1 / 18

Information Structure

Information Structure. Knowledge Theory . The boundary between what can be mechanized and what must forever remain a human judgment or value decision is limited to the facts that language can convey. Knowledge Management. Tacit & Explicit. Trust and Authenticity.

ulric
Download Presentation

Information Structure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Structure

  2. Knowledge Theory • The boundary between what can be mechanized and what must forever remain a human judgment or value decision is limited to the facts that language can convey.

  3. Knowledge Management • Tacit & Explicit

  4. Trust and Authenticity • Trust is of fundamental importance in digital document management for: • scholarly work, • business transactions that include legal and legislative records, • the supporting “paperwork” needed to satisfy regulatory requirements, • military and other government information, • and perhaps even private medical records.

  5. The World Wide Web is not reliable for important facts; they should be obtained or confirmed through other channels. • For applications such as those involving contracts, it is prudent to be skeptical about e-mail from unverified sources or not signed and sealed for source verification.

  6. Strategies for Defining Authenticity • Originalitystrategy, such tactic is to focus on the intrinsic properties of an informational entity by providing criteria for whether each property is present in its proper, original form. • Focus on the process by which an entity is saved, relying on its provenance or history of custodianship to warrant that the entity has not been modified, replaced, or corrupted and must therefore be original. 

  7. Registration of unique document identifiers • The inclusion of metadata within well-defined metadata structures. • Hashing and digital time stamping are 'public' methods which authenticate the existence of a document • Establishing authenticity includes encapsulation techniques and encryption strategies. A digital watermark can only be detected by appropriate software, and is primarily used for protection against unauthorised copying. Digital signatures are used to record authorship and people who have played a role in a document.

More Related