Fu 1996

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Book Reviews

Detour: The Truth about the Information Superhighway. ply to the future. Then the book takes a detour again and in the
Michael Sullivan-Trainor. San Mateo, CA: IDG Books “Showstopper” explores the role of the FCC and how the
Worldwide; 1994. 319 pp. Price: $22.99. (ISBN l-56884-307-0.) agency has to respond to the deployment of the superhighway.
Then the book returns to the cultures currently emerging in
cyberspaceand how the next generation will be influenced. The
The title, Detour: The Truth about the Information Super- cultural theme continues in “The New Reality” and how the
highway, suggeststhat the contents will reflect the emerging
greater sense of community created by computer-mediated
genre of literature that is critical of the utopian predictions of communication could challenge the order and structure of or-
the emerging information infrastructure. While books such as
ganizations and society.
The Future Does Not Compute (Talbott, 1995) or Silicon Chapter 15, “Living Room Virtual Reality,” offers an intro-
Snake Oil (Stall, 1995 ) challenge assertions that the informa-
duction of the technologies of virtual reality and what potential
tion superhighway is one giant happy cyberspace just waiting
applications could be found in the home market. Finally,
to happen, Detour fails to rise to the same challenge. The title “Making It Happen Now,” returns once again to the technolo-
seems to be a misnomer, for this book is much less a critique
gies and industrial issues and obstacles that could detour
and far more of a primer for non-technical readers about the
evolution and future of the information infrastructure. (author’s terminology) the superhighway for the foreseeablefu-
The book is divided into 16 chapters. The first chapter, ture. A glossary completes the book.
“Worldwide Information Exchange,” provides a quick over- Sullivan-Trainor has been a professional writer about the
view of what is meant by the information superhighway, both computer industry for 14 years. Detour is written in a journal-
present and future. “The Superhighway and You,” the next istic style that is easy and approachable. However, the author
chapter, is a basic introduction to multimedia computing and typically ignores any form of citation to sources quoted. No
what a user needs to get on board. As is typical with discussions reference list is provided and only a brief bibliography is
about required hardware, the suggestedconfiguration is already offered. And there are other problems with this volume. First,
dated. as may be apparent already, the logical relationship of chapters
The next set of chapters is erratic. Chapter 3, “Infotain- could be improved. Second, the vast breadth that the author
ment,” offers a discussion of entertainment and information attempts to cover means that the analysis is superficial at best.
services currently available and what is currently being devel- A reader would be hard pressedto determining truth from false-
oped. Then the “Dreammakers,” provides a shallow perspec- hoods when so little is actually discussedand analyzed. At best,
tive on the Clinton administration and the government’s role Detour, provides a quick overview of evolution and status of
in facilitating the evolution of the National Information Infra- the information superhighway for individuals who know little
structure (NII). The next chapters return to applications: “Tel- about the subject. Even so, this reviewer would wish for a better
emedicine” and “Remote Learning.” These chapters are de- introductory volume to the subject.
cent summations of the potential of the NII to assist in fixing
problems, as seen by the author. The closing discussion in the Robin Peek
chapter, “Remote Learning,” assails parents to get their own Graduate School of Library and
multimedia vehicle right away so that children do not miss ac- Information Science
quiring the skill sets for the future. Simmons College
The next chapter “Beyond the Buggy Path”, returns to the 300 The Fenway
discussion of how the superhighway will be built and the Boston, MA 02115-5898
difficulties in doing so. Again the treatment is superficial and in E-mail: rpeek@vmsvaxsimmons.edu
some places quite choppy with thoughts considerably shifting
from paragraph to paragraph. “Teleputer Timetable” is one of
the better written chapters, reflecting the authors background References
as an industry analyst. Sullivan-Trainor provides an under- Stall, C. ( 1995).Siliconsnakeoil: Secondthoughtson the information
standable, but brief, overview of the evolution of necessary superhighway.New York: Doubleday.
computer technologies. Similarly, “Flight of the Navigator,” Talbott, S. L. ( 1995).The future doesnot computer:Transcendingthe
offers a similar perspective focusing on the telecommunication machinesin our midst. Sebastopol,CA: O’Reilly & Associates.
industries.
Chapters 10-l 1 each focus on an aspect of culture conflicts
in the evolution of the NIL “Next Generation Internet” goes
the range from commercialization of the Internet and the pre-
existing culture, to digitized libraries and who should decide Out in the Cold-Academic Boycotts and the Isolation of South
what gets done first. “Back to the Future” examines the histor- Africa. Lorraine J. Haricombe and F. W. Lancaster. Arlington,
ical impact of technologies and what lessons from the past ap- VA: Information Resources Press; 1995; 158 pp. Price: $29.50.
(ISBN O-87815-067-6.)
In Out in the Cold-Academic Boycotts and the Isolation
0 1996John Wiley & Sons,Inc. of South Africa, Haricombe and Lancaster discuss the varied

