Friday, October 15, 2010

Assignment 2

EVALUATIVE STATEMENT


During INF506 the following immersive experiences have been undertaken:

Social bookmarking - Delicious was used to experience the advantages of sharing recommended web resources to communities. The ability to access the information from any connected device and the collaborative functions of tagging and commenting allows for effective delivery of resources to users and colleagues with little effort and time involved in maintenance.

RSS Feeds - were found to be a useful web 2.0 tool to collect and manage current and relevant information and can be used as an information or promotional service.

Twitter - was found to be a fast and effective way to share brief messages or links. The popularity of this tool insists that it should not be ignored as an effective networking tool. It was found that it could be more useful once a larger network could be built up and would require regular spurts of interaction.

Second Life - was found to be enjoyable and fun, but required large amounts of time invested in orientation and also required a higher than average computer specifications to run effectively. The potential of this tool however is exciting, and the enthusiasm of educational institutions in creating learning spaces in this alternate world reflects this.

Blogs - were found to be an effective way of getting a developing process or updates communicated and discussed. The potential of this narrative tool to share information and promote services is of great value to the library environment in creating communication and transparency to users and staff.

FaceBook - was found to be an effective way of sharing a range of mediums and is a popular social networking choice for many Australians. It has a wide and common user base which would be effective to share information and promote services.

Flikr and YouTube - were both a fun and exciting medium to add to the social networking experience, images effectively creating a message or preserving a history. Advantages of connecting with users through these web 2.0 tools ensures involvement in the creative content and creates a fun and technologically savvy image.


The development of Library 2.0 has been necessary to remain current and relevant to the users of libraries as modern day information providers and as support to the evolving social needs (Casey, Savastinuk, 2006). The global nature and diversity of the information available to the digitally connected allows a wide range of users and user needs to be met however large or small. Popular information can be addressed and accessed as easily as special interests. Library 2.0 is far more suited to recognise and address the value of the 'long tail' and endeavour to make it 'directly available to improve the work and lives of our users.' (Dempsey, 2006)

Library 2.0 must be savvy to address the expectations of the technically minded users and capture the interest of users who have little or no online connections. The Australian Oxford dictionary defines savvy as 'common sense or understanding' (Oxford, 2008). Although adoption of technology is inevitable, common sense and understanding developed through analysis of both users and available tools is necessary for purposeful outcomes avoiding reckless 'techno lust' (Farkas, 2008).

Connections with users have always been important with the library playing 'a key role to play in our social, cultural and educational activities' (Shiri, 2003) and it is important to follow the digital trends and preferences of the users to continue those connections, make new connections and facilitate networking to take place through successful implementation of appropriate web 2.0 tools. The role of Library 2.0 is to ensure that sufficient resources are allocated and dedicated to providing the conversation and collaboration required to claim library 2.0 (Bertot, Jaeger, McClure, Wright, Jensen, 2009)and not just a library that uses web 2.0 tools in a 1.0 way. An example of this is blogging without allowing public comments or neglecting to spend time addressing comments made to the blogger.

Safety, security and privacy issues are important and are being adjusted or amended as we develop Web 2.0 technologies with an arguable belief that these issues are being addressed adequately (De Rosa, Contrell, Havens, Hank, Jenkins, 2007. p2). To be connected in the web 2.0 world often means the surrender of an amount of privacy (Raynes-Goldie, 2010) as we move to build our online identities but have stimulated 'new emerging regulatory challenges' (James, 2010) clear policies and procedures are important in the library environment to set out acceptable behaviours in its context, and to ensure awareness of legal implications of online behaviours.



REFLECTIVE STATEMENT

INF506 has opened up the many possibilities and capabilities of web 2.0 as networking tool that adds to the strength of one’s social connections. Social interaction has shifted from the perception of out of work, leisurely interactions to a powerful tool to engage and interest the community in which we work. It was found that online social networking technologies are rapidly evolving and not mutually exclusive. For example, using delicious, we can tweet, or RSS feed information or the options on YouTube to share with FaceBook etc. Several network tools may become interwoven into our daily social interactions, this interoperability indicates the development of an 'open cloud' direction creating an optimal collaborative framework (Nelson, 2009). It is important to open one’s mind to try new technologies and learn how they can be utilised to deliver information to the modern library user. Through exposure and practice in using a variety of online networking tools, the potential to understand the impact open sources and collaborative efforts in education and innovation can ensure we engage and enrich our communities.

In introducing new online social networking tools, it has been discovered that FAQ pages such as those in Delicious, orientation or tours such as those in Second Life are invaluable introductions to new environments and reduce learning and training times providing an easier approach to the learning curve, also by responding positively to change (Cohen, 2006) we can allow the advantages or potential of a particular tool to become apparent, this was the case with ones experience of Second Life. Initially it appeared to be more appealing to gaming enthusiasts and was difficult to operate, however after orientation and practice, the potential as an engaging modern learning resource was appreciated.

