Exploring Barriers to the Free Flow ofInformation

A Question of Accessibility:
Exploring Barriers to the Free Flow of Information
資訊取得性的問題:
探討資訊自由流通的障礙
Jennine Knight
Li brarian , Main Li brary,
The University of the West Indies , Cave Hill Campus , Barbados , U.S.A.
Email: jennine.knight@cavehil l. uw i. edu
Cheryl King
Special Collections Li brarian , Main Li brary,
The University of the West Indies , Cave Hill Campus , Barbados , U.S.A.
Email: chery l. king@cavehil l. uw i. edu
Keywords (關鍵詞) : Information Access (資訊取得) ; Free Flow of Information (資訊自由
流通) ; Information Deprivation (資訊剝奪) ; Technology (科授)
【摘要】
<Abstract >
In the 。巾, the concept of freedom of access
to information is ideal , particularly since democracy warrants the free flow of information.
However, in practice this seldom occurs ,
especially among various classes and groups ,
and across several geographical boundaries.
There are many factors and obstacles which
理論上,資訊自由取得的概愈是理想的,尤
其因為民主制度正保證了資訊自由流通。然而
這樣的情彤在實務上卻很少發生,尤其少見於
不同的階層與群體間,及不同的地域間。障礙
或阻礙賀訊流通的因素繁多,本文探討了一些
自由流動資訊的主要障礙,並提出使用科技來
減輕或消除這些障礙的方法。
hinder or prohibit the flow of information.
This paper explores some of the main
barri幽
ers to the free flow of information and identi-
Introduction
The major barriers which affect the flow of informa-
ties ways in which they may be alleviated or
tion may be divided into three categories - personal,
removed through the use of technologies.
economic , and legal.
Personal barriers are those
in-built obstacles that are unique to an individual (Tedd,
圖書館學與資訊科學 36
(2) : 93 - 101 (民九十九年十月)
93
Llwyd, Simon & Lithgow, 2009). Barriers of this type
tion carriers to people and societies propels the discus-
stem from socialisation or experiences, and determine
sion of barriers to information.
how an individual functions within a society.
Exam-
pies of these barriers inelude information illiteracy,
computer illiteracy, physical or mental disabilities,
geographical boundaries , language differences , time ,
Levels ofBarriers to Information
Flow
Tedd et a l. (2009) identify two levels of the main
education, social status and political affiliations.
barriers to information flow, namely, at the point of
Economic barriers relate to the cost of accessing in-
production and at the point of use or access
formation for the individual, while legal barriers are
The former refers mainly to output, time and institu-
those imposed by the state's legal machinery and in-
tional barriers , while the latter refers to information
elude , for instance , laws against libel, sedition, slander,
handling skills of users, personal or psychological ,
baπiers.
geographical, ability or disability, cost, technological
and 悅ason.
As it relates to output, users
and linguistic barriers.
Tedd et al. (2009) assert that there is the right not
only to receive information but also the right to impart
information without restriction (p. 2).
This concept
underpins several legislations , namely, the Universal
Declaration of Human Rights (Art icle 19), the Euro-
seek to optimise a sub-set of information that meets
their needs.
However, they are sometimes greeted
with so much information that it becomes impossible
for it to be effectively used by them - the result of
i月[ormation overload.
pean Convention ofHuman Rights (Article 10 (1)), the
International Covenant of Civil and Political Rights
With the overwhelming quantities of information,
(Art icle 19) and the Declaration of Freedom and In-
users often have a limited time in which it may be
formation adopted by the Council of Europe Commit-
consumed.
tee of Ministers on 29 April 1982 (p. 6).
maximise time , users must sieve through vast quanti-
Freedom is
understood as the condition of being free or unrestricted.
However, with respect to information flow ,
there is no such thing as
unres甘icted
mation irrespective of the society.
access to infor-
Furthermore , even
in democratic societies , legislations may dictate access
Katz (1988) offers that information flow is
“the
amount of information flowing through formal (measch位mels"
producers,
tion" (p. 3).
“the
flow of information between the
distributo悶,
must exercise their power of choice.
