Linggo, Hulyo 31, 2011

Open Access Online Journals for Libraries

Business Models as Driver for Change

The Impact of Electronic Publishing: The Future for Publishers and Librarians. David J. Brown and Richard Boulderstone. Munich: K. G. Saur, 2008. p[161]-184.


This article tackled Open Access as seen in the Market. Open access is said to be more of a business model as it is involved with selling publicly funded research materials to a wide array of readers. It stated that open access is slowly being accepted as it battles the traditional way of journal subscription. The subscription model offers limited access and only reaches a limited market. If commercially based controls are taken out of picture, then, open access promises to reach a wider audience providing more freedom in accessing information.

Open access however, still has a limited number of audiences. It is mostly the Academic and Research Institutions that uses open access as they have the funds to back them up provided to them by public or private organizations . Consider in the picture the so called "disenfranchised." They are the people outside the the two institutions mentioned. They are faced with constraints such as their actual buying power, how would they benefit from Open access then? Experts then have tried to justify transition from a subscription mode to Open Access to answer information needs.
Things I've learned:
______________________________


Things I've learned:

Open Access promulgated from the idea of "openness" and that are 2 different types of openness--the green route and the gold route.

The gold route. Think gold -- think money. We can derive a there's no such thing as free lunch to fit as the definition of this type of OA. This is where an article when accessed by a user undergoes a per article processing fee. But there are also instances in which private funding organizations support the idea of free open access journal publishing, thus they fund the use of OA for free to those who wish to access information for free (for public use). There is also the new idea of Hybrid journals which includes "a mix of author Paid (OA) and toll-based articles access (TA -- or could also be referred to as the subscription mode)

The green route is the opposite of the gold route. Green supports are one in seeking for the ultimate free-access system for research information.

Backtracking from the previous reading assignment, I've mentioned TRUST as part of intellectual rights and copyright issues. This topic is also present in this article as this is essential for publishers of online journals. In the end, it all boils down to the credibility of an article to pass a good research material and for it to reach a wider audience. If researchers are able to process good information, we must understand that it is not the author who will benefit from this, it will be the community that it serves.

Lunes, Hulyo 25, 2011

Intellectual rights and copyright issues

Trust
The Impact of Electronic Publishing: The Future for Publishers and Librarians. David J. Brown and Richard Boulderstone. Munich: K. G. Saur, 2008. p[319]-321


Trust in publication systems is essential but measuring it is "ill-defined." Publication systems need to maintain their integrity so as to attract more users and retain loyal clientele. Through the years, these publication systems looked for ways to control fraudulent articles from circulating.They have created trust-based systems that would allow them to have control over articles submitted for publishing. It goes through a referee system, a review process that shows whether a research paper has passed.


In the internet world, it is harder to employ a trust-based system because the information space is so vast, but there have been ways developed to address these concerns. There is the use of feedback as a trust metric (Ebay), reviews from book purchasers (Amazon) and Page Rank system (Google).


Nowadays, publishers buy software systems that can detect plagiarism because they want to ensure the integrity of all their published articles. Having a good reputation is good for their business and it means more future submission of articles and more patronizers of these published works.



------------------------------

Today, I became aware of the different measures that publication systems go through before publishing an article. This keeps a good balance between those who wish to submit and share articles for others to learn and users being able to have their hands on a trusted article. I learned about software systems being able to recognize plagiarized materials and best of all, users are rest assured that the materials have gone through rigorous reviews and that publishing systems exhausts all efforts to provide trusted reading materials.

User Interfaces of IRs (Visualization)

Interface Design
Digital Libraries: Principles and Piractices in a Global Environment. Ed. Lucy A. Tedd and Andrew Large. Munich: K. G. Saur, 2005. p[129]-161


This article highlights the importance of the user interface as a means for the user to interact with the information that is stored in the digital library. Galitz defined the user interface as "...a part of a computer and its software that people can see, hear, touch, talk to, or otherwise understand or direct." Interface design is concerned with two components, first, the input component that oversees that the user is able to "communicate needs or desires to the computer?, and second, the output component that shows how the "computer conveys results of its computation to the user."


The interface design is important for it is the determining factor for whether a visit to the digital library is considered a success or failure. The factors include (1) the information retrieved and (2) the user experience. Dilton formulates 5 questions that he thinks designers should consider in creating a digital library interface.


1. How do we attract users to our resources, and make them stay?
2. What will bring a user back to our resources again?
3. How do i build an interface that supports a richer comprehension or appreciation of the contents?
4. What makes material more learnable by users?
5. Can novices learn from viewing an expert's construction of an information space?


In Summary, Galitz emphasizes that in the end, "the best interface is one that is not noticed," rather an interface that allows users to find what they are seeking for "quickly, accurately and with the least effort."


------------------------------

Reading this article made me realize my unconscious behavior towards using the user interfaces of Information retrieval systems. I have realized that sometimes I'm biased with just the looking at its outward appearance. Questions like, "Where do i type in my query?" and "Will it lead me to the right information?" always pops to mind. 

The article gives a good insight as to how user interfaces affects the behavior of users as they search for the information they need. I learned that different users have diverse methods of searching and this is because they are influenced by their own understanding and use of language and even of cultural background. I also learned that though aesthetically a user interface must be appealing to the eyes, the utmost importance must be given to users and as to how they can efficiently seek information and achieve satisfactory results.

As an Information Specialist, I believe it is important to know, recognize and even learn how to evaluate a good user interface. Seeking behavioral patters and learning about Human-computer interaction can be an advantage as well. Being in the profession of information management, I do feel that it is important to understand the whole concept of Information Retrieval--not just the theories. We learn it not so we can boast about it, but because we want to understand the technology and how to better reach a good number of audiences and be able to provide valuable information.


Linggo, Hulyo 10, 2011

Web 2.0 technology application to Libraries

Using Interactive Technologies in Libraries
Edited by Kathlene Hanson and H. Frank Cervone
Neal-Schuman Publishers, 2004

This book first tells us of the hype a new technology can bring to the community. When something new comes out in the market, people always have higher expectations towards it. The same is true for libraries and librarians who are keeping up with the information age. Nowadays, librarians would also research for different technologies to best meet the demands of its users. The book presented different interactive technologies that answers information distribution, subscription to database content, how to use the Wiki as a research guide, using blog feeds to reach its patrons and lastly the idea of "podcasting."

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

I've learned that technologies presents more avenues for information to circulate. Even though the format and nature of information evolves on its own, librarians still have a way of presenting these recorded knowledge. It is a call for us then to learn about new technologies that go around. When I think of applying all the useful interactive technologies, I can picture how great and beneficial it would be to my patrons. 

I also learned about Podcasting. This is a new portable way of presenting information to the public. It is said that Filipinos are more auditory learners than visual learners. They'd rather hear someone explain things and concepts to them than them reading about it. In the case at my workplace, podcast are more likely to be seen used than books. 

This second generation of services gives opportunity for people to share information with each other. The web is also playing a big part in promoting levels of interest and diversity among its users. Time and time again, technology has bridged information gap. Now, even those people who are handicapped or have no access to libraries will be able to have ways of accessing information.

The Internet and the WWW: implications to libraries

Libraries adapting to meet demands of Internet age
by Richard Chang, Reuters
Business World Online


With the advent of technology, the old shushing librarians have slowly been replaced by social networks and books have gone digital as well. Librarians will be seen answering queries and posting updates of their latest acquisitions on Facebook and Twitter. Libraries are slowly accommodating  room for interaction (information commons) and even cafes to improve service and invite an atmosphere of sharing information with others. 


The internet presents so much information that it is impossible to compete with Google. Despite this, the role of librarians cannot be taken out of the picture. They aim to serve the community as content providers. Libraries have gone online, circulations in electronic format are growing rapidly in numbers and now information seekers are able to search at the comfort of their home or offices. 


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

I know for a fact that librarians and libraries will remain essential to the community. It is good to learn that we are not lagging behind. If we think about it carefully, libraries have always tried to meet the demands of its users. It is our duty to present information to users whether it be in print format or electronically accessed. 

Ranganathan's fifth law states that the library is a growing organism. Growth must always be present in the libraries may it mean staff training, acquiring new information in various formats or changing the physical look of the library. 