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE. 47(5):399-406, 1996 CCC 0002-8231/96/050399-08
manifestationsofthe 1957 to 1994 academic boycott on South for South African students. Responsesto this question led Har-
Africa and assesstheir effects on South African scholarship. A icombe and Lancaster to believe that the boycott was more a
brief historical overview of sanctions against South Africa, and nuisance than a major obstacle in the work ofthese scholars.
academic boycotts is provided in the early chapters ofthe book. Nearly 36% of the respondents also said that the academic
Later chapters go into more detail about the academic boycott boycott had had an impact on their colleagues (44.1% an-
of South Africa and the authors’ survey methods and results swered no; 20.3% did not answer). Respondent comments pro-
regarding effects of the academic boycott. vided a clearer picture of how the academic boycott manifested
This boycott was intended to isolate South Africa academics itself in their experiences.When respondents said it had an im-
who supported the racist policies of their government, by boy- pact, their explanations usually expressedknowledge or a belief
cotting informational materials. This practice has been called that their experience was directly or indirectly related to the
into question by the American Civil Liberties Union, Ameri- academic boycott.
can Bar Association, Association of the American University Twenty-eight libraries were surveyed in January 199 1.
Presses,Association of American Publishers ( AAP), and some These survey questions covered the following areas and
British publishers, among others. Opponents of academic boy- whether or not they were affected by the boycott: Acquisitions,
cotts have pointed out that communication, rather than its re- library services (interlibrary loans, periodicals, dissertations,
striction, is more likely to lead to change. monographs, databases, and other) and general. Eighty-two
Haricombe and Lancaster used two survey questionnaires percent ofthe libraries surveyed responded. The majority ofthe
(provided in appendices with accompanying cover letters and libraries surveyed believed that the book boycott had had little
a bibliography on sanctions) and interviews to study and deter- effect on their library’s services.The book boycott was also not
mine the effects of the academic boycott on scholarship in overly effective in stopping South African libraries from acquir-
South Africa. The questionnaires addressed elements of the ing materials, Ifthey neededto, and the majority ofthe libraries
boycott that were most frequently mentioned in the literature: did, they went to third agents. Through good relations with
Publishing, conferences, relationship with international schol- British libraries, most South African librarians had good access
ars, and accessto resources. to computer databasesand could acquire information materi-
Questionnaires were sent to 900 full-time faculty members. als with relative ease.South African librarians surveyed did not
associatedwith 2 1 South African and “homeland” universities believe they were affected by the boycott very much. The most
in November 1990 (they intended to survey all South African trouble some of them had was with obtaining dissertations
universities, but the University of Venda was accidentally from abroad, due to University Microfilms International’s de-
omitted). Subject departmentsat universities were divided into cision to not supply to South Africa.
three broad discipline categories-Science/Technology, Forty-two faculty members and eight librarians were also
Humanities/Arts, and Social Science. The highest survey re- interviewed by Haricombe in the period March-May 1991.
sponse rate was from predominantly white universities: En- Seventeen of the faculty interviewed had not been included in
glish, 59.7%. Afrikaans, 59.3%~~ and Black, 48.9% The total re- the original sample but had been identified during other in-
sponse rate for universities was 57%, and 65.1% of the respon- terviews as scholars who had been affected by the academic
dents were males between the ages of 30 and 49. More than boycott. Interviews were conducted to elicit details about the
half of the respondents from each subject department category respondents’experiences of the boycott and their reactions to
responded to the survey. Faculty members in the Science/ it. as well as to clarify the differences in effect among academics
Technology category had the highest response rate, probably as reported in the survey. Topics addressed in the interviews
becausethe boycott affected these disciplines most seriously. included:
Of the South African faculty surveyed, 57.3% reported that
they were affected by the boycott. English university faculty, ( 1) How boycott experiences affected scholarly activities;
traditionally against violations of academic freedom, had the (2) How respondents reacted when they were affected;
strongest ties to the international community before the boy- (3) How respondents felt when they were affected;
cott, but they were reportedly more affected by the boycott than (4) What are respondents’ views of/about academic boycott.
other universities. The majority (9 1.8%) of the survey respon-
dents said that libraries were very important as material sup-
port servicesto their work. Most of the university faculty interviewees felt that the boy-
Five boycott tactics were specifically covered on the survey cott isolated them from international scholars and interna-
questionnaires sent to the university faculty members (affirm- tional agencies/foundations from which they had previously
ative responsesin parentheses): received financial aid (e.g., Fogarty support). The boycott
and subsequent feelings of isolation, localized South Africa
scholarship.
( 1) South African manuscripts refused publication ( 10.5%);
The eight librarians interviewed, generally believed that the
(2) South African scholars denied attendance at international
conferences (25.9%): boycott had had a minimal effect on their libraries. They felt
(3) International scholars refusing to visit South Africa because that economic sanctions within South Africa, the imposition of
of its governmental policies (52.7%); financial sanctions against South Africa in the 1980s
(4) Foreign scholarsrefusingto collaboratewith South Afri- (devaluation ofthe South African rand), and increasingly book
cans because of South Africa’s governmental policies prices impacted their collection development more than the
( 16.3%); and boycott did. South African libraries were having to double or
(5) South African scholars having access to information re- triple their budgets to maintain the same amount of buying
sources denied(52%). power. Other results of the boycott that were brought out in the
interviews included the following:
Survey respondents who had answered any of the boycott
tactic questions affirmatively were also asked to indicate how l SelJboevcott.SomeSouth African Scholarschoseto volun-
much the academic boycott affected their scholarly activity on tarily withdraw from the internationalcommunity beforeor
a IO-point scale. Over 79% of the respondents, of the 41.1% after they had been rejected by it because of political reasons.
who answered this question, said that they had taken steps to l Brain-dmin. The boycott, and especially the broader sanc-
compensate for the boycott. Some actions taken included going tions campaign,causedSouthAfrican scholarshipto leavethe
to third parties for materials and writing textbooks specifically country. Brain drain can cause institutional inbreedingand