They
Choices are
administered by both the senders and receivers of information as to the quantity and
disclosed or retained
(也is
quality 也at
should be
stems the dispute of the
mat of delivery and receipt of information (the debate
is usually print versus electronic), and whether the
information should be available for 企ee or a fee.
(p.
131), whereas Tedd et al. (2009) suggest a more precise meaning:
ties of information and set priorities for usage.
To
‘ right to know' versus 'the right to privacy'), the for-
to information, thereby regulating this access.
urable) and informal (non-measurable)
This introduces the barrier of time.
and assimilators of informa-
Thus , information is transmitted between
Technology seeks to overcome at the point of pro-
duction and at the point of use or access barriers by
implementing devices whereby users can store and
peruse information at their convenience.
Websites
carriers.
can be bookmarked, the Uniform Resource Locator
The latter includes , inter alia, books , magazines ,
(URL) may be deposited on storage devices or the
the sender and receiver through
i,月[ormation
newspapers, radio , television, films , telephone and
information may be printed.
Internet hosts. Varying accessibility of these informa-
information required may be facilitated by CD , DVD
Quicker access to the
ROMs , and other electronic devices which allow users
94
Journal of Li brary and Information Science 36 (2) : 93 -101 (October, 2010)
Nonetheless, the
Two groups of persons who may be considered
information contained in these sources lacks currency,
among the mobility impaired are those confined to
and are subjected to the durability of the source.
wheelchairs and those with no hand usage.
to cue from one link to another.
In
The for-
addition, these technologies command access to a
mer group of persons usually experience difficulty in
computer, printer, DVD and CD player, and instruc-
gaining
tions in their use.
Furthermore , there is the additional setback of being
en虹y
into facilities to access information.
able to manoeuvre even after gaining successful entry.
Personal Barriers
Persons with no hand usage are limited in using stan-
Personal barriers may be as a result of illiteracy,
dard computer input and output devices.
unawareness, the inability to articulate coherently,
shyness in approaching information professionals , the
perception that the required information is non-existent,
or poor comprehension of the information received.
Hence, even though society is rife with information
and information resources, an unequal awareness
among users of the nature and location of available
information may be an impediment to access.
These
conditions speak also to the information literacy skills
of the researcher.
According to the definition by the
Association of College and Research Libraries
(ACRL) , a division of the Am erican Library Association (ALA) in the United States of America (US), to be
information literate, a person must be able to "recognise when information is needed and have the ability to
locate, evaluate, and use effectively the needed information" (2000).
Information illiteracy may result
Technology has assisted in facilitating the flow of
information to disabled groups.
For instance, infor-
mation is accessible through the use of Braille, talking
newspapers and special photocopiers which ‘read' the
text for the blind and partially sighted.
Moreover,
with environmental adjustments and the appropriate
Adaptive of Assistive Technology the flow of information can be perpetuated.
Adaptive or Assistive Tech-
nology is computer software and hardware that has
been modified to be accessible by persons with disabilities. Some of the hardware and software used,
include speech recognition, memory aiding, touch
screen and eye-tracking devices , joysticks, trackballs ,
big visual cursors and large keyboards.
Organisations
such as Apple and Ability Hub focus on providing and
locating the tools which are necessary for special needs
groups to access information. Other organisations such
from information deprivation among some groups.
as the Information Access Laboratory in the US , assist
An ability or disability barrier is another factor that
students with disabilities in their educational pursuits
may either debar or curtail the flow of information to
through the development of innovative technologies
an individual.
(Information Access Laboratory, 1998).
Cunningham and Coombs (1997) de-
fine disability as “a physical or mental impairment that
substantially limits one or more of the major life activities of such an individual , a record of such an impairment or being regarded as having such an impairment" (p. 2).
i旬.,
Disabilities may include vision, mobil-
hearing and speech impairments , learning disabili-
ties, and 仕aumatic brain
i吋 uries.