So long as human beings continue to use the knowledge they have inherited from their ancestors and learned from their contemporaries, so long as human ingenuity and creativity increases the store of information, there will be a need for persons and institutions to collect, to catalog, to preserve, and to guide. Books, and libraries, have changed over the thousands of years since the invention of writing … But the essential task of the librarian has remained the same: to collect and preserve the record of human accomplishment and imagination, and to put this record in the hands of those who would use it. - Fred Lerner

Computer and Internet Security

Security for Today
by Rick Lehtinen, Deborah Russell, and G.T. Gangemi Sr.
Computer Security Basics, 2nd ed. O'Reilly Media, Inc., 2005


The first part of the book -- Computer Security Basics -- introduced what computer security is and its importance and its role in today's society. It also summarized the different threats to computers and information and an overview of the different types of computer security.


It is said that computer security has changed dramatically since the terrorist attacks in 2001 and different forms of threats have arose as well. Network attacks, bugs, viruses and identify theft are only some of the most common computer crimes. These threats have the capability to paralyze both our computers and network systems. In lieu of this, companies have been adapting modern ways of securing  and protecting their data from malicious software and other threats.  


Computer security is built on three pillars, Confidentiality, Integrity and Availability. From these these three pillars sprung other terms that are important to note as well, these are Identification, Authentication, Authorization and Accountability. Today's computer and internet security is highly relevant and the information stored in it places a much higher value. Companies do not think twice anymore in spending time and money in guarding and protecting their information. 


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

I learned that there are a lot of ways to protect our data from external threats. It is even easier to imagine. Picture a “glass house”  from which your core data is safely stored and placed strategically inside it. The walls may in a sense guard and protect them by ensuring that only an authorized person has the right of access. We can use other tools to ensure that our data is protected by installing things like biometrics or a much more complicated retina scanner.


I also learned about CERT and its role in lending expertise and spreading techniques on how to better protect our data when threats come about. CERT or Computer Emergency Response Team together with other agencies was put up to answer the demands in support of fighting cyber attacks. For Singapore and other parts of Southeast Asia, we have SingCERT to call on to.


Lastly, I learned that we have a responsibility to computer technologies that we use. We have a responsibility to ensure that if a virus attack or a disk failure happens, we have a backup plan and that includes procedures for backing up our data.


As a computer user, I have the responsibility to be aware of computers in general. Educating myself on how to fix it if it breaks down, knowing how  and when to back up my files to prevent data loss in case something unexpected happens to my computer, making sure that my virus software is up-to-date and periodically update. It is much like taking care of my personal belongings and knowing their value. They do say that prevention is better than cure (Better safe than sorry).





Computer Ethics - Netiquette


Computer Ethics
by James H. Moor
Encyclopedia of Philosophy. Ed. Donald M. Borchert. Vol. 2. 2nd ed. Detroit: Macmillan Reference USA, 2006. p396-398.

Computer ethics is a branch of applied ethics and virtually covers all fields. This is because the computer technology has greatly affected and has now been greatly embedded in people's lives and activities in more ways that we can imagine. The computer technology has reached a wide number of users and that everyday new information are being made available to the public through the Internet.  It has now become integrated in society that  all our activities from education, law, business to the government and the military depend on them. Modern computing technologies gave way for more people to create computers that does a  wide range of functions. 
Computer ethics have been raised through the course of the advancements in technology. Viruses, spamming, doctored images and digital information being copied so easily and accurately have greatly increased and these problems have raised issues in rights and responsibilities. Privacy, property, power, security and professionalism are the main areas with which the justification for policies for the ethical use of technology are being based. 
- - - - - - - - - - - - - - - - - - - -
Upon researching for an article in computer ethics, I have discovered that there is a continuous effort to create guidelines for the ethical issues in using computer technologies.I also learned that people all over the world must be able to create a consciousness in observing acceptable behavioral conduct when participating in the cyberworld. Computers cannot be taught to understand emotions and moral responsibilities much like a human person do. We must be able to understand that there is no absolute cyber protocol, we just need to observe sensible rules of communication.

Sabado, Hulyo 9, 2011

Techniques in Information Retrieval

The Internet and Information Science
Information Science in Theory and Practice. Ed. Brian C. Vickery and Alina 
Vickery. 3rd ed. Munich: K. G. Saur, 2004. p300-342.


Information in this article was identified as "the study of the communication of information in society" It looked into the technicalities of providing information such as evaluation, quantitative studies of information processes and systems and retrieval practice.


Retrieval practice with the use of the internet, mainly focuses on "textual symbols" even though information can also be in image format or sound. The internet also holds a vast amount of information available. The information vary in subject, terminology and natural language. 


