Thursday, October 11, 2012

RA: Open Publishing



Title: Open publishing is the same as free software

Author: Martin Arnison
Publisher: Matthew Arnison
URL: http://www.purplebark.net/maffew/cat/openpub.html

ABSTRACT


Open publishing has been a response to the various changes of information behavior. Information is supposed to be free but multinationals have created and have been creating ways to profit over its distribution. Apart from not having any advertisements that somehow alter the presentation and the the process by which information is acquired, open publishing gives the opportunity to the society to share their stories and their side of the news.


What I learned

Software is information and information has become expensive. Through years and years, multinational corporations have made it difficult for people to acquire information, in almost all forms. Open Publishing is said to be a solution, and a movement, that gives the right to information back to users.

Keeping information accessible has been the job of librarians. One example of a collaborative movement to publish is Wikipedia. You can upload information, and publish it while other members or account holders can edit the information if ever there is a need to.  According to Arnison, Microsoft sees this as a problem since they pay billions of dollars to keep information secret and out of public access. Moreover, Arnison thinks that these kinds of corporations assume that their users are stupid. these corporations operate on the fact that the users are not creative and innovative enough. This is a mistake of media corporations which they are now getting a glimpse of.

Indymedia is an example of an open publishing movement. It started when activists were ignored by media in the 90s when an organized mobilization was made against the Vietnam war 30 years earlier, and perhaps other issues. In response to this, a group of programmers devised a a dynamic content system that would enable the activists to bring their movement to the world and make the world know that the government is trying to filter a mass movement. The system also enabled the activists to post text, articles. comments without censorship. One is able to hide content somehow, but is not able to delete them.

One may think that the voluminous amounts of information that may need to be revised or proofread or even verified can be an issue.  Eric Raymond, of ISOC-IL, sees this as a quick fix. If information is freely published, people will have access to it; and when there's something wrong, the author will automatically know because readers have the freedom to correct the author. In the event, the author can quickly fix the issue. If one would examine the system of users doing the verification and "quality assurance" of some sort, it would seem that open publishing treats users of equal importance and skill as the authors. the user is empowered and this would build the confidence of users to publish more competitive material for public consumption.


Reflections

I do think that the best feature of open publishing is the empowerment of users, and treating them as of the same status with the author of information. This can however be a drawback as well. This is not a perfect world and it is rather unlikely that no man will not attempt something evil in this kind of freedom provided. If we look at the system as empowering, it can definitely empower not just the better users, but also the bad tomatoes out there. As an information professional, one must be able to provide careful and vigilant watch over these types of systems. Users, in the event of empowerment should also do the same. There is still some room for improvement in open publishing, but definitely it is something that librarians should take a look at. Having this type of system in a library set-up, especially in libraries who cater to students would help libraries empower students and prepare them to be more vigilant in acquiring, accepting and using information. This would entail careful bibliographic literacy training but it is some burden which will be most worthy to undertake.



References



Electronic sources

Arnison, Martin. (2001).Open publishing is the same as free software. Retrieved October 1, 2012, from http://www.purplebark.net/maffew/cat/openpub.html

Raymond, Eric. The cathedral and the bazaar. ISOC Online Magazine. Retrieved September 12, 2012, from http://www.isoc.org.il/magazine/magazine3_8.html

West, Guy. (2000). Publishing/ journalism open.  Retrieved September 20, 2012, from http://www.cybered.org/open_jur.html

Friday, August 24, 2012

RA: Health Concerns of Computer Use


Title: Computer health and safety

Author: Lasa Information Systems Team
Publisher: Lasa Knowledgebase
URL: http://ictknowledgebase.org.uk/healthandsafety

ABSTRACT


In the United Kingdom (UK), legislation has been positioned to respond to the growing need of computer usage and its effects to users' health, focusing on computer users in the workplace. Problems related to computer usage like eye strain, continual and recurring discomfort, numbness and stiffness can pose long-term health risks. Preventive measures that should be put in practice by employers include the provision of a healthy, safe and non-straining workplace, properly and suitably positioned furniture and materials necessary for work processes and, medical assistance for prevention and treatment of work related health risks.



What I learned

We all know how technology has brought a lot of things and how it made almost everything possible. In the past we used to just use mechanical type writers and photocopiers. Now we can have it all done just conveniently in front of the computer. Workplaces benefited enormously from the emergence of computers. Work processes in, if not all, almost all industries have evolved in almost all levels. Rather than going through the usual 15 minute walk to the library for the printed book you are looking for, you can retrieve your reading list via your online class community, then download it to your tablet's drive then read it as you enjoy lunch. We chat with our friends over web based social networking sites instead of running down the stairs and reaching for your land line. We do not even need to stand in line at the grocery because we can have them ordered via the internet, then delivered right at our doorstep.

We learned how to make use of technology to our advantage. In the event, we got immersed into it and, one good thing, we realized how the best of it has a price. Employing such media as the internet and the internet evolving into a repository of the different facets of life as it is, has increased our exposure to computers and devices with display monitors. If books in the library gave some people paper cuts, that flat screen LCD monitor though which you proofread the articles you write for your boss can cause eye strain and can even chronic back pain. New life processes: new complications. With the evolving media by which we stay connected to our family, at work, in school, etc., it is recognizable that the regulations governing work processes in consideration of employees' and users' welfare should be adapted and enforced.