In their effort to comply with the standards of the
Accessibility for Ontarians with Disabilities Act
(AODA) , 2005 , libraries in Ontario , Canada endeavour
to become:
more accessible to everyone by ensuring that users
Vision impairments
can enter the library facility and successfully navigate
are categorised into various forms , and these usually
within it; communicate effectively with staff who are
hinder the individual's ability to read printed materials,
trained to respond to specific requests for accommoda-
computer screens and keyboards.
tion; access print and electronic resources using a variety of assistive devices; and fully participate in events
圖書館學與資訊科學 36
(2) : 93 - 101
(民九十九年十月)
的
and other activities held in the library (Chittenden &
Dermody, 20 1O).
Feather (1 988) notes that “online databases starkly illuminated the financial dimension ofthe market-place"
The Act establishes accessibility standards to effect
the achievement of equal and equitable access and use
of resources, including those in libraries , to all Ontari-
(p. 71). He also informs that there was a demand but
the potential customers had insufficient resources to
purchase the product.
Therefo 時,
the CD-ROM was
developed, thus bringing supply and demand into bal-
ans.
ance within the financial limitations of the customers.
Economic Barriers
In his updated work, Fωther (2008) emphasises:
Cost is another major factor which appears at both
levels of the barriers to information.
sents the view that cost should not
The ALA pre-
in企inge
on or inter-
The hardware needed for access to CD-ROM is
comparatively inexpensive, and is both cheap and easy
to maintain compared with the high capital and run-
fere with the provision or delivery of information and
ning costs of online access.
resources for any users of a publicly supported library.
of removing the telecommunications element from the
In the document Economic Barriers to Information
information technology equation.
Access: An
Inte.ψretation
of the Library Bill ofRights
CD-ROM has the effect
Th is is of the ut-
most importance in developing countries , where the
which was adopted by the ALA Council on June 30,
telecommunication
1993 , the association states:
the technology for transmitting digitised data often
Library services that involve the provision of infor-
in仕'astructure
is often weak, and
does not exist (pp. 120-121).
mation, regardless of format, technology, or method of
Cost deters some information poor countries from
delivery, should be made available to all library users
investing in Integrated Communications Technology
on an equal and equitable basis.
(l CT).
Charging fees for the
use of library collections , services, programs , or facilities that were purchased with public funds raises barriers to access.
Such fees effectively abridge or deny
access for some members of the community because
吐ley
reinforce distinctions among users on their ability
As posited by Tedd et al. (2009), the investment in
ICT is a crucial factor in establishing and retaining a
competitive edge in macro-economic terms.
These
writers mention numerous inequalities of information
access, which can result in information imperialism -
and willingness to pay
data flowing in abundance between Western Countries
Moreover, cost is a determinant for both the indi-
but a lack of collaboration
wi也 the
Third World.
vidual and institution in their purchasing habits of tra-
Therefore, the flow of information is either denied or
ditional and contemporary sources of information as
clouded.
well as specific information technologies. This factor is
ers as a way of overriding the cost factor.
also extended to the country as a whole.
Users can manipulate the information carriFor in-
The indi-
stance , the consumer book market has a clear
vidual and the institution may opt for a print-based
socio-economic bias towards the wealthier and better
source over, for example, an online source.
educated members of a society.
With the
However, television
online source, there is the cost for access to the infor-
and radio may transcend those boundaries.
mation in addition to the cost of the telecommunica-
tially, broadcast information is easier to absorb and
tions.
Furthermore, the exorbitant fees of electronic
sources permit access on subscription basis.
Essen-
cheaper to receive than printed information. The cost
of technology has been significantly reduced, thereby
facilitating the access to a wider source of electronic
information.
96
Journalof Li braryandlnformationScience 36 (2) :93-101 (October, 2010)
Geographical Barriers
tion to a good balance of telecommunication and tech-
Geographical obstacles to infonnation occur as a
consequence of the residence of the individual and the
inaccessibility to
infonnation providers.
The advent of electronic libraries has helped to
These limitations can be classified as local (urban ver-
eliminate some geographical barriers. Access to bibli-
sus rural areas) , regional (states or countries in close
ographies , indexes, various publications and even da-
proximity), and international (developed countries
tabases is facilitated
versus developing
various
nological resources is needed if technology can assist
in removing geographical barriers to infonnation.
coun出es).
