Friday, October 2, 2009
RA 11 : Greening the Library
The way I see it
Source:
Maria Anna Jankowska. The way I see it : A call for sustainable library operations and services: A response to ACRL’s 2007 environmental scan. C&RL News, June 2008 Vol. 69, No. 6.
URL:
http://www.acrl.org/ala/mgrps/divs/acrl/publications/crlnews/2008/jun/sustainable.cfm. Retrieved September 30, 2009
Abstract:
Libraries especially the academic ones are being discarded in terms of environmental scanning. Piles of printed emails and unwanted books are being thrown out everyday. Old computers and technologies are being discarded and no serious accounting of what type and how much energy is used in academic libraries on a daily basis.
Three things I've Learned:
1. Libraries are being discarded in terms of environmental scanning
2. Academic libraries are ironic places of contradiction: environmental consumption within libraries is skyrocketing, but the very model of a library is built on sustainability.
3. The tradition of sustainability has been overshadowed as digitization, collection development, and providing adequate technologies have become core library missions.
Reflections:
In the library where I'm currently working, we practice the concept of greening the library. We exercise waste management wherein we separate the dry from the wet garbage. We also recycle paper wherein we use scratch papers for newspaper clippings that will be indexed. We also conserve energy especially electricity for air conditioners, lights and other appliances.
Friday, September 25, 2009
RA 10 : Health concerns of Computer use
Source:
American Optometric Association.
www.aoa.org/documents/EffectsComputerUse.pdf. Retrieved Sept 24, 2009.
Abstract
The article discusses the hazards people face when working on computers. These hazards can range from eye and vision related discomfort, neck and back pain, to possible exposure to light radiation from computer monitors. These problems can be addressed by proper workplace lighting to improve contrast between screen and the user’s surroundings. Proper egronomic design of the workstation can help ease neck and back discomfort. Occasional breaks to allow employees rest from continuously looking at computer monitors. These risks and possible solutions are currently being researched by The American Optometric Association.
3 Things I’ve Learned
1. Improper office design can lead to injury such as impaired vision and neck and back pains
2. Working with computers and the harm that can be garnered from it reduces productivity.
3. Effective planning and design of the workplace and proper consideration of worker welfare can greatly reduce these risks.
Reflection/Application
As a librarian, even though my role revolves around books, computers have been an essential part of my daily activities. It has replaced numerous traditional systems. The information I have obtained from the article will help me avoid risks that could cause problems to my eyesight, neck and back. I could also use this knowledge to design better workspace for the library clientele, mainly for those who may use computers or audiovisual equipment.
Friday, September 18, 2009
RA 9 : Rules of Court on Electronic Evidences
Source: http://nationallibraryphilippines.wikispaces.com/file/view/Court+Rules+on+Electronic+Evidence.pdf. Retrieved on Sept 16, 2009
Abstract:
This article discusses the Philippine law on rules of court on electronic evidences. There are twelve rules that were included in this law namely the coverage, definition of terms and construction, electronic documents—best evidence rule, authentication, evidentiary weight, on audio, photographic, video, and ephemeral evidence and its effectivity.
Electronic document and data message and can be used as evidence the same as the one written in paper or the original document. Duplicates and copies are also regarded as equivalent of the original. Authenticity is just the question. The person seeking to introduce an electronic document in any legal proceeding has the burden of proving its authenticity.
3 Things I’ve Learned:
1. An electronic document shall be regarded as the equivalent of an original document under the Best Evidence Rule if it is a printout or output readable by sight or other means, shown to reflect the data accurately.
2. “Asymmetric or public cryptosystem” means a system capable of generating a
secure key pair, consisting of a private key for creating a digital signature, and a public key for verifying the digital signature.
3. “Digital Signature” refers to an electronic signature consisting of a transformation of an electronic document or an electronic data message using an asymmetric or public cryptosystem such that a person having the initial untransformed electronic document and
the signer’s public key can accurately determine: (i) whether the transformation was created using the private key that corresponds to the signer’s public key; and,
(ii) whether the initial electronic document had been altered after the
transformation was made.