400 JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE-May1996


can have a negative impact on the future of the country as a much appreciated that the two authors added “modularity”
whole. and explained in detail as it is applied in a new technological
l Pcwonal networking. Networking became even more impor- environment.
tant for South African scholars during the boycott. This was
how some obtained journal articlesand the like. In some cases, Another important issue brought up in the first two chap-
third parties were also involved, but this cost more and caused ters is the cooperation between the library and the computer
further delay. center. Particularly useful is the outline of the requirements
l C’ompcmutorvstqx Some South African scholars rebelled and configuration of a proper campus information network
against the boycott by refusing to study the work of authors in Chapter 2: Attributes of a Twenty-First Century Library.
from countries that supported it. The works of these authors The specifications for wiring and cabling listed here as well
were replaced with the works ofSouth African scholars. When as the points raised elsewhere in the book about the infra-
new editions could not be accessed, older ones or new texts
written specifically for South African students were used. structure of power and telecommunications should fully oc-
cupy the attention of library planners. Without a good infra-
The results of the boycott were both actual and perceived. structure, the blood line of the library to feed further techno-
Because this study made no distinction between the two, the logical developments will be insufficient and inadequate, and
authors believe that their data possibly underestimates the true will be very expensive to re-do.
effects of the boycott. In our opinion, this study does not sup- However, in an era where computer, library, and media
port that possibility. South African scholars and librarians, technologies are converging, it is regrettable that media tech-
alike, stated in their interviews that the academic boycott was a nologies are mentioned in only very broad terms in this book.
nuisance-an inconvenience at its worst. New developments in media that should be incorporated into
a new library building design have not been considered. For
example, the satellite dishes. As the dish becomes smaller in
size and cheaper in price (and therefore can be easily incorpo-
V. Marielle McFarland rated into the building cost), some wiring provisions and con-
Hermann L. Totten trol racks can and should be planned, very much in the same
School oflibrary and Information Sciences way as its computer connections. Further, the library’s satellite
University of North Te.ms accessshould be a part of the campus plan. If the library does
Box 13796, NT Station not own a satellite dish, it should have boosters and connec-
Denton, TX 76203-3796 tions to the campus dishes and vice versa. With advance plan-
E-mail: totten~lis.unt.e~u ning, there is no reason why the new library building should
not have accessto its own dish( es) as well as to all dishes on
campus. Multiple accessand redundancy in technology are al-
ways desirable. Certainly downlinking, at reasonable cost, can
be done right away with uplinking upgrade added later on.
Academic Libraries as High-Tech Gateways: A Guide to De- With major cable and communications companies getting into
sign and Space Decisions. Richard J. Bazillion and Connie the game of expanding from the entertainment into the educa-
Braun. Chicago, IL: American Library Association; 1995: 180 tion arena, library planners will be well served with these con-
pp. Price: $40.00. (ISBN o-8390-0656-7.) nections in the future.
The middle two chapters (Chapter 3: Creating an “Intelli-
Academic library planners who are in the process of gent Library Building”; and Chapter 4: Furnishing, Equipping,
designing a new library building or expanding an existing one and Testing the Building) are full of solid advice that are prac-
have a few texts that they can rely on to give them good, sound tical and useful. Any library planner who has participated in a
advice. Some ofthese titles cover admirably the basic principles building design process would certainly appreciate the authors’
of building design, but are outdated in incorporating new tech- remarks on page 103 that “The building program document
nological advances as key factors for consideration. The pres- should make explicit the basic design features that library plan-
ent title under review is quite inclusive in incorporating new ners wish to see realized Designers left to their own de-
technologies in different areasofbuilding design with insightful vices quickly become “ego involved” to an extent not easily
observations and practical suggestions, e.g., space and adja- controlled or reversed.” It is these commonsensical remarks
cency considerations, security and climatic controls, furnish- that make this book very readable and enjoyable.
ings, equipment, etc. Further and more importantly, there is a In the last two chapters (Chapter 5: The Library Becomes a
lack of titles that convey the urgency that librarians have to Teaching Instrument; and Chapter 6: Academic Libraries at
recast their thinking so that they can design buildings that are the Millennium,” the authors further expand on the themes
attuned to the changing campus environment to enable the covered in Chapters I and 2. Chapter 5 specifically covers the
new buildings to serve as “high-tech gateways” for the aca- teaching mission of the library, to the extent that an integrated
demic community. This urgency is eloquently iterated and re- ERS (Electronic Research Skills) syllabus is shared. Some li-
iterated by the two authors in the present title under review,
brarians may have some concerns with such an integrated ap-
who offer a quite thorough environmental scan of academia
and its resultant impact on how libraries of the future should proach that word processing skills are included in ERS, but it is
serve. indeed a good example of what library-computer cooperation
The book is organized into six chapters. Chapters I and 2, could be. The last chapter provides a vision into the future. The
“Library Planning in a New Key,” and “Attributes of a environmental scan provided and what libraries have to do to
Twenty-First Century Library” are outlines of important issues fit in that environment are clear and succinct and deserveclose
that have to be considered in new building design. Some of the reading. It is regrettable that new developments that do not re-
issues,for example, the importance of “flexibility,” have been quire wiring (the wireless technologies) are not mentioned in
pounded into our heads by building gurus like Metcalf and Co- the picture, although the authors are fairly inclusive in explor-
hens. But that is a principle easier said than followed. Just ob- ing new technologies and their ramifications for libraries.
serve how many libraries are still putting in expensive built-in This is a very timely and significant addition to the literature
and unmovable “OPAC” workstations! It is therefore very in guiding academic library planners who are venturing into