In 1993, a law was passed in UK providing regulations on health and safety when using computers in the workplace. It suggested ways on how to suitably respond to the physiological effects of increased computer usage, which is currently growing more in more. The law had placed the much needed attention to computer users health and other health risks posed by technology. This can serve as a benchmark of user protection and security policies in private companies and in libraries as well. As an employer, customizing a policy in response to the growing needs of your employees with regard to prevention of computer or technology related health risks would not only ensure the continuity of production but also the trust and security of of your constituents. In the library setting, making user that users get "breaks" from computer usage would help establish trust and rapport between information professionals/librarians and users. A written policy visible to the users of your library or information center about computer usage, its effects on health and measures that address the said effects will help build security and a sense of community among users, with a common feeling of being taken cared of using information.

There are also local efforts that recommends evaluative measures of computer usage so as to determine if the said usage is excessive or not. The Department of Labor and Employment Occupational Safety and Health Center has developed technical guidelines, basically some facts about computer usage and its effects on health, and some sets of questions that survey your usage with some suggested measures to ensure that computer usage does not result to health problems.


Reflections


More definitive laws which are adaptive and responsive to changing demands should be legislated. Though this entails careful study of information behaviour and the effects of the media or environment by which it is transmitted to its users, it will be worth the time. Much like anything and everything in this world, technology will affect us in more ways than one. As information professionals, our job does not only include provision of information. The health and safety of library users is also of major concern. Upholding health and safety standards or policies will make your users secure. I myself would want to feel that the institutions I frequent especially those whose aim is customer service are concerned also for my health. This can help establish the role of libraries as information centers.


References


Books



Department of Labor and Employment Occupational Safety and Health Center. (2007). Technical guidelines on safety and health for contact centers. Retrieved August 11, 2012, from http://www.oshc.dole.gov.ph/29/OSH-INFO-MATERIALS/


Articles

American Optometric Association. (1997). The effects of computer use on eye health and vision. Retrieved August 4, 2012, from http://www.aoa.org/documents/EffectsComputerUse.pdf

Lasa Information Systems Team. (2003). Computer health and safety. Lasa knowledgebase. Retrieved August 06, 2012, from http://ictknowledgebase.org.uk/healthandsafety

Paget, H. (2009). Long-term health risk tied to computer use. 9NEWS. Retrieved August 10, 2012, from http://news.ninemsn.com.au/health/981603/workers-glued-to-computer-face-serious-health-risk

Williams, B. (2008). Health risks associated with extended computer usage. Ezine @rticles. Retrieved August 09, 2012, from http://ezinearticles.com/?Health-Risks-Associated-With-Extended-Computer-Usage&id=1417515


Electronic sources

The National Archives. (1992). The Health and Safety (Display Screen Equipment) Regulations 1992. Retrieved August 05, 2012, from http://www.legislation.gov.uk/uksi/1992/2792/introduction/made

Friday, August 10, 2012

RA: Open Access Journals for Libraries


Title:  Framing the issue: open access
Author: Association of Research Libraries, Office of Scholarly Communication
Publisher: Association of Research Libraries
URL:   http://www.arl.org/bm~doc/framing_issue_may04.pdf 

ABSTRACT

Access to information is important to the development of a society. There are however some factors that deter access to information. The rising prices of subscriptions, monopoly of electronic journals from commercial sources and merger acquisitions all have affected the public's access to information and the library's ability to purchase information sources for public consumption. Legislative and legal issues also have begun to interfere with the concept of fair use.


Despite these hindrances, open access has gained more ground through the collaborated efforts of various institutions. PubMed Central, BioMed Central and arXiv.org e-Print archive are examples of open access journals which are supported by organizations to promote and provide access to information at no cost to users.


What I learned

The role of libraries to provide information has been, since time immemorial, the core of library and information services. Despite the fact that libraries are usually non-profit by nature, librarians have made it possible to provide information needs of their specific users. Access to information however, especially in the advent of the internet has increased by a million-fold. Daily, more and more information sources are being added to vast online environment. The emergence of this unique property of the internet increased the demand for speedy-one-click-of-a-button access to information.


The wide array of sources and their availability and property to be transferred and shared in an instant have been however made a venue for commercial and private companies to draw profit from users, most especially in research and development. The prices online subscriptions to journal articles, periodicals, etc. sky-rocketed, building the difficulty for libraries to acquire information for public consumption. The right of the source of information or the authors have become, time and again, an excuse for these companies to increase their costs.


The open access effort is continually paving the way for users to get the information they need at no cost, or at the very least, at a very minimal expense. Examples of these initiatives are the Budapest Open Access Initiative (BOAI), Scholarly Publishing and Academic Resources Coalition (SPARC) and Public Library of Science (PLoS. All of which cater to users, free of charge. Some issues on copyright have been raised midst these efforts for open access. According to the Office of Scholarly Communication of the Association of Research Libraries (2004), open access is still compliant to the legal rights of authors and producers since agreements between authors and publishers or producers of open access journals because "authors still retain control over the integrity of their work" and as always, they still have the right to be acknowledged and cited.


