORT: https://www.snort.org/
•Security Now: http://twit.tv/sn
•Internet Crime Complaint Center: http://www.ic3.gov/default.aspx
•Hak5: http://hak5.org/
•Facecrooks (facebook.com/Facecrooks)

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Systems
Unrestricted Use
CC BY
Rating
0.0 stars

Students need to understand systems and the systems concept, and they need to understand the role of ICT in enabling systems. Students will learn the characteristics of good systems (e.g., intuitive, likable, error-resistant, fast, flexible, and the like). Knowing the characteristics of good systems will permit students to demand well designed systems and to suggest how existing systems should be changed. Students need to understand the affordances, directions, and limits of hardware, software, and networks in both personal and organizational dimensions. They also need to appreciate that, as technical capabilities change and new ones arise, more opportunities to apply ICT for efficiency, effectiveness, and innovation are afforded. They need to understand the process for developing and implementing new or improved systems and the activities of IS professionals in this process.

Subject:
Applied Science
Information Science
Material Type:
Textbook
Provider:
BCcampus
Provider Set:
BCcampus Open Textbooks
Author:
Richard T. Watson
Date Added:
10/28/2014
Information Systems for Business and Beyond
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book is written as an introductory text, meant for those with little or no experience with computers or information systems. While sometimes the descriptions can get a little bit technical, every effort has been made to convey the information essential to understanding a topic while not getting bogged down in detailed terminology or esoteric discussions.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Textbook
Author:
David T. Bourgeois
James L. Smith
Joseph Mortati
Shouhong Wang
Date Added:
11/18/2021
Information Technology and Libraries Journal, Vol. 43 No. 3 (2024): Special Issue on AI & ML
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Peer-reviewed articles in this special issue:

- “Responsible AI Practice in Libraries and Archives: A Review of the Literature” by Sara Mannheimer, Natalie Bond, Scott W. H. Young, Hannah Scates Kettler, Addison Marcus, Sally K. Slipher, Jason A. Clark, Yasmeen Shorish, Doralyn Rossmann, and Bonnie Sheehey. The authors explore the existing literature to identify and summarize trends in how libraries have (or have not) considered AI’s ethical implications.
- “It Takes a Village: A Distributed Training Model for AI-based Chatbots” by Beth Twomey, Annie Johnson, and Colleen Estes, discusses the steps taken at their institution to develop and implement a library chatbot powered by a large language model, as well as lessons learned.
- “‘Gimme Some Truth’ AI Music and Implications for Copyright and Cataloging” by Adam Eric Berkowitz, details modern developments in AI-assisted music creation, and the resultant challenges that these surface regarding copyright and cataloging work.
- “Adapting Machine Translation Engines to the Needs of Cultural Heritage Metadata” by Konstantinos Chatzitheodorou, Eirini Kaldeli, Antoine Isaac, Paolo Scalia, Carmen Grau Lacal, and Mª Ángeles García Escrivá provides an overview of the process used to hone general-use machine translation engines to improve their outputs when translating cultural heritage metadata in the Europeana repository from one language to another.
- “Exploring the Impact of Generative Artificial Intelligence on Higher Education Students' Utilization of Library Resources: A Critical Examination” by Lynsey Meakin applies the Technological Acceptance Model to higher education students’ perceptions and adoption of tools using generative AI models.

Recurring content:
- Public Libraries Leading the Way: “Activating Our Intelligence: A Common-Sense Approach to Artificial Intelligence” by Dorothy Stoltz

- ITAL &: “The Jack in the Black Box: Teaching College Students to Use ChatGPT Critically” by Shu Wan

Subject:
Applied Science
Computer Science
Education
Higher Education
Information Science
Material Type:
Reading
Author:
Addison Marcus
Annie Johnson
Antoine Isaac
Beth Twomey
Bonnie Sheehey
Carmen Grau Lacal
Colleen Estes
Doralyn Rossmann
Dorothy Stoltz
Eirini Kaldeli
Hannah Scates Kettler
Jason A. Clark
Konstantinos Chatzitheodorou
Lynsey Meakin
Natalie Bond
Paolo Scalia
Sally K. Slipher
Sara Mannheimer
Scott W. H. Young
Shu Wan
Yasmeen Shorish
and MªÁngeles García Escrivá
Peter Musser
Date Added:
10/01/2024
Information Visualization Tutorials
Unrestricted Use
CC BY
Rating
0.0 stars

