371 lines
22 KiB
Plaintext
371 lines
22 KiB
Plaintext
|
||
Current Cites
|
||
|
||
Volume 13, no. 3, March 2002
|
||
|
||
Edited by [2]Roy Tennant
|
||
|
||
The Library, University of California, Berkeley, 94720
|
||
ISSN: 1060-2356 -
|
||
http://sunsite.berkeley.edu/CurrentCites/2002/cc02.13.3.html
|
||
|
||
Contributors: [3]Charles W. Bailey, Jr., [4]Terry Huwe, [5]Shirl
|
||
Kennedy, [6]Leo Robert Klein, [7]Margaret Phillips, [8]Roy Tennant
|
||
|
||
Allen, Maryellen. "A Case Study of the Usability Testing of the
|
||
University of South Florida's Virtual Library Interface Design"
|
||
[9]Online Information Review 26(1) (2002): 40-53. - This month's
|
||
addition to the growing literature on usability in libraries concerns
|
||
the trials and tribulations of a Web site redesign at University of
|
||
South Florida Libraries. Both successes and failures are reported as
|
||
the development team refines their testing procedures. Anyone who's
|
||
been through the process of reconciling often highly contradictory
|
||
goals will know how rocky a road a site redesign can be. Hints of
|
||
differences in the literature not only make for interesting reading
|
||
but they also helpfully alert us to challenges we too are likely to
|
||
face when going down the same road. Here the problem was whether to
|
||
use "plain, straightforward language" or "library jargon". Apparently
|
||
library jargon won out. - [10]LRK
|
||
|
||
Anhang, Abe and Steve Coffman. "The Great Reference Debate"
|
||
[11]American Libraries 33(3) (March 2002): 50-54. - The debate of the
|
||
title is based on the proposition "Be it reolved that reference
|
||
librarians are toast." The authors debated this issue at the Ontario
|
||
Library Association Super Conference in Toronto in February 2001, of
|
||
which this article is a summary. Abe Anhang debates for the
|
||
proposition, while Coffman debates against. As it turns out, they both
|
||
believe that reference librarians "as we know them -- ...who sit
|
||
behind desks for five or six hours a day...waiting for people to walk
|
||
up and ask questions" are toast. If you ignore the non-debate,
|
||
Coffman's part does a good job of identifying six reasons why
|
||
reference librarians definitely are not toast -- as long as we can
|
||
meet our users where and when they want to be served. - [12]RT
|
||
|
||
Brennan, Christopher and Eileen O'Hara. "Murphy Was a Librarian: a
|
||
Case Study in How Not to Handle a Systems Crash" [13]Computers in
|
||
Libraries 22(3) (March 2002): 10-12,72. - Disaster strikes Drake
|
||
Library at SUNY Brockport when a system glitch vaporizes all the MARC
|
||
records from their bib catalog. Backup was faulty and all they had to
|
||
fall back on was a data-run they had submitted five months earlier to
|
||
an outside organization for the purposes of producing a union catalog.
|
||
The public service message coming out of this article is emphasized
|
||
repeatedly by the authors: communicate with your vendor to make sure
|
||
that effective backup procedures are in place and back up early and
|
||
often. - [14]LRK
|
||
|
||
Carlson, Scott and Andrea L. Foster. "Colleges Fear Anti-Terrorism Law
|
||
Could Turn Them into Big Brother" [15]Chronicle of Higher Education
|
||
48(25) (March 1, 2002): A31-A32. - Let's take a break from topics like
|
||
the Dublin Core, metadata and XML and consider privacy and
|
||
anti-terrorism in the information age. In October, the USA Patriot Act
|
||
was enacted giving law enforcement extra tools to track suspected
|
||
terrorists including the right to open student computer files or,
|
||
potentially, to see student library records. This kind of invasion of
|
||
privacy, some believe, endangers the "climate of free inquiry"
|
||
traditional to the academic environment. Some universities have
|
||
instituted guidelines for responding to law enforcement requests made
|
||
under the new law. At Cornell, if a staff member is asked by a law
|
||
enforcement agent to disclose information about a student, they should
|
||
first contact the information technology policy advisor who will
|
||
consult with the university's lawyers. In resonse to the Patriot Act,
|
||
the library community with ALA and other library administrators at the
|
||
healm, remains steadfast in its advocacy of privacy rights. - [16]MP
|
||
|
||
Ellis, John. [17]"All the News That's Fit to Blog" [18]Fast Company
|
||
(April 2002) (http://www.fastcompany.com/online/57/jellis.html). -
|
||
Weblogs are hot, hot, hot. One can only wonder if the enthusiasm for
|
||
them will wane now that they are becoming a mainstream phenomenon. In
|
||
this article, Ellis points out the shortcomings of the "boring
|
||
pundits" who dominate newspaper op-ed pages and political talk shows,
|
||
and compares them (unfavorably, of course) to the lively new world of
|
||
weblogs. Not surprisingly, an increasing number of pundits are taking
|
||
up blogging themselves -- i.e., [19]Andrew Sullivan
|
||
(http://www.andrewsullivan.com/), [20]Virginia Postrel
|
||
(http://www.dynamist.com/scene.html), and [21]Mickey Kaus
|
||
(http://www.kausfiles.com/). There are any number of free tools that
|
||
allow anyone to set up a weblog and begin publishing immediately,
|
||
which naturally results in a lot of swill, but also generates a
|
||
surprising amount of eloquent, dynamic discourse. Bloggers, says
|
||
Ellis, "assume that their readers are as smart as they are, if not
|
||
smarter." And rather than trying to keep you at their site by any
|
||
means necessary, they routinely send you out across the Web by posting
|
||
links from diverse and often obscure sources. The underlying
|
||
technology -- and philosophy -- is peer-to-peer. - [22]SK
|
||
|
||
Emery, David. [23]"The Nigerian E-Mail Hoax: West African Scammers
|
||
Take to the Net" [24]SFGate (March 14, 2002)
|
||
(http://www.sfgate.com/cgi-bin/article.cgi?file=/gate/archive/2002/03/
|
||
14/nig erscam.DTL) - Probably you've already gotten one (or
|
||
more...many more) of these e-mails, ostensibly from some high official
|
||
in the government of Nigeria, Ghana or another West African country.
|
||
This individual urgently seeks your help in transferring a large chunk
|
||
of the national treasury or whatever into a U.S. bank account. All you
|
||
have to do is send this person your bank account number so he or she
|
||
can transfer the money, and he or she will reward your kindness with
|
||
an attractive percentage. Amazingly, people keep falling for
|
||
variations of this scam; the Secret Service says one percent of the
|
||
people thus solicited will respond, and the U.S. Postal Service
|
||
estimates losses to American citizens of more than $100 million
|
||
annually. Who are these pigeons? "Greed and gullibility obviously
|
||
figure in," as do personality traits like risk-taking, susceptibility
|
||
to flattery or intimidation, and lack of interest in news/current
|
||
events. As you might suspect, the Internet has served as a fertile
|
||
breeding ground for scams of this nature. According to the website
|
||
Internet Fraud Watch (http://www.fraud.org/), "Nigerian Money Offers"
|
||
-- also called "Nigerian Advance-Fee Fraud" or "419 Scam" ("419" being
|
||
the relevant section of the country's criminal code) -- surged up the
|
||
charts last year, from seventh to third place, on the list of the most
|
||
common types of online fraud. Next time you receive one of these
|
||
e-mails, forward it to the Secret Service for inclusion in their
|
||
database: [25]419.fcd@usss.treas.gov. - [26]SK
|
||
|
||
Kling, Rob, Lisa Spector, and Geoff McKim. [27]Locally Controlled
|
||
Scholarly Publishing via the Internet: The Guild Model. CSI Working
|
||
Paper No. WP-02-01.
|
||
(http://www.slis.indiana.edu/csi/WP/WP02-01B.html). - Kling et al.
|
||
suggest that too little attention has been paid to the working papers
|
||
and technical reports of academic departments (and other research
|
||
units) as a model of free scholarly publishing. The "Guild Model"
|
||
relies on the academic reputation of the sponsoring department to
|
||
establish the reputation of its research manuscript archive. In order
|
||
to publish papers in the archive, authors must be affiliated with the
|
||
department. Individual faculty contributions to a department's archive
|
||
do not undergo peer review; however, their authors have undergone
|
||
"career review" as part of the hiring and tenure process, and this
|
||
establishes their scholarly credentials. This interesting and
|
||
thoughtful paper includes examples of the Guild Model and a
|
||
consideration of its pros and cons.- [28]CB
|
||
|
||
Kravchyna, V., and Hastings, S. K. [29]Informational Value of Museum
|
||
Web Sites [30]First Monday 7(2) (February 4th 2002)
|
||
(http://www.firstmonday.org/issues/issue7_2/kravchyna/). - This
|
||
article assesses the behavior of users in using museum Web sites, an
|
||
interesting subject for librarians because the experience of users
|
||
with this type of web site charts a truly new application for museums.
|
||
The authors launched an extensive Internet survey of museum users, and
|
||
report on their findings. Among the chief news: most people are used
|
||
to audio and video programs and enjoy these formats on the web, and a
|
||
high percentage or respondents visited a museum web site before
|
||
visiting the museum itself. Obviously, an Internet-using population
|
||
does not tell the whole story of user populations for museum
|
||
directors, but it's an important segment of that population. The
|
||
authors frame this paper as part of a larger investigation into the
|
||
value of museum Web sites, and they make good use of tables and charts
|
||
to illustrate their findings. The authors conclude that their findings
|
||
can help guide database design, metadata creation, and retrieval
|
||
options for museums; indeed, one hopes they're paying attention. -
|
||
[31]TH
|
||
|
||
McClure, Charles R., R. David Lankes, Melissa Gross, and Beverly
|
||
Choltco-Devlin. [32]Statistics, Measures, and Quality Standards for
|
||
Assessing Digital Reference Library Services: Guidelines and
|
||
Procedures Field Test Draft: March 8, 2002. Syracuse, NY: Information
|
||
Institute of Syracuse, 2002.
|
||
(http://quartz.syr.edu/quality/Field_Test_Draft.pdf). - This manual,
|
||
and its accompanying [33]instructions for field testing
|
||
(http://quartz.syr.edu/quality/FTInstructions.pdf) are still in draft
|
||
form, and the authors invite anyone who wishes to test them to contact
|
||
them for more information. Although digital reference service can
|
||
still be considered to be in its infancy, it's nice to know that as
|
||
libraries begin to develop these services that there will be a common
|
||
metric that can be used to measure the effectiveness of those
|
||
services. - [34]RT
|
||
|
||
McCord, Alan. [35]"Are You Ready to Discuss IT Outsourcing on Your
|
||
Campus?" [36]EDUCAUSE Quarterly 25(1): 12-19
|
||
(http://www.educause.edu/ir/library/pdf/eqm0212.pdf). - If there's any
|
||
one message to derive from this article, it's that we can't outsource
|
||
away our IT problems. We have to understand them and their true costs
|
||
before even thinking about handing them over to an outside agency.
|
||
Candidates for outsourcing, the author argues, include larger
|
||
'infrastructure' services: networking, server management and security.
|
||
He's pretty even-handed on both the pros and cons of going this route.
|
||
He argues that while IT is essential to our efforts in the academic
|
||
world, it isn't one of our 'core competencies'. His urge for IT
|
||
departments to develop more 'private-sector-like thinking and skills'
|
||
is something everyone can agree with, though where the
|
||
private-sector-like financing will come from is chronically unclear.
|
||
It won't come from outsourcing. Costs there, the author advises, are
|
||
likely to be a tad higher. - [37]LRK
|
||
|
||
Pantic, Drazen. [38]"Internet the Globalizer, and the Impossibility of
|
||
the Impossibility of the Global Dialog." [39]First Monday 7(1)
|
||
(January 7, 2002)
|
||
(http://www.firstmonday.org/issues/issue7_1/pantic/). - "The world's
|
||
information pool now truly originates in a multitude of sources",
|
||
Pantic says, and no event showed this better than the September 11
|
||
attacks. In the wake of those days in September, the Internet assumed
|
||
a powerful new role as a source of independent and diversified news.
|
||
This article explores that new role and casts the drama of the
|
||
Internet's as change agent as a battle between ideas of modernity and
|
||
local culture. There is evidence, he argues, that a
|
||
"trans-civilizational" dialogue is crying out to be released so much
|
||
so that it may trump cultural behavior such as centralized control of
|
||
media. This brief article succinctly argues that the Internet remains
|
||
surprisingly resilient in the face of censorship efforts, despite the
|
||
tensions between open systems and centralized governments. - [40]TH
|
||
|
||
Reilly, Bernard J. [41]"What the Cultural Sector Can Learn From Enron"
|
||
[42]First Monday 7(2) (February 4, 2002)
|
||
(http://www.firstmonday.org/issues/issue7_2/reilly/). - The very
|
||
public and messy debacle that engulfed the Enron Corporation is a
|
||
metaphorical jumping-off point for the author's premise that a similar
|
||
hall of cards may be lurking in the non-profit information sectors.
|
||
That's a troubling possibility if there's any weight to it, and Reilly
|
||
argues his case based on one key similarity: libraries, museums and
|
||
other cultural repositories now "trade" in "knowledge" assets as much
|
||
as with the assets themselves. The difference lies in the nature of
|
||
the asset, if any. He poses the question, is there a material
|
||
difference between coal and oil deposits and museum collections?
|
||
Whether you agree or not, this Enron analogy will give you pause.
|
||
"Artistic and cultural products are no longer objects, like books,
|
||
paintings, sculpture...nor are they discrete, self-contained events in
|
||
time, like musical performances, dance performances, and so forth," he
|
||
asserts. The new infrastructure for cultural resources is built out of
|
||
the licenses and contractual agreements protecting them. This "matrix"
|
||
of conditions enables preservation, and even if bits of that matrix
|
||
unravel, preservation strategies may be threatened. After an
|
||
interesting exploration of this theory, he argues for better
|
||
safeguards ("underwriting"): namely, a call for "best practices" in
|
||
contract negotiation and licensing. The message to librarians is, once
|
||
again, that libraries are no longer just places; they are also
|
||
"processes" and matrices of relationships. - [43]TH
|
||
|
||
Salkever, Alex. [44]"Guard Copyrights, Don't Jail Innovation"
|
||
[45]BusinessWeek Online (27 March 2002)
|
||
(http://www.businessweek.com/bwdaily/dnflash/mar2002/nf20020327_2364.h
|
||
tm). - Imagine a parallel universe where every piece of electronic
|
||
equipment that could utilize or record digital information had
|
||
built-in copy-protection features that allowed content owners to
|
||
completely control how their information was used on that device. Want
|
||
to live there? You will if the [46]Consumer Broadband and Digital
|
||
Television Promotion Act, which was recently introduced by Senator
|
||
Ernest F. Hollings, becomes law. Alex Salkever, the BusinessWeek
|
||
Online Technology Editor, doesn't want to live there, and in this
|
||
insightful article he tells us why. - [47]CB
|
||
|
||
Tedeschi, Bob. [48]"Is Weblog Technology Here to Stay or Just Another
|
||
Fad?" [49]The New York Times (February 25, 2002)
|
||
(http://www.nytimes.com/2002/02/25/technology/ebusiness/25ECOM.html?ei
|
||
=5040& en=9876919c1afb6ed7&ex=1015304400) - Is the weblog phenomenon
|
||
breaking ground as "a truly new media species," or is it just the
|
||
latest Information Age fad? It depends on who you ask...but there's no
|
||
denying the popularity of these often very personal online journals.
|
||
This article cites a statistic putting the current number of bloggers
|
||
at approximately 500,000. What's fueling this boom are the advances in
|
||
blog technology that make it easy to post short bursts of text
|
||
frequently rather than having to update an entire Web page. Some
|
||
companies see an opportunity in offering and supporting these
|
||
technologies, notably Blogger.com and Userland Software, which hint
|
||
that the next wave of interest in blogging may come from the corporate
|
||
sector. Yet some Webheads remain skeptical, feeling it will ultimately
|
||
prove futile expecting users to return to your weblog site day after
|
||
day to keep up with your latest postings. According to this article,
|
||
one Net consultancy in New York stopped posting to its weblog and
|
||
simply started e-mailing the updated information to interested
|
||
parties. - [50]SK
|
||
|
||
Zieger, Anne. [51]"Bust the Spam Brigade" [52]IBM developerWorks
|
||
(February 2002)
|
||
(http://www-106.ibm.com/developerworks/library/wi-spam.html) - That
|
||
your e-mail inbox is clogged with swill is bad enough. Alas, this
|
||
article predicts an impending boom in wireless spam -- "Wherever there
|
||
are large groups of networked users, marketing messages are sure to
|
||
follow." But don't rush to toss that cell phone or PDA off the nearest
|
||
bridge just yet. The Good Guys are working on technologies that could
|
||
ameliorate the problem. "Unsolicited commercial messages" of the
|
||
wireless kind have already become a problem in Japan, where carrier
|
||
NTT DoCoMo serves some 30 million subscribers. The "mobile marketing"
|
||
types are chomping at the bit to offer you wireless coupons and other
|
||
come-ons, ultimately based on your geographic location. The official
|
||
party line of this industry's trade group -- yes, they have one; it's
|
||
called the Mobile Marketing Association (formerly the [53]Wireless
|
||
Advertising Association -- http://www.waaglobal.org/) -- is that
|
||
commercial wireless messages should only be sent to consumers who wish
|
||
to receive them. But, as with e-mail spam, "it's not the upstanding
|
||
members of professional associations" who are causing the problem;
|
||
rather, "it's the rogues with the willingness to flout professional
|
||
conventions." The article briefly describes some potential technology
|
||
solutions -- Brightmail's Mthree application, which lets users set
|
||
rules for messages forwarded through wired e-mail gateways; "mobile
|
||
messaging controls" written in Java 2, Micro Edition; and Qualcomm's
|
||
Binary Runtime Environment for Wireless (BREW), "another option for
|
||
those who need to roll their own spam-filtering solution." Links to
|
||
related resources are offered at the end of the article. - [54]SK
|
||
_________________________________________________________________
|
||
|
||
Current Cites 13(3) (March 2002) ISSN: 1060-2356
|
||
Copyright <20> 2002 by the Regents of the University of California All
|
||
rights reserved.
|
||
|
||
Copying is permitted for noncommercial use by computerized bulletin
|
||
board/conference systems, individual scholars, and libraries.
|
||
Libraries are authorized to add the journal to their collections at no
|
||
cost. This message must appear on copied material. All commercial use
|
||
requires permission from the editor. All product names are trademarks
|
||
or registered trade marks of their respective holders. Mention of a
|
||
product in this publication does not necessarily imply endorsement of
|
||
the product. To subscribe to the Current Cites distribution list, send
|
||
the message "sub cites [your name]" to
|
||
[55]listserv@library.berkeley.edu, replacing "[your name]" with your
|
||
name. To unsubscribe, send the message "unsub cites" to the same
|
||
address.
|
||
|
||
References
|
||
|
||
1. http://sunsite/cgi-bin/imagemap/cc
|
||
2. http://escholarship.cdlib.org/rtennant/
|
||
3. http://info.lib.uh.edu/cwb/bailey.htm
|
||
4. http://www.lib.berkeley.edu/autobiography/thuwe/
|
||
5. http://web.tampabay.rr.com/hooboy/
|
||
6. http://leoklein.com/
|
||
7. http://www.lib.berkeley.edu/autobiography/mphillip/
|
||
8. http://escholarship.cdlib.org/rtennant/
|
||
9. http://www.emeraldinsight.com/1468-4527.htm
|
||
10. http://leoklein.com/
|
||
11. http://www.ala.org/alonline/
|
||
12. http://escholarship.cdlib.org/rtennant/
|
||
13. http://www.infotoday.com/cilmag/ciltop.htm
|
||
14. http://leoklein.com/
|
||
15. http://www.chronicle.com/
|
||
16. http://www.lib.berkeley.edu/autobiography/mphillip/
|
||
17. http://www.fastcompany.com/online/57/jellis.html
|
||
18. http://www.fastcompany.com/
|
||
19. http://www.andrewsullivan.com/
|
||
20. http://www.dynamist.com/scene.html
|
||
21. http://www.kausfiles.com/
|
||
22. http://web.tampabay.rr.com/hooboy/
|
||
23. http://www.sfgate.com/cgi-bin/article.cgi?file=/gate/archive/2002/03/14/nigerscam.DTL
|
||
24. http://www.sfgate.com/
|
||
25. mailto:419.fcd@usss.treas.gov
|
||
26. http://web.tampabay.rr.com/hooboy/
|
||
27. http://www.slis.indiana.edu/csi/WP/WP02-01B.html
|
||
28. http://info.lib.uh.edu/cwb/bailey.htm
|
||
29. http://www.firstmonday.org/issues/issue7_2/kravchyna/
|
||
30. http://www.firstmonday.org/
|
||
31. http://www.lib.berkeley.edu/autobiography/thuwe/
|
||
32. http://quartz.syr.edu/quality/Field_Test_Draft.pdf
|
||
33. http://quartz.syr.edu/quality/FTInstructions.pdf
|
||
34. http://escholarship.cdlib.org/rtennant/
|
||
35. http://www.educause.edu/ir/library/pdf/eqm0212.pdf
|
||
36. http://www.educause.edu/pub/eq/eq.html
|
||
37. http://leoklein.com/
|
||
38. http://www.firstmonday.org/issues/issue7_1/pantic/
|
||
39. http://sunsite/CurrentCites/cc.current.html
|
||
40. http://www.lib.berkeley.edu/autobiography/thuwe/
|
||
41. http://www.firstmonday.org/issues/issue7_2/reilly/
|
||
42. http://www.firstmonday.org/
|
||
43. http://www.lib.berkeley.edu/autobiography/thuwe/
|
||
44. http://www.businessweek.com/bwdaily/dnflash/mar2002/nf20020327_2364.htm
|
||
45. http://www.businessweek.com/
|
||
46. http://www.eff.org/IP/SSSCA_CBDTPA/20020321_s2048_cbdtpa_bill.pdf
|
||
47. http://info.lib.uh.edu/cwb/bailey.htm
|
||
48. http://www.nytimes.com/2002/02/25/technology/ebusiness/25ECOM.html?ei=5040&en=9876919c1afb6ed7&ex=1015304400
|
||
49. http://www.nytimes.com/
|
||
50. http://web.tampabay.rr.com/hooboy/
|
||
51. http://www-106.ibm.com/developerworks/library/wi-spam.html
|
||
52. http://www-106.ibm.com/developerworks/
|
||
53. http://www.waaglobal.org/
|
||
54. http://web.tampabay.rr.com/hooboy/
|
||
55. mailto:listserv@library.berkeley.edu
|