Saturday, October 15, 2011

IRRI Library: Huli Man Daw at Magaling, Habol Pa Rin

“Is digitization synonymous to preservation?” This question lingers on my mind on our visit to the International Rice Research Institute (IRRI) last 4 October 2011.

The collection of IRRI is highly specialized and it is what gives its library a strategic and advantageous position in the library marketplace.  But as I have noticed, there are only a few users of the library.  This cannot be attributed to failure in marketing and promotions since as explained by the librarians of IRRI, most of their users utilize the organization’s electronic journal collection.  This prompted me to ask why are they allocating so much space and expending resources in housing the print format of their journals when most of their users no longer physically visit the library. Isn’t it about time that the library moves closer to clients?  Advances in technology have changed or affected our attitude and lifestyle.  Hence, IRRI library must reinvent itself in order to adapt to changes, if it does not want to stagnate.  The librarians should start digitizing their print collection and make it accessible to users through remote access since their clients have shown inclinations to it in the first place.  

In relation to my initial observation, the IRRI Library also has to set its role in preservation and conservation vis-à-vis as a support research unit of the International Rice Research Institute.  If the library intends to preserve this collection for archives purposes then it is doing a good job (since in archives study, the object of preservation pertains to the original medium of the document); however if it intends to preserve these materials for circulation, then it must start identifying the ones worth preserving and the ones for weeding, provided that everything has been digitized.

In the long run, the organization cannot keep all its collection.  There will come a time when the aforesaid issues have to be addressed; so while there is abundance in resources, the IRRI Library ought to begin, now.

Lopez Museum and Library: Hitting Two Birds with One Stone

The title aptly describes my visit to the Lopez Museum last 27 September 2011.  The visit served not just the purpose of being able to observe a digitization process for my LIS 260 class but it also enabled me to have a glimpse of how archival materials are preserved for my LIS 212 (Introduction to Archives Administration).

The project of the Lopez Museum and Library to digitize film and mass media materials among others is a commendable effort.  However, the length of time that it has spent on scanning and other germane activities in this stage has taken its toll.  It appears that the library is so enamoured with the idea of digitization that it has neglected equally important issues on reference and access, such as providing the appropriate index and description for the images.  This is crucial as it affects the effective retrieval of information, needless to say the system has high-recall but low precision.  I just hope that in its migration from Alchemy to Docu1, the issue on reference and access would be address; otherwise the cost and effort exerted on the project would be futile.  As often said in the library and information field, “materials are useless if they are not made accessible to users”; hence the ball is in their hands.

Another thing that caught my attention during the visit was the instance when Prof. Esposo-Betan asked the head librarian of the Lopez Museum as to the purpose of the entire digitization project, and the latter answered something like “to uphold Filipino culture and history”.  Somehow, the scene kept me silent for a few seconds and I just had to ask myself the same thing, what is exactly the purpose of all these?  Looking at their daily activities and practices, I cannot help but consider the economic side of things.  The amount of resources that the organization has spent and is spending for the project is quite hefty; and there has to be a return of investment for it.  Acquiring in bulk archival issues of newspapers from different publishers entails cost; not to mention that their website only features the titles of their scanned collection are more of a business strategy. I have the fear that once all the materials in their field of interest are acquired in their collection, then they have the monopoly of trade.  I understand the cost of maintaining these high heritage materials but nothing beats making it available to the public.

Museums in the Philippines have an elitist stigma.  We only get to visit museums during field trips or for research and educational purposes. This contributes to the alienation of most Filipino to its history and cultural heritage.  In the tourism industry, a lot of places in the Philippines are now becoming popular especially for local tourists.  This can be attributed to the sales or promotional packages offered by airlines companies; perhaps museums should learn from this. Unless they try to be more active in reaching out and making themselves accessible to the middle and working class, then their noble cause is not fully served.

Monday, September 12, 2011

Greening the Library

Ephraim, P. (2003).  The greening of libraries.  Library Management, 24(3), 160-163.



