Information science Study Guide
Study Guide
📖 Core Concepts
Information Science – the study of how information is analyzed, collected, classified, manipulated, stored, retrieved, moved, disseminated, and protected in organizational contexts.
Stakeholder Perspective – problems are examined from the viewpoint of the people, groups, or institutions affected, not just the technology.
Systems Approach – applies information & technology to systemic problems rather than isolated tools.
Transdisciplinary Nature – draws on computer science, library science, psychology, sociology, economics, etc.
Foundational Pillars
Technical & Computational: informatics, data science, network science, information theory.
Organization: library/archival science, ontologies, knowledge representation.
Human Dimensions: HCI, cognitive psychology, information behavior, ethics.
Ontology – a formal, shared vocabulary that models concepts and the relationships among them.
Knowledge Representation – encoding domain facts with symbols + logical rules to enable automated inference.
Information Retrieval (IR) – systems that match queries (formal statements of need) to documents and rank results by relevance scores.
Information Society / Knowledge Economy – societies where creation, distribution, and use of information are primary economic and cultural drivers.
---
📌 Must Remember
Scope – information science covers all stages of the information lifecycle (from creation to protection).
Stakeholder‑Centric – always ask: who benefits / is harmed?
Three Foundations: Technical, Organizational, Human.
Key Applied Areas: health informatics, digital humanities, GIS, knowledge management, cybersecurity, educational technology.
IR Basics:
Query → Index → Retrieval → Ranking → Relevance feedback.
Relevance score often derived from term frequency‑inverse document frequency (TF‑IDF) or probabilistic models.
Ontology vs. Taxonomy – ontology = concepts + relationships; taxonomy = hierarchical classification only.
Information Theory – information content of an event: $I = -\log2 p$, where $p$ is the event probability.
Information Access vs. Retrieval – access emphasizes automation of large‑scale processing; retrieval focuses on user‑driven search.
Cybersecurity Goal – protect confidentiality, integrity, and availability of information systems.
---
🔄 Key Processes
Information Retrieval Workflow
User formulates a query.
System indexes documents (tokenization, stemming, weighting).
Matching algorithm computes relevance scores.
Results are ranked and presented.
User may provide feedback (clicks, relevance judgments) → system updates model.
Ontology Development Cycle
Identify domain concepts.
Define relationships (is‑a, part‑of, related‑to).
Choose a formal language (e.g., OWL).
Populate with instances.
Validate against competency questions (tests of intended use).
Decision Support System (DSS) Process
Gather data from internal/external sources.
Apply analytics (statistics, simulation).
Generate alternatives & evaluate with decision criteria.
Present recommendations to the manager.
Information Seeking (Human‑Centered) Model
Recognize an information need.
Choose a search strategy (keyword, browsing, consulting experts).
Execute search, evaluate results.
Synthesize and apply the information.
---
🔍 Key Comparisons
Information Retrieval vs. Information Seeking
IR: system‑centric, focuses on algorithms & ranking.
Seeking: human‑centric, includes behaviors, strategies, and context.
Ontology vs. Taxonomy
Ontology: concepts + rich relationships (semantic network).
Taxonomy: simple hierarchical classification (parent‑child only).
Knowledge Representation vs. Ontology
KR: general AI method for inference (symbols + logic).
Ontology: a specific KR artifact that provides shared vocabularies.
Information Access vs. Information Retrieval
Access: automation, scaling, text mining, MT, categorization.
Retrieval: user‑driven search, relevance ranking.
Cybersecurity vs. Intelligence Analysis
Cybersecurity: protect systems from threats.
Intelligence: process collected information to inform policy/security decisions.
---
⚠️ Common Misunderstandings
“IR = searching the web” – IR is a broader field; includes any system that matches queries to documents, not just Google.
Ontology = simple list of terms – ignores the critical relational component that enables reasoning.
Information Science is only technical – the human/social dimensions (HCI, ethics, behavior) are equally essential.
Cybersecurity is just firewalls – neglects policy, governance, risk assessment, and human factors.
Digital Humanities = digitizing books – actually uses computational analysis (text mining, network analysis) on cultural data.
---
🧠 Mental Models / Intuition
Information Pipeline – raw data → representation (ontology/metadata) → processing (analytics) → decision/action.
Stakeholder Lens – ask “Who is the owner, user, and regulator?” to map requirements.
Ontology as a Map – think of a city map: streets (relationships) connect landmarks (concepts).
IR as a Library Catalog – but with relevance scores that rank items by likelihood of satisfying the need.
---
🚩 Exceptions & Edge Cases
Public vs. Restricted Access – copyright, patents, and privacy laws can block otherwise “open” information.
Spatial Data – GIS requires geometry & topology handling beyond textual IR methods.
Social Media Dissemination – rapid, user‑generated diffusion changes the classic “sender‑receiver” model.
Non‑textual Information – images, video, sensor streams need specialized representation (metadata standards, ontologies).
---
📍 When to Use Which
Use IR techniques when you have a formal query and need ranked document results.
Apply Information Seeking frameworks when studying user behavior or designing search interfaces.
Choose an Ontology if multiple parties must share a precise, machine‑interpretable vocabulary (e.g., health data exchange).
Pick a Taxonomy for simple categorization tasks without complex relationships.
Deploy Knowledge Representation when you need automated reasoning (e.g., expert systems).
Select Business Analytics for descriptive/predictive insights; move to a Decision Support System when you need prescriptive recommendations.
Implement Cybersecurity controls after a threat‑model assessment; supplement with Information Policy for governance.
---
👀 Patterns to Recognize
“Data → Model → Insight → Action” appears in health informatics, business analytics, learning analytics.
Stakeholder‑Problem‑Solution pattern in case studies of information system design.
High‑dimensional data → Need for ontology or metadata (e.g., bioinformatics, GIS).
User query + relevance feedback loop in most modern search engines.
Automation + Scale → Information Access (text mining, MT) rather than manual retrieval.
---
🗂️ Exam Traps
Distractor: “Information retrieval is the same as information seeking.” – wrong; one is system‑centric, the other is user‑centric.
Distractor: “An ontology is only a classification tree.” – ignores relational semantics.
Distractor: “Cybersecurity only concerns technical firewalls.” – overlooks policy, legal, and human aspects.
Distractor: “Digital humanities merely digitizes archives.” – neglects computational analysis methods.
Distractor: “All information science problems are solved by big‑data analytics.” – misses the importance of stakeholder analysis and ethical considerations.
Distractor: “Knowledge management = business analytics.” – they differ: KM focuses on organizing knowledge assets, analytics on extracting insights from data.
---
or
Or, immediately create your own study flashcards:
Upload a PDF.
Master Study Materials.
Master Study Materials.
Start learning in seconds
Drop your PDFs here or
or