Information Structure

Preview:

DESCRIPTION

Information Structure. Knowledge Theory . The boundary between what can be mechanized and what must forever remain a human judgment or value decision is limited to the facts that language can convey. Knowledge Management. Tacit & Explicit. Trust and Authenticity. - PowerPoint PPT Presentation

Citation preview

Information Structure

Knowledge Theory

• The boundary between what can be mechanized and what must forever remain a human judgment or value decision is limited to the facts that language can convey.

Knowledge Management

• Tacit & Explicit

Trust and Authenticity• Trust is of fundamental importance in digital document

management for:– scholarly work, – business transactions that include legal and legislative records, – the supporting “paperwork” needed to satisfy regulatory

requirements, – military and other government information,– and perhaps even private medical records.

• The World Wide Web is not reliable for important facts; they should be obtained or confirmed through other channels.

• For applications such as those involving contracts, it is prudent to be skeptical about e-mail from unverified sources or not signed and sealed for source verification.

Strategies for Defining Authenticity

• Originality strategy, such tactic is to focus on the intrinsic properties of an informational entity by providing criteria for whether each property is present in its proper, original form.

• Focus on the process by which an entity is saved, relying on its provenance or history of custodianship to warrant that the entity has not been modified, replaced, or corrupted and must therefore be original.

• Registration of unique document identifiers • The inclusion of metadata within well-defined metadata

structures. • Hashing and digital time stamping are 'public' methods

which authenticate the existence of a document • Establishing authenticity includes encapsulation

techniques and encryption strategies. A digital watermark can only be detected by appropriate software, and is primarily used for protection against unauthorised copying. Digital signatures are used to record authorship and people who have played a role in a document.

Recommended