Wednesday, July 25, 2012

RA: Digitization

Title:  Digitization of library resources: challenges and implications for policy planning.  
Author: Beatrice Ayudeji Fabunmi, Matthew Paris, & Martins Fabunmi
Publisher: Open Journal Systems
URL:  https://ojcs.siue.edu/ojs/index.php/ijaaas/article/viewFile/80/142 


ABSTRACT



Digitization is a process by which materials housed in a library like books, manuscripts, theses, works of art, etc. are converted to digital or electronic format. In line with the intrinsic mission of libraries and information centers to provide information to its users, digitization enhances the access to information and contributes to the preservation of library materials. Though beneficial, the process of digitization poses certain risks and challenges which have a significant effect to a library's or information center's policy planning. The digitization process may push libraries to expend more resources than the usual but it is deemed to be of importance in modern libraries to respond to the changing needs and demands of users.

What I learned

The advent of the information age, with the emergence of various technologies most especially computers and the internet has brought about advancements in handling information. These factors have proven themselves useful in making information available, providing users with better access. Digitization is part of these technologies that has paved the way for library services to be improved.

The digital format or electronic format with it's unique properties and the usability it gives both librarians and users have made its way to all parts of the world. The process involved, digitization, makes provision of service faster via the internet and also allows different users to access a material at the same time. Just thinking of all these benefits helps librarians become optimistic about the information profession. However, one may ask, what is the cost of all these?

According to Milagros Santos-Ong of the Supreme Court Library Services, it took managerial, financial and technical support for the Supreme Court Library to digitize (2006). Of these three factors, financial support is most likely the hardest to attain, especially that libraries are not primarily profit-generating institutions. Most libraries just depend on a limited budget, not to mention, sometimes, just single person to tend on the whole collection. Resources is one major factor that one must consider when planning a digitization project.

Conway (2000) has identified that a successful digitization project "lies in a thorough understanding of the relationships among" the characteristics of the materials you will be converting, your library's technical capabilities and the purpose of your digitization. To make these ends meet, on has to obviously employ financial resources, time, and manpower. Obtaining these resources expends even more resources. Definitely, librarians have to think it through and consider a lot of factors prior going through digitization.

Reflection

We all should go back to the basics when deciding on a big step such as digitization: our users. Yes, digitizing materials can help "protect..., represent..., and transcend..." library and information resources (Conway, 2000). Digitization can make a lot of things possible for users and librarians, when it comes to managing, preserving, handling, disseminating and accessing information. It all does that. But the big question really is "why digitize?". Perhaps this is the hard part.

I am not practicing a librarian but I believe in making use of technology to make things better, especially access to information. The need for digitization should be established enough for a library to go through it. It is a very good investment, undoubtedly. But your limited budget can go to other projects of immediate need as well: new and better resources, qualified staff and the old computers that may need replacing or upgrading. Though keeping up to the trend is what information professionals should thrive in, we do not have to always do it, especially in these hard times when practicality and ingenuity is better than being trendy and hip.


References

Articles

Fabunmi, A. B., Paris, M., & Fabunmi, M. (2006). Digitization of library resources: challenges and implications for policy planning. International Journal of African and African American Studies. 5 (2), 23-36. Retrieved July 25, 2012, from https://ojcs.siue.edu/ojs/index.php/ijaaas/article/viewFile/80/142

Unsworth, J. (2004). The value of digitization for libraries and humanities scholarship. Retrieved July 26, 2012, from http://people.lis.illinois.edu/~unsworth/newberry.04.html#

Santos-Ong, Milagros. (2006).  Digitization: pros and cons. Information and Communications
Technology in Library  Trends, Security & EthicsRetrieved July 26, 2012, from http://paarl.wikispaces.com/file/view/digitizationprosncons.doc

Books

Northeast Document Conservation Center. (2000). Handbok for digital projects: a management tool for preservation and access. Retrieved July 25, 2012, from http://www.nedcc.org/resources/digitalhandbook/dman.pdf

Thursday, July 19, 2012

RA: Utilization of Social Networking

Title: Libraries making good use of social media and web 2.0 technology
Author: ALA
Publisher: ALA
URL: http://www.ala.org/news/mediapresscenter/americaslibraries/socialnetworking

ABSTRACT

A great fraction of libraries in the US has been making good use of social media and web 2.0 technologies to reach their audience and market their services, though there are still some libraries who do not make use of the said technologies. Cindy Romaine, president of the Special Libraries Association said that this is a manner by which information organizations adapt to the fast changing times. She considers this a strategy to become "Future-ready." Some users consider e-mailing an "antiquated way" of communicating so some librarians use Facebook to send messages to some of their users.



What I learned
 
Social networking refers to a process of building connections, relationships and a community among people of common interests or goals. It is a concept more popular in the internet today. These networks allow members to interact with each other through web posts and other features that basically are in line with any specific group/ social networking site's purpose or goal. Some social networks allow professionals to share trade secrets or updates in their specific fields of interests while some just keep the members updated of each other's whereabouts on a daily basis. The concept has already been used by different institutions including schools, government offices and libraries.

The interactivity and the real-time updates makes social networking a viable tool in the library setting as it can provide a venue for librarians, library users and other libraries to communicate and discuss concerns, updates in the collection, queries, etc. It provides information which are readily accessible with a click of a button and an effective way to get relevant information to its targets.

Communication is vital in deciphering the needs of library users and online social networks provides this need. The interactivity and various features which may be tailored to fit the needs of a specific group (e.g., a librarian and his/her library users) paves the way for librarians to get the public not only informed, but also more interested in making use of libraries.

Reflection

This generation spends most of its hours online. Taking advantage of this will get libraries more involved with the users, and in turn, users, especially those of the younger generation will definitely appreciate the role of librarians. Undoubtedly, in this country, role of librarians are not as established in the minds of the younger generation as the role of Google.com is. A number of public libraries I have studied a few years back recognizes this. But with the emergence of technologies and new ways of interaction with library/information users, librarians can better their services. This convergence of technology with library/information services which is already being practiced in other countries, can truly pave the way for libraries and librarians in our country to keep up with the increasing demands of information seekers.

References

Articles

American Library Association. (2011).  Libraries making good use of social media and web 2.0 technology . State of America’s Libraries Report 2011Retrieved July 18, 2012, from http://www.ala.org/news/mediapresscenter/americaslibraries/socialnetworking

IFLA. (2010). Value of social networking in libray and information organizations in Asia and Oceania. World Library and Information Congress: 76th IFLA General Conference and Assembly 2010. Retrieved July 18, 2012, from http://www.ala.org/news/mediapresscenter/americaslibraries/socialnetworking

American Library Association. (2011).  A plethora of devices, in use by all generations. State of America’s Libraries Report 2011Retrieved July 18, 2012, from http://www.ala.org/news/mediapresscenter/americaslibraries/socialnetworking

Unpublished works

Generao, C.A B. (2008). A study on the effectiveness of programs and activities held by the Manila City Library system in the promotion of its library. Unpublished B. L. I. S. thesis, University of the Philippines Diliman, School of Library and Information Studies.

Friday, July 13, 2012

RA: How can I benefit from web 2.0 technology if I were a librarian?



"Web 2.0 thrives on network effects: databases that get richer the more people interact with them, applications that are smarter the more people use them, marketing that is driven by user stories and experiences, and applications that interact with each other to form a broader computing platform." (Blue Coat Systems, Inc., 2011)


Some web 2.0 technologies and their use in a library setting


Google Maps is a web-based mapping service technology powered by Google. In a library, it can be an electronic substitute to a map of  various locations around the world  -- could be every city, street, corner avenue. It's most usable when travelling  and can definitely be part of the library services for students, people who just moved in town, tourists visiting a local attraction and those looking for the local deli. The librarian may have to study the features of this application in order to maximize its use and fully assist library users.


Web logs or more commonly known as Blogs are web pages with various uses but is basically intended to work like a log, or a journal. People subscribed to a blog will receive e-mail notifications of updates on that specific blog. Libraries can use this service to provide users regular updates. Libraries can coordinate with teachers to have their students subscribe to the blog for updates on more current sources. The interactive functions of commenting and automatic updates through subscription make it easier for librarians and library users to get in touch with each other. Librarians can post new acquisitions, updates on usage guidelines and policies, promotions, acknowledgments, etc. The librarians imagination is the limit. Some may even get extra profit from advertising through blogs.


Content Management Systems (CMSs) are also good examples of web 2.0 technologies. There are some CMSs which require licenses but there are some which are available open source. Libraries can use this and can even build resource sharing among various public libraries, even those from off shore. Soft copies or downloadable and printable file types can be shared through this type of system. Librarians can also coordinate with teachers to use this system to have files retrieved and assignments uploaded and submitted.


With the fast changing technology and the availability of such advancements, the librarian's role to provide information with the least amount of resources in the shortest possible time can be achieved. These technologies not only enhance the library's capacity to manage and provide information but it also keeps them upgrading and keeping up to the trends in the field of information service.


References


Articles and Book Chapters


Blue Coat Systems, Inc. (2011). Technology Primer: Web 2.0. Retrieved July 11, 2012, from http://www.bluecoat.com/sites/default/files/documents/files/bcs_tp_Web20_v3b.pdf
x




Center for Online Research and Service, University of Illinois Springfield. Web 2.0. Retrieved July 12, 2012, from http://www.uis.edu/colrs/learning/technologies/web20.html


Oreilly, Tim. (2007). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. Communications & Strategies, No. 1 First Quarter 2007 (p. 17). Retrieved July 12, 2012, from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1008839


University of Delaware. School of Education Educational Technology - Course Frameworks. Retrieved July 9, 2012, from http://www.udel.edu/fth/courses/web2resources/index.html


Electronic Sources


Opensource CMS. (2012). [home page]. Retrieved July 11, 2012, from http://www.opensourcecms.com/

RA: Computer and Internet Security/ Copyright

Title of the Article: Privacy in the Digital environment—issues for libraries
Author: Michael Gorman
Publisher: IFLA
URL: http://archive.ifla.org/IV/ifla67/papers/145-083e.pdf

ABSTRACT

Technology has brought both advancements and some serious issues to ponder on like privacy. It is said to be barely achievable in our technology laden age where almost everything is accessible via the internet. Though the internet's availability does not automatically mean exploitation and unethical usage, there could still be users well-endowed with the talent of using technology to do so despite due legislation and regulation. Technology has become a solution and at the same time a problem, in various aspects. This challenges the role of information professionals, most especially in the public library setup: to supply free access to the internet, and include privacy policies and tools for guidance in using that access. Though librarians themselves access information and data like user and circulation statistics, these are done with good intentions. Internationally recognized principles and technology with matching policies built around your information center's clientele would do well with proper maintenance and regulation.


What I learned


"You already have zero privacy -- get over it!" This is William Miller, quoting the Chairman of Sun Microsystems  in Library Issues: briefings for faculty and administrators. People may not agree. I, personally, believe in privacy because I do have some thoughts that remain in the portals of my brain. However, one could only believe this for now, until new technology that can track and monitor thoughts comes out. It can be a bit of a stretch but with new developments almost everyday and every hour, the possibilities of making internet and technology work together to make various things happen are endless; and privacy is just a fraction of the issue. There is the legal right which warrants public access to relevant information; censorship, that regulates access under considerable relative parameters; and, the vast internet itself which has been rendered a little too responsive to our daily needs. Librarians themselves use private information like user information and circulation records in users needs analyses. Though this is aimed at library service improvements, their access poses some feelings of threat on the involved parties who perhaps want to conceal their usage of materials with "sexual content, etc. -- and extend to, for example, materials on diseases, English professors borrowing Danielle Steele books, “happily married” people borrowing books on divorce, and musical snobs borrowing hip-hop records..." (Gorman, 2001). If both privacy and maximized usage is the aim of an institution or a community in need of information, technology can either satisfy or hinder their goal.

Proper usage of the internet, information and the technologies that are bound to them is something information professionals can perhaps improve and instill to information users. User education and instruction with properly designed privacy policies still remain appropriate solutions. With the emergence of various electronic sources and the usability of such in various media and formats, regulation of access can be a venue where modern information scientists can put their expertise to good use. While drawing the line between private and public information has been a tiresome pursuit, so is the question of purpose in the ethical sense. This highlights and challenges the role of librarians, especially in the public library where information is freely given to the public. Librarians should instill in themselves a sense of urgency against information security especially when user information. New technologies like "self-check" devices can help librarians secure library users of the privacy in a library. A visible privacy policy can also make the users comfortable in their information search.

