(1) Paths a, b, c and d identify search strategies by a user independent of any information system, and will be referred to as “Category a” paths.
(2) Paths e and f identify search paths involving either a mediator or an information system’s technology (manual card file, computer terminal, etc.) –Category b paths.
(3) Paths g, h and i identify search strategies employed by a mediator to satisfy a user’s demand for information – Category c.
(4) Paths j and k identify strategies employed by a sophisticated technology on behalf of either the user or the mediator – Category d. As an example of this latter category, a system could be envisaged in which a computer network could be searched at the initiative of any computer, which is a member of that system. The network might include files of knowledge in the process of creation, such as research data files, computer conference files, etc.
(1) Paths a, b, c and d identify search strategies by a user independent of any information system, and will be referred to as “Category a” paths.
(2) Paths e and f identify search paths involving either a mediator or an information system’s technology (manual card file, computer terminal, etc.) –Category b paths.
(3) Paths g, h and i identify search strategies employed by a mediator to satisfy a user’s demand for information – Category c.
(4) Paths j and k identify strategies employed by a sophisticated technology on behalf of either the user or the mediator – Category d. As an example of this latter category, a system could be envisaged in which a computer network could be searched at the initiative of any computer, which is a member of that system. The network might include files of knowledge in the process of creation, such as research data files, computer conference files, etc.
การแปล กรุณารอสักครู่..