Reflection:
I’ve learned so much with this reading assignment. What is more interesting is it is also written within the Philippine law context. In our everyday life, we use e-mails, text messages, photos and videos as part of our work, studies, or just simply documenting what is happening in our lives. These documents also serve as evidences when it comes to legal issues/court cases, the only question is its authenticity. As a librarian and student, it is very important that we secure all our documents whether in electronic and paper format. We must learn from the mistakes of other people who were involved in scandals, and legal cases because such electronic evidences were presented in the court.
Friday, September 11, 2009
RA 8 : Open Source Software
Lawrie, Tony (May, 2002). Issues of Dependability in Open Source Software Development. Retrieved Sept 10, 2009 from http://delivery.acm.org/10.1145/640000/638584/p34-lawrie.pdf?key1=638584&key2=0798262521&coll=ACM&dl=ACM&CFID=51206778&CFTOKEN=14041621
Abstract:
The article “Issues of Dependability in Open Source Software
Development” discusses many aspects of Open Source Software revolving
around its dependability and the processes that contribute to that
dependability. To the author, dependability as discussed pertains to
reliability, security and safety of these processes.
First, it discusses the dependability of OSS products. Software
developed as Open Source needs to maintain attributes such as
security, reliability and availability to be called dependable. It
also makes comparisons between Open Source and Non-Open Source
Software Development, citing that the former is not necessarily more
dependable than the latter and gives examples of scenarios where OSS
is at a disadvantage.
Then it discusses the dependability of OSS Processes. It mentions that
OSS processes are less constrained compared to Non-OSS ones because
commercial, time and political barriers apply less. Also, OSS codes
are exposed to higher level of reused and increased knowledge
accumulation is promoted. It mentions that increased potential for
diverse collaboration is found in communities practicing OSS
development.
Issues and implications for OSS and Dependability were also discussed.
It states that there is a need to determine at which attributes assure
dependability of both OSS and Non-OSS software and the evidence that
leads to these conclusions. The nature and type of products, business
and government attitudes, and the tools and paradigms that these
approaches use are to be taken into consideration. Even with the
obvious differences, the article states that there is no substitute
for human intelligence in the development process.
As a conclusion, the author states that OSS products may be limited to
the development of systems oriented software which is vital for
further trustworthy composition and building of dependable systems.
The OSS approach is not subjected to the same of constraints like time
and budget. Tools and methods will contribute to the drive to improve
process and quality assurance.
Three things I learned from the Article:
1. Open Source Software products and processes are less limited by
time and budget constraints compared to Non-OSS software.
2. Tools and Processes do a lot to improve Open Source development
even if they lack the resources in comparison to Non-OSS development.
3. Dependability can be defined under a number of things, such as
reliability, availability, security, and even the perception of the
users.
Reflection:
As a librarian I can put to good use these practices discussed in the
article. While I recognize that I work under a government institution
such as Engineering Library II which at times can be subject to
limitations such as manpower or budget constraints, it is by no means
an excuse not to provide dependable services to our clients. What we
can do is to improve our processes the same way these OSS developers
have done to get around these limitations. We can also establish
better tools such as better indexes and loaning protocols so as to
enhance the security of our materials without subjecting our clientele
experience to less than satisfied. We can also establish relationships
with other libraries as a collaborative effort to provide information,
the same way boundaries were not considered in OSS developers efforts
to create their products.
Friday, September 4, 2009
RA 7: Field Trip to IRRI

*photo courtesy of Jhoanne
Last August 26, 2009 our class had a field trip in IRRI (International Rice Research Institute) in UP Los BaƱos Laguna. The aim of the field trip is to expose the students to the latest development of library and information science. The lecture/orientation was given by Ms. Mila Ramos, chief librarian with Ma’am Ems and Ma’am Lea, senior librarians. They talked of their services focusing mainly on CAS, SDI and document delivery. Document delivery (electronic and conventional) is a fee based service for faculty, students and staff of the university. Yet in IRRI, document delivery is free to scientists up to 50 pages. And for other users, the fee will be only based on the cost of the photocopying of the material. They also gave a description on their library system which is the Millenium (very costly) particularly the Circulation, Cataloging and Serials modules. The librarians also discussed about the access points of the electronic journals.