The latter is often re-
by 也is
means. Moreover, with the
introduction of electronic publishing, the inconven-
ferred to as the information rich and information poor.
ience
The information rich are those persons with access to
poor places, however, users still have to travel to a
abundant resources of infonnation and the ability to
library or some other facility where computers are
retrieve and utilise the infonnation obtained.
available for use in order to access needed infonnation.
i月(ormation
The
poor are 伽 complete opposite.
The level of education of a group, the type of resources , technological and telecommunications infrastructures detennine the categorisation of information
rich and information poor. This is highlighted in the
1995 work by Haywood
In.舟-Rich, In.舟-Poor:
Access
and Exchange in the Global Information Society. This
author posits that an information divide results “ where
access to higher education is symptomatic of access to
interesting infonnation-based work opportunities, and
the pursuit of rich and abundant life choices , while
exclusion 企om
of 個.velling
to libraries is diminished. In many
Language Barriers
“ The most prevalent and specific intellectual barrier
is a linguistic one" (Tedd et aI., p. 11). This is a limitation to the recipient of the infonnation
b的ause
of the
inability to understand the written or spoken message.
An individual greeted with a linguistic or language
barrier may
become
企ustrated
and relinquish the
source or seek an alternative source instead of attempting to find
a 仕'anslation
of the document or a
仕anslator.
higher education generally reduces
A study conducted by Fisher et al. (2004) reveal that
access to infonnation rich environments . . ." (pp.
migrant Mexican workers faced serious challenges in
22-23).
locating and assimilating infonnation which was nec-
Tools such as the computer, telephone and radio are
extremely useful to the flow of infonnation.
Through
the use of computer technologies, access is granted to
the bulk of infonnation stored
elec仕onically,
where
updating , revision, and correction of infonnation can
be a continuous process. Internet technologies afford
infonnation to be transmitted so that delivery is virtually instantaneous. Furthennore , users can exploit the
services of electronic mail and instant chat.
It is im-
portant to note though that the value of the Internet as a
essary for active participation in their daily existence.
This was so because most of the documents which they
needed to access were written in English and their
native language was Spanish.
The writers also dis-
covered that many of the older immigrants relied on
their children to interpret and conduct their everyday
transactions for them.
Technology has made progress in alleviating the
language barrier which has been affecting migrant
workers.
According to Fisher et al. (2004)
“. . .
good resource to accessing infonnation is often com-
availability of cutting edge technology and training is
promised by the lack of proper telecommunication
positively affecting the lives of the people in these
services to remote areas. The consensus seems to be
communities by giving them the
that education among the service population, in addi-
crease their literacy levels , technology and job skills in
圖書館學與資訊科學 36 (2) :
93 - 101
oppo討班lity
(民九十九年十月)
to in-
97
addition to creating a sense of community." Today,
saying “ if the information obtained by the police, the
search engines such as Google and Altavista offer fur-
Inland Revenue , the social-security service, and other
ther assistance through the facilitation of translation
agencies were to be gathered together on one file , the
features as part oftheir service to Internet users.
freedom of the individual would be gravely at risk" (p.
Zhang's discourse International Students and U. S.
Academic Libraries Revisited identifies three
116).
m句 or
The computer, because it can link and match scraps
information 企om
challenges which international students experience
of
when trying to access information from US academic
tential to be used as an instrument in the sullying of an
various data sources has the po-
According to that writer, language , com-
individual's integrity. Robertson (1993) notes that this
munication and technology barriers prevent these stu-
ability to store personal data in various locations on the
dents 企om
computer is actually ‘ to build up an incomplete jigsaw
libraries.
effective use of library services.
Brown
(2000) , Kumar and Suresh (2000) and Wang and Frank
(2002) are also commentators on the subject ofbarriers
to information access which are experienced by inter-
of the individual on record" (p. 117).
Legal Barriers
Legislation is required to protect the individual's
national students in US academic libraries.
personal data.
Institutional Barriers
The United Kingdom (UK) Data Pro-
tection Act, 1998 , speaks to prohibiting the abuse of
Institutional barriers are limitations to information
personal data.