Reflection:

The need and desire for privacy comes naturally to the society. This has sprung from the possibilities of threat  posed by the fast-changing and developing technology. I personally have no issue against total access to information (in a general sense). The only purpose of usage a librarian can know of is the purpose a library user discloses. It remains the purpose the librarian knows of whether the library user changes it along the way or not. To judge whether information will be used ethically or not may need a higher level of experience and vigilance. Perhaps the question of which is the best approach is irrelevant as of the moment. An effective approach however should be considered. New technologies pile up like bills and adapting to the haste may take a lot of resources; thinking of a specific best approach alone can take ages. Starting with a privacy policy and teaching the users how to use information is a big effort. Perhaps new technologies can be used to further computer and internet privacy. What is important is the users know of these measures that keep them secure. This level of security will enable them to be confident in using information and taking care of the information they use though a carefully guided access.


References

Articles

Gorman, Michael. (2001). Privacy in the Digital environment—issues for libraries. Retrieved June 27, 2012, from http://archive.ifla.org/IV/ifla67/papers/145-083e.pdf

Mason, O. R., Mason, F. M., & Culnan M. J. (1993). Ethics of information management. Retrieved June 28, 2012, from http://www2.hawaii.edu/~donnab/lis610/mason_et_al_only_1995.pdf

Milojicic, Dejan. (January, 2000). Internet Technology. IEEE Concurrency,  8 (1), 70-81. Retrieved June 27, 212, from http://www.hpl.hp.com/personal/Dejan_Milojicic/Internet.pdf

Friday, July 6, 2012

RA: Computer Ethics/ Netiquette


Title of the Article: Ethics and information technology- some principles to guide students
Author: Sonia Bodi
Publisher: North Park University
URL:http://www2.hawaii.edu/~donnab/lis610/bodi_1998.pdf

ABSTRACT

The emergence of information technology and its integration with certain information systems such as the internet and the library has brought about issues on ethical use of information like intellectual property rights, plagiarism, piracy and privacy. The widespread and readily accessible electronic resources made available by the internet is prone to unethical usage due to its unique properties (transmission to various media and formats). In the face of this information age where the need for information is growing against the need for security and protection, the role of information professionals is challenged most especially in guiding students and the academe toward the right action when using information.

What I learned

The society needed a system that could keep up with its changing needs. Information technology made this possible. But ever since information technology has grown, it seemed like the society is the one having the hard time to keep up. One aspect of this concern can be explored by pondering on the issues of ethical use of information. Efforts have been established and positioned to address the security and intellectual property issues. But what about fair use and the right to information access? This is where the issues are.

This has been a source of various discussions and debates, especially in the discipline of librarianship. As guardians and custodians not only of physical books but also of electronic information, usage and access is a major concern. The long fight for the right to equal access to information has took its place in the history of society and, more than ever, now is a good time to address the issue; now that internet and web based applications are growing in quality and access to information has greatly increased as well, not to mention photocopying full book copies.

According to Sonia Bodi (1998), "ethics is not an exact science but ethical inquiry does provide a basis for choosing proper actions based on rational principles and sound, carefully reasoned arguments." In the plight of the society's growing need for information, information professionals should try to use techniques and queries to find out the goal of information usage, not only for security of copyright but also to find out the right type of information needed. As for library users, like students, they should just try to do what is just and right: accessing information, using it (putting it to good use), then giving credits to the source. As a critique, one should consider the two sides of the coin when it comes to accessing information: the creator of the information and the researcher who is in need of the information. One must be able to distinguish a correct balance between information use and availability, and a respect for property; between the need of the researcher and the rights of the copyright owner. Copy-pasting online information for class assignments is one thing; citing them correctly is another. Disrespect of ownership by not citing the source of information correctly not only is unethical as plagiarism  but also invasion of privacy. A work which is not cited properly in a research is like a work used without permission. These issues cannot be separated, much like the concepts of usage and access. If usage is allowed, complete access is not always automatic; and in a situation where usage is done without proper citation, usage is improper. If improper usage has been deemed by the owner of the information, permission will most likely be revoked. And since it has already been used, the one who misused it have, technically, already accessed it without permission. 

Bodi considers librarians stakeholders and guardians in the information infrastructure and they should take part in building confidence in the ethical use of information for the growth of the public knowledge. Library instructions are key to getting library users, most especially students, familiar with the concepts of information usage and its importance. Letting them know how the system works and how one should abide by the basics can somehow make them appreciate what you do, what you tell them, how should they approach it and how the entirety affects them and the satisfaction of their needs. Librarians, more than ever, play a vital role in managing and providing access to the vast sources of information online. With teachers and other members of the academic institution, librarians have an important function in making sure that information is protected however made available for users under regulated and appropriate access: one that credits the sources properly and benefits the growth of public knowledge through further and related study.

