NASIG 2010: Publishing 2.0: How the Internet Changes Publications in Society

Presenter: Kent Anderson, JBJS, Inc

Medicine 0.1: in dealing with the influenza outbreak of 1837, a physician administered leeches to the chest, James’s powder, and mucilaginous drinks, and it worked (much like take two aspirin and call in the morning). All of this was written up in a medical journal as a way to share information with peers. Journals have been the primary source of communicating scholarship, but what the journal is has become more abstract with the addition of non-text content and metadata. Add in indexes and other portals to access the information, and readers have changed the way they access and share information in journals. “Non-linear” access of information is increasing exponentially.

Even as technology made publishing easier and more widespread, it was still producers delivering content to consumers. But, with the advent of Web 2.0 tools, consumers now have tools that in many cases are more nimble and accessible than the communication tools that producers are using.

Web 1.0 was a destination. Documents simply moved to a new home, and “going online” was a process separate from anything else you did. However, as broadband access increases, the web becomes more pervasive and less a destination. The web becomes a platform that brings people, not documents, online to share information, consume information, and use it like any other tool.

Heterarchy: a system of organization replete with overlap, multiplicity, mixed ascendandacy and/or divergent but coextistent patterns of relation

Apomediation: mediation by agents not interposed between users and resources, who stand by to guide a consumer to high quality information without a role in the acquisition of the resources (i.e. Amazon product reviewers)

NEJM uses terms by users to add related searches to article search results. They also bump popular articles from searches up in the results as more people click on them. These tools improved their search results and reputation, all by using the people power of experts. In addition, they created a series of “results in” publications that highlight the popular articles.

It took a little over a year to get to a million Twitter authors, and about 600 years to get to the same number of book authors. And, these are literate, savvy users. Twitter & Facebook count for 1.45 million views of the New York Times (and this is a number from several years ago) — imagine what it can do for your scholarly publication. Oh, and NYT has a social media editor now.

Blogs are growing four times as fast as traditional media. The top ten media sites include blogs and the traditional media sources use blogs now as well. Blogs can be diverse or narrow, their coverage varies (and does not have to be immediate), they are verifiably accurate, and they are interactive. Blogs level that media playing field, in part by watching the watchdogs. Blogs tend to investigate more than the mainstream media.

It took AOL five times as long to get to twenty million users than it did for the iPhone. Consumers are increasingly adding “toys” to their collection of ways to get to digital/online content. When the NEJM went on the Kindle, more than just physicians subscribed. Getting content into easy to access places and on the “toys” that consumers use will increase your reach.

Print digests are struggling because they teeter on the brink of the daily divide. Why wait for the news to get stale, collected, and delivered a week/month/quarter/year later? People are transforming. Our audiences don’t think of information as analogue, delayed, isolated, tethered, etc. It has to evolve to something digital, immediate, integrated, and mobile.

From the Q&A session:

The article container will be here for a long time. Academics use the HTML version of the article, but the PDF (static) version is their security blanket and archival copy.

Where does the library as source of funds when the focus is more on the end users? Publishers are looking for other sources of income as library budgets are decreasing (i.e. Kindle, product differentiation, etc.). They are looking to other purchasing centers at institutions.

How do publishers establish the cost of these 2.0 products? It’s essentially what the market will bear, with some adjustments. Sustainability is a grim perspective. Flourishing is much more positive, and not necessarily any less realistic. Equity is not a concept that comes into pricing.

The people who bring the tremendous flow of information under control (i.e. offer filters) will be successful. One of our tasks is to make filters to help our users manage the flow of information.

ER&L 2010: Step Right Up! Planning, Pitfalls, and Performance of an E-Resources Fair

Speakers: Noelle Marie Egan & Nancy G. Eagan

This got started because they had some vendors come in to demonstrate their resources. Elsevier offered to do a demo for students with food. The library saw that several good resources were being under-used, so they decided to try to put together an eresources demo with Elsevier and others. It was also a good opportunity to get usability feedback about the new website.

They decided to have ten tables total, representing the whole fair. They polled the reference librarians to get suggestions for who to invite, and they ended up with resources that crossed most of the major disciplines at the school. The fair was held in a high-traffic location of the library (so that they could get walk-in participation) and publicized in the student paper, posted it in the blog, and the librarians shared it on Facebook with student and faculty friends.

They had a raffle to gather information about the participants, and in the end, they had 64 undergraduates, 19 graduates, 6 faculty, 5 staff, and 2 alumni attend the fair over the four hours. By having the users fill out the raffle information, they were able to interact with library staff in a different way that wasn’t just about them coming for information or help.

