[Asis-l] JASIST TOC, Vol 54, #9

Richard Hill rhill at asis.org
Thu Jun 5 09:44:00 EDT 2003


JASIST, Journal of the American Society for Information Science and Technology
Volume 54, Issue 9, 2003

[Note: at the end of this message are URLs for viewing contents of JASIST 
from past issues.  Below, the contents of Bert Boyce's "In this Issue" has 
been cut into the Table of Contents.]

Volume 54   Number 9   July 2003
CONTENTS

Editorial
Refereeing for JASIST
Donald H. Kraft
807

In This Issue
Bert R. Boyce
808

RESEARCH

A Public-Key Based Authentication and Key Establishment Protocol Coupled 
with a Client Puzzle
M.C. Lee and Chun-Kan Fung
Published online 7 May 2003
810
         Lee describes a public-key based authentication and key 
establishment protocol which is designed to prevent denial of service 
attacks an a server.

The Myth of Technological Neutrality in Copyright and the Rights of 
Institutional Users: Recent Legal Challenges to the Information 
Organization as Mediator and the Impact of the DMCA, WIPO, and TEACH
Tomas A. Lipinski
Published online 7 May 2003
824
              Lipinski contends that prior to the Digital Millennium 
Copyright Act United States Copyright Law was essentially medium neutral, 
but that the Copyright office in its implementation of DMCA has eliminated 
a digital form of the "first sale doctrine." The permission for libraries 
to make digital copies for replacement of damaged or obsolete format works 
is seen as a new restriction since access is limited to within the walls of 
the library; a distinct treatment for digital materials. The World 
Intellectual Property Organization's anti- trafficking and 
anti-circumvention rules incorporated in DMCA also apply only to digital 
material, not all copyrighted material. Fair use of digital works with 
access controls now requires permission as well the meeting of the fair use 
tests and technological control clearly trumps any right of public access. 
The Technology, Education and Copyright Harmonization (TEACH) Act requires 
additional safeguards when material exists in digital form for use in 
distance education. Generally ownership rights are moving strongly into the 
digital environment but the balancing user's rights are not translating 
nearly as clearly.

Do Nondomain Experts Enlist the Strategies of Domain Experts?
Karen M. Drabenstott
Published online 7 May 2003
836
              Previous studies have shown that domain experts use searching 
strategies based upon using known relevant documents to find additional 
material while non-domain experts prefer subject searching and area 
scanning. Drabenstott is interested in whether non-domain experts using 
modern academic library information gateways adopt domain expert 
techniques, and if so, how so, and with what success. The University of 
Michigan's gateway which features the online catalogs of Michigan's 
academic libraries, electronic periodicals, networked electronic secondary 
sources, and a ready reference shelf, was utilized by 14 undergraduate 
volunteers with a project to complete, using SnapZPro to record screens 
while the subjects spoken thoughts were recorded and Drabenstott observed 
the process and asked a series of questions. A series of states describing 
the process currently underway was created, with a new state recorded with 
each strike of the <enter> key. An interaction averaged 93 states with 
"select source" 20%, "search" 13%, "view-select results" 30% and "wait" 
13%, dominating the distribution. Strategies are found in a depth analysis 
of the 'select source" and "search" states. Citation searching was not 
utilized. Two journal run searches were carried out, and one known item 
search. One searcher attempted a footnote chasing strategy and one an 
author search. Subject searching was the primary strategy. Non-domain 
expert strategies outnumbered domain-expert strategies 5 to 1. Five 
subjects used at least one domain-expert strategy, two of whom were 
following suggestions of their instructors. Where successful, perseverance, 
trial and error, and serendipity played a major part. If non-domain experts 
are to use domain expert strategies effectively they will need 
encouragement and support.


A Cast of Thousands: Coauthorship and Subauthorship Collaboration in the
20th Century as Manifested in the Scholarly Journal Literature of Psychology
and Philosophy
Blaise Cronin, Debora Shaw, and Kathryn La Barre
Published online 7 May 2003
855
              Cronin, Shaw, and LaBarre examine each issue of the 100 
volumes of Psychological Reviews and of Mind to identify the number of 
authors and co-authors, and the number of, text of, and names mentioned in, 
any acknowledgments present in research articles. Acknowledgments were 
categorized as unknown, conceptual, editorial, financial, 
instrumental/technical, moral, and reader (one who presented at a meeting) 
with a reliability of roughly 90%. In Psychological Reviews acknowledgments 
appeared in 10% of the papers in the 1920's, 22% in the 1940's, 43% in the 
1950's, 84% in the 1960's and 97% in the 1980's. Financials comprised 36%, 
conceptual 31%, I/T 20%, editorial 11%, and moral and reader together, 1%. 
Co-authored papers exceeded single author papers for the first time in the 
1980's and accounted for 71% n the 1990's. 3,126 unique names appeared in 
conceptual or I/T acknowledgments (the categories representing 
collaboration) with 56 appearing 6 or more times. In Mind acknowledgments 
appeared in 3% of papers in the 1920's,  27% in the 1970's, 63% in the 
1980's, and 83% in the 1990's. The conceptual acknowledgment is most common 
at 69%, with editorial and financial each coming in at 11%. In Mind 98% of 
papers were single author. 1,008 unique names appeared in conceptual or I/T 
acknowledgments  with 40 appearing 5 or more times. Psychology appears more 
collaborative than Philosophy both in terms of acknowledgment and in terms 
of co-authorship.

The User-Subjective Approach to Personal Information Management Systems
Ofer Bergman, Ruth Beyth-Marom, and Rafi Nachmias
Published online 7 May 2003
872
              Bergman, Beyth-Marom, and Nachmias believe that a storage 
system for a personal information system should facilitate a user storing 
items in such a manner that all material on the same user designated 
subject is together, and that its arrangement should be  effected by its 
user judged importance and its original context. The typical PC operating 
system will store bookmarks, documents and e-mails in different places 
despite their subjective association.

A Social Judgment Analysis of Information Source Preference Profiles:  An 
Exploratory Study to Empirically Represent Media Selection Patterns
Joette Stefi-Mabry
Published online 7 May 2003
879
              Stefl-Mabry looks at the degree of satisfaction individuals 
derive from specific quantities of information received from six different 
sources; word of mouth, expert oral advice, the Internet, print news, 
non-fiction books, and radio/TV news. Satisfaction was measured by a survey 
instrument, where 90 respondents (30 law enforcement professionals, 30 
education professionals and 30 medical professionals) reported their 
satisfaction for forty tasks on a 0 to 100 scale. Social Judgement 
Analysis, a multiple regression technique, was used to reveal preferences 
for sources, the effect of volume of information on satisfaction, and the 
effect of positive and negative information from different sources on 
overall satisfaction. Expert oral advice accounted for 28% of the sample's 
preferences and non-fiction books 23%. Other sources were significantly 
lower. The centroid subject seems to derive high levels of satisfaction 
from high levels of supporting information, and the lowest satisfaction 
levels are associated with high volumes of conflicting information. This 
suggests four hypotheses: Source preferences influence satisfaction, 
Individual source preference profiles exist as sets of interacting 
preferences for multiple sources, The consistency of preference profiles 
can be observed and measured, and information satisfaction judgements 
depend upon both conflicting and supporting information.

BOOK REVIEWS
Information Visualization in Data Mining and Knowledge Discovery, edited by 
Usama Fayyad,
Georges G. Grinstein, and Andreas Wierse
Reviewed by Christopher A. Badurek
Published online 7 May 2003
905
The User's View of the Internet, by Harry Bruce
Reviewed by Eric G. Ackerman
Published online 7 May 2003
906

Digital Futures: Strategies for the Information Age, by Marilyn Deegan and 
Simon Tanner
Reviewed by Lisa Ennis
Published online 12 May 2003
908

Encoded Archival Description on the Internet, edited by Daniel V. Pitti and 
Wendy M. Duff
Reviewed by Dale A. Stirling
Published online 7 May 2003
909
------------------------------------------------------
The ASIS web site <http://www.asis.org/Publications/JASIS/tocs.html> 
contains the Table of Contents and brief abstracts as above from January 
1993 (Volume 44) to date.

The John Wiley Interscience site <http://www.interscience.wiley.com> 
includes issues from 1986 (Volume 37) to date.  Guests have access only to 
tables of contents and abstracts.  Registered users of the interscience 
site have access to the full text of these issues and to preprints.


Executive Director
American Society for Information Science and Technology
1320 Fenwick Lane, Suite 510
Silver Spring, MD  20910
FAX: (301) 495-0810
PHONE: (301) 495-0900

http://www.asis.org 




More information about the Asis-l mailing list