Information awareness

Author(s):  
David Jensen ◽  
Matthew Rattigan ◽  
Hannah Blau
IFLA Journal ◽  
2021 ◽  
pp. 034003522199156
Author(s):  
Essam Mansour

The purpose of this study is to investigate the information-seeking behaviour of the Egyptian elderly, including their information needs. A sample of 63 elderly people living in care homes was taken. It was divided into five focus groups. Of the 63 elderly people, 40 were men (63.5%) and 23 women (36.5%). Almost half (47.6%) ranged in aged from 61 to 70. About a quarter (23%) of them held a high school diploma. The highest percentage (28.6%) was labelled as average-income people. The highest percentage (60.3%) was also found to be widows or widowers. The types of information used most by the Egyptian elderly related to physical, medical/health, social, rational and recreational needs. Their information sources varied between formal and informal sources. Nearly two-thirds (63.5%) of them showed that limited knowledge, lack of interest, poor information awareness, aging, loneliness and health problems were the most significant obstacles they faced when seeking information.


2015 ◽  
Vol 14 (02) ◽  
pp. 1550002 ◽  
Author(s):  
Denise A. D. Bedford

Information landscape is a critical component of professional and scholarly disciplines. Established disciplines have a managed information foundation covering primary, secondary and tertiary sources, targeted search capabilities, discipline-specific knowledge organisation tools and services, and quality controlled review processes. The information landscapes of emerging disciplines may be more chaotic and unsettled, and present challenges for professionals. This research considers the information landscape of the knowledge management discipline. An open public survey of knowledge professionals provides insights into three factors that affect the landscape including: (1) information awareness; (2) information use and access; and (3) information valuation. Findings highlight key information management challenges, and offer suggestions for solutions.


Author(s):  
A. B. Antopolsky

The task of creating an open access repository for social sciences in the framework of the development of the information system of the Institute of Scientific Information for Social Sciences of the Russian Academy of Sciences (INION RAS) is formulated. The repository is to acquire and store he programs of workshops, webinars, conference and symposia as well as the presentations and paper abstracts. The findings of the study of open materials science events loaded to the websites of RAS scientific institutions of social and humanitarian profile as potential sources of information for the Repository are cited. For 2019–2020, over 1,2 thousand events held by more than 100 academic institutions were selected. Distribution by the number of events, their categories and status, topics, and type of available materials is given. The data supports the Pareto principle: 20% institutions hold up to 70% events. Thirteen scientific event types are specified, with 5 most popular of them accounting for 90% events with the leading disciplines of history, economics and literary studies. The available materials are unified and their 16 types are specified. Distribution by the number of events, their categories and status, topics, and type of available materials is given. The possibility for using these materials in various information and library services, building e-libraries and union bibliographic databases, and current and advanced selective information awareness services, is discussed.


2021 ◽  
Vol 13 (3) ◽  
pp. 156-162
Author(s):  
Nataliya Blaga ◽  
◽  
Volodymyr Hobela

The mechanism of communication process and information security at an enterprise is considered. The theoretical aspects of the communications at the enterprise are based on the variety of its form and the relation of organizational and information structures: most activities have underlying links via information processes. Thus information security of communication process has a significant impact on the information security of the enterprise as a whole. In modern conditions and circumstances, the information security of the enterprise is largely reduced to cybersecurity and suffers from most threats of the latter. However, the human factor is responsible for most of the real facts of inflicting harm due to information security breaches. Thus, traditional mechanisms of privacy and confidentiality ensuring need to be adapted to new realities. New opportunities also set new requirements for understanding the very concept of information security: information must not only be protected but also timely and accurate as far as it is possible to be provided with modern telecommunication systems and information technologies: information security is a system of information protection of the enterprise – protection against theft, delayed and inaccurate providing of essential information to the recipient inside the enterprise or outside it. There are proposed and justified four principles necessary but not sufficient to ensure efficient mechanism of information security regarding communication process at small to medium enterprises. These include information awareness of staff even if they are not advanced with information technologies, traditional methods of protection against cyber threats such as passwords and encryption, control over information flows and the infrastructure that provides them, reliable cooperation and protection of remote access. These principles should be followed by managers at all levels.


Author(s):  
Hongbo Lv ◽  
Zhiying Zhou

With the wide use of smartphones, mobile cyber has become an indispensable part of our lives. While smartphones are used almost every aspect of our lives, awareness of personal information protection is underdeveloped, and information leak has become one particular problem on mobile cyber. At the same time, personal information resources have become more valuable than ever. This chapter investigates users' attitudes toward cyber information leakage and methods to protect personal information. The software SPSS 19 was used to analysis the relationship among cyber environment, applicability and practicability of protection methods, economic cost, and overall evaluation (satisfaction). A suggestion that may promote personal information awareness and promote cyber security from technical, legal, and social aspects is also provided.


Sign in / Sign up

Export Citation Format

Share Document