Web 2.0 tools become and remain popular through their unique capabilities and appeal as a fresh new way to approach social interactions. Example of this is the rise of twitter with its short tweets. As information professionals it is important to monitor and research new trends in the online social networking sphere to remain relevant to the community.

User analysis can be a complex issue on or off line. In today’s global society with many choices available users cannot be thrown into any one category. It was concluded that analysis of the users and the tools available brings some usefulness to the implementation of web 2.0 tools, but with many of the tools being low cost and requiring little maintenance time, interaction and practice on many tools would be useful to attract a wider audience.

An understanding of power of crowd sourcing has been useful in acknowledging the value of user contribution to the success of a social networking experience. Folksonomies used in the tagging of bookmarks, video, pictures and blog posts can be useful to search the collaborative content and further encourages the feeling of ownership by the users.

The importance of a library to plan their social networking and continually monitor and assess the usefulness and effectiveness of social networking tools has been realised whilst studying this course. Creating awareness and listening to feedback from its users is an essential part of ensuring the tool is worthwhile. It has also been found that there is not one right answer to the social network needs of a community and that several different tools can be used and appeal to different users. There are several sources to keep up to date on the technologies and uses of those technologies in a library context.

The concept of Library 2.0 is widely accepted as the application of Web 2.0 to the library environment. It appears though that library 2.0 may applied in a misguided way and once certain tools are introduced, through lack of interest or lack of time they may be considered failures (Farkas, 2009). Through careful planning involving analysis of both the tool and the users, promotion of the tool and allocation of human resources and technology, acceptance and success of the tools is more likely. Focus on exciting and dynamic content as well as using the modern tools is important to ensure capture of audience and a higher chance of conversation and collaboration.

Although social networking appeals to the fun side of working with a group or users, there and many different levels of immersion and complexities to its application such as privacy, security and institutional policies that should be regarded when using them as a tool. Because of the duty of care to the society these services are provided to, these issues cannot be neglected when planning for and implementing social networking programs within a library environment
.


3 OLJ experiences:

RSS Feeds

Library 2.0

Online Identites




References:

Australian Oxford Paperback Dictionary. (4th ed.). (2008). Melbourne, VIC: OUP.

Bertot, J. C., Jaeger, P. T., McClure, C. R., Wright, C. B., Jensen, E. (2009). Public libraries and the internet 2008-2009: Issues, implications, and challenges. First Monday. Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2700/2351
Casey, M. E., Savastinuk, L.C.,(2006). Library 2.0: Service for the next generation library. Library Journal, 9/1/2006. Retrieved from http://www.libraryjournal.com/article/CA6365200.html

Cohen, L. (2006). A Librarian's 2.0 Manifesto. [video]. Retrieved from http://www.youtube.com.au/watch?v=ZblrRs3flcSU

Dempsey, L. (2006). Libraries and the Long Tail: Some thoughts about libraries in a network age. D-Lib Magazine, 12 (4). Retrieved from http://www.dlib.org/dlib/april06/dempsey/04dempsey.html

DeRosa, C., Cantrell, J., Havens, A., Hawk, J., Jenkins, L. (2007). Section 3: Privacy, security and trust in our networked world: A report to the OCLC membership. Dublin, Ohio: OCLC [ebook]. Retrieved from http://www.oclc.org/reports/pdfs/sharing_part3.pdf

Farkas, M. (2007). Building Academic Library 2.0. Symposium of Librarians Association of the University of California Berkley. Retrieved from http://www.youtube.com/watch?v=q_uOKFhoznI

Farkas, M. (2009). In: Library 2.0 Gang 12/09: Social software in libraries 15 December 2009.[podcast]. Retrieved from http://librarygang.talis.com/2009/12/15/library-2-0-gang-1209-social-software-in-libraries/

James, M. L. (2010). Cybercrime 2.0 versus the Twittering classes. Parliament of Australia, Dept. of Parliamentary Services, Parliamentary Library Information, analysis and advice for the Parliament. Science, Technology, Environment and Resources Section,24 Feb 2010 (2009-10). Retrieved from http://www.aph.gov.au/Library/pubs/bn/sci/Cybercrime.pdf

Landau, R. (2010). Solo Librarian and outreach to hospital staff using Web 2.0 technologies. Medical Reference Service Quarterly, 29 (1), 75-84.

Nelson, M. R. (2010). Building an open cloud. Science, 324(5935, 1656-1657. Retrieved from http://www.sciencemag.org.ezproxy.csu.edu.au/cgi/reprint/324/5935/1656.pdf

Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday, 15(1). Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2775/2432
Shiri, A. (2003). Digital library research: Current developments and trends. Library Review, 52 (5), 198-202.

Tay, A. (2009). Libraries and crowdsourcing - 6 examples. Library 2.0: Librarians and the internet, social media and Web 2.0. Retrieved from http://library20.org/profiles/blogs/libraries-and-crowdsourcing-6

Youngkin, A. (2010). Librarian controlled RSS: A novel approach to literate search follow-up. Journal of Hospital Librarianship, 10(2), 123-131.




















Wednesday, October 6, 2010

Online Identities

What is important in terms of how we present and manage online identities?

I think our awareness as to how open our identity information can be is important and also to know the terms of use and default settings and how they can be generally accepted yet may give out more information that we would like. Its obvious that to not be on the social networking sites can be a big disadvantage so there are measures and custom setting that can be made to manage our online identities as to how much information we give away.

An understanding of the advantages of the open web should also be taken into account, that our networks can be expanded and information sources and knowledge enriched through those connections. Our own authorship and creative talents can also be displayed and disseminated to a wider audience when our identities are open and more detailed.

What can we share and what should we retain as private to the online world?

This question cannot be given any one right answer. The decision we make may depend upon our need to share information and build up a network. Obviously there are incidents reported where giving too much information has lead to negative experiences, but there are also advantages to opening our profiles to the public.

Again awareness is important as to the terms, and default settings of our social platform, and also that we are not naive to the dangers that can come from different levels of disclosure for example location trackers.

There is a belief that people are concerned about their welfare but are willing to trade it for the value of being able to connect through the Internet (Raynes-Goldie, 2010). I think this has a great impact on the generalisation that the new generation is more open and less guarded or carefree about their privacy.

We accept terms these days because we want to get on with things. Every kind of web platform used comes part and parcel with its own set of guidelines and terms of agreements, do we read them? If we don't accept then we are not able to participate. Is this accepting under duress? Negating the effects of a so called 'terms of use agreement'? Well, that could be said, but the fact remains that the only way to develop privacy and security policies is through public debate to find a delicate balance between the moral expectations of the users and the amount of control the facilitators will allow, (ie - facebook have just announced they will allow more control over the group function (Chapman, 2010)) in the mean time we must accept and get on with it, and deal with security issues in our own way by awareness to default settings or manually manipulating the software to protect ourselves i.e. regular wall wiping and the use of an alias (Raynes-Goldie, 2010).


Chapman, C. (2010). Facebook reveals new 'groups' feature to bring cosy cliques back to online social networking. Technology. News.com.au, October 7, 2010. retreived from http://www.news.com.au/technology/facebook-reveals-new-groups-feature-to-bring-cosy-cliques-back-to-online-social-networking/story-e6frfro0-1225935349578

Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Inderstanding privacy in the age of Facebook. First Monday 15 (1) retreived from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2775/2432

Tuesday, October 5, 2010

Identity, Privacy & Security

Face book

It is assumed that face book users particularly the younger users are not concerned about privacy and security issues. This may be because face book is so widely used however does not ensure privacy within a list of friends or at times friends of friends (allowing 'creeping').

Raynes Goldie's (2010) research suggests that young face book users are concerned with social privacy rather than institutional privacy and that people reconcile their use of the social networking tool with their privacy concerns through because of the social benefits and online identity it gives them, they do however use certain techniques to protect their privacy such as:

- cleaning their wall regularly
- using only part of their real name (although real names are required in the ToS)
- using alias's
- not including mobile phone numbers etc in profile

The article discusses the shift from privacy concerned which in the last generation were focused on the informational privacy that institutions offered to the protection of personal profiles (social privacy). This has arisen due to the transparency and openness of the online social structure of creating and maintaining identities that are networked throughout the web.

There is a belief that people are concerned about their welfare but are willing to trade it for the value of being able to connect through the Internet. I think this has a great impact on the generalisation that the new generation is more open and less guarded or carefree about their privacy.

We accept terms these days because we want to get on with things. Every kind of web platform used comes part and parcel with its own set of guidelines and terms of agreements, do we read them? if we don't accept then we are not able to participate. Is this accepting under duress? Well, that could be said, but the fact remains that the only way to develop privacy and security policies is in the public debate, in the mean time we must accept and get on with it, and deal with security issues in our own way by manipulating the software to protect ourselves.


NB - Raynes-Goldie explains social privacy as access to personal information and institutional privacy as institutional privacy as how the company (face book) uses that information.

Raynes-Goldie, K. (2010), Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook, First Monday, 15 (1), 4 January. http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2775/2432

Open clouds

Internet security and privacy are important issues to all who use the Internet particularly in more recent times where we attach profiles including personal information and images to our social network sites. Clouds are a metaphor for online storage of data as opposed to working with software and data stored on servers of the owners of that information. It has been described as a platform for computing and communication linking millions of users to thousands of computers simultaneously (Nelson 2009)

'Building an open cloud' (Nelson 2009) explains that there can be three ways we go about the creation of this cloud Internet framework.