Reflection:

With more power comes a greater responsibility. It has become a cliche, but it is a truth that describes the plight of the vast and growing parts of the information infrastructure. When accessibility was achieved, the limitless possibilities of information technologies has rendered us vulnerable to unethical usage and abuse. Perhaps, the role of librarians is vital in this predicament, given the nature of the profession. But he alone is not responsible. To fight the evils of the information age, all should make a move. Recognizing a social responsibility to protect, secure and make sure that the information available is properly used is the role of all members of the society.

Sources

Articles

Bodi, S. (November, 1998). Ethics and information technology- some principles to guide students. Journal of academic librarianship. Retrieved June 25, 2012, from http://www2.hawaii.edu/~donnab/lis610/bodi_1998.pdf

Gorman, Michael. (2001). Privacy in the Digital environment—issues for libraries. Retrieved June 27, 2012, from http://archive.ifla.org/IV/ifla67/papers/145-083e.pdf

Milojicic, Dejan. (January, 2000). Internet Technology. IEEE Concurrency, 8 (1), 70-81. Retrieved June 27, 2012, from http://www.hpl.hp.com/personal/Dejan_Milojicic/Internet.pdf

RA: Internet Technologies/ Web-based technologies

Title of the Article:Internet Technology
Author: Dejan Milojicic
Publisher: IEEE Concurrency
URL: http://www.hpl.hp.com/personal/Dejan_Milojicic/Internet.pdf

ABSTRACT

Dejan Milojojic of Hewlett Packard Laboratories featured people who took part in bringing the Internet technical revolution -- Erik Brewer of Inktomi and the University of California at Berkeley, Fred Douglis of AT&T Labs–Research, Peter Druschel of Rice University, Gary Herman of HP Labs, Franklin Reynolds
of Nokia, and Munindar Singh of North Carolina State University -- and their insights on internet and web-based technologies: what brought about its emergence, how it affects the internet and it's future, technologies that will dominate the web's future, some controversial technologies and issues on privacy and security.

What I learned

We are all aware that today, the Internet can be accessed anywhere. You can go to the beach and read your mails. You can get your flight schedule changed while getting a foot spa. Now, it's on people's phones... and on land line units, even. According to Gary Herman, director of the Internet and Mobile Systems Laboratory in Hewlett-Packard Laboratories, Palo Alto, CA, and Bristol, UK, a factor that made this possible is the gradual cutbacks on the cost of technology. The Internet that gives people the liberty to create, publish and access information just became affordable. Before this, however, information assembly and dissemination took much needed time and resources. The emergence of advanced technologies revolutionized the processes in the information infrastructure at an expensive cost, at first. But as new technologies developed, and as these new technologies chop and change, older (yet still relatively new) ones became affordable, faster.

We have come to a time that almost everything can be done via the internet: send postcards, research, spell check, purchase items, shop, etc. This current state of technology has been foreseen by Eric A. Brewer (2000), chief scientist and co-founder of Inktomi Corporation (a search company acquired by Yahoo! in 2003). He said that the most important force that will push the internet at the center of the information infrastructure is the need to always be on-line (always-on principle). True enough. The Internet has established itself a need to the many facets of human living. It came fast and we have now made it (internet and web-based technologies) responsive to the growing needs of the society as a unit that continually learns and strives to upgrade itself.


Peter Druschel, an assistant professor of computer science at Rice University in Houston, Texas predicted 10 years ago that the possible areas where major application of internet and web-based technologies would be seen in electronic commerce, distance education, distance collaboration, and entertainment (2000). Head of the Distributed Systems Research Department at AT&T Labs-Research and professor at the Princeton University and the Vrije Universiteit, Amsterdam, Fred Douglis, considered e-commerce, pornography, interactive chat rooms, and games also as targets of the internet and web-based applications. These forecasts somehow came true.

Today, advertising and e-commerce is one of the drivers of profit in web-based technologies and applications (Douglis, 2000). The more users you have, whether you offer your web service for free or not, the more advertisers you can have -- bottom line: more profit. If your blog has thousands of subscribers, you can get more advertisers invest in your page. As relevant information is disseminated, advertisements pop-up, almost on all web pages. To get these ads to work and rendered effective, from a marketing perspective, information from internet users like demographics, statistics, and the like, are needed. The question now is "How is the marketing information obtained?" According to Douglis, lack of privacy comes into the picture in this specific situation.