Reflections

Open access journals basically contribute to the performance of the role of libraries and librarians. Mostly scientific and scholarly in nature, these sources provide and help a society build its knowledge through the production of new information. Researchers bank on the availability of current peer-reviewed research to make way for new ones. This definitely would affect not only librarians but researchers from all fields of study. This however, may prove difficult to be achieved in environments like our country where all seems to come with a cost and everything is marked with a price tag, even if the service is only for research. Perhaps what information professionals and other capable disciplines or authorities should primarily recognize is the role of information in the society, how it can mold the society into development, and, that everyone should have access to information. Upon this realization, libraries should also establish their worth in the society to gain more support of commercial entities, the government and most especially the users.

References


Articles

Association of Research Libraries. (2004). Framing the issue: open access. Retrieved August 6, 2012, from http://www.arl.org/bm~doc/framing_issue_may04.pdf

Suber, P. (2004). Open access overview: focusing on open access to peer-reviewed research articles and their pre-prints. Retrieved August 4, 2012, from http://www.earlham.edu/~peters/fos/overview.htm

Suber, P. (2012). A tale of two bills: the Research Works Act and Federal Research Public Access Act. SPARC Open Access Newsletter, 163. Retrieved August 08, 2012, from http://www.earlham.edu/~peters/fos/newsletter/03-02-12.htm

Web Pages

Lincoln City Libraries. General format. Retrieved August 6, 2012, from http://www.lincolnlibraries.org/index.php

Wednesday, July 25, 2012

RA: Digitization

Title:  Digitization of library resources: challenges and implications for policy planning.  
Author: Beatrice Ayudeji Fabunmi, Matthew Paris, & Martins Fabunmi
Publisher: Open Journal Systems
URL:  https://ojcs.siue.edu/ojs/index.php/ijaaas/article/viewFile/80/142 


ABSTRACT



Digitization is a process by which materials housed in a library like books, manuscripts, theses, works of art, etc. are converted to digital or electronic format. In line with the intrinsic mission of libraries and information centers to provide information to its users, digitization enhances the access to information and contributes to the preservation of library materials. Though beneficial, the process of digitization poses certain risks and challenges which have a significant effect to a library's or information center's policy planning. The digitization process may push libraries to expend more resources than the usual but it is deemed to be of importance in modern libraries to respond to the changing needs and demands of users.

What I learned

The advent of the information age, with the emergence of various technologies most especially computers and the internet has brought about advancements in handling information. These factors have proven themselves useful in making information available, providing users with better access. Digitization is part of these technologies that has paved the way for library services to be improved.

The digital format or electronic format with it's unique properties and the usability it gives both librarians and users have made its way to all parts of the world. The process involved, digitization, makes provision of service faster via the internet and also allows different users to access a material at the same time. Just thinking of all these benefits helps librarians become optimistic about the information profession. However, one may ask, what is the cost of all these?

According to Milagros Santos-Ong of the Supreme Court Library Services, it took managerial, financial and technical support for the Supreme Court Library to digitize (2006). Of these three factors, financial support is most likely the hardest to attain, especially that libraries are not primarily profit-generating institutions. Most libraries just depend on a limited budget, not to mention, sometimes, just single person to tend on the whole collection. Resources is one major factor that one must consider when planning a digitization project.

Conway (2000) has identified that a successful digitization project "lies in a thorough understanding of the relationships among" the characteristics of the materials you will be converting, your library's technical capabilities and the purpose of your digitization. To make these ends meet, on has to obviously employ financial resources, time, and manpower. Obtaining these resources expends even more resources. Definitely, librarians have to think it through and consider a lot of factors prior going through digitization.

Reflection

We all should go back to the basics when deciding on a big step such as digitization: our users. Yes, digitizing materials can help "protect..., represent..., and transcend..." library and information resources (Conway, 2000). Digitization can make a lot of things possible for users and librarians, when it comes to managing, preserving, handling, disseminating and accessing information. It all does that. But the big question really is "why digitize?". Perhaps this is the hard part.

I am not practicing a librarian but I believe in making use of technology to make things better, especially access to information. The need for digitization should be established enough for a library to go through it. It is a very good investment, undoubtedly. But your limited budget can go to other projects of immediate need as well: new and better resources, qualified staff and the old computers that may need replacing or upgrading. Though keeping up to the trend is what information professionals should thrive in, we do not have to always do it, especially in these hard times when practicality and ingenuity is better than being trendy and hip.