1. 'Many Clouds' - in which separate unconnected cloud platforms based on proprietary software in which the author asserts that the potential for new applications and closer collaboration would be lost.

2.'Hazy Skies' - in which data but not software could move between the different clouds which would make it difficult for the users to combine data and services operating in different clouds.

3.'Open Cloud' - in which there is a single global cloud to maximise the collaboration enabling users to assemble software and data easily to meet their needs.

As far as security is concerned, with the open cloud the author suggests that privacy enhancing technologies could be dispersed through out the cloud, it is easy to understand that although most concerns lie with the most open varieties of web use, this is also the easiest way to attain a central and consistent policy basis that is more easily distributed.

Users favour a more open approach to the availability of software and data on an open basis, the freedom that comes from breaking away from proprietary technologies, restricting the transfer of data over different platforms, however they are also concerned with privacy, copyrite and security.

Government policy to restrict access and collaboration by censoring the Internet could thwart the benefits of an open, global cloud which supports the economy, social interactions and innovation. The concerns of privacy and security would be best addressed in an open cloud instead of tailoring separate policies for separate clouds resulting in inconsistent policy and application.



Nelson, M.R. (2009). Building an open cloud [Cloud computing as platform]. Science, 324(5935, 1656-1657.

Information Access for all

Bandwidth/wireless/mobile connectivity and the 'digital divide'.

The modern library is one focused on providing information and services to the community. To ensure their survival and to remain a relevant community institution, the library enriches and encourages community members to take part in lifelong learning and to ensure every members right to be part of the global online information society.

Over the past 10 - 15 years public libraries have been involved in providing access to the online information environment through providing the infrastructure to do this. According to the survey taken by Bertot et al. (2009) they are often the only place within the community that allows for free access, training and services for the online information environment, ensuring that the digital divide is addressed for people without personal home access. It has also been found that during times of global financial hardships this access becomes even more important to ensure that the digital divide doesn't widen as a result of increased poverty.

Issues that arise in relation to providing these services include:
- hours open where these services are available
- staffing levels when budget cutbacks kick in
- the number of workstations available
- bandwidth available and affordable
- availability of wireless and patrons ability to provide their own laptop or wireless device
- need for Internet training
- time limits placed on the use of computers due to high demand
- impact of social networking behaviours on availability of computers

I think it is important to track and study changes in the provision of these services over time as patterns of usage and availability of infrastructure can help libraries to better attend to the needs of the public. I also think that information gathered during the Global Financial Crisis can show us needs and uses for these services in times of real hardship where the users have no where else to turn.


References:
Bertot, J. C., Jaeger, P.t., McClure, C. R., Wright, C. B., & Jensen, E. (2009). Public libraries and the Internet 2008-2009: Issues, implications, and challenges. First Monday, 14 (11) available http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2700/2351

Thursday, September 30, 2010

Digital trends

Over the years from the introduction of the Internet to Web 2.0 there have been many shifts in our usage behaviours surrounding developments in technology and social paradigms.

Internet technologies evolve rapidly and potential uses and power appears unending. With devices that allow for the rapid transfer of data of various formats by crowds of users, creativity flows and networks flourish.

Five examples noted from the 'Did You Know 4.0' You Tube clip were as follows:

1. The digital preference of information reflecting the trend of immediacy expected by users due to the capabilities of modern technology used in the information environment.

2. The enthusiasm to contribute and be a part of the global information world in a range of different and dynamic formats such as picture and video. Again the ease and speed of transferring data due to technologies available serve as encouragement.

3. The recognition by commercial entities that the online environment is where they can find and accurately target a wanted audience. Created by the technology and the openness associated with profiling and sharing with social networks.

4. Publishing models are changing from a commercial and discretionary role to an open framework for anyone willing to create. Open source software and content is widespread and contributes to the attitude of user ownership and continued contribution.

5. Portability of equipment and the web itself has changed considerably due to developments in the technological devices able to process data and use wireless networks throughout the globe.



Tuesday, September 28, 2010

Web 2.0, Comparison of 3 Libraries

A quick check on 3 libraries and their use of web 2.0 tools. To begin with I found that Libraries use a range of tools, ie - they don't all blog or use twitter. Larger libraries and academic libraries are far more likely to use these tools than the small suburban public libraries. That being said, responses varied and the pattern of collaboration that indicates the tool is web 2.0 was achieved to varying degrees. I assert from this that Web 2.0 tools can be downgraded to Web 1.0 tools if used in a way that does not engage the collaboration or conversation of its users and is merely another method to 'mail out' information.


Twitter appears to be the tool of choice for most libraries with short concise messages of a promotional or current affairs nature. Twitter was the only tool that the number of followers could be seen and noted, although it doesn't prove that the message is received, it does show interest.





All the blogs were constructed well and included mainly promotional material, the lack of comments for Charles Sturt University and UTS negates the collaborative effects however there are no measures to tell the usage, the blogs almost take on a bookmark effect highlighting resources but not giving the log (narration, opinion or creative aspect) or discussion. The State Library blogs that included expert knowledge engaged more comments than noted on the other blogs indicating that content has allot to do with the use of this tool and that blogs used for merely promotional purposes are not by nature collaborative.


The Live chat function included on most libraries can be considered a web 2.0 tool due to its instant messaging styles, conversation being a key pattern of web 2.0. Although restricted by hours and days, the hours appear to suit the university environment but I would have expected the larger state library to include more availability. Analysis of usage of these services would be required to make a more accurate assessment of their usefulness.



Web 2.0 tools are implemented to meet user needs, it appears that content is a key factor in the usefulness or to attract user engagement thus making the tool worthwhile. A 2.0 Library is a user expectation that must be analysed with particular focus on content and what the tools convey rather than the tools themselves.



Tuesday, September 21, 2010

Librarian 2.0

Essential knowledge, skills and attributes of of an information professional in a Web 2.0 world:

I think number one is to be curious and cautious, adventurous yet careful, about new technologies and the needs and uses of them in the particular library environment you are in.

I think flexibility and experimentation can be bolstered by analysis and research into both user needs and behaviours along with analysis and trials of the technology. At the same time, as Meredith Farkas (2007) has pointed out, we should not strive to be perfectionists, what I am suggesting is that it should more of a trial and error learning method rather than a hit and miss. Trial and error indicating more of a experimental approach involving hypothesis, theory and practical application and responsiveness to feedback and experiments, whereas a hit and miss approach suggests a reckless adoption of all technology or as Meredith Farkas (2007) describes "techno lust".

Librarian 2.0 must be aware and eager to learn and teach new technologies, and be aware that they may be part of a bigger picture. That the technology they use today may have to be discarded and replaced or accompanied with something new regardless of our attachment. I personally log straight onto my face book site whenever I sit down to the computer, but I still check my emails (considered a web 1.0 tool). This means we must have the ability to develop with web 2.0 whilst using a range of tools that meet the needs or preferences of the users.

I think also that time needs to be devoted to the upkeep and collaborative function of all web 2.0 tools, if we have to do it on top of everything we already do, or if its not considered a priority, then great tools can be left by the wayside and considered useless. This points out that we must facilitate their uptake and continued use and relevancy through dynamic, innovative and appealing content.

We need to be up with whats hot, not just with web 2.0 tools but with hardware, using Ipads, phones, laptops, and any other gadget that's out there to draw in users. My sons DSi has wireless internet connectivity plus he can make and edit small videos on it (not to mention online gaming capabilities), put the two together and we engage our youth. Its important to know hardware and software tools to offer complete relevancy.

The long tail and the digital divide were also two points brought up in Harvey (2009). To reach the long tail, there is a greater reason to be gadget and web 2.0 savvy as mentioned above. More and more our society's individuals are moving away from the mainstream, as seen in the recent Australian federal election. I think this is a trend we will see more of, and the range of technology and tools available supports this individuality and specialisation. No longer do we just have an email address (an indiscreet letterbox) but we have profiles which build a picture of our personalities, beliefs, wants, needs and sentiments.

The digital divide is always an issue that libraries will be involved with. In response to user needs, much of the floorspace is devoted to providing the facilities for users to get connected. I think libraries need to be more innovative in this area too, providing not only computers but the use of more portable Ipads or laptops, kindles etc that can be used throughout the library, opening up the digital experience to all of its users.




Abrams, S. (2007). Web 2.0, Library 2.0 and Librarian 2.0: Preparing for the 2.0 world found at http://2009.online-information.co.uk/files/freedownloads.new_link1.1080622103251.pdf

Farkas, M. (2007). Building academic library 2.0.Symposium of Librarians Association of the University of California retrieved from http://www.youtube.com/watch?v=q_uOKFhoznI


Harvey, M. (2009). What does it mean to be a Science Librarian 2.0? Issues in Science and Technology Librarianship, (Summer). Retrieved from http://www.istl.org/09-summer/article2.html






Tuesday, August 17, 2010

Effective Library Website Design

My own set of criteria of an effective Library Website design:

1. I like the modern look and agree that the a visual of a libraries website does make an impression on users perception of the type of library it is. Two examples are:

Camden Council Library Services:





And Campbelltown Library:


I think both sites are effective and happen to know that both are great local government libraries but the visual difference between the two, leads me to believe that one is easier to use than the other. The Campbelltown Library site fits more into the home page but it is cluttered and for the most part generic and formal, the Camden Library site is more visually attractive because of its use of colour, icons and wigits along with the addition of pictures. Although Campbelltown Library includes web 2.0 by prompting following on twitter, providing RSS feeds and blogs in my opinion, Library 2.0 has become lost on the busy home page.

2. Easy navigation - Users want fast and effective navigation and not have to read through lists of items to find where they want to go, especially if they are unsure of where to look and have to do some searching.


The camden Library includes a serch window in all segmented areas of the site.




The campbelltown library includes a google search function, but searching is carried out over the Campbelltown council web domain, of which the Library is a part of, searching is not focussed on the Library site only and thus includes irrelevent material.

3. Promotional material in prominent places.
The Camden Library home page displays coming events in the centre of the page with pictures and promotional text. The promotional material on the Campbelltown site is again lost in the lists on the homepage, 'follow us on twitter' appears as a listed item but in a different colour which does highlight the feature but could be better shown with the twitter icon.


4. Segmentation - I agree that creating a space for separate and destinct users is wise and appeals to that group more. For example a kids or youth page where specialised librarians can contribute to the content and web 2.0 features geared toward that particular group.


5. Current information that is updated on a regular basis is essential. Regular use of web 2.0 technologies to interact with users is part of this. If the web page or contacts made through web 2.0 technologies are neglected then so will the participation in the site and may effect the usage of the library.

Thursday, August 12, 2010

Advice from Meredith Farkas

Five key pieces of advice from Meredith Farkas on Library 2.0:

1. Planning - was one of the first points and one of the 3 p's of Library 2.0 (planning, partnership, privacy). We need to consider not just what we want but how it will be delivered and ensure that it focuses on the needs of the constituency.

2. Focus on the user and go where they are - ie use YouTube, Facebook, MySpace or whatever their using as social networks and integrate into their worlds, also the formation of partnerships with student groups, faculties etc.

3. Keep up - librarians must make time to keep up, it must be part of their job description and be considered important enough to segregate from other duties. This means that we are able to keep up with new technology plus create content to use on the technology and interaction with users who need these technologies and support through them from the library.

4. Let go of the perfectionist ideal - the new information world is fast paced, if we worry about the final product being perfect (especially on the technologies such as blogs, Facebook and twitter) we won't be using it as much and won't get the benefits from regular use.

5. Techno lust - This idea was interesting as I think this happens to everyone, that we just want the next shiny new thing without the planning its delivery to our users or how it will integrate into our systems. Its wise to be sure that it will be a useful tool in facilitating the resources or services of the library.

And - with advice of number 4 - that will have to do.

Wednesday, August 11, 2010

A - Z of Social Networking for Libraries


Selecting five Library 2.0 ethos that could improve the Library I use:
1. Text - my local library already uses text for overdue notices but without being annoying to the user could use the method to advertise other library 2.0 features, creating awareness of blogs, RSS feeds or changes to the Website. For example library library uses the local paper and its website to promote author visits and although these are mostly successful, they have had to cancel through lack of interest. All advertising is also done by the council advertising department, so control has been taken away from the library. Through texting and RSS feeds or video presentations their coverage could be expanded for promotion of these and other events and also be controlled by the library itself.
2. Video - in the recent past, my local library opened another branch which was considered a state of the art facility, the website has pictures and pictures have been added to flikr (which I actually did during my study visit) but staff are not required to flickr pictures etc and a video tour of the new building on the website and posted to YouTube would be beneficial.
3. Podcasting - this could also improve the success of their author visits by conducting a recording or quick personal interview with the author, it would reach more users and could also satisfy the user needs more as many of the users are commuters and can't be at the author visits because of when they are held.
4. Blogs - would be a useful addition as the aims and direction of the Library and its initiatives and usefulness to the users would be more transparent. They also invite comment and discussion which allows for that interaction and feeling of creation and contribution to the community.
5. Facebook is a popular social networking program that would claw in users by being able to notify them of events, and general library policy, activities and whats available or new. This would be an invaluable tool to gauge user needs and opinion of resources available.

The Library Minute

The ASU 'library minute' presentations are examples of how to capture an audience, through visual and audible entertainment and feed informative and promotional messages about the libraries functions and key features. As these presentations reach their audience, the value of service provided increases through a discovery or reminder of the service plus the added benefit of a memorable imprint in the mind thanks to the mixture of a range of visual and audio learning techniques.

The Library minute is tightly wrapped up with concise points (eg. 'Top 5 Resources for Online Students'), visual examples (such as the laptop theft in 'Security'), effective imagery (such as the visual of the 'Holy Grail' in 'Academic Articles') humorous video clips and music used throughout and also the use of words flashing up on the screen to further imprint their message. The use of a short space of time is also beneficial for attention span and useful to attract busy students.

The clips only present a few points at a time, added together it is possible that they would not have the same impact or maintain interest. The main points presented have on some occasions been covered in more detail in their own Library Minutes, for example there is a 'Academic Articles' and also a 'EBSCO Academic Search Premier' showing the users how to access the academic articles. As they slowly build up the short episodes, users are lead into more detailed information.

