18
Information Structure

Information Structure

  • Upload
    ulric

  • View
    38

  • Download
    0

Embed Size (px)

DESCRIPTION

Information Structure. Knowledge Theory . The boundary between what can be mechanized and what must forever remain a human judgment or value decision is limited to the facts that language can convey. Knowledge Management. Tacit & Explicit. Trust and Authenticity. - PowerPoint PPT Presentation

Citation preview

Page 1: Information Structure

Information Structure

Page 2: Information Structure

Knowledge Theory

• The boundary between what can be mechanized and what must forever remain a human judgment or value decision is limited to the facts that language can convey.

Page 3: Information Structure
Page 4: Information Structure
Page 5: Information Structure
Page 6: Information Structure

Knowledge Management

• Tacit & Explicit

Page 7: Information Structure

Trust and Authenticity• Trust is of fundamental importance in digital document

management for:– scholarly work, – business transactions that include legal and legislative records, – the supporting “paperwork” needed to satisfy regulatory

requirements, – military and other government information,– and perhaps even private medical records.

Page 8: Information Structure

• The World Wide Web is not reliable for important facts; they should be obtained or confirmed through other channels.

• For applications such as those involving contracts, it is prudent to be skeptical about e-mail from unverified sources or not signed and sealed for source verification.

Page 9: Information Structure
Page 10: Information Structure
Page 11: Information Structure

Strategies for Defining Authenticity

• Originality strategy, such tactic is to focus on the intrinsic properties of an informational entity by providing criteria for whether each property is present in its proper, original form.

• Focus on the process by which an entity is saved, relying on its provenance or history of custodianship to warrant that the entity has not been modified, replaced, or corrupted and must therefore be original.

Page 12: Information Structure

• Registration of unique document identifiers • The inclusion of metadata within well-defined metadata

structures. • Hashing and digital time stamping are 'public' methods

which authenticate the existence of a document • Establishing authenticity includes encapsulation

techniques and encryption strategies. A digital watermark can only be detected by appropriate software, and is primarily used for protection against unauthorised copying. Digital signatures are used to record authorship and people who have played a role in a document.

Page 13: Information Structure
Page 14: Information Structure
Page 15: Information Structure
Page 16: Information Structure
Page 17: Information Structure
Page 18: Information Structure