A news item on November 14, 2010
access designed by individual organisations and the
headlines “ Google ‘breached data protection act' in
As it relates to individual organisations ,
UK." According to Christopher Graham, Britain's In-
range 企om
formation Commissioner, Google “ broke the law when
government.
barriers to information may
the refusal to
invest in ICT to curtailing the flow of information on
Street View cars collected personal data from unse-
the grounds of commercial confidentiality.
cured wi-fi networks." The Internet giant was
In the
latter instance, only a selected few, mainly senior
ac心used
of “ deliberately collecting millions of passwords, web-
members of staff or certain departments are privy to
sites (URLs) and emails for commercial gain." Google
‘ sensitive'
The government sometimes
had recently launched a Street Vi ew mapping cars in
utilises legislations to withhold information ‘ for the
Ireland. The Internet service provider was not penal-
public good' and ‘ for the public health'.
ised after pledging not to repeat the violation (Break-
information.
The objec-
tive, in these instances, is to protect the individual ,
society, and the state.
ingnews .ie. , 2010).
Copyright; Intellectual Property; and Defamation
In Britain, according to Robertson (1 993),“the av-
acts are other forms of legislations in the UK and US
erage adult has private information about himself or
which are designed to protect the individual. However,
herself on over two hundred
sep訂ate
files and by 1982
the enforcement of these laws may be confined to a
For instance, in November 2003
Government departments alone boasted 220 different
specified territory.
computerised data banks" (p. 116). The individual's
when damaging information on Prince Charles was
personal record is scattered among “ school and NHS
circulated, the local media, through an
records , tax and VAT returns , insurance, mortgage and
the British High Court was prevented from disclosing
credit ratings , social-security files , motor-vehicle li-
the details of the allegations.
ce凹的,
Further,
was not afforded this protection on the Internet.
Browne-Wilkinson as
Through a link to an Italian Press, the information was
police records and the like" (p. 116).
Robertson
98
(1 993) 中0臨 Lord
Journal of Li brary and Information Science 36 (2) :
93 一 101
(October, 2010)
injunction 企om
However, the Prince
made available to alI web users.
Additionally,
tion. The whole world now is exploring a way to man-
Google was very effective in removing the linguistic
age the Internet and China is also working on this"
barriers for those people who did not speak or under-
(BBC. Google , 2002).
stand Italian.
in an effort to
Under the UK Official Secrets Act, which was implemented to safeguard national security, the British
government in
1987 出ed
Spycatche月 which
to prohibit the
publi臼tion
of
was authored by a former British
Intelligence Officer, Peter Wright. The UK Law of
Sedition also aims to safeguard national security, while
the Race Relations Act was implemented to protect
groups within a society. Robertson (1993) believes that
irrespective
of 也e
legislations, British society still has
automatically
search engine.
訂閱 Internet
allow 企'ee
Content Provider
access to its Chinese users
redirected 也em
This action
to its Hong Kong's
displeased 也e
Chinese
government, who insisted on being able to censor information accessed via the Internet within China.
After years of negotiations, Google in March 2010
agreed to stop the automatic redirect.
More recently, in August 2010 , two Gulf States , citing security concerns , announced bans on some functions of the Blackberry mobile phone.
Saudi Arabia
access to information which contains obscenities
prevented the use of the Blackberry. to-Blackberry
through the use of technologies. “The main battle-
instant messaging service. Additionally, the United
ground has shifted to television drama - EastEnders
Arab Emirates (UAE) intended to block such function-
and the plays of Dennis Potter and the late-night mov-
alities as sending e-mails, accessing the Internet, and
ies on Channel 4, and the imminent invasion of alien
delivering instant messages from one Blackberry
porn from outer space through the satellite dish" (p.
handset to another, in October 2010.
212).
ban was not put into effect after Blackberry's maker
Censorship res甘icts the free flow of information to a
society.
Through acts such as the UK Obscene Pub-
lications Act, 1959, or policies of individual institutions, the state and other entities are able to
the free flow of information.
obs甘uct
A case in point . the
publication, The Satanic Verses was banned under the
Blasphemy Law of several Islamic nations.
more, several publications are
banned 企om
Further-
institutions
Research
in
Motion
proved
to
However, the
the
UAE's
Telecommunications Regulatory Authority that it was
“ compliant
with its security needs" (BBC. United,
2010).