The videos are pesented on the ASU website and on Youtube with the ability to subscribe via RSS, supporting the open access style of Web 2.0. They are also clearly user oriented targeting students and their youthful and fun lifestyle whilst supporting their information needs and encouraging their entrance into the academic library environment. The library minute incorporates the 4 C's of social media by the public access and its consultation with its users - ie conversation (or communication) and community.

Other Web 2.0 facilities available through the ASU Library Channel include, RSS feeds to new news realeases or Library Minutes, a Library Blog and twitter all contributing to collaboration, conversation, community and content creation because of the interaction it draws from the users and library staff. The ability to comment or share services and socialise creates network connections useful in providing relevent and useful information to the students whilst also expressing policies and the reasons for them from the librarians point of view.



NB - The four C's of Web 2.0 being collaboration, conversation, community and content creation.

Saturday, August 7, 2010

RSS Feeds

Really Simple Syndication (RSS) also known as Rich Site Summary is an automatic alert system of currently added web content for subscribers. Users are able to collect information from several RSS services and aggregate the feeds allowing efficient review of new information in a field of interest.

RSS is a useful tool for professionals, encouraging a proactive role in the monitoring of technical information and enhancing the value of costly subscriptions to electronic content and newly acquired resources. RSS can also be used on a more general basis for event notification and news updates. RSS feeds target the need to easily access cutting edge information in an efficient and timely manner. As Internet technology allows the perpetual publication of content, users are able to select only the most relevant information, saving time and allowing a greater focus on their area of speciality.

The State Library of NSW has a range of RSS services found at http://www.sl.nsw.gov.au./rss/index.html?HomeLink=Quick_links directing the user to new information and publications acquired. The State Library of Queensland found at http://www.slq.qld.gov.au/whats-on/news/feeds has RSS for new acquisitions but has also added RSS feeds that incorporate local content (At our Table - Queensland People) and library blogs. Libraries can use this technology to promote their services and also to draw in connections with users. RSS feeds can be received through readers or aggregators, they can also be accessed through the library website.

The advantages of automated RSS feeds ranges from allowing small understaffed libraries with little time or resources to efficiently manage and increase the value of their collections, to assisting highly technical libraries dealing with massive volumes of new content to meet the demands highly specialised staff. Monitoring usefulness through surveys of user behaviour can combat the problems associated with RSS feeds which are its lack of use, lack of relevancy and expiry of links.

The use of RSS readers has been said in recent times to be in decline, however this appears to be from its use in the current affairs and news markets. If Libraries stay connected with their users and are aware of their needs, they can continue to push new and specific resources, events and important local content through RSS effectively and efficiently reaching users in a more permanent and formal manner than a posting on face book or twitter.


References

Hart, L. (n.d). Library 2.0:RSS Feeds Dynamic uses for Special Libraries. Accessed 8/8/2010 from http://www.sla.org/pdfs/sla2007/hartrssfeeds.pdf

Landau, R. (2010). Solo Librarian and Outreach to Hospital Staff using Web 2.0 Technologies. Medical Reference Services Quarterly, 29(1), 75-84

MacManus, R. (2009). RSS Reader Market in Disarray, Continues to Decline. Accessed 9/8/2010 from http://readwriteweb.com/archives/rss_reader_market_in_disarray.php

Miles, A. (2009). RIP RSS: Reviving Innovative Programs through Really Savvy Services. Journal of Hospital Librarianship, 9(4) 425-432.

Youngkin, A. (2010). Librarian controlled RSS: A Novel Approach to Literate Search Follow-up. Journal of Hospital Librarianship, 10(2), 123-131.

Monday, August 2, 2010

Delicious review

Delicious describes itself as a 'collaborative repository' where people can 'discover, remember and share'. The 'live' or online nature of this application ensures its portability whilst also giving it the ability to quickly and easily impart self managed resources to online social communities and other interested information seekers. Incorporating Web 2.0 by sharing through other social network applications such as twitter, face book, email and its own Delicious network, it enables the wide dissemination of commendatory web content, combating the inherent problem of information overload associated with the perpetual growth of web content.

Qualifying it as a folksonomy along with other social media sites such as YouTube and Flikr is the use of tags created by the user to describe, file and retrieve information. The emphasis on self creation as opposed to selecting descriptors from an existing controlled vocabulary, reflects modern expectation of users to participate, interact and engage with resources.

Folksonomy has been criticised by many for among other things, its lack of formality and consistency, however, the nature of Delicious being a personal access and sharing tool for an indefinite amount of content, accuracy and consistency can be incorporated by consensus and personal preference and inaccurate tagging has less of an impact on accessibility. Folksonomy in this form can be influential on the more formal taxonomies as it provides insights into developing language trends.