After the fair, they looked at the sessions and searches of the resources that were represented at the fair, and compared the monthly stats from the previous year. However, there is no way to determine whether the fair had a direct impact on increases (and the few decreases).

In and of itself, the event created publicity for the library. And, because it was free (minus staff time), they don’t really need to provide solid support for the success (or failure) of the event.

Some of the vendors didn’t take it seriously and showed up late. They thought that it was a waste of their time to talk about only the resources the library already purchases, rather than pushing new sales, and it’s doubtful those vendors will be invited back. It may be better to try to schedule it around the time of your state library conference, if that happens nearby, so the vendors may already be close and not making a special trip.

ER&L 2010: Opening Keynote – Librarians in the Wild: Thinking About Security, Privacy, and Digital Information

Speaker: Lance Hayden, Assistant Instructor, School of Information – University of Texas

He spent six years with the CIA, after that he attended the UT iSchool, which was followed by working with Cisco Systems on computer security issues. The team he works with does “ethical hacking” – companies hire them to break into their systems to find the holes that need to be filled so that the real bad guys can’t get in.

Many of us are not scared enough. We do things online that we wouldn’t do in the real world. We should be more aware of our digital surroundings and security.

In computer security, “the wild” refers to things that happen in the real world (as opposed to the lab). In cyberspace, the wild and civilization are not separate – the are co-located. Civilization is confidentiality, integrity, and availability. We think that our online communities are entirely civilized, but we are too trusting.

The point is, if you’re not careful about keeping your virtual houses secure, then you’re leaving yourself open to anyone coming in through the windows or the basement door you never lock.

Large herds attract big predators. As more people are connected to a network or virtual house, the motivation to hit it goes up. Part of why Macs seem more secure than Windows machines is because there is a higher ROI for attacking Windows due to the higher number of users. Hacking has gone from kids leaving graffiti to organized crime exploiting users.

Structures decay quickly. The online houses we have built out of software that lives on real-world machines. There are people every day finding vulnerabilities they can exploit. Sometimes they tell the manufacturers/vendors, sometimes they don’t. We keep adding more things to the infrastructure that increases the possibility of exposing more. The software or systems that we use are not monolithic entities – they are constructed with millions of lines of code. Trying to find the mistake in the line of code is like trying to find a misplaced semicolon in War and Peace. It’s more complex than “XYZ program has a problem.”

Protective spells can backfire. Your protective programs and security systems need to be kept up to date or they can backfire. Make sure that your magic is tight. Online shopping isn’t any less safe, because the vulnerabilities are more about what the vendor has in their system (which can be hacked) than about the connection. Your physical vendor has the same information, often on computer systems that can be hacked.

Knowledge is the best survival trait (or, ignorance can get you eaten). Passwords have been the bane of security professionals since the invention of the computer. When every single person in an institution has a password that is a variation on a template, it’s easy to hack. [side note: The Help Desk manager at MPOW recommends using a personalized template and just increasing the number at the end every time they have the required password change. D’oh!] The nature of passwords is that you can’t pick one that is completely secure. What you’re trying to do is to have secure enough of a password to dissuade most people except the most persistent. Hayden suggests phrases and then replace characters with numbers, and make it longer because it increases the number of possible characters required to hack it.

Zuckerberg says that people don’t care about privacy anymore, so don’t blame Facebook, but to a certain extent, Facebook is responsible for changing those norms. Do companies like Google have any responsibility to protect your information? Hayden’s students think that because Google gives them things for free, they don’t care about the privacy of their information and in fact expect that Google will use it for whatever they want.

IL2009: Connecting Through “Lights, Cameras & Action”

Speaker: Sean Robinson

Stories are essentially a contract between the author and the listener, and filmmaking is about storytelling. Before you start filming, have a story in mind, whether it’s a PSA or something more involved. Stories have beginnings, middles, and endings. You have three choices: comedy, tragedy, or drama — pick one or combine them.

Vade Mecum (take a book with you) was shot on a Canon PowerShot A570. 6,000 photos were shot and edited together with a soundtrack. You can do that with the stories you want to share.

Speakers: Michael Porter & David Lee King

Over 600 images were submitted from about 400 people. There are already over 1700 fans of the Facebook page.

The video looks really cool. I need to watch it again to read the words ’cause I was so focused on seeing all the photos. Go check out the website at Libraryman.com and watch it yourself. The point is, they think there are 101 resources and things that librarians should know. Add to it!