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE-May 1996 401


designing a new library facility that would “hustify] its exis- situations, it is not well suited for the drill-and-practice type
tence.” learning. Shirk states that “four categories of cognitive archi-
tectures” control a hypermedia learning situation: Subject of
the knowledge-base,designers’decisions, learners’knowledge-
base,and the medium of hypermedia. She concludes that a new
Tina C. Fu “rhetoric” is needed to develop a set of design and evaluation
Director of Library Services guidelines for hypermedia in an educational environment.
Eastern Connecticut State University Gregory Anderson writing on “Dimensions, Context, and
E-mail: FUT@ECSU.CTSTATEC’.EDU Freedom: The Library in the Social Creation of Knowledge,”
states that libraries can use multimedia technology to support
organizations and individuals to pursue knowledge creation
without the constraints of media format, time, and geographi-
cal proximity. Kathleen Burnett’s paper on “Multimedia and
Sociomedia: Multimedia, Hypermedia, and the Social Con- the Library and Information Studies Curriculum” very briefly
struction of Knowledge. Edited by Edward Barrett. Cambridge. discusses this subject. Of the three remaining papers, which
MA: The MIT Press: 1992: 580 pp. Price: $24.95. (ISBN 0-262- complete the first section of Sociomedia, one deals with differ-
52 193-8.) ent applications of multimedia in a researchuniversity, another
discussesthe merits of a virtual museum and the third is on
Sociomedia is a collection of twenty-five papers many of “An Epistemic Analysis ofthe Interaction between Knowledge,
which were presented at a conference on “The Social Creation Education, and Technology.” In the latter article, David Chen
of Knowledge” at MIT in 199 I. The book is divided into two statesthat traditionally technology has been associatedwith the
main sections. “Perspectives . . .” deals with a number of con- development of the “cognitive faculties of the individual
ceptual and theoretical issues on the role of technology in learner.” He suggestsa new paradigm based on “an extended
knowledge creation and education. The section begins with an unit of analysis consisting of the social context pertinent to
essayon “Education by Engagement and Construction: A Stra- knowledge.” Chen uses ‘innate,’ or the inherent knowledge in
tegic Education Initiative for a Multimedia Renewal of Ameri- an individual, and the learned knowledge to arrive at the onto-
can Education” by Ben Shneiderman. The author proposes his genie knowledge, which is the sum of the two previous knowl-
own version of the “Star Wars Plan” by suggesting that one edge bases.He also defines the sum of the knowledge produced
hundred billion dollars should be spent on education over a by civilizations as the exogenic knowledge. Chen assertsthat
five-year period. This budget allows the education system to since technology’s primary role is to support the creation of
provide the computing tools necessary in creating an atmo- exogenic knowledge, researchshould be conducted in this area
sphere of exploration and construction for students and teach- rather than in the cognitive paradigm of technology.
ers. John M. Slatin is the second contributor with an essayon The second section of the Sociomedia, “. and Practice, ”
“Is There a Class in This Text? Creating Knowledge in the Elec- is a collection of papers dealing with applications of multime-
tronic Classroom.” His essayis based on his use of computers dia in different university environments. The projects de-
in teaching an English course on poetry. Students use comput- scribed in this section include the use of multimedia in: An
ers to interact with each other, the instructor, and the course English course, physics education, ethnographic research,sim-
material. This “textualization” of classroom discourse replaces ulation for crisis management, language learning, medical ed-
the traditional teaching methods of lecturing and oral partici- ucation, engineering education, negotiation techniques, and
pation and is found to be very beneficial for students. The au- adult education. The majority of papers in this section are case
thor suggeststhat the course symbolizes the type oftransforma- studies of specific applications of multimedia in their particular
tion that computers can bring to the academic world. Patricia environments.
Ann Carlson in her essay on “Varieties of Virtual: Expanded An interesting paper in Sociomedia is the introduction, in
Metaphors for Computer-Mediated Learning” states that which Edward Barrett defines the term “sociomedia.” This
knowledge is formed through an interaction among content, term signifies the importance of computer as a tool for social
context, teacher, and student. She suggeststhat three technolo- construct of knowledge; as a mean to “objectify, exchange and
gies will have a major impact on knowledge creation and there- collaborate, invoke, comment upon. modify, and remember
fore education in the 1990s. Hypermedia is linked to teachers; thoughts and ideas (including ‘information’) .” In this context,
artificial neural networks are linked to students; and artificial multimedia is a particularly important technology since it sup-
realities are utilized for content. Carlson suggeststhat comput- ports all the functions necessaryfor the social construction of
ers should facilitate and support cooperative and productive knowledge: “The collection and classifying of texts, the review
learning environments. and deconstruction of these texts, the exchange of texts among
Schlusselbergand Judson Harward discussdesign principles peers, the empowerment of the individual through the ability
in their article “Multimedia: Informational Alchemy or Con- to create marginalia.” Barrett uses the term sociomedia rather
ceptual Typography?” They state that creating good multime- than multimedia to draw our attention to the complex interac-
dia applications are difficult since the audience expect sophisti- tion among individuals within an educational environment.
cated audio-visual media similar to what they are accustomed The main shortcoming of Sociomedia, like many other col-
to seeon television. Designing a product consists of three inter- lections of conference papers, lies in its inconsistent treatment
dependent levels: Conceptual design, interactive design, and vi- ofthe subject matter. While some authors have chosen an orig-
sual design. They stressthe importance of using metaphors in inal, theoretical, or applied approach to their topics, others
building successfulmultimedia applications. Shirk in “Cogni- have simply described the use of multimedia in their particular
tive Architecture in Hypermedia Instruction” addressesthe de- environments. Although the different approachesemployed by
sign issuesin an instructional environment. She states that the the authors is not a problem per se, the depth of the treatment
inherent problem in developing hypermedia for instructional is inconsistent. Descriptive articles of applications may have
purposes “revolves around issues of control and responsibil- already been overshadowed by technological developments,
ity.” The reader or learner has many choices in navigating such as hundreds of multimedia CD-ROM titles which have
through the material. which has been built in by the author. appeared in the marketplace since the publication of Socio-
While freedom to choose may be beneficial in certain learning media.