Abstract of the Article:
 
Ephraim (2003) integrates the concept of sustainability in the library setting through Green Library Management.  This model works on the premise that “all human activities draw from, and impact on, the environment”.  Thus, it calls for the enactment of library policies and strategies which put prime emphasis on environmental conservation.  Among these are the maintenance of a well-arranged, illuminated, and dust-free work environment;    the incorporation of environmental education in library-use programs, the adoption of using and purchasing materials made out of re-cycled papers; and the replacement of paper-based storage media with electronic format for information preservation.  In the end, Ephraim (2003) is aware of the opposition to the Green Library Management Model as it demands abandoning traditional way of thinking; but he is also confident that libraries will eventually recognize the possibilities it offers.


3 Things I Learned:

1.       The term “sustainable development” is coined by Dr. Gro Harlem Brundtland in the World Commission of Environment and Development in 1983.
2.       Through the concept of generational justice every decisions and actions of current library users and staff has its effect to the library and its future users.
3.        Digitization of materials for preservation is a key element in Green Library Management.


Application / Implication:

The possibilities and challenges it face albeit in another front is comparable to the open access movement.  Sustainable development offers an alternative to the traditional notion of development.  Its scope is more encompassing as it integrates the marginalized sectors on the forefront of debate.  Hence, advancing its cause is not at all a hare brained idea.  In fact, it proposes a more beautiful future for all of us.  Given equal footing, we all owe it Mother Earth.

Sunday, September 11, 2011

Health Concerns

Uwaifo, S.O. (2007).  Nigerian library staff and their perceptions of health risks posed by using computer-based systems in university libraries.  Program: Electronic Library and Information Systems, 42(1), 68-75.



Abstract of the Article:

Uwaifo (2007) reveals that the benefits far outweigh the health risks of using computers in the performance of library-related tasks.  This is manifested in the low level of ergonomic programs of Nigerian university libraries.  Thus, Uwaifo (2007) argues that library management should not overlook health risks of library workers albeit the predominant perception and practice.  He calls for result-oriented ergonomic programs such as designing building and “putting in place IT equipment” and pieces of furniture which complies with ergonomics requirements.


3 Things I Learned:

1.       Etymology of Ergonomics: Greek words: “ergo” (work) and “nomos” (natural laws). Hence, it refers to “the study of how computers and machines” can be made to fit humans better” to ensure the safety, efficiency, and reliability of performance of workers.
2.       Ergonomic features include tiltable keyboard and monitor, suitable software, proper ventilation, adjustable chairs and tables, and spacious building.
3.       Common computer-related health hazards are categorized into two:  repetitive strain injury and cumulative trauma disorders.


Application / Implication:

Managing a library does not just involve building up and organizing one’s collection but also seeing to it that the place or structure itself is conducive for its users.  It must also lessen the health hazards of its workers and promote employees’ welfare.  In my work place however, advancing this cause entails significant budgetary allocation not to mention the long and winding bureaucratic process.  But even if the odds are against me, lobbying for it is my first step in producing desired results.  In this world of endless possibilities, who says that dreams do not come true?

Open Source Software

Krichel, T. (2009). From open source to open libraries.  Bulletin of the American Society for Information Science and Technology, 35(2), 39-46.

Retrieved from http://proquest.umi.com/pqdwebindex=0&did=1624592501&SrchMode=2&sid=3&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1315363632&clientId=51710


Abstract of the Article:

Theoretically, Krichel (2009) makes an analogy between library and open source software (OSS) as a form of service.  In terms of interface, software uses the mouse button and text field; whereas the library service has building and staff.  In terms of organization, software uses various source codes, while the library catalogs its collection.  Lastly, in terms of objects of interest, software works on files and the library works on books. 

On the practical level, Krichel (2009) discusses OSS from the social science perspective.  According to him, one key factor for the success of OSS is the sense of ownership it gives to the community.  Everyone may not just download or read the program but may re-write, re-pack, and re-develop it to serve one’s functional purpose.  Another factor pertains to the way it has valued time.  Developing OSS is tantamount to “making a huge piece (sic) of complex information available” by splitting “the task into small bits” and by assigning “a volunteer to each bit”.  In this way, any person involve in the process spends relatively a small amount of his time.  Another key factor is the way OSS may be reuse.  OSS such as the Perl and C code modules are being reuse in developing other OSS.  Thus, one need not start from scratch but rather builds on the knowledge of others.  For Krichel (2009), libraries should cope with the development in OSS.  However, technical incompetence of library staff, the myth of industry, and the myth of full text are just some of the challenges to achieving open libraries.

  
3 Things I Learned:

1.       Although theoretically neglected, OSS is in itself a form of service.
2.       Myth of industry refers to the tendency of people to apply rigid control over the usage of one’s work.
3.       The use of Perl and C codes in software programming.


Application / Implication:

Having learned about the nature and possible benefits of OSS, I am challenged to look for one that may facilitate a more efficient legal information service for my work place.

Open-Publishing

Hahn, T.B., Burright, M., and Duggan, H.N. (2011). Has the revolution in scholarly communication lived up its promise.  Bulletin of the American Society for Information Science and Technology, 37(5), 24-28.

Retrieved from http://proquest.umi.com/pqdweb?index=0&did=2369488191&SrchMode=2&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1315277280&clientId=51710


Abstract of the Article:

Hahn et al. (2011) propose the Open Access Institutional Repository Model for scholarly communication “where scholars (may) share their works with few or no legal and financial barriers” and where these scholarly materials may be disseminated to audience around the world.  In line with this, Hahn et al. (2011) explore the various roles librarians can play in scholarly communication. By supporting the Open Access Institutional Repository Model, librarians may help shrink the gap between dwindling library budget and increasing cost of library materials.  The professional expertise of librarians with respect to copyright and scholarly communication equips the former to lobby for better terms of agreement (e.g. opt-out clauses, less content bundling, and lower prices) with traditional publishing companies in favor of the scholar and the larger public. Lastly, librarians can contribute in raising the awareness of the community as to the availability of these open access mechanisms as an alternative to what Hahn et al. (2011) describe  as “prohibitively costly and restrictive” traditional model of publishing.


3 Things I Learned:

1.       Scholarly Communication is an umbrella term which encompasses “all activities and norms of scholars related to creating and disseminating new knowledge”.

2.       Impact Factor is based on the assumption that “the number of times articles are cited relates to their importance in the field”.  It is one of the tools used in open access publication; so much for its credit or discredit for that matter, such articles will then be considered the core collection of a particularly field.

3.       The Public Library of Science, which is launched in 2003, serves as the open access business model for open access publishing.


Application / Implication:

Utilizing the various mechanisms of the open access movement offers nothing but advantages to any library and information center.  But as a word of caution, we as librarians, as information professionals, and most importantly as end-users must critically assess the scholarly value and relevance of these open access publications since the quality of our output is to a certain extent dependent on the quality of information we feed upon ourselves. 

Monday, August 8, 2011

Cloud Computing


Cervone, H.F. (2010).  An overview of virtual and cloud computing.  OCLC Systems and Services, 26(3), 162-165.


Retrieved from http://proquest.umi.com/pqdweb?index=0&did=2139271291&SrchMode=2&sid=2&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1312791836&clientId=51710


Abstract of the Article:

Cervone (2010) distinguishes among traditional, virtual, and cloud computing with respect to their principles, techniques, and utility to organizations.  First is “traditional computing”, which involves the installation of software “for one or more physical servers” within the organization.  Its limitation is on its rigid scalability.  Virtual computing, on the other hand, uses the hypervisor, which enables “multiple operating system environments and their associated applications” to run on a single physical machine. Through this model, continuity of organizational processes is ensured.  Last is cloud computing; this enhances virtual computing by enabling one to run applications without necessarily owning or knowing the exact location of the physical hardware in which the application is ran.  Organizations that subscribe to cloud providers usually enjoy the benefits of lessened production cost.  Nevertheless, Cervone (2010) is cautious on the security and legal impediments in engaging to cloud computing.  In the end, he recommends that, to best protect itself, organizations ought to work with cloud providers that are “committed to transparency”.


3 Things I Learned:

1.       “Cloud” computing stands for “common location independent, on-line utility on demand”.
2.       Utility of hypervisor: such that as it simulates the operating environment of a virtual machine, it avoids process or service interruption when a particular hardware on the cluster fails.
3.        Augmenting hardware to increase the scalability of servers must be thoroughly evaluated because it often leads to inefficiency in such a way that the extra capacity may not be used for other work loads.