References

Articles

Fabunmi, A. B., Paris, M., & Fabunmi, M. (2006). Digitization of library resources: challenges and implications for policy planning. International Journal of African and African American Studies. 5 (2), 23-36. Retrieved July 25, 2012, from https://ojcs.siue.edu/ojs/index.php/ijaaas/article/viewFile/80/142

Unsworth, J. (2004). The value of digitization for libraries and humanities scholarship. Retrieved July 26, 2012, from http://people.lis.illinois.edu/~unsworth/newberry.04.html#

Santos-Ong, Milagros. (2006).  Digitization: pros and cons. Information and Communications
Technology in Library  Trends, Security & EthicsRetrieved July 26, 2012, from http://paarl.wikispaces.com/file/view/digitizationprosncons.doc

Books

Northeast Document Conservation Center. (2000). Handbok for digital projects: a management tool for preservation and access. Retrieved July 25, 2012, from http://www.nedcc.org/resources/digitalhandbook/dman.pdf

Thursday, July 19, 2012

RA: Utilization of Social Networking

Title: Libraries making good use of social media and web 2.0 technology
Author: ALA
Publisher: ALA
URL: http://www.ala.org/news/mediapresscenter/americaslibraries/socialnetworking

ABSTRACT

A great fraction of libraries in the US has been making good use of social media and web 2.0 technologies to reach their audience and market their services, though there are still some libraries who do not make use of the said technologies. Cindy Romaine, president of the Special Libraries Association said that this is a manner by which information organizations adapt to the fast changing times. She considers this a strategy to become "Future-ready." Some users consider e-mailing an "antiquated way" of communicating so some librarians use Facebook to send messages to some of their users.



What I learned
 
Social networking refers to a process of building connections, relationships and a community among people of common interests or goals. It is a concept more popular in the internet today. These networks allow members to interact with each other through web posts and other features that basically are in line with any specific group/ social networking site's purpose or goal. Some social networks allow professionals to share trade secrets or updates in their specific fields of interests while some just keep the members updated of each other's whereabouts on a daily basis. The concept has already been used by different institutions including schools, government offices and libraries.

The interactivity and the real-time updates makes social networking a viable tool in the library setting as it can provide a venue for librarians, library users and other libraries to communicate and discuss concerns, updates in the collection, queries, etc. It provides information which are readily accessible with a click of a button and an effective way to get relevant information to its targets.

Communication is vital in deciphering the needs of library users and online social networks provides this need. The interactivity and various features which may be tailored to fit the needs of a specific group (e.g., a librarian and his/her library users) paves the way for librarians to get the public not only informed, but also more interested in making use of libraries.

Reflection

This generation spends most of its hours online. Taking advantage of this will get libraries more involved with the users, and in turn, users, especially those of the younger generation will definitely appreciate the role of librarians. Undoubtedly, in this country, role of librarians are not as established in the minds of the younger generation as the role of Google.com is. A number of public libraries I have studied a few years back recognizes this. But with the emergence of technologies and new ways of interaction with library/information users, librarians can better their services. This convergence of technology with library/information services which is already being practiced in other countries, can truly pave the way for libraries and librarians in our country to keep up with the increasing demands of information seekers.

References

Articles

American Library Association. (2011).  Libraries making good use of social media and web 2.0 technology . State of America’s Libraries Report 2011Retrieved July 18, 2012, from http://www.ala.org/news/mediapresscenter/americaslibraries/socialnetworking

IFLA. (2010). Value of social networking in libray and information organizations in Asia and Oceania. World Library and Information Congress: 76th IFLA General Conference and Assembly 2010. Retrieved July 18, 2012, from http://www.ala.org/news/mediapresscenter/americaslibraries/socialnetworking

American Library Association. (2011).  A plethora of devices, in use by all generations. State of America’s Libraries Report 2011Retrieved July 18, 2012, from http://www.ala.org/news/mediapresscenter/americaslibraries/socialnetworking

Unpublished works

Generao, C.A B. (2008). A study on the effectiveness of programs and activities held by the Manila City Library system in the promotion of its library. Unpublished B. L. I. S. thesis, University of the Philippines Diliman, School of Library and Information Studies.

Friday, July 13, 2012

RA: How can I benefit from web 2.0 technology if I were a librarian?



"Web 2.0 thrives on network effects: databases that get richer the more people interact with them, applications that are smarter the more people use them, marketing that is driven by user stories and experiences, and applications that interact with each other to form a broader computing platform." (Blue Coat Systems, Inc., 2011)


Some web 2.0 technologies and their use in a library setting


Google Maps is a web-based mapping service technology powered by Google. In a library, it can be an electronic substitute to a map of  various locations around the world  -- could be every city, street, corner avenue. It's most usable when travelling  and can definitely be part of the library services for students, people who just moved in town, tourists visiting a local attraction and those looking for the local deli. The librarian may have to study the features of this application in order to maximize its use and fully assist library users.


Web logs or more commonly known as Blogs are web pages with various uses but is basically intended to work like a log, or a journal. People subscribed to a blog will receive e-mail notifications of updates on that specific blog. Libraries can use this service to provide users regular updates. Libraries can coordinate with teachers to have their students subscribe to the blog for updates on more current sources. The interactive functions of commenting and automatic updates through subscription make it easier for librarians and library users to get in touch with each other. Librarians can post new acquisitions, updates on usage guidelines and policies, promotions, acknowledgments, etc. The librarians imagination is the limit. Some may even get extra profit from advertising through blogs.


Content Management Systems (CMSs) are also good examples of web 2.0 technologies. There are some CMSs which require licenses but there are some which are available open source. Libraries can use this and can even build resource sharing among various public libraries, even those from off shore. Soft copies or downloadable and printable file types can be shared through this type of system. Librarians can also coordinate with teachers to use this system to have files retrieved and assignments uploaded and submitted.