402 JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE-May 1996


Fortunately, most of the papers fall in the original contribu- If the numbers represented musical notes, Hofstadter says,“ei-
tion category. Carlson, Shirk, Schlusselbergand Judson Har- ther you accent the even-numbered notes or you accent the
ward, and Chen have written the most interesting papers deal- odd-numbered notes” (p. 79). Even though the A pattern is
ing with the design criteria for multimedia products in a con- perceptually the more “smooth,” Chopin himself chosepattern
ceptual framework. These articles may be used as a basis for B, which is the best way, because,as Hofstadter puts it, by vio-
discussion or “rhetoric,” and will not be readily obsolete. They lating some normal, easy way of doing things, pattern B has the
are thought-provoking and contribute to the knowledge-base most information. You’ll notice that in patterns A and B,
of the field. above, the notes (numbers) are chunked together, or glommed
in “packets” to bring out the underlying pattern.
To achieve these patterns the mind must have fluid data-
structures. Hofstadter begins this discussion with examples
Jamshid Beheshti from everyday communication:
Associate Professor
Graduate School of Library & InJorrnation Studies Shelley: I’m going to pay for my beer now.
McGill University Tim: Me too. (p. 76)
3459-McTavish Street, Montreal, Quebec, Canada H3A 1 YI
E-mail: injz@musicb.mcgill.cu
Here, Tim has actually said he will pay for Shelley’s beer as well
(the actual “me too”). However, what Tim means and what
Shelley understands he means is that he will also pay for his
beer, at the same time Shelley is paying for her beer (the un-
derstood “me too”).
Fluid Concepts and Creative Analogies: Computer Models of Hofstadter believes the basis of our ability to communicate
the Fundamental Mechanisms of Thought. Douglas Hofs- with each other and the world is the fluidity of the internal data-
tadter. New York, NY: Basic Books; 1995: 5 18 pp. Price: structures we use to represent and make senseof what is outside
$30.00. (ISBN: O-465-05154-5.) of us; we are constantly readjusting the internal boundaries of
these structures, reassessingthe connection strengths between
This book is a collection of both new and previously pub- these structures, and also rearranging the parts of these struc-
lished work by Douglas Hofstadter and other members of Indi- tures-this is at the core of the recognition [of pattern] process
ana University’s Fluid Analogies Research Group (FARG). (p. 119).
Most of the chapters are introduced by detailed, anecdote rich The rest of the book is given over to examples of computer
prefaces written by Hofstadter especially for the book. And models based on these FARG principles of how creative rea-
there is a marvelous, newly written first chapter which goesinto soning works. Chapter 3, written for an expert AI audience by
the history of Hofstadter’s personal interest in the ideas that led FARG member Daniel Defays, gives a detailed, succinct view
to his founding of FARG in 1984. of a computer model of human creative reasoning called
These fundamental ideas are that we can understand our “Numbo” that is based on other FARG projects (JUMBO and
own thought processesand make generalizations about them; Copycat, among others). The purpose of Numbo, Defays
that creative reasoning is the essential part of intelligence, not states, is to reproduce “a particular aspect of human mental
“rigorous reasoning” (p. 126); and that the basis of creative behavior: the ability to fluidly group, take apart, and restruc-
reasoning is the discovery of patterns done, at least in part, ture the components of ideas, and to use these structures to
through analogy-making. The borders separating the human achieve a goal” (p. 132). The goal, in the example he gives, is
mind’s mental representations for different concepts must to get the computer to solve puzzles involving a “target” and
therefore, by necessity,be fluid. “bricks.” The target is a randomly chosen number between I
Hofstadter begins the book with a description of an early and 150; the bricks are also randomly and independently cho-
project ( l977-83), called Seek-Whence,whose purpose was to sen numbers between I and 25. The puzzle to solve is that the
develop a computer model that could find patterns in a se- computer must mathematically link (add, subtract, or
quence of numbers. In order to create the model, Hofstadter multiply) five “bricks” together to come up with a formula that
observed his own thought process when solving similar prob- will equal the target.
lems, for which he gives examples. The pattern making is not Built into the Numbo computer mode1 is what Defays calls
reasoned out, but happens right before our eyes, as Hofstadter a priori knowledge, which allows the computer, like humans,
puts it, with deeper principles ofhuman reasoning directing the to use top-down as well as bottom-up strategies to solve the
effort. There is an aesthetic principle: It seemsto be a given that problem. The Numbo program includes three different types of
the mind automatically seeksto chunk or put into packets any a priori knowledge: Rote small-number arithmetic, knowledge
seriesof discrete elements it perceives, and from there to make of approximate sizes of numbers, and procedural arithmetical
larger, more meaningful patterns out of the chunks. Underly- knowledge. There is also a control module to direct operations
ing these steps is the same aesthetic structure of thinking as that use these types of a priori knowledge (p. 135). However,
making music out of a seriesof notes. when Defays actually tested the program against a human sub-
To demonstrate the analogy between pattern formation in ject, neither human subject nor Numbo succeededin coming
mathematics and pattern formation in music, he starts with the up with the answer.
seriesof numbers: The problems such as Numbo’s that FARG confronts deal
with small scale intradomain analogy-making rather than the
1,2,2, 3, 3,4,4,5, 5,6 . . . interdomain analogy-making of more widely publicized re-
search programs such as ACME (Holyoak and Thagard,
Hofstadter points out that this series of numbers is similar to a 1989). ACME claims to model analogical thinking linking a
theme by Chopin. Hofstadter then proposes two possibilities of midwife’s role in childbirth to Socrates’role in elicitating ideas
arranging the numbers into patterns, pattern A and pattern B: in a pupil’s mind. Hofstadter contends these are false claims
becausein order to do what they claim, such computer models
A: 1(22)(33)(44)(55)(6. . . must know what the concept of Socratesmeans, and what mid-
B:(l2)(23)(34)(45)(56). . . wifery means, which clearly ACME does not (Hofstadter in-