Three things I’ve learned:
1. Librarians are very resourceful in serving their clients better. They make a system on how to retrieve and get information for clients that organized, user-friendly and consistent like in the access points of electronic journals.
2. Web 2.0 applications are very effective ways to reach out to the library’s clients like blogs and chat service. They serve clients all over the world with different time zones yet the librarians are very reliable because users are their priority.
3. Open access journals that are selected and evaluated by the librarians are great help for additional information of researchers. They are free and openly available for public use.
Reflections:
It gave me a fresh perspective on how new technologies can be used to improve the library I maintain now. Moreover, one cannot overstate the value of experienced librarians such as those maintaining the IRRI library. They have showed me that even though I have been a practicing librarian for almost two years and I am immersed in new trends in the profession I feel that there is still much to learn particularly on the foundation skills on which the practice of librarianship is built upon.
Friday, August 14, 2009
RA 6: The IFLA Internet Manifesto
Source: The IFLA Internet Manifesto. Retrieved from http://www.ifla.org/en/publications/the-ifla-internet-manifesto
Abstract:
The IFLA Internet manifesto states that access to the internet and all its resources should be consistent with the United Nations Universal Declaration of Human Rights and especially Article 19 ‘everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas thru any media and regardless of frontiers. It also stresses that library users have the right to expect the same degree of expression and freedom of access to information on the Internet as they do with print materials. With that libraries have the responsibility to serve all of the members of their communities regardless of age, race, nationality, religion, culture and librarians and electronic information efficiently and effectively. Librarians should also proactively promote and facilitate responsible access to quality networked information for all their users including children and young people.
Three things I’ve learned from the Article:
1. Access to the internet and all its resources should be consistent with the United Nations Universal Declaration of Human Rights and especially Article 19.
2. The manifesto has a great contribution to make to librarians all over the world as Internet access continues to increase.
3. IFLA encourages the library community to develop strategies, policies, and plans that implement the principles expressed in the Manifesto.
Reflection:
As a librarian it is very important that we provide the information needs of all kinds of users from any form of media like print/non-print or through the Internet. The declaration of IFLA of the right to access to information to every human being teaches us how to be responsible facilitators/users of the Internet. Libraries should create clear and transparent policies for internet access particularly stressing the balance of responsibilities between staff and users. Also, librarians should proactively promote and facilitate responsible access to quality networked information for all their users including children and young people.
Friday, August 7, 2009
5th Reading Assignment
Source:
Mann, Florian. Open occess publishing in science. ACM Digital Library. Communications of the ACM, March 2009 Vol 52 No. 3. Retrieved August 4,2009.
Exact URL:
http://delivery.acm.org/10.1145/1470000/1467279/p135-mann.pdf?key1=1467279&key2=3307829421&coll=ACM&dl=ACM&CFID=46154780&CFTOKEN=72790312
Abstract
The article "Open Access publishing in Science" discusses the application of the Open Access model to the dissemination of knowledge in the field of Science and its advantages and disadvantages. This model was also compared to the traditional, non-Open practice of publishing scientific works where subscribers are expected to pay fees to gain access to material. Research was done through the survey of 1433 researchers from 49 countries. Almost all of the sample population agreed that
Open Access publishing is suited to the goals of preserving and disseminating scientific knowledge and find the practice desirable. Almost half see a potential increase of their work reaching their audience more effectively. On the other hand, researchers also have fears that Open access publishing can jeopardize their promotion and tenure. Some also state that it will negatively affect their research funds as less will be needed if all sources follow Open access. This results in a wait and see attitude wherein few researchers and publishers think that Open Access is a common practice.
Finally, the study points out that while Open Access publishing is advantageous to traditional media in terms of wide and rapid dissemination of knowledge to the general and expert audience, some factors are currently only effectively supported by traditional media. Open Access has to address other factors such as long term availability, impact factor and a high profile editorial board in order for it to be sustainable. Processes such as collecting fees from authors who wish for their work to be published or delayed open access where information is only initially accessible for a fee have been suggested.