The possibilities with the internet as of now seems endless and access to all these technology over the world wide web have become venues of controversy. Its attribution to "being limitless" alone is of great importance. If information is easier to assemble and disseminate, then access, what controls do these internet or web-based technologies have? Who controls access to it? These are issues tackled in the November 1999 Internet Engineering Task Force meeting (Reynolds, 2000). According to Franklin Reynolds, a senior research engineer at Nokia Networks and works at the Nokia Research Center in Boston,"Security and privacy-related technologies are already the most controversial, and I expect the controversy to intensify in the future. There are many issues, for example, should a government be able to eavesdrop on your Internet use? Should your employer? (2000) Nonetheless, online advertising, the need for internet-user information, and security and/or privacy are risks and, at the same time, contributing factors to the development of better web-based and internet technologies that we just have to accept an adapt to through standardizing measures. Munindar Singh, an assistant professor in computer science at North Carolina State University, author of Multiagent Systems, predicted correct that security standards shall be established and people will be able to check their privacy requirements. Perhaps, this is where the role of the information professional comes in.

There are a couple of perspectives from which one can view the role of an information professionals in the reinforcement of information privacy. If the information professional is a librarian and in a library setup, perhaps, he can help with ensuring that passwords are kept confidential in accounts in subscriptions of users to different web-based applications. In the corporate setup, database administrators and electronic resources personnel can make sure that the in-house information is stored properly and various controls of access are established and enforced. Standards for information management and security can also be observed. There are various organizations, like the International Standardization Organization (ISO), that currently concentrate in various process and operational standards in all fields, that give accreditation to various industries (e.g., for service industries, ISO 2008). These measures of standardization have been used by some private companies as basis for acquiring and/or hiring different kinds of services. It's their way of making sure that the service they intend to pay for are adherent to internationally recommended standards or processes. The information professional can initiate this in a private company as a chance to document the entirety of the company's processes, in the aim of improving and recording the progress of the improvement effort.

Internet and web-based technologies will continue to affect the different aspects of our lives. In this age, everything updates faster and these updates are disseminated almost real time. Certainly, the process will just go on as long as the society's needs and demands grow and change. The wide array of technology that one can work with are accessible; and this accessibility pushes a challenge when security and privacy or censorship comes in the picture. As Singh said, "with security, people are either extremely careless about it or they’re really paranoid about it -- with nothing in the middle." The role of the information professional is to carefully draw the line between security, fair usage and privacy.

The internet has brought us a lot of good as much as it has brought a jigsaw to solve. It has rendered our society equipped with the tools and information sources. But with these tools are risks which should be viewed as a challenge to adapt to. Which outweighs which? Perhaps it all depends on how we manage and regulate the enormity of benefits web-based technologies can provide.

Reflection:

With the emergence of these web-based technologies, the manner by which information is processed (from origination/creation to usage) is revolutionized. It continually adapts to and affects the information needs of the society. The society and these technologies are both powerful forces. At some point, the society has made technology possible. But as time went by, the same society that made technology possible is immersed in anxiety and enormity of possibilities brought about by the same technology they made possible. Which affects which? Is the information infrastructure a growing organism? The challenge to the society falls upon the hands of information professionals like us, in the advent of the digital age. Managing information storage, retrieval, preservation and dissemination, as according to carefully studied user needs, the basics, can also be applied to these situations. Information professionals should gear themselves toward making these internet and web-base technologies work for the society and not the other way around.


Sources

Articles


      Milojicic, Dejan. (January, 2000). Internet Technology. IEEE Concurrency,  8 (1), 70-81Retrieved June 27, 2012, from http://www.hpl.hp.com/personal/Dejan_Milojicic/Internet.pdf

Turgeon, A. J., (May 29, 2002). Implications of Web-Based Technology for Engaging Students in a Learning Society. Journal of Public Service and Outreach 2(2), 32-37. Retrieved June 25, 2012 from http://www.adec.edu/user/resource/turgeon-implications.html

Gorman, Michael. (2001). Privacy in the Digital environment—issues for libraries. Retrieved June 26, 2012 from http://archive.ifla.org/IV/ifla67/papers/145-083e.pdf