953 lines
42 KiB
Plaintext
953 lines
42 KiB
Plaintext
|
|
+ Page 1 +
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review
|
|
|
|
Volume 3, Number 7 (1992) ISSN 1048-6542
|
|
-----------------------------------------------------------------
|
|
|
|
To retrieve an article file as an e-mail message, send the GET
|
|
command given after the article information to LISTSERV@UHUPVM1
|
|
(BITNET) or LISTSERV@UHUPVM1.UH.EDU (Internet). To retrieve the
|
|
article as a file, omit "F=MAIL" from the end of the GET command.
|
|
|
|
|
|
CONTENTS
|
|
|
|
FOCUS ON CAMPUS-WIDE INFORMATION SYSTEMS, PART III
|
|
|
|
|
|
REFEREED ARTICLES
|
|
|
|
The Development of an Information Policy for the University of
|
|
California at Berkeley's Infocal Campus Information Service
|
|
|
|
By Margaret Baker (pp. 4-18)
|
|
|
|
To retrieve this file: GET BAKER PRV3N7 F=MAIL
|
|
|
|
As an increasing amount of diverse material is made publicly
|
|
available on campus computer systems, universities face some
|
|
provocative new areas of concern. When the University of
|
|
California at Berkeley's Information Systems and Technology (IST)
|
|
department began developing its Infocal campus information
|
|
service, it had an important responsibility to develop the system
|
|
so that the University's vulnerability to legal action and
|
|
adverse publicity was minimized. A formal information policy was
|
|
needed, and it was established by means of an advisory committee.
|
|
In July 1991, the committee finalized its recommendations. These
|
|
recommendations, which are included in the paper, have been
|
|
implemented.
|
|
|
|
|
|
EDITOR@CYBERSPACE
|
|
|
|
Fostering Technical Innovation in Libraries
|
|
|
|
By Charles W. Bailey, Jr. (pp. 19-22)
|
|
|
|
To retrieve this file: GET BAILEY PRV3N7 F=MAIL
|
|
|
|
+ Page 2 +
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review
|
|
|
|
Editor-in-Chief
|
|
|
|
Charles W. Bailey, Jr.
|
|
University Libraries
|
|
University of Houston
|
|
Houston, TX 77204-2091
|
|
(713) 743-9804
|
|
LIB3@UHUPVM1 (BITNET) or LIB3@UHUPVM1.UH.EDU (Internet)
|
|
|
|
Associate Editors
|
|
|
|
Columns: Leslie Pearse, OCLC
|
|
Communications: Dana Rooks, University of Houston
|
|
Reviews: Roy Tennant, University of California, Berkeley
|
|
|
|
Editorial Board
|
|
|
|
Ralph Alberico, University of Texas, Austin
|
|
George H. Brett II, Clearinghouse for Networked Information
|
|
Discovery and Retrieval
|
|
Steve Cisler, Apple
|
|
Walt Crawford, Research Libraries Group
|
|
Lorcan Dempsey, University of Bath
|
|
Nancy Evans, Pennsylvania State University, Ogontz
|
|
Charles Hildreth, READ Ltd.
|
|
Ronald Larsen, University of Maryland
|
|
Clifford Lynch, Division of Library Automation,
|
|
University of California
|
|
David R. McDonald, Tufts University
|
|
R. Bruce Miller, University of California, San Diego
|
|
Paul Evan Peters, Coalition for Networked Information
|
|
Mike Ridley, University of Waterloo
|
|
Peggy Seiden, Skidmore College
|
|
Peter Stone, University of Sussex
|
|
John E. Ulmschneider, North Carolina State University
|
|
|
|
Publication Information
|
|
|
|
Published on an irregular basis by the University Libraries,
|
|
University of Houston. Technical support is provided by the
|
|
Information Technology Division, University of Houston.
|
|
Circulation: 4,945 subscribers in 46 countries (PACS-L) and 709
|
|
subscribers in 35 countries (PACS-P).
|
|
|
|
+ Page 3 +
|
|
|
|
Back issues are available from LISTSERV@UHUPVM1 (BITNET) or
|
|
LISTSERV@UHUPVM1.UH.EDU (Internet). To obtain a list of all
|
|
available files, send the following e-mail message to the
|
|
LISTSERV: INDEX PACS-L. The name of each issue's table of
|
|
contents file begins with the word "CONTENTS."
|
|
|
|
-----------------------------------------------------------------
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review is an electronic
|
|
journal that is distributed on BITNET, Internet, and other
|
|
computer networks. There is no subscription fee.
|
|
To subscribe, send an e-mail message to LISTSERV@UHUPVM1
|
|
(BITNET) or LISTSERV@UHUPVM1.UH.EDU (Internet) that says:
|
|
SUBSCRIBE PACS-P First Name Last Name. PACS-P subscribers also
|
|
receive two electronic newsletters: Current Cites and Public-
|
|
Access Computer Systems News.
|
|
The Public-Access Computer Systems Review is Copyright (C)
|
|
1992 by the University Libraries, University of Houston. All
|
|
Rights Reserved.