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE-May 1996 403


eludes the line input that makes up the ACME program to ar- to support reader’s advisory work and to act as a textbook for
gue his point (p. 163)). In Chapter 4, David Chalmers, Robert library school students.
French, and Hofstadter examine the claims of BACON, a fa- The basic format of Genreflecting remains largely the same
mous program that is supposed to model scientific discovery as in earlier editions. It includes an introductory chapter that
(Langley et al., 1987). But here again, according to FARG, the provides a brief overview of the history of reading for pleasure
claims are based on false assumptions about how creative intel- and public library responseto this, as well as information about
ligence works, particularly the role of high level perception and the current handling ofgenre fiction in libraries and recent pub-
representation-building in analogy-making. lishing trends. This is followed by single chapters on the major
In most computer models of analogy-making, representa- genres including western, crime, adventure, romance, science
tion-building, which is the hard part of the process, is done be- fiction, fantasy and horror fiction. Each chapter describes the
fore the model is asked to begin to perform. This is understand- characteristics of the genre, identifies and defines subgenresand
able. saysFARG, becauselifelike representation-building is too lists prolific and important authors whose works are still readily
difficult to model at this point. That is why FARG sticks to available in libraries. A “Topics” section provides additional
creating computer models of (idealized) microdomains, which information such as: Lists of classic and best-selling authors
allows FARG, in this stripped down world, to put the problem and important publishers; citations for anthologies, bibliogra-
of representation-building in analogy-making front and center. phies, encyclopedias, and works of history and criticism; and
The remaining chapters of the book give other FARG projects directory type information for related associations, confer-
which exemplify this philosophy of AI. ences, and magazines. Author, title, and (new to this edition)
In addition to the ideas present in this book, Hofstadter subject and series character indexes are provided. Changes
makes his theorizing easily readable and understandable to a from the third edition are few. The “Thriller” genre was subdi-
wide range of readers. For instance, with his explanation of the vided into “Crime” and “Adventure” stories, New authors, ti-
basis for his JUMBO program, he usesromance, marriage and tles, and occasionally subgenres have been added. Titles no
the commitment of one spouseto the other to describe why two longer readily av-ailablein libraries have been removed.
letters in the alphabet such as SP usually stay together, but on The rather limited extent of revision (I estimate that about
occasion side with other letters. He concludes: “Thus in Jumbo IO% of the content has been changed since the previous
just as with people, being “committed” (glommed) acts as a edition) is significant. On a positive note, it indicates the matu-
damper, but not a total inhibitor, of exploration of rival ro- rity of this work in particular and the field’s understanding of
mances. What really inhibits such exploration is happiness, not genre literature in general. Genrejlectingis the place to go ifone
mere commitment” (Hofstadter. 199.5,p. I I I ). Ummmmm. is a practitioner needing a title to recommend to a library user
Here is the one little criticism one can make about this ac- who wants “another good book to read just like this one.” It is
cessible and challenging book. Hofstadter’s wide aim might also a wonderful source for LIS students beginning to explore
offend a narrow audience of cognitive science and AI experts, this area of knowledge. Much has changed, however, since Be-
or at least make the reading of this book a chore for them, es- tty Rosenberg introduced her first edition with the compelling
pecially in the pieces written earlier on. (The other FARG con- cry to “Never apologize for your reading tastes.”Practitioners,
tributors to this volume, however, seem to be immune to Hof- educators. and scholars in our field have rallied behind this
stadter’s popularizing tendency.) But this is a small price to pay statement, implementing changes that are not reflected in the
for a deep and vertical view into a counter vision of where AI fourth edition of Genrefecting.
research should be going. ALA officially sanctioned the provision of genre literature
in public libraries when it included Popular Reading Materials
Centre as one of its eight roles for public library service (see
McClure. Charles R.. Owen, Amy, Zweizig, Douglas L., Lynch,
Charles Cole Mary Jo, & Van House. Nancy A. ( 1987) Planning and role
Graduate School ofLibrury3 and Information Science setting for pnblic Libraries: A manual of options and proce-
Elborn College dztres.Chicago: ALA). The ALA’s Public Library Association’s
University’of Western Ontario annual statistical reports indicate this role has been adopted as
London Ontario Canada MG IHI a primary one by many North American public libraries. Texts
E-mail: ccolel~juliun.u~~o.ca such as Sharon Baker’s ( 1993) The responsive public library
collection (Englewood, CO: Libraries Unlimited) and Balti-
more County Public Library’s more notorious how-to-do-it
References manual (Give ‘em Mrhatthey want! Managing the pliblic’s li-
brary ( 1992 ). Chicago: ALA), also show that genre fiction has
Holyoak, K. J., & Thagard,P. (1989). Analogicalmappingby con- clearly found a place on our public library shelves. Serious
straintsatisfaction.Cognitive Science.13(3), 295-355. scholarly work like Catherine Ross’analysis ( 199 I ) of reader’s
Langley.P., Simon,H. A., Bradshaw,G. L., & Zytkow, J. M. ( 1987). advisory services(“Readers’advisory service: New directions.”
Scrent$cdiscoverv:Cotnpzctufional exploratiorrsofthe creativepro- RQ 30: 503-18) is deepening our understanding in this area.
ce.s.se.s.
Cambridge,MA: MIT Press. None of these documents and the changes they represent are
mentioned in the new edition of Genregecting which still em-
phasizes its original advocacy orientation. While this may still
be important, advances in our acceptance and understanding
of the recreational reading of popular materials (which may be
attributed at least in part to early editions of works like
Genreflecting: A Guide to Reading Interests in Genre Fiction. Genreflecting) reflect an important change within our disci-
Fourth Edition. Diana Tixier Herald. Englewood, CO: Librar- pline and should have been included.
ies Unlimited; 1995: 367 pp. Price: $38.00. (ISBN l-56308- I also noted that much of the literature listed in the history
354-X.) and criticism sections is quite dated. Almost 60% of the docu-
ments listed were published between 1975 and 1984 and only
This is a new edition ofa prominent public library reference about 14% since then. Although this material is only supple-
tool first published in 1982. Genreflecting’s stated purposes are mentary, it is important to the library school textbook role. Ex-

