The central thesis of this book is that access to information represents a vital aspect of contemporary society, encompassing participation, accountability, governance, transparency, the production of products, and the delivery of services. This view is widely shared, with commentators and scholars agreeing that access to information is a key factor in maintaining societal and economic stability. However, having access to information does not guarantee its accessibility. Assuming that information is (cognitively) interpretable is incorrect, as many practical examples illustrate. In the first chapter, this book offers insights into the challenge of access to information in a digitalized world. The concepts of access and accessibility are addressed, elucidating their meanings and delineating the ways in which they are influenced by the exponential growth of information. It examines how information technology introduces a novel access paradox. The second chapter examines the challenges to access to and accessibility of information in a digitalized, hybrid world where code may be law, where there is an inescapable loss of privacy, where doing business opens and restricts access, where literacy is a necessity to survive ‘digital divides,’ and where environmental concerns may have an adverse effect on high expectations. The third chapter presents a review of theoretical approaches to access and accessibility from seven different research perspectives: information access disparity, information seeking, information retrieval, information quality, information security, information management, and archives management. Six approaches to information access and accessibility are identified: [1] social, economic, and political participation; [2] ‘smart’ and evolving technology; [3] power and control; [4] sense-making; [5] knowledge representations, and [6] information survival. The fourth chapter addresses the bottlenecks and requirements for information access and accessibility, culminating in a checklist for organizations to assess these requirements within their own business processes. In the fifth chapter, some perspectives on artificial intelligence and the future of information access are presented. The sixth chapter represents an attempt to draw conclusions and to bring this book to a close.
The purpose of this article is to expand on a previous study on the development of a scoring rubric for information literacy1. The present paper examines how students at the Department of Information Services and Information Management, The Hague University, use the scoring rubric for their school work and/or in their regular jobs and social life. The research presented here focuses on a group of adult students who follow a part time evening variant of the Bachelor curriculum. The methods employed in this study consisted of an online survey to select students who had used the scoring rubric at least once after the workshop in which it was introduced. Following on from this, a focus group with respondents who had answered positively to the invitation at the end of the survey was organised and chaired by a neutral moderator. Samples that could be used in this research were very small. The findings may therefore not be generalized to all other groups of students. However, the results appear to be of relevance to the IL community. The students who participated in the focus group reported that they used it for self-assessment throughout the course, in subsequent courses, and to become more critical of their own writings and those of other people. The research also makes clear that adult students appreciate the feedback generated by completing the scoring rubric form but that this is not a substitute for the face-to-face feedback they receive from their teachers. [Dit is de auteursversie waarvoor Elsevier toestemming heeft gegeven.]
IT organizations and CEO‟s are, and should be, concerned these days about the (lack of) data confidentiality and the usage of „shadow‟ IT systems by employees. Not only does the company risk monetary loss or public embarrassment, the senior management might also risk personal fines or even imprisonment. Several trends reinforce the attention for these subjects, including the fact that an increasing number of people perform parts of their work tasks from home (RSA, 2007) and the increasing bandwidth available to internet users which makes them rely on the Internet for satisfying their business and personal computing needs (Desisto et al. 2008). Employee compliance with the existing IT security policies is therefore essential. This paper presents a study on factors that influence non-compliance behavior of employees in organizations. The factors found in literature are tested in a survey study amongst employees of a big-four accountancy firm in the Netherlands and Belgium. The study concludes that stricter IT governance and cultural aspects are the most important factors influencing non-compliance behavior.