With the fast changing technology and the availability of such advancements, the librarian's role to provide information with the least amount of resources in the shortest possible time can be achieved. These technologies not only enhance the library's capacity to manage and provide information but it also keeps them upgrading and keeping up to the trends in the field of information service.


References


Articles and Book Chapters


Blue Coat Systems, Inc. (2011). Technology Primer: Web 2.0. Retrieved July 11, 2012, from http://www.bluecoat.com/sites/default/files/documents/files/bcs_tp_Web20_v3b.pdf
x




Center for Online Research and Service, University of Illinois Springfield. Web 2.0. Retrieved July 12, 2012, from http://www.uis.edu/colrs/learning/technologies/web20.html


Oreilly, Tim. (2007). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. Communications & Strategies, No. 1 First Quarter 2007 (p. 17). Retrieved July 12, 2012, from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1008839


University of Delaware. School of Education Educational Technology - Course Frameworks. Retrieved July 9, 2012, from http://www.udel.edu/fth/courses/web2resources/index.html


Electronic Sources


Opensource CMS. (2012). [home page]. Retrieved July 11, 2012, from http://www.opensourcecms.com/

RA: Computer and Internet Security/ Copyright

Title of the Article: Privacy in the Digital environment—issues for libraries
Author: Michael Gorman
Publisher: IFLA
URL: http://archive.ifla.org/IV/ifla67/papers/145-083e.pdf

ABSTRACT

Technology has brought both advancements and some serious issues to ponder on like privacy. It is said to be barely achievable in our technology laden age where almost everything is accessible via the internet. Though the internet's availability does not automatically mean exploitation and unethical usage, there could still be users well-endowed with the talent of using technology to do so despite due legislation and regulation. Technology has become a solution and at the same time a problem, in various aspects. This challenges the role of information professionals, most especially in the public library setup: to supply free access to the internet, and include privacy policies and tools for guidance in using that access. Though librarians themselves access information and data like user and circulation statistics, these are done with good intentions. Internationally recognized principles and technology with matching policies built around your information center's clientele would do well with proper maintenance and regulation.


What I learned


"You already have zero privacy -- get over it!" This is William Miller, quoting the Chairman of Sun Microsystems  in Library Issues: briefings for faculty and administrators. People may not agree. I, personally, believe in privacy because I do have some thoughts that remain in the portals of my brain. However, one could only believe this for now, until new technology that can track and monitor thoughts comes out. It can be a bit of a stretch but with new developments almost everyday and every hour, the possibilities of making internet and technology work together to make various things happen are endless; and privacy is just a fraction of the issue. There is the legal right which warrants public access to relevant information; censorship, that regulates access under considerable relative parameters; and, the vast internet itself which has been rendered a little too responsive to our daily needs. Librarians themselves use private information like user information and circulation records in users needs analyses. Though this is aimed at library service improvements, their access poses some feelings of threat on the involved parties who perhaps want to conceal their usage of materials with "sexual content, etc. -- and extend to, for example, materials on diseases, English professors borrowing Danielle Steele books, “happily married” people borrowing books on divorce, and musical snobs borrowing hip-hop records..." (Gorman, 2001). If both privacy and maximized usage is the aim of an institution or a community in need of information, technology can either satisfy or hinder their goal.

Proper usage of the internet, information and the technologies that are bound to them is something information professionals can perhaps improve and instill to information users. User education and instruction with properly designed privacy policies still remain appropriate solutions. With the emergence of various electronic sources and the usability of such in various media and formats, regulation of access can be a venue where modern information scientists can put their expertise to good use. While drawing the line between private and public information has been a tiresome pursuit, so is the question of purpose in the ethical sense. This highlights and challenges the role of librarians, especially in the public library where information is freely given to the public. Librarians should instill in themselves a sense of urgency against information security especially when user information. New technologies like "self-check" devices can help librarians secure library users of the privacy in a library. A visible privacy policy can also make the users comfortable in their information search.

Reflection:

The need and desire for privacy comes naturally to the society. This has sprung from the possibilities of threat  posed by the fast-changing and developing technology. I personally have no issue against total access to information (in a general sense). The only purpose of usage a librarian can know of is the purpose a library user discloses. It remains the purpose the librarian knows of whether the library user changes it along the way or not. To judge whether information will be used ethically or not may need a higher level of experience and vigilance. Perhaps the question of which is the best approach is irrelevant as of the moment. An effective approach however should be considered. New technologies pile up like bills and adapting to the haste may take a lot of resources; thinking of a specific best approach alone can take ages. Starting with a privacy policy and teaching the users how to use information is a big effort. Perhaps new technologies can be used to further computer and internet privacy. What is important is the users know of these measures that keep them secure. This level of security will enable them to be confident in using information and taking care of the information they use though a carefully guided access.