404 JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE-May 1996


panding the section on reviewing sources and other selection understanding the orientation of the text. Marchionini has
tools would also enhance Genreflecting’s value for collection taken a user oriented view of the information seeking process,
development. Care should be taken to revise and update these with the book focusing heavily on how people use electronic
sections in the next edition. environments to find information. Substantial groundwork for
Although several similar resources have appeared (for ex- this is laid in chapter two. The user focus includes the elements
ample, Gale’s annual publication What do I read next?,4 reud- the user brings to the environment as well as the strategiesgen-
er ‘sguide to current genrefiction), Genreflecting, if it attends to erated as they seek information.
the revisions suggestedabove, is likely to remain the classic Marchionini also lays the foundation for another pervading
work in this area for training LIS students. It is curious to note theme of the book in the first two chapters: That of viewing
that it began and continues to be the work of first one (Betty the process of information seeking from an interdisciplinary
Rosenberg) and then another (Diana Tixier Herald) single orientation. According to Marchionini, “information and tech-
committed practitioner, responding to heartfelt and real user nology have become inextricably intertwined as information
needs. has led to new technologies and technologies have in turn al-
lowed more information to be created, stored, manipulated,
and communicated” (p. ix-x). In taking this view, Marchio-
nini garners information and viewpoints from cognitive sci-
Lynne (E. F.) McKechnie ence, psychology, computer science, information science, phi-
Graduate School qflibrary and Information Science losophy, sociology, and education.
Universily of Western Ontario The third chapter of the book is dedicated to the actual gen-
London, Ontario eration of the framework. Marchionini begins with a discussion
N6G 1 Hl Canada on human-centered models of information seeking and re-
E-mail: mckechnie@uwo.ca search on users of electronic retrieval systems. A heavy focus
in the chapter centers on discussion of factors contributing to
information seeking, including the seeker,task, search system,
domain, setting, and outcomes. These factors are then inte-
grated into a model of the information seeking process.
Information Seeking in Electronic Environments. Gary Mar- The model Marchionini presentstakes the user from the be-
chionini. Cambridge, UK: Cambridge University Press; 1995: ginning of the searchprocess,when they “recognize and accept
224 pp. Price: $49.95. (ISBN O-521-44372-5.) an information problem” to the end, which Marchionini tags
“reflect/iterate/stop.” Recent research conducted using
“The expansion ofelectronic technologies is occurring at an emerging information technologies have produced similar
exponential rate.” This phrase, stated in a variety of ways, is a models (Hill, 1995). built from an examination of related user
common one in what is now touted as “The Information Age.” factors. While Marchionini’s and Hill’s models may need fur-
While the rate of growth is impressive, perhaps what is more ther examination and testing, the foundation they provide for
interesting is that the expansion is no longer restricted to one discussion of the information seeking processis valuable.
discipline: the expansion effects all disciplines, work environ- Marchionini pursues this discussion in the next three chap-
ments, and age levels. Where once understanding information ters of the book. First examining how information seeking is
retrieval may have been of interest solely to the information influenced by knowledge, skills, and attitude, Marchionini
professional, the level of expansion of these emerging technol- looks at the differences in the search processfor the novice and
ogies has generated not only interest, but a need to know in a the expert. In presenting information on the novice searcher,
variety of professional areas. Marchionini’s book, Information Marchionini focuses on the browsing activity involved in the
Seeking in Electronic Environments, provides answers to some process. This builds on research Marchionini has been con-
of the questions generated from the “need to know” and at a ducting over the past ten years (see. for example, Marchionini,
level accessiblefrom a variety of disciplines. 1987; Marchionini & Shneiderman, 1988).
Marchionini statesthe purpose ofthe book is to ‘&. . . expli- According to Marchionini, browsing is an integral part in
cate some of these changes [changes in how we seek and use much that we do in society, from reading the paper, to shop-
information as a result of computers and communication ping, to visiting museums. “Browsing has become much more
networks] so that information workers can better prepare for important as more information resourcesmigrate to electronic
the ongoing changesahead and system designerscan better un- environments” ( p. 10.5). With the growth of the Internet and
derstand the needs and perspectives of information seekers” World Wide Web, and the multitude of resourcesin each envi-
(p. ix). In working to meet this target, Marchionini creates a ronment. it would appear to be a necessary skill in order to
framework for understanding information seeking.After building manage all the information. Although devoting two chapters in
the framework, he then usesit to analyze searchstrategiesof both the text for the topic of browsing may seem extensive, recent
the expert and the novice information seeker,discussinghow this researchon usersseeking information on the Web also indicate
activity has been affectedby electronic technologies. that browsing is a heavily used activity (Hill, 1995). Continued
The framework Marchionini creates builds from the growth in the use of these technologies across a broad range of
ground, up. The first two chapters are dedicated to building a users makes understanding of this activity vital if information
foundation for the frame. Marchionini begins by defining in- professionals are to develop systems that can support this
formation, using a general definition which “. , . includes ob- heavily used process. To further the understanding, Marchio-
jects in the world, what is transferred from people or objects to nini offers several suggestionsfor design in chapter seven.
a person’s cognitive system, and as the components of internal The last two chapters of the book are devoted to the evolu-
knowledge in people’s minds” (p. 5). Marchionini then goes tion of information seeking and suggestions for future direc-
on to explain information seeking, as opposed to information tions in the creation of information systems. Marchionini fo-
retrieval. Information seeking is “. . . a process in which hu- cusesheavily on the effects of electronic environments, includ-
mans purposefully engage in order to change their state of ing the physical and intellectual consequencesin using these
knowledge. . . . [it] is preferred to information retrieval be- systems. He also discussesconstraints and challenges associ-
causeit is more human oriented and open ended” (p. 5-6). ated with these emerging technologies.
The distinctions made in the first chapter are important for The future directions chapter, which is also the last of the

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE-May1996 405


nine chapters, extends the focus of human-centered systems to harvest patterns of knowledge just as fish extract oxygen
and interdisciplinarity into potential information environ- from water via their gills.” Following his principle of user-cen-
ments. Marchionini presents three scenarios for the reader to tered design, Marchionini has created a well-written text on in-
consider: Examining multimedia, intelligent agents, and im- formation seeking that is easily accessibleby a broad audience.
plants. Each provides considerable “food for thought” for all The extensive bibliography and index sections are quite help-
the disciplines involved in the creation of information systems. ful. and the quotes which open each chapter help to focus the
Marchionini concludes with two principles to keep in mind reader toward the central messageof the text. Marchionini’s
regarding information systems. “First, we should design sys- book is a great place to start building understanding of the in-
tems that amplify and enhance natural capabilities. Second, we formation seeking process.
should pay more attention to the information-seeking process
and the interactions among the information-seeking factors
rather than to technology itself” (p. 196). Marchionini’s book
Janette R. Hill
presents issues and examples relevant to these principles, as Learning and Performance Support Laboratory
well as offers suggestionsfor how to adhere to the principles.
University of Georgia
information Seeking in Electronic Environments is a wel- Athens, GA 30602-7101
come and needed addition to the information science litera- E-mail: janette@coe.uga.edu
ture. It also presents exciting possibilities to be used as a cross-
disciplinary text in several fields. Marchionini states the target
audiences as information science students and professionals, References
and human-computer interaction students and professionals.
However, the basic foundation created in the text would be Dede, C. (1995, July). The transformationof distanceeducationto
valuable in other disciplines as well, including psychology, distributed learning. InTRO [On-line]. Available: http://
computer science,communication, and education. 129.7.160.78/InTRO.html
As the information seeking process becomes integrated into Hill, J. R. ( 1995). Cognitive sfrutegiesand the use of a hypermedia
our everyday tasks of learning, working, and planning, under- informationsystem:An exploralorysfudy. Unpublisheddoctoraldis-
standing the information seeking processbecomes critical if we sertation.Florida StateUniversity,Tallahassee.
are to create systemsto support everyday “needs to know.” Ac- Marchionini, G. ( 1987). An invitation to browse:Designingfull-text
cording to Dede ( 1995), “the core skill for today’s workplace systemsfor casualusers.Canadian Journal for Information Science,
is not foraging for data, but filtering a plethora of incoming 12(3/4), 69-79.
information. The emerging literacy we all must master requires Marchionini, G., & Shneiderman,B. ( 1988).Finding factsvs.brows-
diving into a sea of information, immersing ourselves in data ing knowledgein hypertextsystems.IEEE Compuler, 21( I ). 70-80.

406 JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE-May 1996

You might also like