💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CURRENTCITIES › 2002.13-3 captured on 2022-06-12 at 11:14:09.

View Raw

More Information

-=-=-=-=-=-=-


                               Current Cites
   
                        Volume 13, no. 3, March 2002
                                      
                          Edited by [2]Roy Tennant
                                      
           The Library, University of California, Berkeley, 94720
                             ISSN: 1060-2356 -
        http://sunsite.berkeley.edu/CurrentCites/2002/cc02.13.3.html
   
      Contributors: [3]Charles W. Bailey, Jr., [4]Terry Huwe, [5]Shirl
     Kennedy, [6]Leo Robert Klein, [7]Margaret Phillips, [8]Roy Tennant
   
   Allen, Maryellen. "A Case Study of the Usability Testing of the
   University of South Florida's Virtual Library Interface Design"
   [9]Online Information Review 26(1) (2002): 40-53. - This month's
   addition to the growing literature on usability in libraries concerns
   the trials and tribulations of a Web site redesign at University of
   South Florida Libraries. Both successes and failures are reported as
   the development team refines their testing procedures. Anyone who's
   been through the process of reconciling often highly contradictory
   goals will know how rocky a road a site redesign can be. Hints of
   differences in the literature not only make for interesting reading
   but they also helpfully alert us to challenges we too are likely to
   face when going down the same road. Here the problem was whether to
   use "plain, straightforward language" or "library jargon". Apparently
   library jargon won out. - [10]LRK
   
   Anhang, Abe and Steve Coffman. "The Great Reference Debate"
   [11]American Libraries 33(3) (March 2002): 50-54. - The debate of the
   title is based on the proposition "Be it reolved that reference
   librarians are toast." The authors debated this issue at the Ontario
   Library Association Super Conference in Toronto in February 2001, of
   which this article is a summary. Abe Anhang debates for the
   proposition, while Coffman debates against. As it turns out, they both
   believe that reference librarians "as we know them -- ...who sit
   behind desks for five or six hours a day...waiting for people to walk
   up and ask questions" are toast. If you ignore the non-debate,
   Coffman's part does a good job of identifying six reasons why
   reference librarians definitely are not toast -- as long as we can
   meet our users where and when they want to be served. - [12]RT
   
   Brennan, Christopher and Eileen O'Hara. "Murphy Was a Librarian: a
   Case Study in How Not to Handle a Systems Crash" [13]Computers in
   Libraries 22(3) (March 2002): 10-12,72. - Disaster strikes Drake
   Library at SUNY Brockport when a system glitch vaporizes all the MARC
   records from their bib catalog. Backup was faulty and all they had to
   fall back on was a data-run they had submitted five months earlier to
   an outside organization for the purposes of producing a union catalog.
   The public service message coming out of this article is emphasized
   repeatedly by the authors: communicate with your vendor to make sure
   that effective backup procedures are in place and back up early and
   often. - [14]LRK
   
   Carlson, Scott and Andrea L. Foster. "Colleges Fear Anti-Terrorism Law
   Could Turn Them into Big Brother" [15]Chronicle of Higher Education
   48(25) (March 1, 2002): A31-A32. - Let's take a break from topics like
   the Dublin Core, metadata and XML and consider privacy and
   anti-terrorism in the information age. In October, the USA Patriot Act
   was enacted giving law enforcement extra tools to track suspected
   terrorists including the right to open student computer files or,
   potentially, to see student library records. This kind of invasion of
   privacy, some believe, endangers the "climate of free inquiry"
   traditional to the academic environment. Some universities have
   instituted guidelines for responding to law enforcement requests made
   under the new law. At Cornell, if a staff member is asked by a law
   enforcement agent to disclose information about a student, they should
   first contact the information technology policy advisor who will
   consult with the university's lawyers. In resonse to the Patriot Act,
   the library community with ALA and other library administrators at the
   healm, remains steadfast in its advocacy of privacy rights. - [16]MP
   
   Ellis, John. [17]"All the News That's Fit to Blog" [18]Fast Company
   (April 2002) (http://www.fastcompany.com/online/57/jellis.html). -
   Weblogs are hot, hot, hot. One can only wonder if the enthusiasm for
   them will wane now that they are becoming a mainstream phenomenon. In
   this article, Ellis points out the shortcomings of the "boring
   pundits" who dominate newspaper op-ed pages and political talk shows,
   and compares them (unfavorably, of course) to the lively new world of
   weblogs. Not surprisingly, an increasing number of pundits are taking
   up blogging themselves -- i.e., [19]Andrew Sullivan
   (http://www.andrewsullivan.com/), [20]Virginia Postrel
   (http://www.dynamist.com/scene.html), and [21]Mickey Kaus
   (http://www.kausfiles.com/). There are any number of free tools that
   allow anyone to set up a weblog and begin publishing immediately,
   which naturally results in a lot of swill, but also generates a
   surprising amount of eloquent, dynamic discourse. Bloggers, says
   Ellis, "assume that their readers are as smart as they are, if not
   smarter." And rather than trying to keep you at their site by any
   means necessary, they routinely send you out across the Web by posting
   links from diverse and often obscure sources. The underlying
   technology -- and philosophy -- is peer-to-peer. - [22]SK
   
   Emery, David. [23]"The Nigerian E-Mail Hoax: West African Scammers
   Take to the Net" [24]SFGate (March 14, 2002)
   (http://www.sfgate.com/cgi-bin/article.cgi?file=/gate/archive/2002/03/
   14/nig erscam.DTL) - Probably you've already gotten one (or
   more...many more) of these e-mails, ostensibly from some high official
   in the government of Nigeria, Ghana or another West African country.
   This individual urgently seeks your help in transferring a large chunk
   of the national treasury or whatever into a U.S. bank account. All you
   have to do is send this person your bank account number so he or she
   can transfer the money, and he or she will reward your kindness with
   an attractive percentage. Amazingly, people keep falling for
   variations of this scam; the Secret Service says one percent of the
   people thus solicited will respond, and the U.S. Postal Service
   estimates losses to American citizens of more than $100 million
   annually. Who are these pigeons? "Greed and gullibility obviously
   figure in," as do personality traits like risk-taking, susceptibility
   to flattery or intimidation, and lack of interest in news/current
   events. As you might suspect, the Internet has served as a fertile
   breeding ground for scams of this nature. According to the website
   Internet Fraud Watch (http://www.fraud.org/), "Nigerian Money Offers"
   -- also called "Nigerian Advance-Fee Fraud" or "419 Scam" ("419" being
   the relevant section of the country's criminal code) -- surged up the
   charts last year, from seventh to third place, on the list of the most
   common types of online fraud. Next time you receive one of these
   e-mails, forward it to the Secret Service for inclusion in their
   database: [25]419.fcd@usss.treas.gov. - [26]SK
   
   Kling, Rob, Lisa Spector, and Geoff McKim. [27]Locally Controlled
   Scholarly Publishing via the Internet: The Guild Model. CSI Working
   Paper No. WP-02-01.
   (http://www.slis.indiana.edu/csi/WP/WP02-01B.html). - Kling et al.
   suggest that too little attention has been paid to the working papers
   and technical reports of academic departments (and other research
   units) as a model of free scholarly publishing. The "Guild Model"
   relies on the academic reputation of the sponsoring department to
   establish the reputation of its research manuscript archive. In order
   to publish papers in the archive, authors must be affiliated with the
   department. Individual faculty contributions to a department's archive
   do not undergo peer review; however, their authors have undergone
   "career review" as part of the hiring and tenure process, and this
   establishes their scholarly credentials. This interesting and
   thoughtful paper includes examples of the Guild Model and a
   consideration of its pros and cons.- [28]CB
   
   Kravchyna, V., and Hastings, S. K. [29]Informational Value of Museum
   Web Sites [30]First Monday 7(2) (February 4th 2002)
   (http://www.firstmonday.org/issues/issue7_2/kravchyna/). - This
   article assesses the behavior of users in using museum Web sites, an
   interesting subject for librarians because the experience of users
   with this type of web site charts a truly new application for museums.
   The authors launched an extensive Internet survey of museum users, and
   report on their findings. Among the chief news: most people are used
   to audio and video programs and enjoy these formats on the web, and a
   high percentage or respondents visited a museum web site before
   visiting the museum itself. Obviously, an Internet-using population
   does not tell the whole story of user populations for museum
   directors, but it's an important segment of that population. The
   authors frame this paper as part of a larger investigation into the
   value of museum Web sites, and they make good use of tables and charts
   to illustrate their findings. The authors conclude that their findings
   can help guide database design, metadata creation, and retrieval
   options for museums; indeed, one hopes they're paying attention. -
   [31]TH
   
   McClure, Charles R., R. David Lankes, Melissa Gross, and Beverly
   Choltco-Devlin. [32]Statistics, Measures, and Quality Standards for
   Assessing Digital Reference Library Services: Guidelines and
   Procedures Field Test Draft: March 8, 2002. Syracuse, NY: Information
   Institute of Syracuse, 2002.
   (http://quartz.syr.edu/quality/Field_Test_Draft.pdf). - This manual,
   and its accompanying [33]instructions for field testing
   (http://quartz.syr.edu/quality/FTInstructions.pdf) are still in draft
   form, and the authors invite anyone who wishes to test them to contact
   them for more information. Although digital reference service can
   still be considered to be in its infancy, it's nice to know that as
   libraries begin to develop these services that there will be a common
   metric that can be used to measure the effectiveness of those
   services. - [34]RT
   
   McCord, Alan. [35]"Are You Ready to Discuss IT Outsourcing on Your
   Campus?" [36]EDUCAUSE Quarterly 25(1): 12-19
   (http://www.educause.edu/ir/library/pdf/eqm0212.pdf). - If there's any
   one message to derive from this article, it's that we can't outsource
   away our IT problems. We have to understand them and their true costs
   before even thinking about handing them over to an outside agency.
   Candidates for outsourcing, the author argues, include larger
   'infrastructure' services: networking, server management and security.
   He's pretty even-handed on both the pros and cons of going this route.
   He argues that while IT is essential to our efforts in the academic
   world, it isn't one of our 'core competencies'. His urge for IT
   departments to develop more 'private-sector-like thinking and skills'
   is something everyone can agree with, though where the
   private-sector-like financing will come from is chronically unclear.
   It won't come from outsourcing. Costs there, the author advises, are
   likely to be a tad higher. - [37]LRK
   
   Pantic, Drazen. [38]"Internet the Globalizer, and the Impossibility of
   the Impossibility of the Global Dialog." [39]First Monday 7(1)
   (January 7, 2002)
   (http://www.firstmonday.org/issues/issue7_1/pantic/). - "The world's
   information pool now truly originates in a multitude of sources",
   Pantic says, and no event showed this better than the September 11
   attacks. In the wake of those days in September, the Internet assumed
   a powerful new role as a source of independent and diversified news.
   This article explores that new role and casts the drama of the
   Internet's as change agent as a battle between ideas of modernity and
   local culture. There is evidence, he argues, that a
   "trans-civilizational" dialogue is crying out to be released so much
   so that it may trump cultural behavior such as centralized control of
   media. This brief article succinctly argues that the Internet remains
   surprisingly resilient in the face of censorship efforts, despite the
   tensions between open systems and centralized governments. - [40]TH
   
   Reilly, Bernard J. [41]"What the Cultural Sector Can Learn From Enron"
   [42]First Monday 7(2) (February 4, 2002)
   (http://www.firstmonday.org/issues/issue7_2/reilly/). - The very
   public and messy debacle that engulfed the Enron Corporation is a
   metaphorical jumping-off point for the author's premise that a similar
   hall of cards may be lurking in the non-profit information sectors.
   That's a troubling possibility if there's any weight to it, and Reilly
   argues his case based on one key similarity: libraries, museums and
   other cultural repositories now "trade" in "knowledge" assets as much
   as with the assets themselves. The difference lies in the nature of
   the asset, if any. He poses the question, is there a material
   difference between coal and oil deposits and museum collections?
   Whether you agree or not, this Enron analogy will give you pause.
   "Artistic and cultural products are no longer objects, like books,
   paintings, sculpture...nor are they discrete, self-contained events in
   time, like musical performances, dance performances, and so forth," he
   asserts. The new infrastructure for cultural resources is built out of
   the licenses and contractual agreements protecting them. This "matrix"
   of conditions enables preservation, and even if bits of that matrix
   unravel, preservation strategies may be threatened. After an
   interesting exploration of this theory, he argues for better
   safeguards ("underwriting"): namely, a call for "best practices" in
   contract negotiation and licensing. The message to librarians is, once
   again, that libraries are no longer just places; they are also
   "processes" and matrices of relationships. - [43]TH
   