References

Articles

Gorman, Michael. (2001). Privacy in the Digital environment—issues for libraries. Retrieved June 27, 2012, from http://archive.ifla.org/IV/ifla67/papers/145-083e.pdf

Mason, O. R., Mason, F. M., & Culnan M. J. (1993). Ethics of information management. Retrieved June 28, 2012, from http://www2.hawaii.edu/~donnab/lis610/mason_et_al_only_1995.pdf

Milojicic, Dejan. (January, 2000). Internet Technology. IEEE Concurrency,  8 (1), 70-81. Retrieved June 27, 212, from http://www.hpl.hp.com/personal/Dejan_Milojicic/Internet.pdf

Friday, July 6, 2012

RA: Computer Ethics/ Netiquette


Title of the Article: Ethics and information technology- some principles to guide students
Author: Sonia Bodi
Publisher: North Park University
URL:http://www2.hawaii.edu/~donnab/lis610/bodi_1998.pdf

ABSTRACT

The emergence of information technology and its integration with certain information systems such as the internet and the library has brought about issues on ethical use of information like intellectual property rights, plagiarism, piracy and privacy. The widespread and readily accessible electronic resources made available by the internet is prone to unethical usage due to its unique properties (transmission to various media and formats). In the face of this information age where the need for information is growing against the need for security and protection, the role of information professionals is challenged most especially in guiding students and the academe toward the right action when using information.

What I learned

The society needed a system that could keep up with its changing needs. Information technology made this possible. But ever since information technology has grown, it seemed like the society is the one having the hard time to keep up. One aspect of this concern can be explored by pondering on the issues of ethical use of information. Efforts have been established and positioned to address the security and intellectual property issues. But what about fair use and the right to information access? This is where the issues are.

This has been a source of various discussions and debates, especially in the discipline of librarianship. As guardians and custodians not only of physical books but also of electronic information, usage and access is a major concern. The long fight for the right to equal access to information has took its place in the history of society and, more than ever, now is a good time to address the issue; now that internet and web based applications are growing in quality and access to information has greatly increased as well, not to mention photocopying full book copies.

According to Sonia Bodi (1998), "ethics is not an exact science but ethical inquiry does provide a basis for choosing proper actions based on rational principles and sound, carefully reasoned arguments." In the plight of the society's growing need for information, information professionals should try to use techniques and queries to find out the goal of information usage, not only for security of copyright but also to find out the right type of information needed. As for library users, like students, they should just try to do what is just and right: accessing information, using it (putting it to good use), then giving credits to the source. As a critique, one should consider the two sides of the coin when it comes to accessing information: the creator of the information and the researcher who is in need of the information. One must be able to distinguish a correct balance between information use and availability, and a respect for property; between the need of the researcher and the rights of the copyright owner. Copy-pasting online information for class assignments is one thing; citing them correctly is another. Disrespect of ownership by not citing the source of information correctly not only is unethical as plagiarism  but also invasion of privacy. A work which is not cited properly in a research is like a work used without permission. These issues cannot be separated, much like the concepts of usage and access. If usage is allowed, complete access is not always automatic; and in a situation where usage is done without proper citation, usage is improper. If improper usage has been deemed by the owner of the information, permission will most likely be revoked. And since it has already been used, the one who misused it have, technically, already accessed it without permission. 

Bodi considers librarians stakeholders and guardians in the information infrastructure and they should take part in building confidence in the ethical use of information for the growth of the public knowledge. Library instructions are key to getting library users, most especially students, familiar with the concepts of information usage and its importance. Letting them know how the system works and how one should abide by the basics can somehow make them appreciate what you do, what you tell them, how should they approach it and how the entirety affects them and the satisfaction of their needs. Librarians, more than ever, play a vital role in managing and providing access to the vast sources of information online. With teachers and other members of the academic institution, librarians have an important function in making sure that information is protected however made available for users under regulated and appropriate access: one that credits the sources properly and benefits the growth of public knowledge through further and related study.

Reflection:

With more power comes a greater responsibility. It has become a cliche, but it is a truth that describes the plight of the vast and growing parts of the information infrastructure. When accessibility was achieved, the limitless possibilities of information technologies has rendered us vulnerable to unethical usage and abuse. Perhaps, the role of librarians is vital in this predicament, given the nature of the profession. But he alone is not responsible. To fight the evils of the information age, all should make a move. Recognizing a social responsibility to protect, secure and make sure that the information available is properly used is the role of all members of the society.

Sources

Articles

Bodi, S. (November, 1998). Ethics and information technology- some principles to guide students. Journal of academic librarianship. Retrieved June 25, 2012, from http://www2.hawaii.edu/~donnab/lis610/bodi_1998.pdf

Gorman, Michael. (2001). Privacy in the Digital environment—issues for libraries. Retrieved June 27, 2012, from http://archive.ifla.org/IV/ifla67/papers/145-083e.pdf

Milojicic, Dejan. (January, 2000). Internet Technology. IEEE Concurrency, 8 (1), 70-81. Retrieved June 27, 2012, from http://www.hpl.hp.com/personal/Dejan_Milojicic/Internet.pdf

RA: Internet Technologies/ Web-based technologies

Title of the Article:Internet Technology
Author: Dejan Milojicic
Publisher: IEEE Concurrency
URL: http://www.hpl.hp.com/personal/Dejan_Milojicic/Internet.pdf

ABSTRACT

Dejan Milojojic of Hewlett Packard Laboratories featured people who took part in bringing the Internet technical revolution -- Erik Brewer of Inktomi and the University of California at Berkeley, Fred Douglis of AT&T Labs–Research, Peter Druschel of Rice University, Gary Herman of HP Labs, Franklin Reynolds
of Nokia, and Munindar Singh of North Carolina State University -- and their insights on internet and web-based technologies: what brought about its emergence, how it affects the internet and it's future, technologies that will dominate the web's future, some controversial technologies and issues on privacy and security.

