NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Bearman, David; Trant, Jennifer – D-Lib Magazine, 1998
Discusses asserting and assessing authenticity of digital information sources and why authenticity is an issue now. Describes three types of technical and social strategies (public, secret, and functionally dependent) for asserting authenticity. Cites examples of requirements for authenticity from the various stages in the research process. (AEF)
Descriptors: Evaluation Criteria, Evaluation Methods, Information Processing, Information Sources
Dolin, R.; Agrawal, D.; Pearlman, J.; El Abbadi, A. – D-Lib Magazine, 1998
Describes Pharos, a prototype that automatically classifies and summarizes Internet newsgroups using the Library of Congress Classification (LCC) scheme. Topics addressed include the methodology of collection summarization and selection, constructing an online LCC outline, evaluation, limitations of the system, and classification of nontextual…
Descriptors: Automation, Classification, Content Analysis, Information Processing