SIG/CON Home ASIST

[coming soon]

Search
Site Map
FAQ

SIG/CON: Published Papers

The bibliography is arranged chronologically by publication date, not presentation date (unless the presentation is the only available format). The papers which appeared in the April 1984 issues of the Bulletin of ASIS were chosen as representing, in their time, the "Best of SIG/CON". The papers which appeared in the 1995 volume (v. 46, no. 0), of the Journal of ASIS were chosen for their scholarly approach, for their significance and originality, and for their suitability for publication. Many worthy presentations at SIG/CON sessions contained strong visual elements, and do not translate well to paper. You had to be there, so to speak. Many others, of course, were in questionable taste, and best left in the recesses of the ASIS tape archives.

Bibliography

Epstein, H. (Ed.). (1975). Proceedings of the first annual SIG/CON meeting, 1975. Stanford, CA: SIG/CON Press, 1975.

Cremmins, E.T. (1984). Amathematical [sic] model of the epidemiology, contagion, and etiology of anomalous poly-entropy in information scientists. Bulletin of the American Society for Information Science, 10(4), 39-40. [Page 1, Page 2]

Epstein, H. (1984). The impact of technology on the image of the library. (1984). Bulletin of the American Society for Information Science, 10(4), 30-32. [Page 1, Page 2, Page 3]

Mason, E. (1984). ADELEINE (Phase I): An interactive on-line musical network: A model for the humanities. Bulletin of the American Society for Information Science, 10(4), 35-36. [Page 1, Page 2]

Puppybreath, Llewellyn C., III. (1984). The origin of specious. Bulletin of the American Society for Information Science, 10(4), 29. [Page 1]

Stevens, N.D. (1984). A cost analysis of a cost analysis. Bulletin of the American Society for Information Science, 10(4), 33-35. Also in His Archives of library research from the Molesworth Institute. New York: Haworth Press, 1985 (pp. 25-30). [Page 1, Page 2, Page 3]

Wooster, H. (1984). MARCing and parking: A sexist fable. Bulletin of the American Society for Information Science, 10(4), 37-38. [Page 1, Page 2]

Stevens, N.D. (1985a). Multiple acronymization as a creative solution to the effective use of library resources. In His Archives of library research from the Molesworth Institute. New York: Haworth Press, 1985 (pp. 47-53).

Stevens, N.D. (1985b). Umbrella disappearance, exchange, and loss rates in American academic libraries. In His Archives of library research from the Molesworth Institute. New York: Haworth Press, 1985 (pp. 33-39). Also published in the Journal of Irreproducible Results.

Hlava, Marjorie. (1993). Information futures. [PDF]

Hurd, Julie. (1994). Bytes and bites: An economic analysis and functional comparison of the Macintosh Quadra 650 and the K9-ST. [PDF]

Bates, Marcia J. (1995). Nevertheless. Journal of the American Society for Information Science, 46(0), 32. [PDF]

Batty, David. (1995a). Classification in historico-psycho-linguistics, or, The Hemingway complex and the Salinger-Mailer syndrome. Journal of the American Society for Information Science, 46(0), 23-24. [PDF]

Batty, David. (1995b). A comparative analysis of the 14th and 16th editions of the Dewey Decimal Classification Class 130 as an index to changes in social attitude and perception. Journal of the American Society for Information Science, 46(0), 25-27. [PDF]

Janes, Joseph. (1995). Probabilistic and evolutionary aspects of online bibliographic retrieval: An exploratory investigation. Journal of the American Society for Information Science, 46(0), 33-34. [PDF]

Janes, Joseph. (1995). SIG/CON: The next 25 years. Journal of the American Society for Information Science, 46(0), 38-41. [PDF]

Lipetz, Ben-Ami. (1995). Misconceptions about information transfer: Some timely constructive criticism. Journal of the American Society for Information Science, 46(0), 21-22. [PDF]

Meadow, Charles. (1995). Science, science publication, solution to all problems. Journal of the American Society for Information Science, 46(0), 28-29. [PDF]

Schwartz, Candy. (1995). The "least-threat" mechanism in title selection: A study of word distributions in high precall titles. Journal of the American Society for Information Science, 46(0), 35-37. [PDF]

White, Herbert S. (1995). The assurance of noise in an informed society: Adaptation of new irrelevancies to very old norms? Journal of the American Society for Information Science, 46(0), 30-31. [PDF]

Kraft, Don. (1996). CHAOS: The acronym for "A Study of Use of JASIS by Our Readers". [HTML]

Schwartz, Candy. (1997). Digital library research, 1995-2010. [PDF]

Blixrud, Julia. (1998). Digital counting. [PPT]

Larson, Ray, for L.C. Puppybreath. (1998). Defining digital libraries. [PPT]

Schwartz, Candy. (1999). The role of SIG/CON in the advancement of information science. Journal of the American Society for Information Science, 50(11), 1037-1039.

Lynch, Michael. (2000). Identity-seeking behavior in organizations: Four-letter vs. five -letter taxonomies and their implications. [PDF]

Schwartz, Candy. (2001). The LCP element set. [PPT]

Szigeti, Helen, Goodrum, Abby, & Atkins, Helen. (2001). New frontiers in auto-translation: The HAH* solution. [PPT]

Shaw, Ralf. (2001). SIG/CON retrospective. [PDF]

Szigeti, Helen, Goodrum, Abby, & Atkins, Helen. (2002). Just in time methods: A review of the literature. [PPT]

Shaw, Dr. "r". (2002). Famous first words. [PDF and PPT]

Terrell, T. & Gregory, V. (2002). Genderlessness: A growing problem in LIS, IS or I, or .... [PPT]

Szigeti, Helen, Goodrum, Abby, & Atkins, Helen. (2002). New frontiers in citation-counting: The HAH* Just-in-Time CiteCountSM. [PPT]

Janes, Joseph. (2002). Alternative models of Web searching: Broadening our perspectives: An exploratory study: Preliminary findings. [PPT]

XHTML Validated