What I learned

We are all aware that today, the Internet can be accessed anywhere. You can go to the beach and read your mails. You can get your flight schedule changed while getting a foot spa. Now, it's on people's phones... and on land line units, even. According to Gary Herman, director of the Internet and Mobile Systems Laboratory in Hewlett-Packard Laboratories, Palo Alto, CA, and Bristol, UK, a factor that made this possible is the gradual cutbacks on the cost of technology. The Internet that gives people the liberty to create, publish and access information just became affordable. Before this, however, information assembly and dissemination took much needed time and resources. The emergence of advanced technologies revolutionized the processes in the information infrastructure at an expensive cost, at first. But as new technologies developed, and as these new technologies chop and change, older (yet still relatively new) ones became affordable, faster.

We have come to a time that almost everything can be done via the internet: send postcards, research, spell check, purchase items, shop, etc. This current state of technology has been foreseen by Eric A. Brewer (2000), chief scientist and co-founder of Inktomi Corporation (a search company acquired by Yahoo! in 2003). He said that the most important force that will push the internet at the center of the information infrastructure is the need to always be on-line (always-on principle). True enough. The Internet has established itself a need to the many facets of human living. It came fast and we have now made it (internet and web-based technologies) responsive to the growing needs of the society as a unit that continually learns and strives to upgrade itself.


Peter Druschel, an assistant professor of computer science at Rice University in Houston, Texas predicted 10 years ago that the possible areas where major application of internet and web-based technologies would be seen in electronic commerce, distance education, distance collaboration, and entertainment (2000). Head of the Distributed Systems Research Department at AT&T Labs-Research and professor at the Princeton University and the Vrije Universiteit, Amsterdam, Fred Douglis, considered e-commerce, pornography, interactive chat rooms, and games also as targets of the internet and web-based applications. These forecasts somehow came true.

Today, advertising and e-commerce is one of the drivers of profit in web-based technologies and applications (Douglis, 2000). The more users you have, whether you offer your web service for free or not, the more advertisers you can have -- bottom line: more profit. If your blog has thousands of subscribers, you can get more advertisers invest in your page. As relevant information is disseminated, advertisements pop-up, almost on all web pages. To get these ads to work and rendered effective, from a marketing perspective, information from internet users like demographics, statistics, and the like, are needed. The question now is "How is the marketing information obtained?" According to Douglis, lack of privacy comes into the picture in this specific situation.

The possibilities with the internet as of now seems endless and access to all these technology over the world wide web have become venues of controversy. Its attribution to "being limitless" alone is of great importance. If information is easier to assemble and disseminate, then access, what controls do these internet or web-based technologies have? Who controls access to it? These are issues tackled in the November 1999 Internet Engineering Task Force meeting (Reynolds, 2000). According to Franklin Reynolds, a senior research engineer at Nokia Networks and works at the Nokia Research Center in Boston,"Security and privacy-related technologies are already the most controversial, and I expect the controversy to intensify in the future. There are many issues, for example, should a government be able to eavesdrop on your Internet use? Should your employer? (2000) Nonetheless, online advertising, the need for internet-user information, and security and/or privacy are risks and, at the same time, contributing factors to the development of better web-based and internet technologies that we just have to accept an adapt to through standardizing measures. Munindar Singh, an assistant professor in computer science at North Carolina State University, author of Multiagent Systems, predicted correct that security standards shall be established and people will be able to check their privacy requirements. Perhaps, this is where the role of the information professional comes in.

There are a couple of perspectives from which one can view the role of an information professionals in the reinforcement of information privacy. If the information professional is a librarian and in a library setup, perhaps, he can help with ensuring that passwords are kept confidential in accounts in subscriptions of users to different web-based applications. In the corporate setup, database administrators and electronic resources personnel can make sure that the in-house information is stored properly and various controls of access are established and enforced. Standards for information management and security can also be observed. There are various organizations, like the International Standardization Organization (ISO), that currently concentrate in various process and operational standards in all fields, that give accreditation to various industries (e.g., for service industries, ISO 2008). These measures of standardization have been used by some private companies as basis for acquiring and/or hiring different kinds of services. It's their way of making sure that the service they intend to pay for are adherent to internationally recommended standards or processes. The information professional can initiate this in a private company as a chance to document the entirety of the company's processes, in the aim of improving and recording the progress of the improvement effort.

Internet and web-based technologies will continue to affect the different aspects of our lives. In this age, everything updates faster and these updates are disseminated almost real time. Certainly, the process will just go on as long as the society's needs and demands grow and change. The wide array of technology that one can work with are accessible; and this accessibility pushes a challenge when security and privacy or censorship comes in the picture. As Singh said, "with security, people are either extremely careless about it or they’re really paranoid about it -- with nothing in the middle." The role of the information professional is to carefully draw the line between security, fair usage and privacy.

