Updated March 30, 2004
The following titles await reviewers for the Journal of the American Society
for Information Science and Technology. If you are interested in reviewing one
of the titles, contact
A typical review is three to six typewritten pages in length.
"Reviews in JASIS are part of the scholarly record of our discipline. They are intended to be one expert's careful analysis and comment on the contributions of other information scientists to our common literature." Donald O. Case, "Book Reviewing", JASIS v. 46 (5), June 1995, p326
Activity-Centered
Design: An Ecological Approach to Designing Smart Tools and Usable Systems
Geri gay and Helene Hembrooke. The MIT Press, 2004
“The
shift in the practice of human-computer interaction design from user-centered
to context-based design marks a significant change in focus…argue that it is
time to develop new models for HCI design that support not only research and
development but also investigations into the context and motivation of user
behavior.”
Automated
Web Site Evaluation: Researchers’ and Practitioners’ Perspectives
Melody Y. Ivory. Kluwer, 2003
“For
researchers, we provide an overview of the approaches that have been explored
for automated web site evaluation and their effectiveness; we also highlight
open research problems. For
practitioners, we provide an overview of the tools that have been developed for
automated web site evaluation and their effectiveness.”
Design
Research: Methods and Perspectives
Edited by Brenda Laurel. The MIT Press, 2003
“Often neglected in the various curricula of design schools, the new models of design research described in this book help designers to investigate people, form, and process in ways that can make their work more potent and more delightful…introduce designers to the many research tools that can be used to inform design as well as to ideas about how and when to deploy them effectively.”
The Digital Subline: Myth, Power, and Cyberspace
Vincent Mosco. The MIT Press, 2004
“…goes beyond the usual stories of technological breakthrough and economic meltdown to explore the myths constructed around the new digital technology and why we feel compelled to believe in them…Myths are not just falsehoods that can be disproved…but stories that lift us out of the banality of everyday life into the possibility of the sublime.”
Foundations of Soft Case-based Reasoning
Sankar K. Pal & Simon C.K.Shiu. Wiley-Interscience, 2004
“Case-based reasoning is one such application area where soft computing methodologies have had a significant impact during the past decade. CBR may be defined as a model of reasonng that incorporates problem solving, understanding, and learning and integrates all of them with memory processes.”
How Images Think
Ron Burnett. The MIT Press, 2004
“…explores this new ecology, which has transformed the relationships humans have with the image-based technologies they have created. So much intelligence has been programmed into these image-dependent technologies that it often seems as if images are ‘thinking’…marks a turning poinit inn our understanding of the connections between humans and machines.”
Humanizing Information Technology
Julian Warner. Scarecrow Press, 2004
“…a dialogue between a stress on the autonomy of information and the determining power of economic base….A contrasting perspective, associated, although not exclusively, with Marx, would regard existence as producing consciousness, including information and theoretical knowledge. In view of the significance of the contrasting perspective, and of the wide currency of the information society concept, it is surprising that there have not been more deliberate attempts at this dialogue.”
Knowledge Management Lessons Learned: What Works and What Doesn’t
Edited by Michael E.D. Koenig and T.K. Srikantaiah. Information Today, 2004
“Through the experiences and analyses of more than 30 experts, the book demonstrates KM in practice, revealing what has been learned, what works and what doesn’t. Practitioners describe projects undertaken by organizations at the forefront of KM, and top researchers and analysts discuss KM strategy and implementation, cost analysis, education and training, content management, communities of practice, competitive intelligence, and more.”
Legitimate Applications of Peer-to-Peer Networks
Dinesh C. Verma. Wiley-Interscience, 2004
“…describe some of the applications that can exploit the unique features of
peer-to-peer networks and to discuss why developing these applications on a
peer-to-peer network is better than developing them in the traditional manner.”
Measuring for Results: The Dimensions of Public Library Effectiveness
Joseph R. Matthews. Libraries Unlimited, 2004
“…it is now becoming apparent that public libraries must be able to demonstrate, using an acceptable methodology, the economic value of the library and its services to individuals, businesses, and the surrounding local community”
Protocol: How Control Exists after Decentralization
Alexander R. Galloway. MIT Press, 2004
“…argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconnections) possible. He does this by treating the computer as a textual medium that is based on a technological language, code. Code, he argues, can be subject to the same kind of cultural and literary analysis as any natural language; computer languages have their own syntax, grammar, communities, and cultures.”
Putting XML to Work in the Library: Tools for Improving Access and Management
Dick R. Miller and Kevin S. Clarke. American Library Association, 2004
“…we will endeavor in this book to stir interest in XML and the role it can play in bringing products of the imagination closer to reality in libraries. The topics covered range from those of interest to beginners to some that are cutting edge…XML holds the promise that with broader use, libraries will one day be poised to offer much more than the sum of their individual efforts.”
Spectrum Auctions and Competition in Telecommunications
Gerhard Illing and Ulrich Kluh, editors. The MIT Press, 2003
“In 2000 and 2001, several European countries carried out auctions for third generation technologies or universal mobile telephone services communication licenses…Because of their spectacular but often puzzling outcomes, these spectrum auctions attracted enormous attention and invited new research on the interplay of auctions, industry dynamics and regulation.
Understanding Information Systems: What They Do and Why We Need Them
Lee Ratzan. American Library Association, 2004.
“…differs from others in that it offers an innovtive approach to information studies not oriented to any specific application, time, or technology…addresses both theoretical and practical issues and is complete with exercises, examples, definitions, and charts that help clarify concepts tomake your information system a success”
Using Open Source Systems for Digital Libraries
Art Rhyno. Libraries Unlimited, 2004
“Introducing the concept of the digital library, Rhyno details the open source tools that are instrumental in developing many of the digital libraries in today’s institutions, both from an introductory technical perspective and from the vantage point of the emerging community of users that is erecting the digital library.”
Web Site Design with the Patron in Mind: A Step-by-Step Guide for Libraries.
Susanna Davidsen and Everyl Yankee. American Library Association, 2004
“In this book, we’ll teach you how to design a site for your users…The methodology presented in this book provides step-by-step guidance on how to gather key information, distill it, and use it to build a practical, useful site for your patrons.”