   Salkever, Alex. [44]"Guard Copyrights, Don't Jail Innovation"
   [45]BusinessWeek Online (27 March 2002)
   (http://www.businessweek.com/bwdaily/dnflash/mar2002/nf20020327_2364.h
   tm). - Imagine a parallel universe where every piece of electronic
   equipment that could utilize or record digital information had
   built-in copy-protection features that allowed content owners to
   completely control how their information was used on that device. Want
   to live there? You will if the [46]Consumer Broadband and Digital
   Television Promotion Act, which was recently introduced by Senator
   Ernest F. Hollings, becomes law. Alex Salkever, the BusinessWeek
   Online Technology Editor, doesn't want to live there, and in this
   insightful article he tells us why. - [47]CB
   
   Tedeschi, Bob. [48]"Is Weblog Technology Here to Stay or Just Another
   Fad?" [49]The New York Times (February 25, 2002)
   (http://www.nytimes.com/2002/02/25/technology/ebusiness/25ECOM.html?ei
   =5040& en=9876919c1afb6ed7&ex=1015304400) - Is the weblog phenomenon
   breaking ground as "a truly new media species," or is it just the
   latest Information Age fad? It depends on who you ask...but there's no
   denying the popularity of these often very personal online journals.
   This article cites a statistic putting the current number of bloggers
   at approximately 500,000. What's fueling this boom are the advances in
   blog technology that make it easy to post short bursts of text
   frequently rather than having to update an entire Web page. Some
   companies see an opportunity in offering and supporting these
   technologies, notably Blogger.com and Userland Software, which hint
   that the next wave of interest in blogging may come from the corporate
   sector. Yet some Webheads remain skeptical, feeling it will ultimately
   prove futile expecting users to return to your weblog site day after
   day to keep up with your latest postings. According to this article,
   one Net consultancy in New York stopped posting to its weblog and
   simply started e-mailing the updated information to interested
   parties. - [50]SK
   
   Zieger, Anne. [51]"Bust the Spam Brigade" [52]IBM developerWorks
   (February 2002)
   (http://www-106.ibm.com/developerworks/library/wi-spam.html) - That
   your e-mail inbox is clogged with swill is bad enough. Alas, this
   article predicts an impending boom in wireless spam -- "Wherever there
   are large groups of networked users, marketing messages are sure to
   follow." But don't rush to toss that cell phone or PDA off the nearest
   bridge just yet. The Good Guys are working on technologies that could
   ameliorate the problem. "Unsolicited commercial messages" of the
   wireless kind have already become a problem in Japan, where carrier
   NTT DoCoMo serves some 30 million subscribers. The "mobile marketing"
   types are chomping at the bit to offer you wireless coupons and other
   come-ons, ultimately based on your geographic location. The official
   party line of this industry's trade group -- yes, they have one; it's
   called the Mobile Marketing Association (formerly the [53]Wireless
   Advertising Association -- http://www.waaglobal.org/) -- is that
   commercial wireless messages should only be sent to consumers who wish
   to receive them. But, as with e-mail spam, "it's not the upstanding
   members of professional associations" who are causing the problem;
   rather, "it's the rogues with the willingness to flout professional
   conventions." The article briefly describes some potential technology
   solutions -- Brightmail's Mthree application, which lets users set
   rules for messages forwarded through wired e-mail gateways; "mobile
   messaging controls" written in Java 2, Micro Edition; and Qualcomm's
   Binary Runtime Environment for Wireless (BREW), "another option for
   those who need to roll their own spam-filtering solution." Links to
   related resources are offered at the end of the article. - [54]SK
     _________________________________________________________________
   
              Current Cites 13(3) (March 2002) ISSN: 1060-2356
    Copyright ? 2002 by the Regents of the University of California All
                              rights reserved.
   