 Application / Implication:

Cervone (2010) taught me the different models of hosting applications.  Although I am aware of the traditional model to call it as such and to know its theoretical underpinnings make me a greenhorn on the topic at hand.  More so was I enthusiastic when I read about virtual and cloud computing.  Hence, I look forward to the report and class discussion; it’s high-time to clear the clouds.

Open Access Online Journals for Libraries


Kopak, R. (2008). Open access and the open journal systems: making sense all over.  School Libraries Worldwide, 14(2), 45-54.


Retrieved from http://proquest.umi.com/pqdweb?index=0&did=1567446531&SrchMode=2&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1312791639&clientId=51710


Abstract of the Article:

Kopak (2008) works on the proposition that open access system is not just about having free access but also about ensuring that “high quality information sources” are available to the community.  He further proposes that the mode of presentation should be supportive of “engaging, interactive, and increasingly social” knowledge integration, which should be manifested in the user-interface of an open-access system.  

Kopak (2008) uses the Open Journal Systems (OJS) of the Public Knowledge Project as his example.  In terms of the quality of content, the OJS serves as the platform for the production and distribution of scholarly journal articles which are product of publicly-funded researches.  In terms of its presentation, OJS uses reading tools to enhance users’ engagement.   These reading tools are grouped into two, viz: the structural, which aim is to provide access to information and other services (e.g. ”abstract”, “how to cite item”, “review policy”, “about the author”,  “notify colleague”, and  “look up terms”) and the topical or domain specific, which aim is to enhance “contextual meaning of knowledge” (e.g. “ related studies”, “media reports”, “book searches”, “annotation”, and “hypertext linking tools”).    In the end, Kopak (2008) aspires that OJS would serve as a platform for knowledge-based interaction and in the long run promote life long learning.


3 Things I Learned:

1.       Open access should not just stop at information retrieval but should move further towards information interaction and meaning-making.
2.       As a public good, research and scholarship should be non-rival (i.e. one’s consumption of good does not reduce the amount available to others) and non-excludable (i.e. one cannot be excluded from utilizing the good).
3.       Directly annotating a document is an indicator of active reading.  As such, it has the advantage of convenience, easier visual searching, and intensified immersion in the context of the document.


 Application / Implication:

The development of open access platforms for scholarly journals should be maximized by any library and information center.  This calls for me to initiate and promote the use of open access journals on law and associated topical interests such as business and corporate governance to users of the OGCC Library. Through this, the convergence of theory and practice may help enhance the quality of discourse in the often presumed and arbitrarily labeled corrupt bureaucracy.  

Friday, August 5, 2011

Visualization

Gang, W. (2006). Visualizations for digital libraries. Information Technology and Libraries, 25(2), 88-94.


Retrieved from http://proquest.umi.com/pqdweb?index=0&did=1082361561&SrchMode=2&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1312523017&clientId=51710

Marcus, A. (2002). Information visualization for advanced vehicle displays. Information Visualization, 1(2), 95-102.


Retrieved from http://proquest.umi.com/pqdweb?index=1&did=420333511&SrchMode=2&sid=2&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1312523268&clientId=51710


Abstract of the Articles:

Gang (2006) puts forward that effective visualization of user interface is based on “a detailed understanding of users, their information needs, and their tasks”. Online information retrieval tasks generally include searching, navigation, and browsing. He describes the various techniques and applications used by the digital libraries of Indiana University, the University of California System, Los Alamos National Laboratory, and Tufts University. He also identifies the principal metaphors of Borner and Aqualab, which are the Semantic Treemap and Word Cloud respectively. In the end, Gang (2006) suggests that future researches on visualization should focus on the extent in which a “visual interface facilitates a user’s perception of information”.  

Gang (2002) focuses on the best practices in information retrieval visualization; but the factors in the development of “best practice” in visual prototypes are discussed by Marcus (2002).  Although the latter’s study is on the application of user-interface to vehicles, he provides a thorough discussion of the context in which IR user tasks are done. He identifies the underlying components of user interface as well as the cultural dimensions that must be considered in developing an effective user interface.  Marcus (2002) describes how culture affects the various components of user interface. Consequently, for visual images to become effective communication tools, developers must understand and incorporate these cultural dimensions into the user-interface.  


3 Things I Learned:
 
1.       Detailed enumeration of user tasks with respect to online information retrieval, viz: browsing of sources, viewing context of query match, visualizing passages within documents, rendering sources and results, reflecting time cost of interaction, managing multiple-search processes, integrating multiple search and browsing techniques, and visualizing large information sets.
2.       The components of user-interface are metaphors, mental models, navigation, interaction, appearance, and communication structures (i.e. lexical, syntactic, semantic, and pragmatic).
3.       Cultural dimensions cover power distance, individualism vs collectivism, masculinity vs femininity, uncertainty avoidance, and, long-term time orientation.


Application / Implication:

I am now more aware of the values and biases of computer icons and how they are presented.  What is commonly perceived as detached and random metaphors are value-laden.   Taking hold of that knowledge, I would be more considerate and patient to library users, especially the senior and elderly members of my work place.  Although we belong in the same society and organization, each of us carries our respective sub-culture values, which in turn affect our behavior towards the equally value-laden information and computing system.  The challenge is to find the conjunction where users’ expectation and system standards meet; and it is in that conjunction where the greater challenge lies for library and information students and professionals. 

Tuesday, August 2, 2011

Web 2.0 Technology Application to Libraries

Joint, N. (2009).  The Web.20 challenge to libraries.  Library Review, 58(3), 168-178.


Abstract of the Article:

  Joint (2009) gives an overview and more importantly caveats of the effect of Web 2.0 to libraries. Initially, he describes Web 2.0 as having “heightened functionality” compared to Web 1.0 as offering only “passive text describing library services and hyperlinks to information sources”.   As he has observed, it is the reference service that foremost benefited from the proliferation of Web 2.0 applications such as RSS feeds, blogs, wikis, instant messaging, social networking, and podcasting.  According to Joint (2009), this development has widened the reach of libraries; however he is quick to warn that one must have an integrated purpose in using these applications. In other words, Web 2.0 applications are simply tools of established objectives.  Another caveat is the long-term difficulty of using external platforms for various library services such as acquisition, cataloging, and circulation.  For Joint (2009), building the institutional services of a library on an “external, non-institutional server” can lead to legal and technical problems, viz ownership and security.  In the end, the utility of Web 2.0 applications cannot be undermined; it’s just that libraries must be critical in employing it.


3 Things I learned:

1.       The distinction between Web 1.0 and Web 2.0. The former offer only “passive text” and “hyperlinks to information sources” while the latter is characterized by more interactive applications.
2.       The development of Web 2.0 paved the way for digital libraries to have an increase and enhanced web presence; thus extending its reach but also placing it in a relatively vulnerable position.
3.       The popularity of Web 2.0 applications can be attributed not just to its interactive trait but also to the sense of personal control it gives to individual users.


Application / Implication:

   Developing a portal for the OGCC Library, which will utilize Web 2.0 applications, should not be seen as a harebrained idea.  In fact, I should be considering it as one expected output from my proposed study of redefining the role of the OGCC Library in the government corporate sector (LIS 299).  Now that’s another step albeit a single one in the long winding road towards a pro-active OGCC Library. May the force be with me.     

Netiquette

Sturges, P. (2002). Remember the human: the first rule of netiquette, librarians and the Internet. Online Information Review, 26(3), 209- 216.



Abstract of the Article:

     Sturges (2002) contends that the first rule of netiquette is “respect for the human”.  For him, librarianship is not just about books and information system but more of respecting the individuality of every library user; but the challenge lies in this very basic value.  By protecting individuality, the library is ensuring the users a space to be themselves.  In being themselves, a number of users utilize the Internet as a means for their malicious or criminal behavior.  To curb these behaviors, administrators block a number of sites or randomly checked users as they use the Internet facility of the library.  In doing so, libraries somehow exploit user data and ultimately encroached on one’s individuality.  As Sturges (2002) aptly stated, “the dilemma faced by the library administrators was weather serious offence and distress caused by a few people justified monitoring and controlling the access of a blameless majority”.  Thus, the challenge for libraries is to institutionalize policies that would seek to balance individual privacy and community values.



3 Things I learned:

1.       The issue of privacy is merely one of the sub-issues of ownership. 
2.       Semantics of ownership include: solitude (ownership of space), anonymity (ownership of one’s name and details about oneself), bodily modesty (ownership of one’s body), psychological integrity (ownership of contents and workings of one’s mind), and confidentiality (ownership of information about oneself).
3.       Findings of the research at Loughborough University at the United Kingdom suggest that “there is a dangerous gap between the privacy protection that the public believes the library offers, and the preparedness of librarians for providing this protection”.



Application / Implication:

     The findings of the Loughborough Research demands that upholding the privacy of users should not just be lip service; the commitment to do it should be initiated and constantly carried out by librarians and information professionals in our own respective backyard.  This emanates from the fundamental value that each of us (users and library staff) has our own individuality, distinct, unique, and allow me to add special.   Despite individual differences, there is a family or another person loving the library user whom we least like. In the same manner that whenever we use the Internet; no matter how long we sit in front of our computer or how complex and abstracted our interaction with the computer machine, somehow at some point behind the interface is another human being, equally seeking respect and care --- like you and me. 

Information Science

Klempner, I. (1969). Information science unlimited?... a position paper. American Documentation., 20(4).  


Retrieved from http://proquest.umi.com/pqdweb?index=13&did=640703831&SrchMode=1&sid=2&Fmt=10&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1312117224&clientId=51710


Abstract of the Article:


   Kempler (1969) explores the concept of information and calls for a re-evaluation of the Information Science curriculum to make it more responsive to the changing needs of his time.  He jumps-off from the definition provided by the American Society for Information Science, viz “information science investigates the properties and behavior of information, the process governing the transfer process, and the technology necessary to process the information for optimum accessibility and use”.  For him, the inability of the discipline to develop theories is mainly attributed to the way information is defined, as the “product of conceptualization”.  As such, information is presented as a highly subjective matter. He contends that in order to strengthen the discipline one must understand and build a framework around the various segments of information as provided in the above definition, viz conceptualization, storage or transmission, and utilization.  One does not stop at the conceptualization segment.  In the end, information should be evaluated not just in terms of its value in a technological system, for lack of better term, but also in terms of its relevance to the human person. 



3 Things I learned:

1.   As academic disciplines, Information Science and Information Technology are distinct but complementary to one another.
2.    Based on its various segments, information has its technological and human component.  The conceptualization and utilization segments represent the human component, whereas the storage or transmission represents technological part.  Being segments of a whole, man and technology do not contend but rather complement each other.
3.       Shannon’s (1948) definition of information is placed in a more appropriate context and that is in the storage or transmission segment, as it deals with the “physical nature” of information.



Application / Implication:

      Reading this article reminds me of the metaphor of the elephant, which I first heard from Prof. Clarita Carlos way back in 2000.  As discrete persons, our perspective is merely one way of looking at things.  Philosophically, we can only claim the truth based on our limited sense-perception and established mechanisms but we cannot prove it.  The same is true when dealing with the central object of our study; information has to be approached from various segments.  But then again, have we exhausted all segments of the object?  I believe that there are still a lot of things to explore, and that makes the study of information interesting.    

Monday, July 25, 2011

Intellectual Rights / Copyright

Pike, G. (2010).  Copyright: a partial victory for Georgia State. Information Today, 27(10). 


Retrieved from http://proquest.umi.com/pqdweb?index=0&did=2187694111&SrchMode=2&sid=2&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1311607084&clientId=51710






Abstract of the Article:
                Pike (2010) discusses the lawsuit between Georgia State University (GSU) and Cambridge University Press, at al. (CUP). In the case, GSU was accused of violating the copyright of CUP by unauthorized copying of “excerpts and articles from journals” of the latter’s published works; said materials were scanned and distributed through the university’s electronic course reserved and course-web system   GSU, on the other hand, invoked the fair use doctrine, in which the materials are used for instructional purposes only.  The court decided in favor of GSU, stating the latter does not encouraged infringement, especially that the university has an established Copyright Policy.



3 Things I learned:
1.       The imperative of having copyright or information policy for any organization since it serves as guide for proper use of information.
2.       Instituting and implementing policies are two different activities. An organization’s adherence to the fair use doctrine necessitates an accompanying obligation to strictly and consistently implement rules pertaining to the use of information.
3.       In approaching the issue of infringement to copyright, one must consider not just the nature of the user but also the use of the material itself.   



