1026 lines
47 KiB
Plaintext
1026 lines
47 KiB
Plaintext
|
|
+ Page 1 +
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review
|
|
|
|
Volume 5, Number 4 (1994) ISSN 1048-6542
|
|
-----------------------------------------------------------------
|
|
|
|
To retrieve an article file as an e-mail message, send the GET
|
|
command given after the article information to
|
|
listserv@uhupvm1.uh.edu. (Files are also available from the
|
|
University of Houston Libraries' Gopher server: info.lib.uh.edu,
|
|
port 70.)
|
|
|
|
CONTENTS
|
|
|
|
REFEREED ARTICLES
|
|
|
|
Teaching Remote Users How to Use Electronic Information Resources
|
|
|
|
By Karen Wielhorski (pp. 5-20)
|
|
|
|
To retrieve this file: GET WIELHORS PRV5N4 F=MAIL
|
|
|
|
How can we effectively train remote users of electronic
|
|
information resources? This paper examines the categories and
|
|
characteristics of remote users, training challenges, and ways
|
|
that emerging electronic capabilities can be used to enhance
|
|
traditional bibliographic instruction methods.
|
|
|
|
COLUMNS
|
|
|
|
Public-Access Provocations: An Informal Column
|
|
|
|
And Only Half of What You See, Part I: Discounting the
|
|
Counts
|
|
|
|
By Walt Crawford (pp. 21-23)
|
|
|
|
To retrieve this file: GET CRAWFORD PRV5N4 F=MAIL
|
|
|
|
+ Page 2 +
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review
|
|
-----------------------------------------------------------------
|
|
|
|
Editor-in-Chief
|
|
|
|
Charles W. Bailey, Jr.
|
|
University Libraries
|
|
University of Houston
|
|
Houston, TX 77204-2091
|
|
(713) 743-9804
|
|
Internet: lib3@uhupvm1.uh.edu
|
|
|
|
Associate Editors
|
|
|
|
Columns: Leslie Pearse, OCLC
|
|
Communications: Dana Rooks, University of Houston
|
|
|
|
Editorial Board
|
|
|
|
Ralph Alberico, University of Texas, Austin
|
|
George H. Brett II, Clearinghouse for Networked Information
|
|
Discovery and Retrieval
|
|
Priscilla Caplan, University of Chicago
|
|
Steve Cisler, Apple Computer, Inc.
|
|
Walt Crawford, Research Libraries Group
|
|
Lorcan Dempsey, University of Bath
|
|
Pat Ensor, University of Houston
|
|
Nancy Evans, Pennsylvania State University, Ogontz
|
|
Charles Hildreth, READ, Ltd.
|
|
Ronald Larsen, University of Maryland
|
|
Clifford Lynch, Division of Library Automation,
|
|
University of California
|
|
David R. McDonald, Tufts University
|
|
R. Bruce Miller, University of California, San Diego
|
|
Paul Evan Peters, Coalition for Networked Information
|
|
Mike Ridley, University of Waterloo
|
|
Peggy Seiden, Skidmore College
|
|
Peter Stone, University of Sussex
|
|
John E. Ulmschneider, North Carolina State University
|
|
|
|
+ Page 3 +
|
|
|
|
Technical Support
|
|
|
|
Tahereh Jafari, University of Houston
|
|
|
|
Publication Information
|
|
|
|
Published on an irregular basis by the University Libraries,
|
|
University of Houston. Technical support is provided by the
|
|
Information Technology Division, University of Houston.
|
|
Circulation: 8,186 subscribers in 66 countries (PACS-L) and 2,596
|
|
subscribers in 50 countries (PACS-P).
|
|
|
|
Back issues are available from listserv@uhupvm1.uh.edu. To
|
|
retrieve a cumulative index to the journal, send the following e-
|
|
mail message to the list server: GET INDEX PR F=MAIL.
|
|
|
|
Back issues are also available from the University of Houston
|
|
Libraries' Gopher server. Point your Gopher client at
|
|
info.lib.uh.edu, port 70, and follow this menu path:
|
|
|
|
Looking for Articles
|
|
Electronic Journals
|
|
University of Houston Libraries E-Journals
|
|
The Public-Access Computer Systems Review
|
|
|
|
The journal's URL is gopher://info.lib.uh.edu:70/11/articles/e-
|
|
journals/uhlibrary/pacsreview.
|
|
|
|
The first three volumes of The Public-Access Computer Systems
|
|
Review are also available in book form from the American Library
|
|
Association's Library and Information Technology Association
|
|
(LITA). The price of each volume is $17 for LITA members and $20
|
|
for non-LITA members. All three volumes can be ordered as a set
|
|
for $45 (indicate that you want the PACS Review set, order number
|
|
7712-X). To order, contact: ALA Publishing Services, Order
|
|
Department, 50 East Huron Street, Chicago, IL 60611-2729, (800)
|
|
545-2433.
|
|
|
|
+ Page 4 +
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review is an electronic
|
|
journal that is distributed on the Internet and on other computer
|
|
networks. There is no subscription fee.
|
|
To subscribe, send an e-mail message to
|
|
listserv@uhupvm1.uh.edu that says: SUBSCRIBE PACS-P First Name
|
|
Last Name.
|
|
The Public-Access Computer Systems Review is Copyright (C)
|
|
1994 by the University Libraries, University of Houston. All
|
|
Rights Reserved.
|
|
Copying is permitted for noncommercial use by academic
|
|
computer centers, computer conferences, individual scholars, and
|
|
libraries. Libraries are authorized to add the journal to their
|
|
collection, in electronic or printed form, at no charge. This
|
|
message must appear on all copied material. All commercial use
|
|
requires permission.
|
|
-----------------------------------------------------------------
|
|
|
|
+ Page 21 +
|
|
|
|
-----------------------------------------------------------------
|
|
Public-Access Provocations: An Informal Column
|
|
-----------------------------------------------------------------
|
|
|
|
-----------------------------------------------------------------
|
|
Crawford, Walt. "And Only Half of What You See, Part I:
|
|
Discounting the Counts." The Public-Access Computer Systems
|
|
Review 5, no. 4 (1994): 21-23. To retrieve this file, send the
|
|
following e-mail message to listserv@uhupvm1.uh.edu: GET CRAWFORD
|
|
PRV5N4 F=MAIL. (The file is also available from the University
|
|
of Houston Libraries' Gopher server: info.lib.uh.edu, port 70.)
|
|
-----------------------------------------------------------------
|
|
|
|
A funny thing happened in mid-January 1994. I was updating the
|
|
weekly usage graph for Eureka, a manual operation (in Quattro
|
|
Pro) based on a sampled weekly statistical summary. After a
|
|
couple of weeks in which usage was growing back from low holiday
|
|
levels, suddenly usage was about half of the preceding week.
|
|
(No, this isn't another "Eureka column." Bear with me.)
|
|
What happened? Where did all the users go? We were
|
|
expecting to see continued growth as more libraries implement
|
|
Eureka. Even though the weekly graph is based on partial
|
|
sampling and is an informal measure, the sharp decline was
|
|
unexpected and startling. After some discussion, we concluded
|
|
that the horrendous weather in the eastern United States could be
|
|
responsible.
|
|
As it turned out, that wasn't the cause. Instead, an
|
|
unexpected data condition caused the data analysis routines to
|
|
misbehave. Closer examination showed that there was perhaps a
|
|
10% dip in usage, almost certainly because of weather, followed
|
|
by new record highs in each of the next two weeks. As my message
|
|
to those looking at weekly figures noted:
|
|
|
|
Remember that drop in usage last week? Well, there's a new
|
|
explanation: It didn't happen.
|
|
What did happen is a little embarrassing: after 26
|
|
years making my living using computers, I actually believed
|
|
something that didn't make sense, because it emerged from a
|
|
computer. I should have known better.
|
|
|
|
+ Page 22 +
|
|
|
|
If It Doesn't Make Sense, It's Probably Wrong
|
|
|
|
If there's one rule every experienced computer user should know,
|
|
it's this one. When "the computer" says something that violates
|
|
your expectations, your first assumption should be that "the
|
|
computer" is wrong. Check the raw data, check intermediate
|
|
calculations, check the algorithms. Chances are, something went
|
|
wrong along the way. Did the computer actually make a mistake?
|
|
Probably not. Computers rarely suffer internal processing
|
|
failures that they don't catch. Well-written programs rarely
|
|
fail to calculate properly. But calculations are no better than
|
|
the algorithms used to code them, and algorithms are no better
|
|
than the designs used to prepare them. More to the point, "GIGO"
|
|
is as true now as ever: if the raw data has been corrupted, the
|
|
output is useless.
|
|
|
|
|
|
Is That Calculation Really Calculated?
|
|
|
|
Spreadsheets and other similar programs may represent the worst
|
|
case. With most spreadsheet software, there's nothing at all to
|
|
prevent a user from keying a number into a slot that should be a
|
|
calculation, thus disrupting not only that particular cell but
|
|
any other cells that depend on it. Any spreadsheet should be
|
|
regarded with some suspicion, particularly if any of the
|
|
calculated figures appear extraordinary: maybe they're simply
|
|
wrong.
|
|
Those of us who have been programmers should know this, of
|
|
course, but there's a powerful temptation to assume that
|
|
computers never lie. Putting the most nonsensical assumptions
|
|
and erroneous data into nicely-formatted spreadsheet form gives
|
|
it validity in many eyes, even though the data may be flawed.
|
|
Better yet: make a chart out of it--and if the chart isn't
|
|
impressive enough, use a non-zero baseline. But then, we all
|
|
know better than to fall for misleading graphics and statistics,
|
|
don't we?
|
|
|
|
How about this statistic?
|
|
|
|
The use of Zyzix, the hot new Internet tool, has increased
|
|
19,000% over the past six months.
|
|
|
|
Which could mean that six months ago two people used it and this
|
|
month 380 people used it: that's a 19,000% growth rate.
|
|
|
|
+ Page 23 +
|
|
|
|
Heuristics and Skepticism
|
|
|
|
To use statistics and computer-generated numbers well, you must
|
|
be able to do mental approximations. You must have the
|
|
heuristics handy to see whether the computer's output is
|
|
reasonable. Most of the time, of course, the output will be
|
|
perfectly sensible--but you should always be ready to look twice
|
|
at something that's sharply out of line.
|
|
What does this have to do with public access? Quite a bit.
|
|
If you're looking at access versus collections, you need to look
|
|
closely at the economic arguments, and look at them in totality.
|
|
When you find usage of a new system has jumped by an order of
|
|
magnitude (i.e., 1000%) over the past year, be aware that such a
|
|
jump probably will not be repeated: percentages without numbers
|
|
are essentially meaningless.
|
|
Not only do you need to be skeptical when looking at
|
|
analyses and projections, you need to find ways to encourage
|
|
patrons to be skeptical. More on that in the next two
|
|
Public-Access Provocations columns.
|
|
|
|
|
|
About the Author
|
|
|
|
Walt Crawford, Senior Analyst, The Research Libraries Group,
|
|
Inc., 1200 Villa Street, Mountain View, CA 94041-1100. Internet:
|
|
br.wcc@rlg.stanford.edu.
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review is an electronic
|
|
journal that is distributed on the Internet and on other computer
|
|
networks. There is no subscription fee.
|
|
To subscribe, send an e-mail message to
|
|
listserv@uhupvm1.uh.edu that says: SUBSCRIBE PACS-P First Name
|
|
Last Name.
|
|
This article is Copyright (C) 1994 by Walt Crawford. All
|
|
Rights Reserved.
|
|
The Public-Access Computer Systems Review is Copyright (C)
|
|
1994 by the University Libraries, University of Houston. All
|
|
Rights Reserved.
|
|
Copying is permitted for noncommercial use by academic
|
|
computer centers, computer conferences, individual scholars, and
|
|
libraries. Libraries are authorized to add the journal to their
|
|
collection, in electronic or printed form, at no charge. This
|
|
message must appear on all copied material. All commercial use
|
|
requires permission.
|
|
-----------------------------------------------------------------
|
|
|
|
+ Page 5 +
|
|
|
|
-----------------------------------------------------------------
|
|
Wielhorski, Karen. "Teaching Remote Users How to Use Electronic
|
|
Information Resources." The Public-Access Computer Systems
|
|
Review 5, no. 4 (1994): 5-20. (Refereed Article) To retrieve
|
|
this file, send the following e-mail message to
|
|
listserv@uhupvm1.uh.edu: GET WIELHORS PRV5N4 F=MAIL. (The file
|
|
is also available from the University of Houston Libraries'
|
|
Gopher server: info.lib.uh.edu, port 70.)
|
|
-----------------------------------------------------------------
|
|
|
|
1.0 Introduction
|
|
|
|
Remote users are no longer a small segment of library users. [1]
|
|
From electronic workstations in their offices and homes, scholars
|
|
and students access library OPACs and commercial indexes, connect
|
|
to distant Internet systems, and download information using file
|
|
transfer protocols that were uncommon just a few years ago. They
|
|
ask questions of reference librarians through e-mail, requesting
|
|
answers via fax machines. Remote users are no longer limited to
|
|
just dial access; they surf the Internet to locate resources that
|
|
meet their needs. Library staff have become remote users of a
|
|
variety of systems, including other libraries' systems. Staff
|
|
are challenged to use new electronic capabilities to enhance
|
|
traditional methods of bibliographic instruction and to reinvent
|
|
themselves and library services.
|
|
Do libraries have a mission to educate remote users about
|
|
their electronic information resources? At least one librarian
|
|
has written that end-user instruction is unnecessary due to the
|
|
development of increasingly user friendly systems and the growing
|
|
computer sophistication of users. [2] But is reliance on users'
|
|
hands-on experience really best? It is a logical extension of
|
|
bibliographic instruction programs to extend libraries' teaching
|
|
activities into the remote electronic information resources
|
|
arena. The growth of high bandwidth connections that will
|
|
provide users with access to interactive digital video and audio
|
|
capabilities will increase libraries' opportunities to reach and
|
|
teach remote users. If we do not utilize these new technologies
|
|
to add value to the information we provide by demonstrating and
|
|
teaching our unique skills in the electronic arena, we will have
|
|
lost an opportunity to make ourselves and our libraries part of
|
|
the electronic future.
|
|
|
|
+ Page 6 +
|
|
|
|
As the trend toward the virtual library continues to
|
|
accelerate, the knowledge that a library physically houses must
|
|
be made electronically available to its remote users. As
|
|
libraries move toward a user-centered focus, their perspective
|
|
must change: it is not users that are remote from libraries,
|
|
rather it is libraries that are remote from users. [3] Services
|
|
needed from these remote libraries will be defined by future
|
|
users to help them deal with an increasingly complex information
|
|
environment. Consequently, the question of how best to identify,
|
|
contact, selectively disseminate information to, and teach remote
|
|
users should already be an important consideration when planning
|
|
library services.
|
|
How can we effectively train remote users of electronic
|
|
information resources? This paper examines the categories and
|
|
characteristics of remote users, training challenges, and ways
|
|
that emerging electronic capabilities can be used to enhance
|
|
traditional bibliographic instruction methods.
|
|
|
|
2.0 A Short History of Remote Access
|
|
|
|
Remote access can be defined as access through electronic means
|
|
(e.g., dial access or network access) to library resources (e.g.,
|
|
OPACs, bibliographic databases, full-text databases, and numeric
|
|
databases) and library services (e.g., reference, interlibrary
|
|
loan, and document delivery) from a location distant from the
|
|
physical site of the library that provides these resources.
|
|
Remote access to libraries did not start with the electronic
|
|
era: 19th century printed book catalogs allowed patrons to check
|
|
the library's holdings in their homes or offices. However, at
|
|
the turn of the century, card catalogs began to replace printed
|
|
book catalogs, and this was no longer possible. [4]
|
|
Electronic remote access began in libraries with dial access
|
|
through modems to commercial databases in the late 1960s and
|
|
early 1970s. In 1972, for example, Dialog began commercial
|
|
operation with 3 databases. By 1975, 300 databases were
|
|
available; by 1980, that number had grown to 600 databases; and
|
|
by 1984, it had increased to 2,400 databases. [5] The latest
|
|
edition of the Gale Directory of Databases lists 8,261 unique
|
|
databases and subfiles available through various vendors today.
|
|
It points out the growth in the size of the databases over the
|
|
same time period: the "average database in 1975 contained 173,000
|
|
records, and reached approximately 500,000 records in 1985. The
|
|
average database entry in 1993 has 739,188 records." [6]
|
|
|
|
+ Page 7 +
|
|
|
|
According to the same source, the searching of word-oriented
|
|
online databases on the major U.S. systems increased from 750,000
|
|
searches per year in 1974 to 51.78 million searches per year in
|
|
1992.
|
|
It is not surprising that remote access to online databases
|
|
began to increase rapidly in the early 1980s coinciding with the
|
|
widespread availability of personal computers in the consumer
|
|
marketplace. Libraries' introduction of OPACs in that period,
|
|
followed by locally mounted databases, further accelerated the
|
|
remote access trend. The rapid growth of the Internet in the
|
|
late 1980s and early 1990s also significantly increased remote
|
|
access of library electronic information systems, as Gophers and
|
|
World-Wide Web servers were added to OPACs.
|
|
|
|
3.0 Types of Remote Electronic Information Resources
|
|
|
|
With the burgeoning number of electronic information resources,
|
|
it is useful to have a method of grouping them in order to
|
|
discuss them. These resources be grouped in many ways. One way
|
|
is to group them by their form of data representation (i.e.,
|
|
words, numbers, images, or sounds). This system does not
|
|
adequately allow for resources such as computer bulletin boards,
|
|
e-mail, and electronic conferences. Nor does it adequately
|
|
account for software archives that include public domain
|
|
software, special help software, and shareware. Another means of
|
|
grouping is by region and country of origin. A third method
|
|
groups resources by subject categories. [7]
|
|
For the purposes of this paper, I have adopted Cuadra's
|
|
classification of databases into "reference databases" and
|
|
"source databases." [8] The former category includes
|
|
bibliographic citation databases that refer users to printed
|
|
publications. The latter category contains databases that
|
|
contain original (i.e., source) information, such as numeric
|
|
databases containing statistical data, textual and numeric
|
|
databases, full-text databases, and software. This terminology
|
|
can be extended to non-database electronic resources on other
|
|
types of systems, such as Gophers, and the term "electronic
|
|
information resource" will be used instead of database.
|
|
This paper will primarily focus on the first category--
|
|
electronic information resources containing bibliographic
|
|
citations. However, it should be noted that there are many
|
|
electronic information resources marketed directly to consumers
|
|
for which libraries provide no instructional support. In the
|
|
future, libraries may choose to become active in providing access
|
|
to and instruction in these resources also.
|
|
|
|
+ Page 8 +
|
|
|
|
4.0 Who Are the Remote Users?
|
|
|
|
Elizabeth H. Dow, in her 1988 dissertation, found that nearly 80%
|
|
of remote library users were between the ages of 24 and 54. [9]
|
|
This suggests that remote users are more likely to be graduate
|
|
students, faculty, staff, or researchers, rather than typical
|
|
undergraduate students.
|
|
As more undergraduates bring their personal computers and
|
|
modems to the university, they are creating a vast new group of
|
|
remote users. As remote use grows, librarians are faced with BI
|
|
problems similar to those encountered in training end-users
|
|
within the library. A body of knowledge has been accumulated
|
|
about teaching end-users to search OPACs, online databases, and
|
|
CD-ROM databases in the library. While this knowledge base is
|
|
valuable to some extent in understanding and dealing with remote
|
|
users, much research remains to be done. Sally Wayman Kalin has
|
|
done groundbreaking work in identifying the needs and habits of
|
|
academic remote users. [10] However, further investigation of
|
|
this topic is needed.
|
|
|
|
4.1 Categories of Remote Users
|
|
|
|
It is useful to identify four general categories of academic
|
|
remote users:
|
|
|
|
1. Affiliated campus users (traditional academic users).
|
|
|
|
2. Affiliated off-campus users (research center personnel,
|
|
distance education students, and users at other
|
|
institutions in the same university system).
|
|
|
|
3. Unaffiliated local users (community users).
|
|
|
|
4. Unaffiliated distant users (anyone with Internet
|
|
access).
|
|
|
|
This paper will primarily address the needs of the first two
|
|
categories, although as library policies allow, the same training
|
|
techniques would also be applicable to the last two categories.
|
|
Since access problems are a significant factor in
|
|
instructing remote users, it is necessary to consider the modes
|
|
of access typified by these different categories of users.
|
|
The users in category one (affiliated campus users) often
|
|
have access to network-connected workstations in dormitories and
|
|
campus computer labs that allow them to connect to campus
|
|
computers and Internet computers. Those living off-campus
|
|
usually rely on dial access to campus computers via modems.
|
|
Category two users (affiliated off-campus users) often have
|
|
access to computers on the university system network, but some
|
|
may need to utilize dial access.
|
|
|
|
+ Page 9 +
|
|
|
|
Category three users (unaffiliated local users) typically
|
|
rely on dial access.
|
|
Finally, category four users (unaffiliated distant users)
|
|
either access Internet-connected computers either via dial access
|
|
or via workstations attached to local networks.
|
|
|
|
4.2 Characteristics of Remote Users
|
|
|
|
Reva Basch has classified electronic users into broad categories
|
|
with identifiable traits. [11] This paper will adapt some of her
|
|
terminology, which was based on fee-paying clients, and apply it
|
|
to the academic milieu.
|
|
|
|
4.2.1. The Technologically Challenged Remote User
|
|
|
|
These remote users are usually newcomers to computer terminals
|
|
and electronic information resources. The faculty members in
|
|
this category have expertise in the research methodology of their
|
|
subject areas, but are frustrated by the technical problems of
|
|
access. They are interested in results rather than in the
|
|
operation of the computer or the mechanics of searching. The
|
|
students in this group are not yet fully computer literate, and
|
|
they frequently experience anxiety about both the means of access
|
|
and the research process itself. These users need "electronic
|
|
counseling" to reassure them, to help them through the technical
|
|
problems of remote access, and to encourage them to seek further
|
|
help when needed. [12]
|
|
|
|
4.2.2. The Techie Remote User
|
|
|
|
These remote users are aggressively computer literate and are
|
|
eager to explore the possibilities of cyberspace. They are
|
|
interested in the technological aspects of telecommunications and
|
|
techniques of remote access, but may not be familiar with the
|
|
subject area they are researching or with effective search
|
|
techniques. They are more interested in the means rather than
|
|
the end.
|
|
|
|
4.2.3. The Research-Naive Remote User
|
|
|
|
These remote users are technologically sophisticated enough to
|
|
surmount the problems of access and gain entry into library
|
|
systems. Once connected, students in this group encounter
|
|
problems with particular electronic information resources. For
|
|
example, they may not know the scope and coverage of a resource,
|
|
or they may not be able to construct a search strategy that
|
|
includes all the possible ways of expressing the concept that
|
|
they are searching for. Faculty members in this group usually
|
|
understand information retrieval principles, but need assistance
|
|
with the terminology of an unfamiliar subject area.
|
|
|
|
+ Page 10 +
|
|
|
|
Many users in this category are confused by the enormous
|
|
wealth of available electronic resources. Librarians have a real
|
|
opportunity to provide a service here and, in doing so, to
|
|
establish their role as navigators of the electronic information
|
|
universe. End-users, overwhelmed by numerous information
|
|
resources, want to know techniques for winnowing out unreliable
|
|
and less useful information. Librarians need to establish
|
|
themselves as the best equipped professionals to assist in this
|
|
task.
|
|
|
|
5.0 Challenges of Training Remote Users
|
|
|
|
Working with remote users presents some interesting instructional
|
|
challenges that call for new high-tech solutions. This section
|
|
discusses two types of major challenges: (1) providing procedural
|
|
knowledge, such as accessing and capturing the needed
|
|
information; and (2) providing conceptual knowledge, such as
|
|
teaching effective information retrieval strategies.
|
|
|
|
5.1 Procedural Knowledge
|
|
|
|
A key task for libraries is helping remote users, who are using
|
|
different hardware and software platforms, operating systems, and
|
|
telecommunications software, to effectively access electronic
|
|
information resources.
|
|
The first thing that all types of remote users need to know
|
|
is how to access the target system and how to reach technical
|
|
support services for it. The logon procedures for either network
|
|
access or dial access are necessary first steps. Technical
|
|
details needed for dial access users include the proper terminal
|
|
emulations supported or required by the system, parity bits, baud
|
|
rate, and other technical settings for the communications
|
|
software. Network-connected users need to know how to obtain
|
|
accounts with the campus computing system, how to logon to campus
|
|
network servers, and how to use the sometimes obscure commands
|
|
and special features of their campus network. Both types of
|
|
users need clear explanations of error messages and prompts. It
|
|
is extremely important to tell users how to reach assistance by
|
|
providing phone numbers for immediate help with frustrating
|
|
problems.
|
|
It is critical that library instruction staff work closely
|
|
and cooperatively with the campus computing center in order to
|
|
provide support services to remote users. Computing centers
|
|
typically provide technical support, such as how to get started
|
|
with the correct communication software settings appropriate to
|
|
the dial-access user's hardware platform, and libraries provide
|
|
assistance with searching and using electronic information
|
|
resources.
|
|
|
|
+ Page 11 +
|
|
|
|
Should librarians develop the expertise to diagnose and
|
|
advise users on complex technical problems related to hardware
|
|
and software platforms? Debate concerning electronic user
|
|
support services focuses on the "one-stop shopping" approach
|
|
versus the "complementary role" approach. The one-stop shopping
|
|
approach proposes that librarians should develop in-house
|
|
technical support for handling the needs of remote users as well
|
|
as providing support for searching and using electronic
|
|
information resources. The complementary role approach envisions
|
|
librarians working cooperatively with the campus computing center
|
|
personnel to provide remote user support. Based on their unique
|
|
configuration of resources and needs, libraries may choose to
|
|
implement one approach rather than another, or they may view this
|
|
debate as a continuum of choices rather than as an either-or
|
|
decision.
|
|
|
|
5.2 Conceptual Knowledge
|
|
|
|
Helping remote users develop a conceptual model of how
|
|
information retrieval works is the central challenge of user
|
|
instruction for remote users, just as it is of any user
|
|
instruction program. The remote user needs to learn to
|
|
conceptualize his or her information need and to think in terms
|
|
of how an electronic information resource is organized in order
|
|
to develop an appropriate search strategy. The user must also
|
|
understand the limitations of the system in order to evaluate
|
|
search results. Were the search terms the best ones to use to
|
|
exploit the strengths of the system? Does the electronic
|
|
information resource represent all relevant research in the
|
|
subject area?
|
|
If the user does not understand the scope and nature of the
|
|
electronic information resource, he or she runs the risk of
|
|
assuming that it holds absolutely everything they need to know
|
|
and that any search will turn up all relevant citations. More
|
|
than in the print environment, the librarian working in the
|
|
electronic environment needs to help the user recognize that the
|
|
electronic information resource is a tool that the user controls
|
|
to gather and evaluate information. In order to do that, the
|
|
librarian must explain the tool's limitations, purpose, and
|
|
proper use.
|
|
|
|
+ Page 12 +
|
|
|
|
5.3 Teaching Searching to Remote Users
|
|
|
|
Successful efforts to teach effective searching techniques have
|
|
often employed interactive, one-on-one, point-of-use instruction
|
|
by reference staff working with end-users. Until advances in
|
|
technology supply us with similar interactive electronic
|
|
capabilities, providing general instruction to a potentially vast
|
|
group of remote users with unknown levels of sophistication and
|
|
learning styles will require creative use of existing
|
|
instructional technologies. Much more research needs to be done
|
|
to identify how remote users actually search electronic
|
|
information resources and how best to address their needs.
|
|
A study at Hofstra University has suggested what end-users
|
|
do not need to know: advanced search techniques such as nesting
|
|
concepts, using an online thesaurus of descriptors, and anything
|
|
beyond the most basic Boolean search strategy. [13]
|
|
|
|
5.4 Helping Remote Users to Capture and Manage Information
|
|
|
|
To support effective remote use of electronic information,
|
|
libraries need to address the wide variety and complexity of the
|
|
hardware that dial-access users are utilizing to download
|
|
information as well as the vagaries of the different kinds of
|
|
communications software that they employ. It is extremely
|
|
important that library instruction staff work closely and
|
|
cooperatively with the campus computing center in order to
|
|
provide this type of support service to remote users. For
|
|
example, while the computing center might typically provide
|
|
communication software and instruction in its use, librarians can
|
|
teach users how to manipulate downloaded information and how to
|
|
format it for use in word processing, spreadsheet, or
|
|
bibliography software.
|
|
Network access presents its own challenges in capturing and
|
|
downloading information to an individual's workstation via
|
|
network software such as the NCSA Telnet drivers. In this case,
|
|
librarians providing support for remote users need to address the
|
|
technical details of capturing and downloading data from network
|
|
systems and to provide help in formatting the data.