To answer the need to filter information, the author presented two approaches to indexing the internet, one is to assign one or more index terms in a web wage or two, to scan the text and extract important keywords and use an appropriate index term.


- - - - - - - - - - - - - - - - - - - - - - - 


The three things I learned from this reading are, first, that to understand the basic retrieval process we must understand how it is done. Second, the basic retrieval process starts with understanding the information contained in an article. And third, that by indexing, one must inspect and condense the article into a word or phrase that best characterizes the article.

Role of the Computer System in Information Retrieval

Computing
Encyclopedia of Communication and Information. Ed. Jorge Reina Schement. Vol. 1. New York: Macmillan Reference USA, 2002. p172-180.

This article describes computers and its significant role in people's lives. From it's primary source of performing mathematical tasks, computers now gave way to becoming a handy tool for "communication, artistic expression, and managing the store of human knowledge" Its history has 2 stories to tell -- the hardware story and the software story.

The author also described the way writers would do research and how it has evolved from the early 70's to the present time. It described the use of keypunchers, mainframe computers, use of paper cards or computer output microform (COM), microfiche, to an easier access to information such as Online Computer Library Center (OCLC), Machine-Readable Cataloging format (MARC) that made it possible for the world to exchange information, use of compact disc read only memory (CD-ROM), which was largely used by EBSCO and Info Trac, and of course, over the Internet. 

Searching for data electronically may produce unexpected results at times. This is because the computer does not really understand a set of strings such as "Jim Smith". The results vary on occurrences that it finds, thus process of information retrieval.

- - - - - - - - - - - - - - - - - - - - - - - 


From this reading I've realized how convenient our lives have been, how computers have affected the way we live our lives. It has brought great advancement in the workplace, in schools and in running a business, offering different levels of information to respond to different information needs. With computers we were able to expand our knowledge and with the increasing knowledge we've learned to explore things like Digital Information.

As an Information Management Specialist, it is important for me to understand how to maximize/make full use of the available information. Apart from that, it is handy to know the role of computers (that we unconsciously take for granted) in making the information available.These machines are capable of assisting us humans with complicated tasks making information retrieval much faster and much easier at a much cheaper cost. 


Lunes, Hulyo 4, 2011

Hello

You have reached rosamarikit.blogspot.com

I am Rosa Marikit Mateo. I'm an Information Management Specialist by day and a frustrated singer by night. I work for an IT company called Geodata Systems--a mapping solutions company--for almost three years now. My work evolves around Information dissemination--from writing policies and procedures to implementing information management systems. 

When I started out, I was what some would consider the traditional librarian. I was stuck with my library knowledge of cataloguing, indexing, abstracting and other management tasks and I was doing them by the book and manually. At some point, I realized there must be something more to this library life.

With the advent of technology, antiquated would be an understatement for those who were stuck in the traditional ways. I began to discover new concepts Digital Libraries, Information Management and Knowledge Management just to name some. I realized that this was what I wanted to do and give focus on. It does not only answer librarianship work, it is when realized fully, would be the solution to knowledge acquisition and information dissemination and sharing, not just for my company but to everyone who would be interested. 

The concept of Digital Libraries is starting to gain popularity in the Philippines but weak in the implementation part. Professionally, I lack knowledge about it but I can’t just stop and not do anything about it. I’ve done research; I’ve read papers and attended conferences to enhance my knowledge still they were scarce. My thirst to learn has lead me in applying for a Masters Degree with great focus on Information Science.

My main motivation is to learn. With learning, I gain knowledge and with knowledge I’m able to put plans into action. Professionally, I would like to achieve a lot of things--improve documents and records management processes, to have a fully implemented document management system to use for our company, improve business process make available useful knowledge that the employees can make use and benefit from. 

I hope that I would be able to share as much knowledge in the field of Information Science through the topics that had been laid for the duration of our lis 260 class. On the other hand, I would like to learn just as much from my peers and be exposed to this discipline through the experiences of others and learn how Information Science is practiced in their work and as it is worldwide.

The great secret of success is self-discipline - getting yourself to do what you really need to do - choosing to do what you feel is right and will bring the results you want into your life -  long term.   It is bringing order and efficiency into your life-. . .  creating structure in your life and doing this enthusiastically! Success comes from taking charge of yourself and feeling proud of yourself when you do. - Anonymous