Application / Implication:
                I take information literacy as a personal advocacy but I must be more active in translating it in a concrete and tangible manner, especially in my work place.  

Monday, July 11, 2011

The Internet and Implications to Libraries

Partridge, H., Lee, J., and Munro C. (2010). Becoming “librarian 2.0”: the skills, knowledge, and attributes required by library and information professionals in Web. 2.0 world (and beyond). Library Trends, 59(1-2), 315-335.  



Abstract of the Article:

  Partridge et al. (2010) explores the implication of the development of Web 2.0 to librarians.  From a focus-group study of librarians and information professionals in Australia, the following characteristics are the expected qualities that Librarian 2.0 must possess, viz: has an awareness and understanding of emerging technology, has a zest for lifelong learning, has good research and analytical skills, has good written and oral communication skills in various formats and media, a team-player, user-focus, business savvy, and pro-active. 


3 Things I learned:

1.       Stephen (2006) concept of Librarian 2.0 as someone who “plans for his or her users; embraces Web 2.0 tools; controls ‘techno lust’; makes good, yet fast decisions; is a trends potter;  gets content… (and) never stops dreaming about the best library service”

2.       The development of Web 2.0 has raised the bar of how librarians and information professionals perceived themselves.

3.       Focus group discussion is a good methodology if one wants an intensive study of how a certain group of people would perceive a situation. Results from this kind of studies should be analyzed from the contextual and thematic levels.


Application / Implication:

    Many are the challenges that await librarians nowadays.  Thus, studying to become a librarian does not stop in passing the board examination, God willing of course.  The challenge is far harder when I commit myself to an insatiable lifelong desire to learn brought by the very nature and dynamics of the central object of the discipline --- information.   Perhaps for many, to say the phrase is consummation of all hard work but for others it is simply the beginning: so help me, God.

Computer and Internet Security


Trim, P.R.J. (2005). Managing computer security issues: preventing and limiting future threats and disasters. Disaster Prevention and Management, 14(4), 493-505.



Abstract of the Article:


     Trim (2005) posits that senior management should view security as a ‘core activity’ of any organization. The cost of losing valuable information and eventually paralyzing the operations of an organization far outweighs the cost of institutionalizing a holistic and pro-active security policy. Its necessity is underscored not just by the proliferation of organized criminal syndicates and terrorist groups but also by treats emanating from the functional-structure of the organization itself. Hence, cooperation with law enforcement agencies, continuous staff training, and establishment of risk assessment and corporate intelligence policy are essential elements of organizational security policy.  



3 Things I learned:

1.       Corporate intelligence, which is defined as “the acquisition of knowledge using human, electronic and other means, and the interpretation of knowledge relating to the environment, both internal and external, in which the organization operates. It provides selected staff within the organization with up-to-date and accurate information, which allows strategists to develop and implement policy so that the organization maintains and/or gains a competitive advantage in the marketplace. It also provides a mechanism for implementing counter-intelligence measures to safeguard corporate data and secrets".   

2.       Installation of information – security infrastructure and software (firewall, anti-virus etc.) solves only half of the problem; the other half is dependent on the attitude of the people within the organization.

3.     The concept of organizational security has internal and external dimensions.  It should be addressed in a holistic manner by the senior management and in every level or functional component of the organization by the employees. 


  
Application / Implication:


     Having learned about the nature of organizational security, I would be more careful in my use of the Internet for I may unknowingly put organizational and personal information at risk. This further strengthened my advocacy for information literacy, where responsibility and accountability are crucial components.  

Monday, July 4, 2011

Apologetic Beginning

When Ma'am Sharon said that the class is required to make a blog for our weekly entries, I was telling myself, "oh no!  another another blog site to neglect"!!! But my alter ego, who happens to be the more rational and diligent one, was shouting: "HOPE NOT"!

Enough for my long introduction, truth is, I just misplaced the hard copy of my article and I was not able to keep a soft copy of it (dahi-dahilan). But I promise to look for it tomorrow and hopefully, I'd be able to get things done for this blog.   

For now, sorry naman!