|
|
|
|
6.0 Methods of Training Remote Users
|
|
|
|
Specific strategies and teaching techniques should be developed
|
|
with the needs of different types of remote users in mind.
|
|
Current methods of training include providing self-study
|
|
materials; individualized instruction; and various forms of group
|
|
instruction, including remote online workshops, local hands-on
|
|
workshops, demonstrations, and classroom lectures.
|
|
|
|
+ Page 13 +
|
|
|
|
6.1 Self-Study Materials
|
|
|
|
Traditionally, many libraries have maintained packets of
|
|
instructional guides, help sheets, pathfinders, brochures, and
|
|
other printed handouts that are available to mail out to remote
|
|
users upon request. These packets typically include an
|
|
instruction sheet on how to access the OPAC and other local
|
|
databases, a sheet explaining Boolean searching concepts and
|
|
techniques, and a sheet giving system-specific search commands
|
|
and tips on using a particular resource.
|
|
With the advent of campus-wide electronic networks, one of
|
|
the easiest methods of distributing these instructional guides is
|
|
to add them to a campus or library Gopher, where a user could
|
|
easily access them and either read them online or download the
|
|
information. One problem frequently encountered with this
|
|
process is the length of the instructional guide. Users seem to
|
|
prefer brevity, and a useful rule of thumb is to limit electronic
|
|
versions of help sheets intended to be read online to no more
|
|
than three screens.
|
|
The Gopher itself can be a useful self-instructional tool.
|
|
Academic libraries have been working with campus computing
|
|
centers to construct gophers that will enhance the user's ability
|
|
to locate and explore electronic reference books, e-journals,
|
|
bibliographic citation databases, Usenet newsreaders, and other
|
|
wonders of Gopherspace. A list of well-constructed Gophers was
|
|
posted to the PACS-L list, and an examination of any one of these
|
|
gophers will illustrate the potential for using a Gopher as an
|
|
information tool for remote users. [14]
|
|
Network hypermedia software, such as World-Wide Web servers
|
|
and Mosaic clients, feature user-friendly interfaces, links to
|
|
diverse types of network resources, access to digital multimedia
|
|
information, and full-featured interactive help. These tools
|
|
make it possible for users to discover electronic information
|
|
resources on their own. So much information is already available
|
|
electronically that users need to be allowed to learn on their
|
|
own through guided exploration and to create their own paths
|
|
through cyberspace.
|
|
|
|
+ Page 14 +
|
|
|
|
Reference librarians should also be prepared to send user
|
|
help tips as text files directly to remote users' workstations
|
|
via e-mail or file transfers; however, an easier alternative is
|
|
to establish an anonymous FTP or Gopher site on a campus network
|
|
server that is accessible to all remote users. For example, a
|
|
joint project of the University Library and the School of
|
|
Information and Library Studies at the University of Michigan has
|
|
established a Clearinghouse for Subject-Oriented Internet
|
|
Resource Guides, and made these guides available via anonymous
|
|
FTP, Gopher, and the World-Wide Web. [15]
|
|
As more fee-based systems become available to remote users,
|
|
instruction becomes even more essential to enable users to employ
|
|
these electronic resources in a cost-effective manner. For this
|
|
purpose, modular self-paced workbooks can be developed and made
|
|
available for a fee on a cost-recovery basis. Printed workbooks
|
|
can be made available for pick-up or mailed out, and electronic
|
|
versions can be provided in the various ways discussed
|
|
previously.
|
|
Libraries are making online tutorials from publishers
|
|
available on their networks so that users can employ them prior
|
|
to utilizing an electronic information resource. These
|
|
computer-aided instructional programs have become more useful as
|
|
they have become more interactive. For example, SilverPlatter
|
|
has excellent tutorials for the ERIC and PsycLit CD-ROM databases
|
|
that go into far more detail than ordinary printed library
|
|
handouts.
|
|
Another training option is computer-assisted instructional
|
|
programs developed by the library. These programs can be made
|
|
available on diskette so that they can be picked-up at the
|
|
library or mailed out, or the programs can be sent electronically
|
|
to users' workstations. With this approach, library staff can
|
|
tailor instruction to the unique set of resources available from
|
|
their site. Unfortunately, the development of these programs is
|
|
time consuming, and, in many cases, the need is obviated as the
|
|
quality of commercial tutorials available from publishers
|
|
improves.
|
|
Emerging technologies for delivering instruction, such as
|
|
on-demand video, offer interesting possibilities for the future.
|
|
Once commercial ventures provide this service to users' homes,
|
|
libraries may be able to use this delivery mechanism for
|
|
instructional purposes. One can imagine a scenario in which
|
|
users will be able to call up on-demand tutorials for learning
|
|
how to utilize remote electronic information resources of all
|
|
kinds.
|
|
|
|
+ Page 15 +
|
|
|
|
6.2. Individualized Instruction
|
|
|
|
For users who can come to the library, library staff could offer
|
|
individualized instruction sessions that would be tailored to
|
|
meet a particular user's needs. By appointment, the user could
|
|
consult with library staff members, and the user could quickly
|
|
get hands-on experience with remote access techniques and develop
|
|
a mental picture of how electronic information resources are
|
|
designed and function. This basic understanding would help
|
|
combat the common misconceptions of remote users and enable users
|
|
to become more effective researchers.
|
|
Currently, technological tools (e.g., e-mail, telephone, and
|
|
fax) are usually used in individualized instruction to help
|
|
remote users to solve specific problems, typically technical
|
|
problems that must be resolved immediately (e.g., an
|
|
indecipherable system prompt or error message).
|
|
Emerging technologies provide exciting opportunities for
|
|
individualized instruction. Online consultation via interactive
|
|
digital video would provide an electronic means to teach remote
|
|
users that would truly extend the library's reach beyond its
|
|
walls, while giving users their most preferred means of learning:
|
|
real-time, one-on-one interaction with a librarian who is an
|
|
expert in using electronic information resources and managing
|
|
data from them.
|
|
|
|
6.3. Group Instruction
|
|
|
|
If remote users can come to the campus, workshops are an
|
|
effective instructional technique. Workshops may be held at the
|
|
library or elsewhere on campus. They are most effective when
|
|
hands-on training can be offered so that the two basics of user
|
|
training can be covered: how to access electronic information
|
|
resources and how to use them. When equipment is not available
|
|
for hands-on training, demonstrations are useful to show groups
|
|
of remote users the techniques of online access and searching.
|
|
Classroom lectures, although better than no instruction at all,
|
|
are woefully inadequate to teach online skills. Slides or
|
|
overhead transparencies can be used to simulate the screens that
|
|
the user will encounter, but a hands-on approach or a live demo
|
|
is much better.
|
|
An e-mail message posted to PACS-L summarized twenty-three
|
|
responses made concerning workshop teaching methods for an
|
|
Internet course: thirteen respondents recommended a hands-on
|
|
approach, six recommended both hands-on training and a
|
|
demonstration, and only four recommended the
|
|
lecture/demonstration approach. [16]
|
|
|
|
+ Page 16 +
|
|
|
|
"Master" electronic classrooms are superior to traditional
|
|
classrooms because they are equipped with the latest computer and
|
|
video technologies. The master classroom at Steen Library at
|
|
Stephen F. Austin State University is an example of an ideal
|
|
electronic classroom. It includes twenty network-connected
|
|
workstations along with five printers encased in soundproof
|
|
printer stations. There is a network-connected instructor
|
|
workstation equipped with an overhead projector and a color LCD
|
|
projection panel for projecting the instructor's computer screen
|
|
on a large screen for group viewing. The lights in the room can
|
|
be easily dimmed to an appropriate level for the task at hand.
|
|
To provide maximum flexibility for teaching a variety of skills
|
|
and electronic information resources, workstations can access the
|
|
library's OPAC, all in-house electronic information resources,
|
|
and Internet resources. The workstations can also access
|
|
applications software (e.g., word processing, spreadsheet, and
|
|
bibliography software) so that students can learn to cut and
|
|
paste the results of their searches directly into their
|
|
documents. In this way, students and faculty are able to see for
|
|
themselves the ideal of the "scholar's workstation" in action.
|
|
In the near future, the number of workstations will be increased
|
|
to thirty, and these workstations will have access to image and
|
|
other multimedia resources, including digital color video and
|
|
audio sound clips.
|
|
Group instruction outside such a classroom setting is best
|
|
exemplified in the emerging electronic era by the interactive
|
|
online courses offered over the Internet. Such classes or
|
|
workshops are announced on PACS-L, NETTRAIN, and LIBREF-L with
|
|
increasing frequency. For example, a workshop entitled
|
|
"Navigating the Internet: Let's Go Gopherin'" attracted 17,769
|
|
participants from 54 different countries. [17]
|
|
|
|
7.0 Preparing Librarians to Work With Remote Users
|
|
|
|
The library should define its role in respect to training remote
|
|
users. That role should not be developed in isolation from the
|
|
campus computing center, which often offers a variety of computer
|
|
courses. For example, the Butler Library at Columbia University
|
|
defines their role as complementing that of the University's
|
|
Center for Computing Activities and does not duplicate existing
|
|
instruction in computer hardware, telecommunications, or basic
|
|
applications like word processing. Instead, their "focus is on
|
|
advanced research tools and processes . . . and on specific
|
|
applications of technology to information retrieval and
|
|
organization, publishing and communication, and textual
|
|
analysis." [18]
|
|
|
|
+ Page 17 +
|
|
|
|
Librarians working with instructional programs in electronic
|
|
information resources need to have a broad perspective not only
|
|
of the resources themselves, but also of information management
|
|
techniques, electronic scholarship, and electronic publishing.
|
|
Staff training programs should focus on providing an
|
|
understanding of these subjects. Other areas that should be
|
|
covered include the system-specific commands of relevant
|
|
electronic information resources, expertise in managing personal
|
|
databases, and the bibliographic generation of downloaded
|
|
information.
|
|
It is also very important for those working with remote
|
|
users to understand the user's perspective. They should
|
|
experience the kinds of problems and system messages that remote
|
|
users encounter using various means of access, and they should
|
|
develop appropriate training materials to assist users with any
|
|
challenges that cannot be resolved.
|
|
|
|
8.0 Conclusion
|
|
|
|
One day, new electronic information systems may provide remote
|
|
users with easier, more intuitive means of searching. For
|
|
example, search techniques based on statistical weighting (also
|
|
known as relevance ranking) can produce a list of citations
|
|
sorted in descending order with the most relevant items at the
|
|
top of the list. This type of search system is exemplified by
|
|
Westlaw's WIN. A similar system called TARGET is being developed
|
|
by Dialog, which "strikes a middle ground between pure natural
|
|
language relevance ranking systems and Boolean searching." [19]
|
|
But even with significant system improvements, the librarian
|
|
in the brave new electronic world of the future will still play
|
|
an important role in aiding users "to navigate . . . between
|
|
information needs and information resource systems." [20]
|
|
To return to the three categories of users discussed earlier
|
|
in this paper, the problems of the "technologically challenged"
|
|
may be overcome through improved design of search engines, user
|
|
interfaces, and information protocols. The "techie" and
|
|
"research-naive" users can benefit from increased human and
|
|
computer-based library instruction, and they should be encouraged
|
|
to explore and effectively utilize the electronic information
|
|
possibilities of cyberspace. Hopefully, librarians will be able
|
|
to focus more energy on fostering electronic information literacy
|
|
by assisting users to develop lifelong skills in retrieving and
|
|
managing all of the electronic information resources available to
|
|
them from libraries and other remote sites.
|
|
|
|
+ Page 18 +
|
|
|
|
It is important that we continue to explore the use of new
|
|
technologies to reach out to and interact with today's remote
|
|
users. But we should also welcome the opportunity to rethink our
|
|
attitudes and our perspectives in order to reinvent our services
|
|
in this new electronic environment. As John R. Sack has
|
|
suggested, we need to move away from the "Ptolemaic" view of the
|
|
library as central towards the "Copernican" view of the user as
|
|
central. [21] Armed with this perspective, librarians will be
|
|
better equipped to utilize emerging technological capabilities to
|
|
effectively serve their users.
|
|
|
|
|
|
Notes
|
|
|
|
1. An earlier version of this paper was presented at the Ninth
|
|
Texas Conference on Library Automation, 3 April 1993.
|
|
|
|
2. Mary Jean Pavelsek, "A Case Against Instructing Users of
|
|
Computerized Retrieval Systems," College and Research Libraries
|
|
News 52 (May 1991): 297-299, 301; and Tom Eadie, "Immodest
|
|
Proposals," Library Journal 115 (15 October 1990): 42.
|
|
|
|
3. The author would like to thank Tom Wilson of the University of
|
|
Houston University Libraries for this important observation at
|
|
the Ninth Texas Conference on Library Automation.
|
|
|
|
4. Brian Aveney, "Online Catalogs: The Transformation Continues,"
|
|
Wilson Library Bulletin 58 (February 1984): 406.
|
|
|
|
5. M. Lynne Neufeld and Martha Cornog, "Database History: From
|
|
Dinosaurs to Compact Discs," Journal of the American Society for
|
|
Information Science 37 (July 1986): 189.
|
|
|
|
6. Kathleen Young Marcaccio, ed., Gale Directory of Databases
|
|
(Detroit: Gale Research Inc., 1994), xxi-xxii.
|
|
|
|
7. Ibid., xxiii-xxvii.
|
|
|
|
8. Online Database Selection: A User's Guide to the Directory of
|
|
Online Databases (New York: Cuadra/Elsevier, 1989), 7.
|
|
|
|
+ Page 19 +
|
|
|
|
9. Elizabeth H. Dow, "The Impact of Home and Office Workstation
|
|
Use on an Academic Library" (Ph.D. diss., University of
|
|
Pittsburgh, 1988), 63.
|
|
|
|
10. See Sally Wayman Kalin, "The Invisible Users of Online
|
|
Catalogs: A Public Services Perspective," Library Trends 35
|
|
(Spring 1987): 587-595; and Sally Wayman Kalin, "Support Services
|
|
for Remote Users of Online Public Access Catalogs," RQ 31 (Winter
|
|
1991): 197-213.
|
|
|
|
11. Reva Basch, "The Electronic Client: User Expectations and
|
|
Searcher Responsibilities," in Proceedings of the Seventh
|
|
National Online Meeting (Medford, NJ: Learned Information, 1986),
|
|
22-24.
|
|
|
|
12. Also described as "reference psychotherapist" in: Sally
|
|
Wayman Kalin, "The Invisible Users of Online Catalogs: A Public
|
|
Services Perspective," 590.
|
|
|
|
13. Domenica M. Barbuto and Elena E. Cevallos, "End-User
|
|
Searching: Program Review and Future Prospects," RQ 31 (Winter
|
|
1991): 225.
|
|
|
|
14. Steven J. Herro, "Summary of Well Constructed Gophers," e-
|
|
mail message posted to pacs-l@uhupvm1.uh.edu, 17 November 1993.
|
|
|
|
15. Louis Rosenfeld, "New Topical Internet Guides Available," e-
|
|
mail message posted to pacs-l@uhupvm1.uh.edu, 20 December 1993.
|
|
|
|
16. Jim Olivetti, "Summary: Workshop Design Assistance," e-mail
|
|
message posted to pacs-l@uhupvm1.uh.edu, 21 December 1993.
|
|
|
|
17. Richard Smith, "Navigating Report," e-mail message posted to
|
|
pacs-l@uhupvm1.uh.edu, 30 November 1993.
|
|
|
|
18. Anita Kay Lowry, "Beyond BI: Information Literacy in the
|
|
Electronic Age," Research Strategies 8 (Winter 1990): 26.
|
|
|
|
19. Promotional information from DIALOG Information Services,
|
|
Inc.
|
|
|
|
+ Page 20 +
|
|
|
|
20. Francis Miksa, "The Future of Reference II: A Paradigm of
|
|
Academic Library Organization," College & Research Libraries News
|
|
50 (October 1989): 789.
|
|
|
|
21. John R. Sack, "Open Systems for Open Minds: Building the
|
|
Library Without Walls," College & Research Libraries 47 (November
|
|
1986): 538.
|
|
|
|
|
|
About the Author
|
|
|
|
Karen Wielhorski, Head of Reference, Ralph W. Steen Library,
|
|
Stephen F. Austin State University, Nacogdoches, TX 75962-3055.
|
|
Internet: karenw@sfalib.sfasu.edu.
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review is an electronic
|
|
journal that is distributed on the Internet and on other computer
|
|
networks. There is no subscription fee.
|
|
To subscribe, send an e-mail message to
|
|
listserv@uhupvm1.uh.edu that says: SUBSCRIBE PACS-P First Name
|
|
Last Name.
|
|
This article is Copyright (C) 1994 by Karen Wielhorski. All
|
|
Rights Reserved.
|
|
The Public-Access Computer Systems Review is Copyright (C)
|
|
1994 by the University Libraries, University of Houston. All
|
|
Rights Reserved.
|
|
Copying is permitted for noncommercial use by academic
|
|
computer centers, computer conferences, individual scholars, and
|
|
libraries. Libraries are authorized to add the journal to their
|
|
collection, in electronic or printed form, at no charge. This
|
|
message must appear on all copied material. All commercial use
|
|
requires permission.
|
|
-----------------------------------------------------------------
|