3 things I learned from the article:
-Open Access can bridge the gap on knowledge between rich and poor communities.
- Authors and Researchers are still hesitant to publish works in an Open Access environment due to economic reasons.
- Supporters of the Open Access model have found alternative ways to produce income to support their publications.
Application/Implication of the things I learned
As a student and a librarian the idea of Open Access publishing opens new opportunites. As a student it is obvious that if I had the ability to gain knowledge without the restrictions of financial or geographical constraints, along with the idea that a broader range of authors are within reach, the potential for learning is high. As a librarian I could better perform my function to serve my clientele if Open Access publications were available. This means that my clients too can be directed to a broader range of information and also this means that the library system I work under will not be burdened by budget constraints.
Friday, July 24, 2009
4th Reading Asignment
Ou, Carol. “Technology and copyright issues in the academic library: First sale, fair use and electronic document.” Libraries and the Academy, Vol 3 No. 1 (2003) pp. 89-98. Project Muse. 21 July 2009
http://muse.jhu.edu/journals/portal_libraries_and_the_academy/v003/3.1ou.pdf
Abstract:
The article is about concepts the first sale and fair use and its implications to Library's electronic resources. These two concepts were discussed in the article as it needed to be re-examined in an information age. It also discussed that this technology has the potential to upset the traditional balance between the public and private spheres that governs the doctrine of copyright.
Three things I've learned form the article:
1.Difference between the concepts of the first sale and fair use in an academic library setting.
2.First sale doctrine is more difficult to implement with digital items such as electronic documents
3.Major concerns posed by the Internet and digital document is that they blur the distinction between the public and private sphere
Reflection:
This Internet age presents new challenges to copyright issues. Universal access and distribution has become possible through the Internet. Libraries are leaders in trying to maintain balance of power between copyright holders and users.
Libraries want to provide the information need of its users. What is important is the institution must have a policy in accessing copyrighted materials in electronic reserves. It should be based on the fair use of the provisions of the Copyright Act. The methods of access are also important like the institution must have the required subscriptions and IP authentications. The Library where I work is currently looking for E-books especially for the Reserve ones. I a m hoping that I will learn more about policies, procedures, copyright issues after the E-books purchase.
Friday, July 17, 2009
3rd Reading Assigment
Source:
Maness, Jack. Library 2.0 Theory : Web 2.0 and Its Implications for Libraries [Electronic Version]. Webology 3(2), June 2006.
http://www.webology.ir/2006/v3n2/a25.html
Abstract:
The author discussed the concept of Web 2.0 and its application to libraries.
He also presented a number of ways of web 2.0 applications that can be of help to library services. This included synchronous messaging, streaming media, blogs, wikis, social networks, tagging, RSS feeds, and mashups. These services were discussed by the author its description, advantages and short history. Most of these technologies that are used by the library clients are user-centered, provides multimedia experience, socially rich and communally innovative.
Things I’ve Learned
1) There are many ways to apply web 2.0 in a library setting.
2) There are many available resources for Library 2.0. The decision of the librarian whether what resources should be used depends on the needs of the Library and its clients.
3) Library 2.0 is a challenge for libraries. It is providing new and interesting resources for librarians to continue to do what they have always done so well in the past—bringing order out of chaos and making information readily available.
Reflections:
As I’ve read the article, I’ve learned so much about web2.0 applications that would be very helpful in many library services. Though I’ve been introduced to some of the applications like blogs, reference chat, podcast and social networking, I was very surprise that many other technologies can still be applied. Honestly, these applications make the library works less complicated especially for SDI and CAS.
As a reference librarian before, I experienced how to manage blogs and the reference chat service. I thought that these applications can only be used for personal reasons but what we are doing as librarians is maximizing the use of these technologies so we can reach out to our clients.
