نتایج جستجو برای: awareness librarians information managemeat
تعداد نتایج: 1244377 فیلتر نتایج به سال:
Purpose – This paper aims to investigate whether academic reference librarians, archivists, catalogers, distance education librarians, public librarians, records managers, school librarians, special collections librarians, and systems librarians differ in personality traits measured by the Personal Style Inventory: i.e. adaptability, assertiveness, autonomy, conscientiousness, customer service ...
Purpose – This study seeks to establish and compare the research and publication patterns and output of academic librarians in Eastern Africa from 2000 to 2009 using informetric techniques. Design/methodology/approach – The study confined its scope to publications produced between 2000 and 2009. The informetric technique (through content analysis) was used as a research method. The documents th...
Background MyLibrary model Data store Library processes Interactive assistance Interfaces to MyLibrary@NCState User Interface Header and footer Global message and Message from the Librarian Your Librarians Library and University Links Bibliograhic Databases, Electronic Journals, and Reference Shelf Personal Links Quick Searches Current Awareness Administrative interface MyLibrary@NCState Techni...
On the one hand, libraries are at the forefront of the digital transformation and digital information infrastructures, on the other, they manage and curate cultural heritage collections. This brings about new ways of engagement with information and knowledge and the need to rethink skills and competency profiles – which enable librarians to support e-research all along the research cycle. This ...
Journalists and librarians share a common goal of providing information to the public, yet very little is known about how journalists’ seeking behavior intersects with libraries. This case study seeks understand environmental journalists by investigating their needs intersect library changed over course 9-month fellowship at University Colorado Boulder. Semi-structured interviews were conducted...
In this paper, the authors discuss employees’ beliefs about their abilities to competently use computer information security tools in the determination of effective information security practices within organizations. In the first section the authors present a background about information security practices at work. Then, the authors present a research approach based on social cognitive theory ...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Th...
Background and Aim: The utilization of information and communication technologies in medical librarianship would put librarians in new created conditions. Therefore, the aim of this study was to evaluate the effects of external factors on medical librarians' attitudes toward their future professional situation.Materials and Methods: This was a cross-sectional study. All libraries and affiliated...
THEEDUCATIONAL ROLE OF health sciences librarians in both academic centers and in hospitals is expanding due to influences of new educational models and growing use of technology. Innovative health sciences curricula are being applied in undergraduate and continuing education and of ten incorporate new technologies. The health sciences librarians’ educational responsibilities include teaching a...
The primary goal of this study is to examine the relationship between managerial information security awareness and managerial actions toward information security for the purpose of putting stress on the significant roles of managerial information security awareness in an organization’s total information security performance. Under the assumption that managerial actions toward information secur...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید