Selection and packaging - value-added information services, Other Management

Assignment Help:

Selection and Packaging:

Added value is often claimed for information services on the grounds that they bring together, in a convenient form, items of information which would otherwise be impossible to find in one place, and, therefore, difficult to access. The value addition stems from the convenience, thus, offered to the user. If some attempt is made by the information provider to collate, relate or link information from different sources, then greater value addition is likely to be claimed. The expression 'value-added' is likely to be used especially when the information put together is of different kinds, for example, bibliographic and numeric/factual or formal and informal, or information coming from different sources such as, internal and external.

This process of integration is known as repackaging. The integration and repackaging concept can be applied to numeric data sources also as much as to the text. The advent of CD-ROM as a delivery medium for different types of information products and services has given a boost to the concept of added value as it can deliver repackaged information of different forms combined together. Datex Business Inform Service is cited as an example of such service. Datex allows the merging of bibliographic, textual and numeric information from a number of sources, with facilities for data manipulation and presentation.  


Related Discussions:- Selection and packaging - value-added information services

Links in information, Links in InformationTransmission Chain: i)  Sour...

Links in InformationTransmission Chain: i)  Sources of Generation: As discussed in Unit 1, the researchers and their employing oreganisations are responsible for generating in

Types of observation, Types  of Observation: Types of observation rela...

Types  of Observation: Types of observation relate  to  the  observer-observed relationship. It has been described as "concealment and participant", "concealment and non- part

Differentiate between malicious and non-malicious threats, Problem: a) ...

Problem: a) Authentication is the mechanism whereby a system securely identifies their users. Authentication system provides answers to the following questions: - Who is t

Possible challenges and dark-side of an e-pms, "The use of technology in pe...

"The use of technology in performance management has the potential to increase productivity and enhance competitiveness. We believe that appraisal satisfaction is a key concept tha

Acquisition through donations - library administrations, Acquisition Throu...

Acquisition Through Gifts/Donations: Gifts and donations constitute an important source acquisition of reading materials in a library. Many a library has benefited enormously

Working of enterprise project management within the model, Working of EPM w...

Working of EPM within the model The replica of the enterprise functions provides the foundation for implementing a rigorous move to selecting projects that have both strategic

Keiretsu, Keiretsu This is a Corporate conglomerates whose members are ...

Keiretsu This is a Corporate conglomerates whose members are cooperate with each other for strategic purposes within the international business environment; a Japanese term.

Business Improvement Strategies, Hi there i need help in case study assignm...

Hi there i need help in case study assignment. Thanks

Arrangement of entries - library management, Arrangement of Entries   T...

Arrangement of Entries   The actual process of filing starts when sufficient number of cards accumulate.  Preliminary arrangement  In the preliminary arrangement we sor

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd