Digital Libraries and Crowdsourcing
โ Scribed by Mathieu Andro
- Publisher
- Wiley-ISTE
- Year
- 2018
- Tongue
- English
- Leaves
- 193
- Series
- Computer Engineering: Digital Tools and Uses Set
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Instead of outsourcing tasks to providers using labor-intensive countries, libraries around the world increasingly appeal to the crowds of Internet users, making their relationship with users more collaborative . These internet users can be volunteers or paid, work consciously, unconsciously or in the form of games. They can provide the workforce, skills, knowledge or financial resources that libraries need in order to achieve unimaginable goals.
ย
๐ SIMILAR VOLUMES
<b>This book illustrates crowdsourcing techniques that will help you to raise money and collect community knowledge so your library can be its most impactful.</b><br/>This informative guide teaches you how to strengthen your library's collections and services and develop your relationships with
<p><span>This book offers an in-depth exploration of crowdfunding and crowdsourcing in journalism today, and examines their impacts on the broader media landscape. </span></p><p><span>Crowdfunding and Crowdsourcing in Journalism looks at how these practices disrupt traditional journalism models, inc
<b>A concise introduction to crowdsourcing that goes beyond social media buzzwords to explain what crowdsourcing really is and how it works.</b>Ever since the term "crowdsourcing" was coined in 2006 by<i>Wired</i>writer Jeff Howe, group activities ranging from the creation of the Oxford English Dict
Ever since the term "crowdsourcing" was coined in 2006 by Wired writer Jeff Howe, group activities ranging from the creation of the Oxford English Dictionary to the choosing of new colors for M&Ms have been labeled with this most buzz-generating of media buzzwords. In this accessible but authoritati
<p><span>This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications. Discussed approaches help b