Search results

1 – 10 of over 25000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 April 1973

Current issues of Publishers' Weekly are reporting serious shortages of paper, binders board, cloth, and other essential book manufacturing materials. Let us assure you these…

144

Abstract

Current issues of Publishers' Weekly are reporting serious shortages of paper, binders board, cloth, and other essential book manufacturing materials. Let us assure you these shortages are very real and quite severe.

Details

Reference Services Review, vol. 1 no. 4
Type: Research Article
ISSN: 0090-7324

Available. Open Access. Open Access
Book part
Publication date: 9 December 2021

Alex Stedmon and Daniel Paul

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson

Abstract

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.

This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.

Access Restricted. View access options
Article
Publication date: 1 April 1969

ANDREW Carnegie stands apart from all other library benefactors. No other man has given so much, or given so widely, in the cause of library progress. Although the United Kingdom…

67

Abstract

ANDREW Carnegie stands apart from all other library benefactors. No other man has given so much, or given so widely, in the cause of library progress. Although the United Kingdom was not the main recipient of his bounty, it received from him, personally, about £12 million, and considerable sums, in addition, from the Trust which he founded. It might well be expected, therefore, that his name would always be in our minds and that we would remember him more kindly than any other library benefactor. But it is not so.

Details

New Library World, vol. 70 no. 10
Type: Research Article
ISSN: 0307-4803

Access Restricted. View access options
Article
Publication date: 1 February 1977

G.P.M. WALKER

The ‘automated management system’ ASU‐PECHAT' is the first of its kind to be applied to the publishing industry of an entire country. The first subsystems began operation in 1975…

62

Abstract

The ‘automated management system’ ASU‐PECHAT' is the first of its kind to be applied to the publishing industry of an entire country. The first subsystems began operation in 1975. It is designed to supply information for the management of publishing, printing and the book trade throughout the USSR, with the intention of easing the tasks of a highly‐centralized administrative apparatus and of facilitating the supervision of the content of publications. Three subsystems are to handle finance, accounting and personnel records for the entire publishing‐printing‐bookselling sector, and three more will assist the internal planning of each subsector and the monitoring of its operations. They will be complemented by a further sub‐system to handle bibliographical data, and another to provide information services to staff working in the sector.

Details

Journal of Documentation, vol. 33 no. 2
Type: Research Article
ISSN: 0022-0418

Access Restricted. View access options
Article
Publication date: 1 March 1965

March TUE.23 — FRI.26. Junior introductory course to special library and information work.

11

Abstract

March TUE.23 — FRI.26. Junior introductory course to special library and information work.

Details

Aslib Proceedings, vol. 17 no. 3
Type: Research Article
ISSN: 0001-253X

Access Restricted. View access options
Article
Publication date: 1 April 1982

SUE STONE

The literature of the information needs and uses of humanities scholars in universities is reviewed, using, in the main, material published from 1970 onwards. The areas covered…

1916

Abstract

The literature of the information needs and uses of humanities scholars in universities is reviewed, using, in the main, material published from 1970 onwards. The areas covered include definitions of humanities, the way humanities scholars work and the materials of their research; secondary services; computers and new technology; the role of libraries and library services and comparisons between humanities and other disciplines. The review ends with a brief assessment of the state of the art; an outline of some unanswered questions and some consideration of the future of humanities. The main conclusions drawn are that the literature is piecemeal, at times confusing, and that progress in providing guidelines to librarians on the basis of systematic enquiry is slow.

Details

Journal of Documentation, vol. 38 no. 4
Type: Research Article
ISSN: 0022-0418

Access Restricted. View access options
Article
Publication date: 1 February 1975

G.P.M. Walker

Western users of information from and about the area: types and characteristics. Sources of published information in the area: organisation and control of publishing activity…

39

Abstract

Western users of information from and about the area: types and characteristics. Sources of published information in the area: organisation and control of publishing activity, volume and peculiarities of published output. Unpublished and semi‐published information. ‘Uncontrolled’ sources of information. Access to information: the indigenous tools for access and the Western‐based information‐processing efforts which index, abstract, translate and interpret. Problems of access to special types of information: political and economic, technical and scientific, commercial and academic. Acquisition and handling of information from the area by Western libraries and information services: distribution and adequacy of provision.

Details

Aslib Proceedings, vol. 27 no. 2
Type: Research Article
ISSN: 0001-253X

Access Restricted. View access options
Article
Publication date: 1 February 1979

In April 1978 an Anglo‐Soviet Conference on Library Co‐operation was held in York. An account of the conference appeared in Interlending Review, 1978, 6 (3), 100–102. The agreed…

25

Abstract

In April 1978 an Anglo‐Soviet Conference on Library Co‐operation was held in York. An account of the conference appeared in Interlending Review, 1978, 6 (3), 100–102. The agreed statement arising from the conference appears below. The papers given at the conference are issued in microfiche as a supplement to this issue of Interlending Review. Copies of the papers may also be obtained from the Lending Division as part of the normal loan/photocopy service. A list of participants is given at the end.

Details

Interlending Review, vol. 7 no. 2
Type: Research Article
ISSN: 0140-2773

Access Restricted. View access options
Article
Publication date: 1 April 1973

Frances Neel Cheney

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Tenn. 37203. Mrs. Cheney does not sell the books listed here. They are…

69

Abstract

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Tenn. 37203. Mrs. Cheney does not sell the books listed here. They are available through normal trade sources. Mrs. Cheney, being a member of the editorial board of Pierian Press, will not review Pierian Press reference books in this column. Descriptions of Pierian Press reference books will be included elsewhere in this publication.

Details

Reference Services Review, vol. 1 no. 4
Type: Research Article
ISSN: 0090-7324

Access Restricted. View access options
Article
Publication date: 26 April 2011

Paul Salmon, Neville Stanton, Dan Jenkins and Guy Walker

Coordination between military and civilian agencies has previously been found to be a significant issue that affects the efficiency of multi‐agency system responses to large‐scale…

6043

Abstract

Purpose

Coordination between military and civilian agencies has previously been found to be a significant issue that affects the efficiency of multi‐agency system responses to large‐scale emergencies. The purpose of this article is to present the findings derived from a case study focussing on the problems that abound when the military attempts to work with civilian organisations.

Design/methodology/approach

An integrated framework of human factors methods was used to analyse a Military Aid to the Civilian Authorities training exercise, involving the army and seven other responding agencies.

Findings

A range of factors that hinder coordination between agencies during multi‐agency emergency responses were identified. Potential solutions for removing these barriers and augmenting coordination levels are proposed.

Practical implications

This research suggests that much further work is required in training and designing multi‐agency response systems and procedures in order to optimise coordination between responding agencies.

Originality/value

This article presents the first attempt to apply structured, theoretically underpinned human factors methods, to understand the problems that abound when the military works with civilian agencies during large‐scale emergency responses.

Details

Disaster Prevention and Management: An International Journal, vol. 20 no. 2
Type: Research Article
ISSN: 0965-3562

Keywords

1 – 10 of over 25000
Per page
102050