IL2009: Growing & Grown-Up Digital: Next-Gen Speaks

Facilitator: Stephen Abram
Panel: two high-school students, a college student, and the teen services librarian from the local public library

Abrams has asked that folks blogging or tweeting to not use the name of the teen participants, as some are under-age and we should act responsibly when creating a digital trail for them.

First question is about music. The college student likes classical, one high school student still likes vinyl and cassette tapes (no iPod), and the other puts music on her USB stick to take with her (along with her iPod). The college student started with illegal downloads, but gained a respect for the musicians, so now he buys music via iTunes. The iPod-weilding high school student has an iTunes account that she uses sometimes, but mostly shares music with friends. The vinyl student buys the physical medium rather than making copies.

What’s in your bag? Surprisingly, two of them carry USB sticks, which I almost never see with the college students at my library.

Is brand important? Yes, if it’s indicative of the quality, which is more important. (Ugg boots and short-shorts = "the Escaho")

How do you use your phone? Keep in contact with family and friends around the world, mostly via text. One high school student uses her phone mainly to take photos and videos.

"Facebook, Myspace, and phone are good places to keep in touch with people, but Twitter is kind of dead." Ouch — I guess it’s all about where your community exists.

Do you create content? The college student writes music and records it, but hasn’t posted it yet.

Do you expect the same or better standard of living than your parents? Everything seems better/easier now. If we use it the right way, everything will be exponentially easier. There are more options available now for careers, and the internet has opened doors of awareness of what could be. Technology is almost overly-available to us, which can be distracting.

Homework? The college student uses voice recognition software to "write" his papers. He uses Google for most research, but will get a book from the library for "older" material. One high school student uses "homework help now" service from the library for online tutoring. The analog high school student avoids the computer and it’s distractions when doing homework. She also uses interlibrary loan & federated search engines, but doesn’t know them by those names. ("It’s like a bajillion Googles, but for information.")

How do you evaluate information? One tries to find other sources to back up the info. Another starts with using library/school authoritative sources. And the other uses the search limiting tools like peer-review only searches, although, again, she doesn’t know it by that name. She also likes to us Opposing Viewpoints.

Wikipedia? Good for big, broad topics, according to some teachers, but others limit information sources to the textbook only. Some teachers recognize that students use it for overviews of topics, but it’s not good to cite it in a paper.

Are online sources good for finding information about things that you would be uncomfortable to talk about with your parents? It’s easier to talk about things with someone you don’t know. Or go to friends first and then verify with online info. "It’s must be true, it’s on the internet!" isn’t true. There are safe, anonymous places around town where people can talk to each other face-to-face.

Video games? The college student doesn’t play, but his friends do. Neither high school student plays, although they did when they were younger (Nintendo 64, Tekken).

Read online? No, it hurts the eyes after a while, and there are too many other distractions online, too. It’s hard to take notes and highlight online books.

Republican, Democrat, or Independent? They seem to all be the same anymore. There aren’t distinctions. We need to review our system and do a CTRL-ALT-DEL reboot. They are concerned with the impact of the meat industry and oil consumption on the environment, as well as the unequal distribution of wealth around the world.

Teen librarian: There are too many groups of teens with too many interests to connect with all of them, so the focus has been to try to provide a space in the library that they can create for themselves.

How do we overcome the emerging prejudices towards Millenials? The Pew research shows that Millenials and Boomers have a huge overlap in interests and activities. We need to stop thinking of them so much as something strange and different.

i like it!

Earlier today, my friend Kaia posted a comment on FriendFeed about wanting to “like” an email she’d received, and it got me thinking.

Due to regular use of FriendFeed, Facebook, and Twitter, I’m getting used to using the “like” or “favorite” options to give my friends a pat on the back without having to say anything witty. There are many instances now when I find myself wishing I could “like” something that doesn’t have the option to do so, particularly when it’s a physical object or person and not some thing on a social-aware site.

So, I set up my first CafePress store, created a design, and now I have “like” buttons and stickers at my disposal, ready to be used whenever they are needed. As I told some friends, I’m thinking of ordering a bunch to hand out at conferences and such. Feel free to do the same.

CIL 2009: Social Network Profile Management

Speaker: Greg Schwartz

Who are you online? Identity is what you say about you and what others say about you. However, it’s more than just that. It includes the things you buy, the tools you use, the places you spend your time, etc.

You do not own your online identity. You can’t control what people find out about you, but you can influence it.

  1. Own your user name. Pick one and stick to it. Even better if you can use your real name. (checkusernames.com)
  2. Join the conversation. Develop your identity by participating in social networks.
  3. Listen. Pay attention to what other people are saying about you.
  4. Be authentic. Ultimately, social networking is about connecting your online identity to your in-person identity.