Friday, July 10, 2009
2nd Reading Asignment
Source:
Masrom,Maslin. “Computer security and computer ethics awareness : a component of management information system” Information Technology, 2008. ITSim 2008. International Symposium on. Volume 3, 26-28 Aug. 2008 Page(s):1 -7. IEEE Xplore. Retrieved July 8, 2009
http://ieeexplore.ieee.org/Xplore/guesthome.jsp
exact URL:
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4632042&isnumber=4631966
*Full text can be viewed if you are an IEEE member or if you have the required subscriptions.
Abstract
The article is about a study that examined the computer security and computer ethics among students of the College of Science and Technology, University Technology Malaysia. The sample population consisted of students who are either in computer science majors or non-majors. Results showed that majority of the students had a satisfactory awareness of computer security and computer ethics. There is also a difference in awareness level to computer security and ethics between computer science majors and non majors as well as between male and female in certain aspects.
Three things I’ve learned in the article
• Universities are among the least secure places in the world according to experts in the computer security discipline.
• There is a difference in awareness level to computer security and ethics between computer science majors and non majors as well as between male and female in certain aspects.
• Majority of computer users strongly support anti-virus software as a protection for computing systems and data. Also, the most unethical behavior is to use computer to harm other people.
Application
Computer security and ethics are vital aspects to any computer user. As a computer user for more than ten years, I have been practicing a number of ways to promote computer security. Installing anti-virus software is an important protective step in securing a computer. Password is also an effective way to secure unauthorized access to computer resources. It is also important to backup data for protection against intentional security attacks. Also, being guided by the commandment “Thou shall not use a computer to harm other people” makes me a responsible and accountable computer user.
Friday, July 3, 2009
1st Reading Assignment LIS 260
Source:
Liawa, Shu-Sheng. "An investigation of user attitudes toward search engines as an information retrieval tool" Computers in Human Behavior.
http://www.sciencedirect.com/
Exact URL:
http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VDC-4811TNB-C&_user=3728211&_coverDate=11%2F30%2F2003&_alid=947133209&_rdoc=1&_fmt=high&_orig=search&_cdi=5979&_sort=r&_docanchor=&view=c&_ct=265&_acct=C000061230&_version=1&_urlVersion=0&_userid=3728211&md5=48339fe78cc5d06ccd188b5c73e2c24a
Science Direct is one of the online subscriptions of UP Diliman. You may not be able to access its full text if you are not within the campus or if you do not have the required subscriptions.
Abstract
The article discusses the factors that affect user attitudes towards search engines as an information retrieval tool. It explains how the main uses of computers, with the growth of the internet, in information retrieval. It hypothesizes that factors such as the quality of search systems, individual computer and Internet experience and personal motivation can be considered to predict these attitudes. The research mainly used questionnaires for gathering data. The results showed that computers are mainly used for information retrieval rather than for word processing and data storage. Also, it showed that users who enjoyed using search engines regard that search engine to be easy to use and will use it again. The article concluded that the research results were consistent with earlier studies. These past studies showed that users’ attitudes toward system quality predict whether they like that system or feel easy to use that system and that effective implementation of information retrieval systems depends whether or not users will have a positive attitude towards it.
3 things I learned from the article:
- Computer experience is one of the factors that determine a user’ perceptions to search engines.
- The quality of an information system and its accuracy of delivered results are relevant to its success.
- Search services on the Web are of two types: directory services and query-based
Application/Implication of the things I learned
I can personally apply the findings in the article in my line of work as a librarian. A huge part of my role consists of assisting the library clientele retrieve information using our library’s tools and resources. Knowing factors such as the quality of the search systems and the users’ individual computer and internet experience and motivation can help me to facilitate better the users. For example, we can consider the accuracy of results delivered by the library’s OPAC as a factor contributing to the users’ experience. On the other hand we can also consider the frequency of clients using the OPAC to determine its usefulness. Other things like user motivation can be considered in building the library’s collection. For the most part, the engineering library II is geared towards Electrical and Electronics Engineering and Computer Science students. Thus their motivation is having their homework done and preparing for exams. As a librarian, I can build the collection around these needs and propagate a strong learning environment so as to foster a positive attitude from our main clients, the students.