|
|
Copying is permitted for noncommercial use by academic
|
|
computer centers, computer conferences, individual scholars, and
|
|
libraries. Libraries are authorized to add the journal to their
|
|
collection, in electronic or printed form, at no charge. This
|
|
message must appear on all copied material. All commercial use
|
|
requires permission.
|
|
-----------------------------------------------------------------
|
|
|
|
+ Page 19 +
|
|
|
|
-----------------------------------------------------------------
|
|
EDITOR@CYBERSPACE
|
|
-----------------------------------------------------------------
|
|
|
|
-----------------------------------------------------------------
|
|
Bailey, Charles W., Jr. "Fostering Technical Innovation in
|
|
Libraries." The Public-Access Computer Systems Review 3, no. 7
|
|
(1992): 19-22. To retrieve this article, send the following e-
|
|
mail message to LISTSERV@UHUPVM1 or LISTSERV@UHUPVM1.UH.EDU: GET
|
|
BAILEY PRV3N7 F=MAIL.
|
|
-----------------------------------------------------------------
|
|
|
|
The 1990s offer libraries significant opportunities for
|
|
developing innovative computer systems--powerful computer
|
|
platforms and sophisticated software tools have become
|
|
affordable, and they continue to drop in price and improve in
|
|
performance.
|
|
How can libraries take advantage of this opportunity? Grant
|
|
funding offers one way to foster innovation, and, for large-scale
|
|
projects, it may be essential; however, there are limited
|
|
opportunities to secure such funding and many small projects may
|
|
not warrant it. When grant funding is sought, the library's
|
|
proposal is strengthened if it can demonstrate prior effort and
|
|
expertise in the proposal area. Every opportunity to secure
|
|
grant funding should be seized; however, libraries should not
|
|
limit themselves to this funding option. Here are some brief
|
|
guidelines for encouraging technical innovation without depending
|
|
on grant funding.
|
|
|
|
(1) Cultivate staff technical expertise and encourage
|
|
interdepartmental cooperation. As computing and
|
|
networking technologies evolve, the effective
|
|
application of these technologies in libraries requires
|
|
a considerable breadth and depth of technical
|
|
expertise. It is becoming increasingly difficult for a
|
|
single staff member to master all relevant aspects of
|
|
these technologies; a team approach is often required.
|
|
Typically, libraries have small systems
|
|
departments that provide a core of technical expertise.
|
|
Increasingly, staff in other departments are mastering
|
|
computing tools that have direct relevance to their job
|
|
duties. These technical experts should be encouraged
|
|
to broaden and deepen their skills through academic
|
|
courses, training seminars, and self-study
|
|
opportunities. As the budget permits, libraries should
|
|
provide leave time and funding for technical training
|
|
opportunities, and they should formally recognize the
|
|
acquisition of technical skills for promotion and
|
|
tenure purposes.
|
|
|
|
+ Page 20 +
|
|
|
|
Libraries should encourage experts in different
|
|
departments--and at different levels of the
|
|
organization--to work together on technical projects.
|
|
Matrix project management can be challenging; however,
|
|
it can also create productive new bonds between staff
|
|
that have both short- and long-term benefits.
|
|
|
|
(2) Provide seed money for pilot projects. [1] Libraries
|
|
do not need to invest massive amounts of money to make
|
|
progress; however, they do need to establish a
|
|
technical innovation fund that staff can tap to create
|
|
small-scale pilot projects. Although a variety of
|
|
funding strategies are possible, a straightforward
|
|
approach would be to allocate a fixed budget for this
|
|
purpose at the start of the fiscal year and to use it
|
|
to fund projects that have a predetermined maximum
|
|
funding ceiling. At this stage, funding a number of
|
|
small projects is preferable to funding a few very
|
|
expensive ones.
|
|
A simple procedure for requesting funds should be
|
|
established that encourages administrators to make
|
|
swift decisions. Librarians should complete a brief
|
|
proposal form that provides project objectives and
|
|
benefits, a timetable with a firm completion date,
|
|
staffing needs, and required hardware and software.
|
|
Given budget constraints, not every meritorious
|
|
project can be funded. The goal is to fund enough
|
|
proposals to produce a few projects that show
|
|
significant promise.
|
|
|
|
(3) Build on success. Some pilot projects will have an
|
|
immediate payoff; they can used as is without further
|
|
development effort. Additional money may or may not be
|
|
required to implement the system. For example, a
|
|
library may want to install a microcomputer-based
|
|
reference advisor system at different service desks and
|
|
public-access clusters throughout the library. If the
|
|
appropriate hardware and software is in place to
|
|
support the system, no additional funds will be
|
|
required to implement it. If not, needed hardware and
|
|
software will have to be purchased.
|
|
|
|
+ Page 21 +
|
|
|
|
Other pilot projects will show promise, but will
|
|
require additional money, time, and effort to reach
|
|
fruition. Often this is because the task is more
|
|
complex than anticipated. If they are not so
|
|
complicated that they defy solution, complex problems
|
|
are good problems--the systems that solve these
|
|
problems are likely to have significant benefits.
|
|
However, hard problems are usually best approached by a
|
|
successive approximation strategy: solve one part of
|
|
the problem at a time, accepting the imperfection of
|
|
each interim solution, until the whole problem is
|
|
solved.