Although there has been criticism of folksonomies, Delicious continues in popularity due to its ability to make social connections and its effective organisation of web resources for individuals and groups of people with common interests. It is another way in which social networks can be expanded and new connections made whilst access is increased and encouraged.

Libraries and information agencies such as the State Library of NSW and university libraries have incorporated Delicious into their collections to link users with their information requirements. In some cases such as the Ann Arbour Library resources within the library catalogue have used folksonomy to create wider access along with more traditional cataloguing. Although taxonomy still has its place, social bookmarking sites such as Delicious are gaining in popularity with information professionals and users within the information environment.




References:

Miller, P. (2009) Stephanie Lemieux talks about folksonomy and taxonomy in the enterprise. Nodalities Blog: from semantics web to web data. accessed 25/7/2010 from http//blogs.talis.com/nodalities/2009/06/stephanie-lemieux-talks-about-folksonomy-and-taxonomy-in-the-enterprise.php


Steele, T. (2009) The New Cooperative cataloguing. Library Hi Tech. 27 (1), 68-77.

Saturday, July 31, 2010

Reflections on Ethnic Technology

Reading :http://www.kk.org/thetechnium/archives/2009/03/ethnic_technolo.php
Viewing: http://www.youtube.com/watch?v=eeTEcwmfuu4

After reading and viewing the above I find the concept of refusal to use particular technologies interesting. I always thought that refusal would boil down to a natural aversion to change (and I must say this is the attitude I pick up mostly from peoples aversion to the with the new 'ribbon' version of Word & Excel) cost of the new technology, or in this rapidly developing consumer market a 'just wait and see' cautionary hesitation.

In the article it stated that 'a perfectly understood technology is voluntarily ignored'. I must say that this was the case with me and mobile phones, especially when circumstances didn't really require me to have one in the early days. When the mobile phone market emerged the lack of competition and options and the fact they were used to symbolise status drove me from the item. As more competitive deals and more options became available along with the integration of value added items such as Internet connectivity and cameras etc. they moved into the category of a common household item and became less associated with status. Now I choose not to have the popular IPhone, avoiding that particular technology in favour of a more economical brand which introduced upgraded versions allot faster and agree this is probably a personal defining principle.

The article states that 'technologies have a social dimension beyond their mere mechanical performance. We adopt new technologies largely because of what they do for us, but also in part because of what they mean to us. Often we refuse to adopt technology for the same reason: because of how avoidance reinforces, or crafts our identity' I think this is true. When I talk to die hard apple users I find it boils down to image (plus the fact they don't want global domination by another operating system - but in so doing ironically endorse the global domination of apple). Apple definitely plays on the image button of the consumer - the cool apple guy vs. boring old Mr PC and of course buy an IPad, because the ad simply states 'Ipad is beautiful'.

'Groups or individuals will reject all kinds of technological advanced innovations simply because. Because everyone else accepts them. Or because they clash with their self conception' I propose that Linux users easily fall into this category, and others who choose a different technology simply because they don't want to be cornered by what can be seen as a very dominating product.

I found the article and video very insightful and thought provoking. Obviously there are many reasons why people do things and we can't be all painted with the same brush, for example some people might buy the Ipad out of mere curiosity or find it fits their particular needs as well as being beautiful. But I think there is a strong argument for emotional reasonings behind certain technologies.

A related news article I found which was interesting when reflecting on these resources:
www.news.com.au/technology/ipad/ipad-owners-over-acheiving-selfish-elites/story-fn5knrwy-1225897805225

Tuesday, July 27, 2010

What is social networking

In defining Social Networking, I have broken down the terms. Social is to interact with one or more persons, who you may or may not be familiar with, usually for the sake of being socially courteous, forming aquaintances or strengthening relationships. Networking is also about forming relationships but is a more formal construction of connections formed that intersect at a place of commonality, for example business, friendship, family etc.
Networks are useful in commercial activities as it enhances the "word of mouth" method of promotion by travelling outside your domain or social circle, reaching others through various and possibly unending network connections.
Social networking has become a blur of personal and business relationships and thus potentially unending connections when carried out on the internet. This process has been enhanced by Web 2.0 capabilities of sharing, collaborating, creating and participating, which increases finding capabilities to add connections with people or businesses through common grounds, for example finding functions on Facebook or Twitter, or advertising tailored to your profile.

Social Networking technologies and sites already used:
- Facebook (regularly)
- twitter (account hardly used)
- Delicious
- Flickr
- NING
- YouTube (regularly)
- News blogs
- various Listservs

What I expect to learn from completing INF506.
- Current trends in using social network sites in information environments.
- Further familiarisation with social networking sites.
- Exploration of previously unknown sites and formats useful in social networking.
- Future outlook for integration of Web 2.0 into society and application of emerging trends.
- How social networking can be inbedded in information seeking behaviour and user power
- How to cope with barriers to integrating Web 2.0.