The internet has brought us a lot of good as much as it has brought a jigsaw to solve. It has rendered our society equipped with the tools and information sources. But with these tools are risks which should be viewed as a challenge to adapt to. Which outweighs which? Perhaps it all depends on how we manage and regulate the enormity of benefits web-based technologies can provide.

Reflection:

With the emergence of these web-based technologies, the manner by which information is processed (from origination/creation to usage) is revolutionized. It continually adapts to and affects the information needs of the society. The society and these technologies are both powerful forces. At some point, the society has made technology possible. But as time went by, the same society that made technology possible is immersed in anxiety and enormity of possibilities brought about by the same technology they made possible. Which affects which? Is the information infrastructure a growing organism? The challenge to the society falls upon the hands of information professionals like us, in the advent of the digital age. Managing information storage, retrieval, preservation and dissemination, as according to carefully studied user needs, the basics, can also be applied to these situations. Information professionals should gear themselves toward making these internet and web-base technologies work for the society and not the other way around.


Sources

Articles


      Milojicic, Dejan. (January, 2000). Internet Technology. IEEE Concurrency,  8 (1), 70-81Retrieved June 27, 2012, from http://www.hpl.hp.com/personal/Dejan_Milojicic/Internet.pdf

Turgeon, A. J., (May 29, 2002). Implications of Web-Based Technology for Engaging Students in a Learning Society. Journal of Public Service and Outreach 2(2), 32-37. Retrieved June 25, 2012 from http://www.adec.edu/user/resource/turgeon-implications.html

Gorman, Michael. (2001). Privacy in the Digital environment—issues for libraries. Retrieved June 26, 2012 from http://archive.ifla.org/IV/ifla67/papers/145-083e.pdf



Friday, June 29, 2012

RA: Role of the Computer in Information Storage and Retrieval Systems (ISRSs)

Title of the Article: A key resource for the jobless, entrepreneurs – and the community
Author: ALA
Publisher: ALA

ABSTRACT

The American Libraries Association (ALA) report presented the status of public libraries in the USA, in the year 2011. It reported how the existence of computers in libraries help a community better the lives of its citizens. Public libraries are still considered an institution of great importance as they help in the entrepreneurial interests of the people through the availability of computer workstations for the public. The libraries have proven themselves of great value to the people. However, these same new and advanced technologies and other new processes of library and information may endanger the role of librarians in the said valued-service provision of libraries to the information needs of the public.

What I learned

It’s great news that US public libraries have found means of helping communities during the recession. Despite the budget cut of these non-profit social institutions, they still have proved useful. Computer workstations are made available by public libraries, helping the community conduct job searches and providing them with internet connectivity. These computers have been great helps to the role of librarians as information professionals.

In the advent of the digital age and the information revolution, these computers which help information professionals and libraries deliver their work with efficiency, has also put some pressure on. Computerized vending machines for books, outsourced library services, sophisticated computerized information systems and more technological advancements are being developed to further the information infrastructure; computer programs that tends to 'mimic' the function of information professionals. The role of the computer has become a double-edged sword, providing help and at the same time, a threat to the slowly overshadowed role and function of librarians and libraries.

Librarians should not be threatened despite the fact the machines can cover most of the technical work a librarian or an information professional does. The said work processes do not include the core of a librarians work: understanding user needs and providing service that is based on experience and expertise in handling queries and providing the users not just any type of information, but the information that they’ll be able to use. Yes, computers do serve their purpose but the information literacy that an information professional has and the information professional’s skill in imparting that knowledge and technique is something most machines cannot do.

Reflections

Amidst this day and age of buttons and touch screen gadgets, librarians should step-up and continually upgrade their skills to render them adaptable and up-to-date with the latest processes. The mixture of the technology of the times and the expertise of information professionals make a very strong mixture of skill that would better address users’ needs, in the shortest period of time, exerting the least amount of effort, with accuracy and timeliness.


Sources

Articles

American Library Association. (2002). A key resource for the jobless, entrepreneurs – and the community. State of America’s Libraries Report 2011, American Libraries, Special IssueRetrieved  Retrieved June 20, 2012, from http://www.ala.org/news/mediapresscenter/americaslibraries/publiclibraries

American Library Association. (2002). Computer use increases even (or especially) during recession. State of America’s Libraries Report 2011, American Libraries  Special IssueRetrieved June 20, 2012, from http://www.ala.org/news/mediapresscenter/americaslibraries/publiclibraries

American Library Association. (2002). No-librarian libraries: An idea whose time has (not) come. State of America’s Libraries Report 2011American LibrariesSpecial IssueRetrieved June 20, 2012, from http://www.ala.org/news/mediapresscenter/americaslibraries/publiclibraries

American Library Association. (2002). Outsourcing of library services seen as another bad idea. State of America’s Libraries Report 2011American LibrariesSpecial Issue. Retrieved June 20, 2012,   from http://www.ala.org/news/mediapresscenter/americaslibraries/publiclibraries