|
|
|
|
(4) Reward effective innovation. The efforts of staff who
|
|
develop successful systems should be rewarded. If
|
|
system development activities are recognized when
|
|
decisions are made about merit pay increases,
|
|
promotion, and tenure, more staff will be interested in
|
|
engaging in these activities. Other types of
|
|
recognition are also effective, including institutional
|
|
awards and publicity in library publications.
|
|
|
|
(5) Accept failure. The hunt for the guilty when a project
|
|
fails accomplishes little, but it does make other staff
|
|
reconsider taking risks in the future. If the resource
|
|
investment in pilot projects is kept small, little is
|
|
lost. Often valuable lessons can be learned from
|
|
failure: dead ends are identified, new avenues of
|
|
inquiry may be revealed, and parts of the failed system
|
|
may form the core of a successful, new effort.
|
|
|
|
With the proper encouragement, staff can develop systems that
|
|
improve library operations; however, to foster technical
|
|
innovation, libraries must prudently invest scarce resources and
|
|
take calculated risks.
|
|
|
|
|
|
References and Notes
|
|
|
|
|
|
1. Jerry Campbell, University Librarian at Duke University, has
|
|
suggested that libraries allocate three percent of their budgets
|
|
for research and development. See: Jerry D. Campbell, "Shaking
|
|
the Conceptual Foundations of Reference: A Perspective,"
|
|
Reference Services Review 20, no. 4 (1992): 29-35.
|
|
|
|
+ Page 22 +
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review is an electronic
|
|
journal that is distributed on BITNET, Internet, and other
|
|
computer networks. There is no subscription fee.
|
|
To subscribe, send an e-mail message to LISTSERV@UHUPVM1
|
|
(BITNET) or LISTSERV@UHUPVM1.UH.EDU (Internet) that says:
|
|
SUBSCRIBE PACS-P First Name Last Name. PACS-P subscribers also
|
|
receive two electronic newsletters: Current Cites and Public-
|
|
Access Computer Systems News.
|
|
This article is Copyright (C) 1992 by Charles W. Bailey, Jr.
|
|
All Rights Reserved.
|
|
The Public-Access Computer Systems Review is Copyright (C)
|
|
1992 by the University Libraries, University of Houston. All
|
|
Rights Reserved.
|
|
Copying is permitted for noncommercial use by academic
|
|
computer centers, computer conferences, individual scholars, and
|
|
libraries. Libraries are authorized to add the journal to their
|
|
collection, in electronic or printed form, at no charge. This
|
|
message must appear on all copied material. All commercial use
|
|
requires permission.
|
|
-----------------------------------------------------------------
|
|
|
|
+ Page 4 +
|
|
|
|
-----------------------------------------------------------------
|
|
Baker, Margaret. "The Development of an Information Policy for
|
|
the University of California at Berkeley's Infocal Campus
|
|
Information Service." The Public-Access Computer Systems Review
|
|
3, no. 7 (1992): 4-18. (Refereed Article.) To retrieve this
|
|
article, send the following e-mail message to LISTSERV@UHUPVM1 or
|
|
LISTSERV@UHUPVM1.UH.EDU: GET BAKER PRV3N7 F=MAIL.
|
|
-----------------------------------------------------------------
|
|
|
|
1.0 Introduction
|
|
|
|
As an increasing amount of diverse material is made publicly
|
|
available on campus computer systems, universities face some
|
|
provocative new areas of concern. When the University of
|
|
California at Berkeley's Information Systems and Technology (IST)
|
|
department began developing its Infocal campus information
|
|
service, we were fully aware of the headlines of the time: porn
|
|
on the Internet, racist jokes in newsgroups, and constant
|
|
copyright violations. We saw it as an important responsibility
|
|
to develop Infocal so that the University's vulnerability to
|
|
legal action and adverse publicity was minimized.
|
|
In short, we decided that we needed a formal information
|
|
policy for Infocal, and we established it by means of an advisory
|
|
committee. [1] In July 1991, the committee finalized its
|
|
recommendations. These recommendations have been implemented,
|
|
and it has been reassuring to know that they provide a solid
|
|
basis for guiding the operation of the system.
|
|
|
|
2.0 Infocal
|
|
|
|
We call Infocal an "information service" instead of a campus-wide
|
|
information system (CWIS) because these systems can have far more
|
|
functionality than we are dealing with. Someday our campus may
|
|
develop a coherent, integrated, comprehensive CWIS, but Infocal
|
|
is not that system. What we wanted to build was simply a vehicle
|
|
for the online distribution of information. As John Kunze [2]
|
|
described in a prior article, the decision to use Z39.50 to
|
|
communicate with other servers complicated things a bit, but the
|
|
basic Infocal concept was a simple one.
|
|
|
|
+ Page 5 +
|
|
|
|
We envisioned a distributed system with multiple servers. A
|
|
campus unit might choose to have its own server because IST
|
|
didn't have enough disk space or because the unit wanted to
|
|
administer their server independently. Other servers would be
|
|
administered by other institutions, including other campuses,
|
|
libraries, software vendors, and value-added data vendors. Local
|
|
clients could query these servers, and the queries could pass
|
|
through one server to another. For example, one choice within
|
|
Infocal might be to access a departmental server.
|
|
Infocal queries might come from multiple types of clients.
|
|
A new client could be built because a new computer platform was
|
|
acquired or because a specialized user interface was required.
|
|
Users could employ clients that met their needs. Communicating
|
|
via the Z39.50 protocol, the client could query the server,
|
|
irrespective of client/server differences in platform,
|
|
administrative authority, or originating source.
|
|
For example, a user might employ a menu-driven client,
|
|
running on a UNIX workstation, to query many servers, including
|
|
MELVYL--an OPAC that runs on an IBM mainframe. (The Infocal
|
|
server currently runs under Ultrix on a DEC 5900.) The user
|
|
would view MELVYL through his or her client, and it might not
|
|
look very much like native MELVYL. Another user might be
|
|
querying the same servers for the same information from a
|
|
graphical user interface (GUI) client running on a Macintosh. In
|
|
turn, MELVYL devotees might be viewing the information on Infocal
|
|
through a MELVYL-oriented client. We expected users to want
|
|
their clients to behave as much like their normal computing
|
|
environments as possible.
|
|
|
|
3.0 Defining the Problem
|
|
|
|
There were two principles that we established early on, which
|
|
helped to restrict the policy areas we needed to worry about.
|
|
First, Infocal would be, for the users, a read-only system. Only
|
|
authorized information providers could post information. This
|
|
decision has kept us out of issues that proved troublesome for
|
|
many bulletin boards. Second, we always intended to have a
|
|
client/server arrangement, with our server connected to other
|
|
servers through the network. Consequently, we confined our
|
|
efforts to our own server--we never tried to establish policies
|
|
for all servers in the University.
|
|
|
|
+ Page 6 +
|
|
|
|
The advisory committee concurred with our early ideas about
|
|
the scope of Infocal: it was for the distribution of
|
|
"institutional information"--information distributed by the
|
|
University as well as information needed by the University for
|
|
its own internal business purposes. Under the former heading is
|
|
material such as class schedules, campus job listings, and public
|
|
notices. The second category might include material from outside
|
|
the campus (e.g., course catalogs from other UC units or a
|
|
suitably licensed dictionary) or access to external systems.
|
|
This definition excludes, for example, a faculty member's
|
|
thoughts on 18th century French economics; however, we would
|
|
encourage the faculty member (or his or her department) to use
|
|
our software to set up another server to distribute this
|
|
information.
|
|
Within the Infocal environment, we also envisioned a
|
|
distributed data provision system where campus units would be
|
|
responsible for providing and updating data that "belonged" to
|
|
them; these units would have considerable influence about the way
|
|
their data appeared on Infocal clients. Since most campus
|
|
information is originally entered on computers, this seemed to
|
|
present the possibility of achieving wider information
|
|
dissemination without great additional effort by the originating
|
|
units. However, we would need to be able to use information in
|
|
many different file formats (e.g., word processing and database
|
|
management system formats) and from many kinds of computers
|
|
(e.g., PCs, Macs, and various mainframes). Information would be
|
|
provided both by network transmission and by dial-up access. In
|
|
a service with so much distributed responsibility, it would be
|
|
easy to let anarchy reign and find ourselves quickly mired in
|
|
inappropriate, inaccurate, out-of-date, or incomplete
|
|
information.
|
|
Thus, we had a situation in which policies were clearly
|
|
important, but there was no obvious avenue to establish those
|
|
policies. Infocal was a bootstrap operation, which meant that we
|
|
had to identify, define, and seek resolution to problems on our
|
|
own. There was no higher level authority saying "thou shalt" or
|
|
"thou shalt not." This independence was exhilarating; however it
|
|
was desirable to have rules to guide our actions. We did not
|
|
want to be perceived as acting capriciously, either by acting as
|
|
censors or by establishing inappropriate priorities. Computing
|
|
centers have less experience than libraries in dealing with
|
|
difficult information provision issues.
|
|
|
|
+ Page 7 +
|
|
|
|
4.0 The Advisory Committee
|
|
|
|
Probably the most important step I took was to ask my superior,
|
|
former Vice Provost Curtis Hardyck, to set up an advisory
|
|
committee drawn from various parts of the University to address
|
|
Infocal issues. This was an ad hoc committee consisting of eight
|
|
members, six from the Berkeley campus and two from the UC Office
|
|
of the President.
|
|
In suggesting possible committee members to the Vice
|
|
Provost, we sought two kinds of expertise: first, people who knew
|
|
and understood existing university policies, and, second, people
|
|
with significant experience in the public dissemination of
|
|
information. Most of the committee members had little experience
|
|
with computers, but this wasn't a problem. Although we
|
|
frequently had to explain certain technical aspects of Infocal,
|
|
all of the committee members contributed important perspectives
|
|
and experience.
|
|
The committee members were from the following UC units:
|
|
|
|
Berkeley campus:
|
|
|
|
Academic Senate
|
|
Business and Administrative Services
|
|
Human Resources and Public Safety
|
|
Information Systems and Technology (Chair)
|
|
Legal Affairs
|
|
Public Information Office
|
|
|
|
UC Office of the President:
|
|
|
|
Division of Library Automation
|
|
Office of the General Counsel
|
|
|
|
Two lawyers on the committee were unable to attend our meetings
|
|
regularly, but they did attend when the agenda seemed to require
|
|
them. Despite the logistic difficulties introduced by having the
|
|
lawyers on the committee, their involvement was of great value
|
|
since we would have felt far less secure moving forward using
|
|
policies that had not undergone informed legal scrutiny. Also,
|
|
the lawyers were able to educate us about the legal basis for
|
|
some University policies that would otherwise have been
|
|
unfathomable.
|
|
|
|
+ Page 8 +
|
|
|
|
For example, a strict uniformity of application underlies
|
|
many University rules. Legal vulnerability is minimized if the
|
|
University can demonstrate that the same rules apply to all
|
|
outside organizations. Thus, if we do not allow local record
|
|
stores to advertise their wares on Infocal, we cannot allow local
|
|
computer vendors to place ads. However, if a campus department
|
|
like IST chooses to announce that a computer vendor is giving a
|
|
demonstration, this becomes institutional information under the
|
|
sponsorship of that department.
|
|
Of the other committee members, one left the University
|
|
toward the end of our deliberations and was not replaced; another
|
|
became too busy with other things and sent a replacement. The
|
|
choice of committee members from such diverse units stood us in
|
|
good stead because upper-level administrators were reassured by
|
|
having representation on the committee.
|
|
The committee members felt that the most critical
|
|
requirement was a statement of purpose, and we spent most of our
|
|
time working on that. The statement of purpose has proven to be
|
|
more effective than I had expected, and it has helped to define
|
|
priorities. The final section of the statement, which promotes
|
|
the use of compatible software and standards, was a little
|
|
difficult for the nontechnical committee members to support. As
|
|
it turned out, their difficulty with this was truly a matter of
|
|
misunderstanding, not of disagreement, and, on two occasions,
|
|
technical briefings resolved this problem.
|
|
Once the statement of purpose was settled, the other parts
|
|
of the recommendations were more easily written. As a result of
|
|
this process, the committee became concerned about the education
|
|
of information providers, especially about what constituted a
|
|
real data security issue.
|
|
The committee also made some recommendations regarding the
|
|
maintenance of good relations with information providers. These
|
|
are not reflected in the formal recommendations, but we try to
|
|
follow them in spirit. I was particularly pleased that the
|
|
committee spontaneously chose to include a paragraph regarding
|
|
the quality of the online information, since I had imagined this
|
|
to be a truly obscure (though important) point.
|
|
|
|
+ Page 9 +
|
|
|
|
5.0 Issues
|
|
|
|
The following are the areas of concern that the committee felt
|
|
needed attention; another institution may have a radically
|
|
different list.
|
|
|
|
o Audience: Who was our audience? Just the UC Berkeley
|
|
campus or the entire UC system? Did our audience
|
|
include the affiliated labs (Lawrence Livermore,
|
|
Lawrence Berkeley, and Los Alamos), University
|
|
Extension, and other units?
|
|
|
|
o Control: How much control over the information was in
|
|
our hands and how much was in the hands of the
|
|
information providers? Were we merely in an advisory
|
|
role, or could we say "No"? Conversely, could we
|
|
insist on posting information despite its "owner's"
|
|
resistance? Would we want to?
|
|
|
|
o Quality: We were increasingly convinced that the
|
|
accuracy, completeness, timeliness, and authoritative
|
|
value of the information were the most compelling
|
|
factors in the success of a campus information service.
|
|
Could we ensure the quality of Infocal information?
|
|
|
|
o Confidentiality: We didn't have to worry about truly
|
|
confidential material, such as grades or payroll data,
|
|
but what about borderline privacy issues, such as home
|
|
telephone numbers? This issue included the privacy of
|
|
the user of the information, an important area in its
|
|
own right, but one that is beyond the scope of this
|
|
article.
|
|
|
|
o Legality: There were numerous legal issues, including
|
|
disclaimers of liability, censorship, and theft of
|
|
proprietary material.
|
|
|
|
o Taste: Since Infocal wasn't a bulletin board-type
|
|
system, there would be minimal opportunity for
|
|
demonstrating bad taste, unless a known information
|
|
provider was malicious or careless.
|
|
|
|
o Commercial information: What about commercial
|
|
information? We knew that we wouldn't be running
|
|
advertisements, but what about milder forms of
|
|
commercial involvement, such as the announcement of a
|
|
demonstration put on by a computer vendor?
|
|
|
|
+ Page 10 +
|
|
|
|
o Priorities: How should our work on different datasets
|
|
be prioritized so that our limited resources were used
|
|
wisely? Whose needs should come first? IST? The
|
|
campus? The UC system?
|
|
|
|
o Policies: What about the application of existing
|
|
policies? Like any other large university, UC had
|
|
existing policies on just about everything that
|
|
predated computers. How much of the existing canon
|
|
could be of use in this new context?
|
|
|
|
o Adequate computing power: What about potential system
|
|
overload? The crippling load experienced by McGill's
|
|
Archie system in its early days indicated that this was
|
|
not a frivolous concern.
|
|
|
|
o Connections to other servers: When a request was
|
|
redirected via Z39.50 to another server, our clients
|
|
would alert the user that a redirect was occurring.
|
|
Was that all that we should do about it?
|
|
|
|
The committee's recommendations, which address these issues, are
|
|
presented in Appendix A. Some issues deserve additional
|
|
discussion.
|
|
Our intended audience has not been explicitly defined, but
|
|
the statement of purpose makes it clear that the priorities are:
|
|
(1) UC Berkeley, (2) the rest of the UC community, and (3) the
|
|
public.
|
|
We haven't run into real problems with any information
|
|
provider as to whether certain information should be made
|
|
available online or not, so this is another area that will have
|
|
to be worked through in the future.
|
|
From our perspective, all we can do about the quality issue
|
|
is to take care that the source and date of the information are
|
|
conspicuously included in Infocal. If we aren't comfortable
|
|
about a potential information provider, we may have to recommend
|
|
that they run their own server.
|
|
Generally, we have managed to stay a few steps ahead of the
|
|
information providers on sensitive confidentiality matters such
|
|
as home telephone numbers--we have identified the problem, done
|
|
some research, and developed a proposal before the information
|
|
provider realized that the problem existed.
|
|
If a campus unit takes responsibility, commercial
|
|
information becomes "institutional information," thus avoiding
|
|
the nonuniform application of University rules.
|
|
|
|
+ Page 11 +
|
|
|
|
To help set priorities, we are setting up a second advisory
|
|
committee, intended to be an ongoing one, whose primary purpose
|
|
will be to identify and assess proposed datasets and determine
|
|
implementation priorities. One of the secondary charges to this
|
|
committee is to extend the work done by the previous committee as
|
|
new areas of concern are identified and as the needs of the
|
|
campus change.
|
|
Finally, when users connect to another server, we will
|
|
notify them that they're leaving Infocal. There is no way to
|
|
require another server to identify itself accurately, nor is
|
|
there any way to require other clients to present any particular
|
|
information.
|
|
|
|
6.0 Conclusion
|
|
|
|
Although Infocal is not yet available over the network (due to
|
|
our inability to fully support it with current staff), we have
|
|
released a pilot version on dedicated library terminals, as a
|
|
joint venture with the campus library. The pilot release
|
|
initially contained the class schedule, the campus telephone
|
|
directory, a listing of job vacancies, a list of faculty
|
|
research funding opportunities, and the IST newsletter. Each of
|
|
these datasets is carefully tended and updated by the
|
|
organization providing it, and several are definitely superior to
|
|
their printed versions because they are up-to-date.
|
|
We did run into some unpredictable problems just as the
|
|
pilot version was released because, at the same time, the
|
|
Registrar's Office ran out of printed class schedules and the new
|
|
campus dial-in registration system was overloaded. This happened
|
|
just before the beginning of fall semester, and it put an
|
|
immediate load on the pilot release, which was suddenly the only
|
|
source of this timely and essential information.
|
|
We haven't run into any new areas of concern that were not
|
|
anticipated, but I'm sure that we will.
|
|
Given our experiences, I strongly recommend that any
|
|
institution planning a CWIS develop appropriate policies early in
|
|
the process. Establishing a formal policy was more important
|
|
than we realized at the outset, and involving other campus units
|
|
in policy making was an immensely valuable byproduct of the
|
|
process. The committee's deliberations occurred simultaneously
|
|
with the technical development of Infocal. They didn't hold up
|
|
progress, and having the policies in place has enabled us to move
|
|
quickly.
|
|
|
|
+ Page 12 +
|
|
|
|
Berkeley is a campus where every group is vocal, empowered,
|
|
and demanding. Berkeley lives up to its reputation; however,
|
|
it's not a unique situation. In these times of tight budgets, a
|
|
computer center doesn't expect to satisfy all of its users, but
|
|
it doesn't want to alienate them either. IST's Infocal
|
|
information policy has enabled us to walk this tightrope with
|
|
some comfort and confidence.
|
|
|
|
|
|
References and Notes
|
|
|
|
1. This work has been supported in part by Apple Computer Inc.,
|
|
Digital Equipment Company, and Sun Microsystems.
|
|
|
|
2. John A. Kunze, "Nonbibliographic Applications of Z39.50,"
|
|
The Public-Access Computer Systems Review 3, no. 5 (1992): 4-30.
|
|
To retrieve this article, send the following e-mail message to
|
|
LISTSERV@UHUPVM1: GET KUNZE PRV3N5 F=MAIL.
|
|
|
|
|
|
Appendix A. The Advisory Committee's Recommendations
|
|
|
|
Statement of Purpose
|
|
|
|
The server and clients administered and maintained by IST
|
|
(Information Systems and Technology) have the following purposes:
|
|
|
|
(1) To distribute institutional information to the Berkeley
|
|
campus community, and secondarily, to other UC campuses.
|
|
This includes information from IST as well as from other
|
|
campus academic and administrative units.
|
|
|
|
(2) To make institutional information that is applicable
|
|
for wide distribution, such as job listings, publicly
|
|
available online.
|
|
|
|
(3) As budgets allow, to distribute to the campus and UC
|
|
communities UC business-related information of wide utility,
|
|
including proprietary information such as a dictionary,
|
|
where licensed for this purpose and method of distribution.
|
|
|
|
(4) To encourage other campus units, UC campuses, and
|
|
external institutions and organizations to use compatible
|
|
software and standards in developing servers of their own.
|
|
|
|
Policies regarding the content and administration of the
|
|
information resident on the IST server are described separately.
|
|
|
|
+ Page 13 +
|
|
|
|
Information Policies
|
|
|
|
General Comments
|
|
|
|
Any given server may be administered by any set of policies--as
|
|
other campus units develop their own servers they may choose to
|
|
follow different policies regarding the information on their
|
|
servers. The policies below apply specifically to the IST
|
|
Information Server. Both the policies and the guidelines that
|
|
follow were determined by an Advisory Committee drawn from
|
|
several Berkeley Campus and Office of the President units.
|
|
The content of this server is to be in accordance with all
|
|
relevant UC and Berkeley Campus policies. Different policies
|
|
will be more or less applicable to individual information
|
|
providers, but the following policies should certainly be
|
|
considered:
|
|
|
|
o University staff policies regarding what is public
|
|
information and what is not;
|
|
|
|
o University policies regarding employee organizations;
|
|
|
|
o University policies regarding politically-oriented
|
|
material;
|
|
|
|
o University policies regarding commercial advertising
|
|
and vendor relationships;
|
|
|
|
o University policies regarding protection of copyrighted
|
|
or proprietary material.
|
|
|
|
IST will actively seek legal advice when questionable issues
|
|
arise.
|
|
|
|
|
|
Policies Regarding External Servers
|
|
|
|
Information may come to campus users from other servers as well.
|
|
On the advice of General Counsel's office, a disclaimer will be
|
|
displayed by IST user interfaces when information comes from a
|
|
server that is not an institutional University of California
|
|
server. The administrator of any external (i.e., non-IST) server
|
|
is responsible for its contents.
|
|
|
|
+ Page 14 +
|
|
|
|
Guidelines for Units Providing Information
|
|
|
|
Each participating department will need to consider for each
|
|
piece of information whether it is appropriate online, and
|
|
determine and follow an internal approval and authority process.
|
|
If the information is also to be made available on paper, perhaps
|
|
when the printed version is approved, the (matching) online
|
|
version may be automatically approved. However, there may be
|
|
situations in which separate approval steps are necessary, for
|
|
instance, if the two versions differ significantly, or if the
|
|
provider is not convinced of the wisdom of offering the
|
|
information online.
|
|
In other situations, information is intended to be made
|
|
available only online, and providers will need to develop
|
|
internal procedures to handle its review and approval. For
|
|
example, does your department consider an "electronic signature"
|
|
to be the equivalent of a written signature? Do those in the
|
|
department who would need to be involved in the review process
|
|
have ready access to computers? Internally, IST has followed the
|
|
premise that information to be viewed online should be reviewed
|
|
online as well.
|
|
It is also important that the editorial and quality control
|
|
process applied to online information be as rigorous as that
|
|
applied to printed information. Spelling and other errors are
|
|
just as unacceptable online as on paper, even though they may be
|
|
repaired more quickly. Online information raises new quality
|
|
control issues as well; for example, information may be expected
|
|
to be more up-to-date than printed material.
|
|
|
|
|
|
Things to Consider
|
|
|
|
(1) Each information-providing unit should consider what
|
|
level of access is appropriate for each piece of
|
|
information, and inform IST accordingly. The following
|
|
are the three levels of access available:
|
|
|
|
(a) All information will be available to known
|
|
Berkeley campus network hosts. This includes
|
|
networked personal computers, workstations,
|
|
and shared systems. Anyone with a user
|
|
account on any campus host, including the IST
|
|
shared systems, will have access to the
|
|
information. Users from off campus who have
|
|
such accounts will also have access to this
|
|
information.
|
|
|
|
+ Page 15 +
|
|
|
|
(b) A more limited set of information will be
|
|
available to hosts (as described above) known
|
|
to be on any UC campus, the Office of the
|
|
President, the labs, etc.
|
|
|
|
(c) The most limited set of information will be
|
|
available to anyone who can dial in or access
|
|
the server over the network. This means
|
|
basically anyone.
|
|
|
|
(2) Each information-providing unit should consider the
|
|
frequency with which they might update their
|
|
information, and inform IST accordingly. A given piece
|
|
of information might be subject to updating hourly,
|
|
daily, or monthly. A very stable set of information,
|
|
such as a unit's newsletter, might not be subject to
|
|
updating at all--when it is published, it is published.
|
|
|
|
(3) Each information-providing unit should consider the
|
|
life span of a given piece of information. To use the
|
|
unit's newsletter example again, the unit might wish to
|
|
make the most recent six issues available. A balance
|
|
should be maintained between making only the most
|
|
recent information available versus using the server as
|
|
an archive.