Conclusion
The role of technology in the flow of information is
seamless.
Technology can both facilitate the flow and
also create barriers to information.
Persons may have
annually through their individual collection develop-
difficulty in understanding how to use it or may be
ment polices.
unable to keep abreast of the dynamic changes as there
Th is does not only relate to books. In
July 2002 , the Saudi Arabian Govemment blocked
is a lack of standardisation.
Furthermore, this diffi-
approximately 2000 websites. Most of the blacklisted
culty can be compounded by technophobia.
sites were either deemed sexually explicit, about relig-
puter packages can still be inflexible and unsophisti-
ion, on women's history or about bathing suits (BBC.
cated.
Saudis, 2002).
so自ware
Google.com was banned in China, in September
2002.
The rationale verbalised by the Chinese for-
Com-
In addition, there may be instances whereby
changes may be incompatible with an indi-
vidual's computer.
However, software and hardware
is sold with manuals which provide instructions as to
eign ministry spokesman was: “ Obviously there is
usage.
There are also help screens and faqs to facili-
some harmful information on the internet [and] not
tate easy access to information.
everyone should have access to this harmful informa.
tings , guidance to individuals in need is provided by
圖書館學與資訊科學 36
(2) : 93 - 101
In some public set-
(民九十九年十月)
99
information professionals who
are 甘ained
in the use of
Retrieved November 15 , 2010, from
the technologies offered.
There will always be barriers to the
fre活 flow
of in-
formation. These may occur as a result of personal or
economic factors which affect an individual. Alternatively,位ley
may be imposed by the society or the
state's legal machinery for the protection of a people.
As highlighted by this paper, not all barriers are insurmountable.
Technology has played a very effec-
tive role in alleviating and removing some of the
ba叮i­
ers to allow access of information. Libraries are also
playing their part in making information more accessible to those who experience challenges occasioned by
barriers which restrict
the 企ee
flow of information.
“ Information is power." In most cases , researchers are
disadvantage when there are barriers to information
access.
‘ significant breach' of UK Data Laws. BBC News.
They are empowered when there is free flow
h句 ://www.bbc.
co.uklnews/technology-11684 952.
British Broadcasting Corporation (2002 , September 3).
Google fights Chinese ban. BBC News. Retrieved
July 21 ,
2010,企om
http://news.bbc.co.ukll /hi/
technology/2233229.stm.
(2002 , July 31).
British Broadcasting Corporation.
Saudis block 2,000 websites. BBC News. Retrieved
August 24 , 2010 , from http://news. bbc.co.ukll /hi/
tee趾lology/2153312.stm.
(2010 , August I).
British Broadcasting Corporation.
Two Gulf states to ban some Blackberry functions.
BBC News. Retrieved August 14, 2010 , from
http;/川ww.bbc.co.uk
/news/world-middle-east-I 0830485.
British Broadcasting Corporation. (2010, October 8).
United Arab Emirates will not ban Blackberries.
of information.
BBC News. Retrieved November 19 , 2010 , from
http://www.bbc.co. uklnews/ technology -11499755.
References
British Broadcasting Corporation. (2010 , August 4).
American Library Association. (1993).
barriers 的 information
access: An
the Library Bill of Rights.
Economic
Inte中retation
of
Retrieved August 21 ,
2010, from http://www.ala.orglTemplate.cfm? Sec-
Untangling the BlackB erry ban. BBC News. Retrieved
August
14,
2010 ,
from
http://www.
bbc.co.uklnews/technology-I 0866417.
Brown, C. C. (2000). Reference services to the intema-
tion= Interpretations&Template=ContentManagementl
tional adult learner: Understanding the barriers.
ContentD isplay.cfm&ContentID=8536.
erence Librarian, 33
Apple.
(n.d.). Apple 's commitment
的 accessibility.
Chittend 凹,
R耳其
(69 /7旬, 337-347.
M. & Dermody, K. (2010). Removing
Retrieved August 24 , 2010 , from http://www.apple.
barriers to access: Libraries and the Accessibility for
com/accessibility.
Ontarians with Disabilities Act.
Association of College and Research Libraries. (2000).
Felicite 月 56
(3) ,
94-96.