Information visualization is concerned with the visual and interactive representation of abstract and possibly complex datasets. As we encounter growing datasets in various sectors there is an increasing need to develop effective methods for making sense of data. Information visualization relies on computational means and our perceptual system to help reveal otherwise invisible patterns and gain new insights. Across various fields, there is great hope in the power of visualization to turn complex data into informative, engaging, and maybe even attractive forms. However, it typically takes several steps of data preparation and processing before a given dataset can be meaningfully visualized. While visualizations can indeed provide novel and useful perspectives on data, they can also obscure or misrepresent certain aspects of a phenomenon. Thus it is essential to develop a critical literacy towards the rhetoric of information visualization. One of the best ways to develop this literacy is to learn how to create visualizations! The tutorials offer a practical approach to working with data and to create interactive visualizations.

The tutorials require basic familiarity with statistics and programming. They come as Jupyter notebooks containing both human-readable explanations as well as computable code. The code blocks in the tutorials are written in Python, which you should either have already some experience with or a keen curiosity for. The tutorials make frequent use of the data analysis library Pandas, the visualization library Altair, and a range of other packages. You can view the tutorials as webpages, open and run them on Google Colab, or download the Jupyter notebook files to edit and run them locally.

Subject:
Applied Science
Computer Science
Information Science
Mathematics
Measurement and Data
Material Type:
Activity/Lab
Author:
Marian Dörk
Date Added:
08/26/2020
Information literacy rubric
Unrestricted Use
CC BY
Rating
0.0 stars

Deb Baker created this after consulting with faculty, librarians, and colleagues from around the country. The idea was to create a practical tool for assessing information literacy that anyone could use, was easy to norm, and focused on what students could do and where research instruction could be improved to increase students' information literacy. This rubric can help improve student success and information literacy learning outcomes in research assignments for any course. Used early in the semester it can serve as a diagnostic tool for supporting student researchers in developing the skills and habits of mind needed to successfully find and use information to answer a question, support a thesis, or solve a problem. Students could even use it to self-assess.

Cover photo by Glenn Carstens-Peters on Unsplash

Subject:
Applied Science
Composition and Rhetoric
Education
English Language Arts
Higher Education
Information Science
Material Type:
Assessment
Teaching/Learning Strategy
Author:
Deb Baker
Date Added:
11/18/2020
Institutional Repositories and Open Access Movement
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

A presentation on Institutional Repositories and Open Access Movement by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Tumakuru, Karnataka, India.

Subject:
Applied Science
Education
Higher Education
Information Science
Material Type:
Lecture
Author:
Rupesh Kumar A
Date Added:
11/22/2020
Instructional Leadership - Learner variability
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Knowledge of learners and learning is an essential priority for Library Media Specialists. As the demand for meeting the needs of all learners increases, LMSs are uniquely positioned to observe and support learners across the range of their strengths and challenges. Not only are they able to provide a variety of resources for gathering, processing, and producing information, LMSs are often afforded the opportunity to observe learner strengths that may go overlooked in classroom settings.Personalizing learning is a shift from facilitating implementation of a curricular program to developing a repertoire of instructional resources and strategies to support learner variability. In bridging the disciplines of information and learning, the LMS stays abreast of developments in each, curating and accessing exceptional OER materials and integrating evidence-based mind, brain, and education science (MBES). This module will take a look at the concept and science of learner variability, and investigate and apply two models for designing instruction for learner variability. Students are asked to build on their knowledge of Guided Inquiry Process (see Resources) and OER materials to leveraging learner profiles for effective instructional design.This unit specifically addresses NH ED 614.11.A.1.a and 614.11.A.1.b.

Subject:
Information Science
Material Type:
Module
Author:
Kim Carter
Date Added:
09/12/2016