|
|
|
|
(4) Information providers should keep in mind that
|
|
restrictions on viewing this material are no more
|
|
secure than restrictions on account access (login name
|
|
and password) and on the underlying network.
|
|
Individuals with valid access to campus-only material
|
|
may inappropriately share that access with others. The
|
|
server is no place for restricted or confidential
|
|
information.
|
|
On the other hand, the integrity of the
|
|
information itself is fairly well protected. No one
|
|
except the known information provider will be able to
|
|
change or install it, so information providers have the
|
|
responsibility of protecting passwords and other write-
|
|
access restrictions themselves.
|
|
|
|
+ Page 16 +
|
|
|
|
Problem Resolution
|
|
|
|
(1) When problems of inappropriate information come to
|
|
IST's attention, IST will attempt to resolve them
|
|
through normal University channels. However, if the
|
|
problems seem to be unresolvable, or recurring, IST
|
|
will cease putting that particular information on the
|
|
IST server.
|
|
|
|
(2) In the future, some campus departments may decide to
|
|
act as sponsors for information coming from other
|
|
agencies such as student groups, user groups, etc. Any
|
|
campus department that chooses to do this will be
|
|
responsible for the appropriateness of the other
|
|
group's information, and should carefully consider
|
|
University policies, including those mentioned above:
|
|
|
|
o University staff policies regarding what is
|
|
public information and what is not;
|
|
|
|
o University policies regarding employee
|
|
organizations;
|
|
|
|
o University policies regarding politically-
|
|
oriented material;
|
|
|
|
o University policies regarding commercial
|
|
advertising and vendor relationships;
|
|
|
|
o University policies regarding protection of
|
|
copyrighted or proprietary material.
|
|
|
|
If there is any doubt about adherence to these or other
|
|
University policies, the sponsoring department should consult
|
|
with the appropriate campus authorities for clarification.
|
|
Again, if problems appear that are unresolvable through normal
|
|
University channels, or are recurring, IST will cease putting
|
|
that particular information on the IST server.
|
|
|
|
[Appendix A. is reproduced with the permission of the University
|
|
of California, Berkeley.]
|
|
|
|
+ Page 17 +
|
|
|
|
Appendix B. CWIS Resources
|
|
|
|
There are many more resources about this topic now than there
|
|
were when our advisory committee was formed. The following is an
|
|
informal list of some other resources that we have found
|
|
valuable.
|
|
|
|
o The CWIS-L@WUVMD list distributes ideas and experiences
|
|
on many relevant topics. This is also a good place to
|
|
ask questions about specific concerns. To join this
|
|
list, send an e-mail message to LISTSERV@WUVMD that
|
|
says: SUBSCRIBE CWIS-L First Name Last Name.
|
|
|
|
o ACM's SIGUCCS (Special Interest Group on University and
|
|
College Computing Services) often has presentations on
|
|
related topics at its fall User Services Conferences.
|
|
In particular, see: Timothy J. Foley, "Developing a
|
|
Computing and Information Policy," in Proceedings ACM
|
|
SIGUCCS User Service Conference XVIII (New York:
|
|
Association for Computing Machinery, 1990), 127-130.
|
|
|
|
o The Coalition for Networked Information and EDUCOM are
|
|
two organizations that focus on these issues:
|
|
|
|
Coalition for Networked Information, 1527 New
|
|
Hampshire Ave., N.W., Washington, DC 20036, (202)
|
|
232-2466.
|
|
|
|
EDUCOM, 1112 16th Street, N.W., Suite 600,
|
|
Washington, DC 20036, (202) 872-4200.
|
|
|
|
+ Page 18 +
|
|
|
|
About the Author
|
|
|
|
Margaret Baker, Information Systems and Technology, 289 Evans
|
|
Hall, University of California at Berkeley, Berkeley, CA 94720.
|
|
Internet: MARGARET@GARNET.BERKELEY.EDU.
|
|
|
|
-----------------------------------------------------------------
|
|
The Public-Access Computer Systems Review is an electronic
|
|
journal that is distributed on BITNET, Internet, and other
|
|
computer networks. There is no subscription fee.
|
|
To subscribe, send an e-mail message to LISTSERV@UHUPVM1
|
|
(BITNET) or LISTSERV@UHUPVM1.UH.EDU (Internet) that says:
|
|
SUBSCRIBE PACS-P First Name Last Name. PACS-P subscribers also
|
|
receive two electronic newsletters: Current Cites and Public-
|
|
Access Computer Systems News.
|
|
This article is Copyright (C) 1992 by Margaret Baker. All
|
|
Rights Reserved.
|
|
The Public-Access Computer Systems Review is Copyright (C)
|
|
1992 by the University Libraries, University of Houston. All
|
|
Rights Reserved.
|
|
Copying is permitted for noncommercial use by academic
|
|
computer centers, computer conferences, individual scholars, and
|
|
libraries. Libraries are authorized to add the journal to their
|
|
collection, in electronic or printed form, at no charge. This
|
|
message must appear on all copied material. All commercial use
|
|
requires permission.
|
|
-----------------------------------------------------------------
|