Speaker: Michael Porter

MP was the project manager for the social tools on WebJunction. It’s designed to be for librarians and library staff.

If you are representing your organization online, be yourself, but also be sensitive to how that could be perceived. Share your library success stories!

Speaker: Sarah Houghton-Jan

Library online identities should be created with a generic email address, should be up-to-date, and should allow comment and interaction with users. Keep the tone personable.

Don’t use multiple identities. Make sure that someone is checking the contact points. You’ll get better results if you disperse the responsibility for library online identities across your institution rather than relying on one person to manage it all.

Speaker: Amanda Clay Powers

People have been telling their stories for a long time, and online social networks are just another tool for doing that. Some people are more comfortable with this than others. It’s our role to educate people about how to manage their online identities, however, our users don’t always know that librarians can help them.

On Facebook, you can manage social data by creating friends lists. This functionality is becoming more important as online social networks grow and expand.

DILO: electronic resources librarian

9:00am Arrive at work. Despite getting to bed early, I still overslept. Great way to start a Monday, I tell you.

9:00-9:20am I was out of the office for most of last week, so I spent some time catching up with my assistant. This also gave my computer plenty of time to boot up.

9:20-9:30am Logged into the network, and then went to get some iced tea from the library coffee shop. It takes several minutes for all of the start-up programs to load, so that’s a perfect time to acquire my first dose of work-time caffeine.

9:30-9:35am Start this post.

9:35-10:20am Sifting through the 100+ new messages in my mailbox from the time while I was gone. I followed-up on the ones that looked urgent while I was out, but the rest were left for today. In the end, three messages went into the to-do category and a few more into the use statistics category. The rest were read and deleted.

10:20-10:45am Filled out an order form for a new database. PDF form is printable only, so this required the use of a typewriter (my handwriting is marginally legible). I also discovered in the middle of the process that I did not have all of the necessary information, which required further investigation and calculations.

10:45-11:05am Sent email reminders to the students LIB 101 class that I will be teaching on Friday. Created a class roster for all four sections I’m teaching this spring.

11:05-11:15am Mental break. Read Twitter and left a birthday greeting for a friend in Facebook.

11:15-11:20am Added use stats login info for a new resource to our ERM and the shared spreadsheet of admin logins that we have been using since before the ERM (still implementing ERM, so it’s best to put it in both places).

11:20-11:25am Processed incoming email.

11:25am-12:40pm Was going to run some errands over my lunch hour, but instead was snagged by some colleagues who were going out to my favorite Mexican restaurant.

12:40-1:00pm Sorting through the email that came in while I was gone. Answered a call from a publisher sales person.

1:00-3:00pm Main Service Desk shift, covering the reference side of it. During the slow times, I accessed my work station PC via remote desktop and worked on the scanned license naming standardization project I started last week. In the process, I’m also breaking apart multiple contracts that were accidentally scanned together. As usual, the busy times involved a sudden influx of in-person, email, and IM questions, most often at the same time.

3:00-3:15pm Got a refill of ice tea from the coffee shop, processed email, and read through the Twitter feed.

3:15-4:00pm Organized recently scanned license agreements and created labels for the folders. Filed the licenses in the file drawer next to my cubicle.

4:00-4:20pm Checked in with co-workers and revised my to-do list.

4:20-5:15pm Responded to email and followed-up on action items related to the recent NASIG executive board meeting.

And that, my friends, is my rather unusual day in the life of an electronic resources librarian. Most of the time, I bounce between actual ER work, meetings, and email.

Read more DILOs like this one.

na-blog-wri-mo?

Recently, I went digging through the archives of this blog to locate something I knew had to be there. I didn’t find it, and I suspect that has to do with things getting lost in the conversion from MovableType to WordPress. *sigh*

Anyway, I ended up reading some of the old link round-up posts I made back in the infancy of this blog, and it got me thinking about how much my approach has changed over time. For link blogging, I’ve started using a mix of Delicious bookmarks and Google Reader shared items, and for general “look at this crazy stuff” kinds of things, I use Twitter, FriendFeed, or Facebook.

What’s left for the blog? Well, short reflective pieces like this, for one. And, of course, there’s the conference session summaries and the “what I wrote for Blogcritics” round-ups. Other than that, I am finding that I have things that I want to write about, but I don’t have the time or energy to form them into anything worthy of public consumption.

Honestly, though, the main reason is that I’ve become rather lazy about the care and feeding of this blog. So, for the rest of this month, I’m going to try to write something here at least a few times each week.

css.php