Information Literacy Competency Standards for
Cunningham, C. & Coombs , N. (1 997). Information
2010 ,企om
access and adaptive technology. Phoenix, Arizona:
Higher Education. Retrieved August 27 ,
http://www.ala.org/al a/mgrps/divs/acrVstandards/inf
ormationliteracycompetency.cfm.
Breakingnews .ie.
‘breached
(2010, November
American Council on Education and Oryx Press.
Feather, J. (1 998). The Information society: A
15).
Data Protection Act' in UK.
Google
Re甘ieved
November 15 , 2010, from http://www.breakingnews.
continuity and change. (2nd ed.) London: Library
Association Publishing.
Feather, J. (2008). The Information
ie/world!google/breached-data-protection-act-in-uk-
continuity and change.
480290.html. See also British Broadcasting Corpo-
lishing.
ration (BB C).
100
(2010, November 3). Google in ‘ sig-
S的砂 of
(5 吐1
Socie妒 A Stu砂 of
ed.) London: Facet Pub-
Feather, J. & Sturges , P. (1 996). International ency-
Journalof Li braryandlnformationScience 36 (2) :93-101 (October, 2010)
c/opedia of information and library science. London:
Kumar, S. L. & Suresh, R. S. (2000).
Routledge.
Fisher, K. E. , Marco間, E. , Miller, L. S. , Sanchez, A. &
Cunningham. , E. R. (2004,
Octobe吵.
Information
behaviour of migrant Hispanic farm workers and
their families in the Pacific Northwest IR Information Research , 10 (1).
台om
Re甘ieved
August 21 , 2010,
http://www.webcitation.org/mainframe. php.
Google. (n.d.). Google language tools. Retrieved July
21 ,
2010 ,
from
http://www.google.comllan-
Haywood, T. (1995). Info-rich,
In.舟、poor:
Access
and exchange in the global information society.
Bowker Sauro
for
tional adult learners.
R吃ference
Librarian, 33
(69170), 327-336.
Meadows,1. (Ed.). (1991). Information technology and
the individual. London: Printer.
(2003 , November 9) Prince
Melbourne Indymedia.
Charles story - A gay time in the Royal Palace? Re仕ieved
November 9, 2003 , from http://www.mel-
nt.php.
On-line Books Page.
(2003).
Banned books on-line.
Retrieved December 8, 2003, from http://www-2.cs.
Haywood, T. (1995). Only connect: Shaping networks
and knowledge for the new millennium.
London:
Bowker Sauro
Haywood, T.
S甘ategies
providing effective reference services for interna-
bo叮ne.indymedia.orgJnewsI2003/l1l57323 _comrne
guage_tools?hl=en.
London:
temational perspective. New York: Praeger.
cmu.edu/People/spok/b anned-books.htrnl.
Robertson, G. (1993). Freedom, the individual and the
law. (7th ed.). London: Penguin.
(1 982). The Wi thering ofpublic access:
Tedd, L.,
Ll wyd, R. G.,
Simon, A. & Lithgow, S. D.
Vi ewpoint in LIS. London: Library Association Pub-
(2009). DSM7620lILM 5120 Information and Soci-
lishing.
ety. Aberystwyth: University of Aberystwy曲, Open
Information Access Laboratory. (1998). Information
access research and development: Breaking barriers
through innovation technologies.
24,
2010 ,台om
Re甘ieved
Learning Uni t.
Wang , J. &
Frar祉,
D. G. (2002). Cross-cultural com-
August
munication: Implications for effective information
http://www.ee.ude1. edulIn- foAc-
services in academic libraries. Portal: Libraries and
cess/Technology.
the Academy, 2 (2), 207-216.
co"!戶Iter
access, seniors
Zhang, W. (2006). International students and U. S. aca-
surfing the web. Retrieved August 24 , 2010 , from
demic libraries revisited. Journal ofLibrary and In-
http://www.intellitools.com lindex .htm.
formation Science, 32 (2) , 6-17.
IntelliTools. (n.d). About us,
Katz , R. L. (1 988). The Information society:
An In-
圖書館學與資訊科學 36
(2) : 93 - 101
(民九十九年十月)
101