   Copying is permitted for noncommercial use by computerized bulletin
   board/conference systems, individual scholars, and libraries.
   Libraries are authorized to add the journal to their collections at no
   cost. This message must appear on copied material. All commercial use
   requires permission from the editor. All product names are trademarks
   or registered trade marks of their respective holders. Mention of a
   product in this publication does not necessarily imply endorsement of
   the product. To subscribe to the Current Cites distribution list, send
   the message "sub cites [your name]" to
   [55]listserv@library.berkeley.edu, replacing "[your name]" with your
   name. To unsubscribe, send the message "unsub cites" to the same
   address.
   
References

   1. http://sunsite/cgi-bin/imagemap/cc
   2. http://escholarship.cdlib.org/rtennant/
   3. http://info.lib.uh.edu/cwb/bailey.htm
   4. http://www.lib.berkeley.edu/autobiography/thuwe/
   5. http://web.tampabay.rr.com/hooboy/
   6. http://leoklein.com/
   7. http://www.lib.berkeley.edu/autobiography/mphillip/
   8. http://escholarship.cdlib.org/rtennant/
   9. http://www.emeraldinsight.com/1468-4527.htm
  10. http://leoklein.com/
  11. http://www.ala.org/alonline/
  12. http://escholarship.cdlib.org/rtennant/
  13. http://www.infotoday.com/cilmag/ciltop.htm
  14. http://leoklein.com/
  15. http://www.chronicle.com/
  16. http://www.lib.berkeley.edu/autobiography/mphillip/
  17. http://www.fastcompany.com/online/57/jellis.html
  18. http://www.fastcompany.com/
  19. http://www.andrewsullivan.com/
  20. http://www.dynamist.com/scene.html
  21. http://www.kausfiles.com/
  22. http://web.tampabay.rr.com/hooboy/
  23. http://www.sfgate.com/cgi-bin/article.cgi?file=/gate/archive/2002/03/14/nigerscam.DTL
  24. http://www.sfgate.com/
  25. mailto:419.fcd@usss.treas.gov
  26. http://web.tampabay.rr.com/hooboy/
  27. http://www.slis.indiana.edu/csi/WP/WP02-01B.html
  28. http://info.lib.uh.edu/cwb/bailey.htm
  29. http://www.firstmonday.org/issues/issue7_2/kravchyna/
  30. http://www.firstmonday.org/
  31. http://www.lib.berkeley.edu/autobiography/thuwe/
  32. http://quartz.syr.edu/quality/Field_Test_Draft.pdf
  33. http://quartz.syr.edu/quality/FTInstructions.pdf
  34. http://escholarship.cdlib.org/rtennant/
  35. http://www.educause.edu/ir/library/pdf/eqm0212.pdf
  36. http://www.educause.edu/pub/eq/eq.html
  37. http://leoklein.com/
  38. http://www.firstmonday.org/issues/issue7_1/pantic/
  39. http://sunsite/CurrentCites/cc.current.html
  40. http://www.lib.berkeley.edu/autobiography/thuwe/
  41. http://www.firstmonday.org/issues/issue7_2/reilly/
  42. http://www.firstmonday.org/
  43. http://www.lib.berkeley.edu/autobiography/thuwe/
  44. http://www.businessweek.com/bwdaily/dnflash/mar2002/nf20020327_2364.htm
  45. http://www.businessweek.com/
  46. http://www.eff.org/IP/SSSCA_CBDTPA/20020321_s2048_cbdtpa_bill.pdf
  47. http://info.lib.uh.edu/cwb/bailey.htm
  48. http://www.nytimes.com/2002/02/25/technology/ebusiness/25ECOM.html?ei=5040&en=9876919c1afb6ed7&ex=1015304400
  49. http://www.nytimes.com/
  50. http://web.tampabay.rr.com/hooboy/
  51. http://www-106.ibm.com/developerworks/library/wi-spam.html
  52. http://www-106.ibm.com/developerworks/
  53. http://www.waaglobal.org/
  54. http://web.tampabay.rr.com/hooboy/
  55. mailto:listserv@library.berkeley.edu