Searching for "social media library"

library Social Media Strategy

RSS Feed 2.0: The Crux of a Social Media Strategy

This article explains how the University of Nebraska Kearney Calvin T. Ryan Library improved their social media strategy by using an RSS 2.0 feed to update and sync social media tools and create a slideshow on the library’s home page. An example of how to code a well-formed RSS 2.0 feed with XML is given, in addition to PHP, HTML, and JQuery utilized to automate the library home page slideshow.

My note: such use of social media + blog was exactly what I have been proposing to the SCSU library for several years to no avail.

In order to sync content, and coordinate those channels, libraries can turn to enterprise solutions, such as Gremln, Salesforce Marketing Cloud, or Hootsuite; however, a simpler approach is to utilize an RSS (Really Simply Syndication or Rich Site Summary) feed to disseminate content to various social media channels.

using a WordPress blog for news and events in the library that grew to include items of potential interest to the campus community connected to the library. Categories were created to describe posts in more detail, structure content and link related posts, such as “Library Info” or “E-resources”.

see also: http://blog.stcloudstate.edu/ims/2016/03/22/university-web-page/

social media in the library

please have two great articles on the use of social media in the library:
1. Experts as facilitators for the implementation of social media in the library

Vanwynsberghe, H.., Boudry, E.., Verdegem, P.., & Vanderlinde, R.. (2014). Experts as facilitators for the implementation of social media in the library? A social network approach. Library Hi Tech, 32(3), 529-545. doi:10.1108/LHT-02-2014-0015

Excellent article. Apparently, they do things differently in Belgium.

“Social media literacy” (SML) can be defined as not only the practical
and critically cognitive competencies possessed by users of social media, but also the
motivation to employ these media effectively and appropriately for social interaction
and communication on the web (Vanwynsberghe and Verdegem, 2013).

Repeated by me numerous times, but ignored consistently.

p. 530 Therefore, the aim of this study is to empirically assess how a social media expert, or the employee with the most knowledge and skills concerning social media, in the library facilitates, or impedes, the information flow and implementation of social media in the library.
p. 541 The findings suggest that such social media experts play a significant role in either supporting or constraining the information flow and implementation of social media.

5.2 A social media expert plays an important role in the library for spreading
information about social media Unsurprisingly, social media experts are the most central actors for giving social media information; they share more social media information with other librarians and rarely receive information in return. Any information they do receive mostly comes from a person skilled in social media use. The social media expert as the central actor in the information network has the power to facilitate or prevent information exchange about social media (Scott and Carrington, 2012).

this is, if the experts are ALLOWED to participate. What if the social media access is usurped by very few others?

even worse, what if the social media is decentralized across?

++++++++++++++++++++++++++++++++++
2.
Woodsworth, A., & Penniman, W. D. (2015). Current Issues in Libraries, Information Science and Related Fields. Emerald Group Publishing.
https://books.google.com/books?id=yMXrCQAAQBAJ&lpg=PA256&ots=74zfMzv16V&dq=Abigail%20Phillips%20social%20media&pg=PA256#v=onepage&q=Abigail%20Phillips%20social%20media&f=false
Mon, L. and Phillips, A. (2015) ‘The social library in the virtual branch: Serving adults and teens in social spaces’, in Current Issues in Libraries, Information Science and Related Fields. Emerald, pp. 241–268.
The Social Library in the Virtual Branch
p. 256 Lorri Mon and Abigail Phillips. Measuring and Assessing the Results of Social Media Activities
public libraries
at the moment the success is assessed and quantified according the activity by the library and the users.
beyond the activities of viewing, friending, liking, following, commenting, mentioning, and sharing and re-sharing, an important question is: How has this social media activity contributed to furthering the library’s mission, goal, and objectives?
p. 257 Assessing the impact, influence and reach of the library’s social media requires more effort than simply counting followers, friends and likes; e.g. assessing friends or followers as a percentage of the library’s services area.
Planning an impact assessment might involve measuring traffic to the physical library or to specific library web pages before and after FB or Twitter posting, or measuring usage of particular resources before and after a social media promotion.

measuring library outcomes and value

THE VALUE OF ACADEMIC LIBRARIES
A Comprehensive Research Review and Report. Megan Oakleaf

http://www.ala.org/acrl/sites/ala.org.acrl/files/content/issues/value/val_report.pdf

Librarians in universities, colleges, and community colleges can establish, assess, and link
academic library outcomes to institutional outcomes related to the following areas:
student enrollment, student retention and graduation rates, student success, student
achievement, student learning, student engagement, faculty research productivity,
faculty teaching, service, and overarching institutional quality.
Assessment management systems help higher education educators, including librarians, manage their outcomes, record and maintain data on each outcome, facilitate connections to
similar outcomes throughout an institution, and generate reports.
Assessment management systems are helpful for documenting progress toward
strategic/organizational goals, but their real strength lies in managing learning
outcomes assessments.
to determine the impact of library interactions on users, libraries can collect data on how individual users engage with library resources and services.
increase library impact on student enrollment.
p. 13-14improved student retention and graduation rates. High -impact practices include: first -year seminars and experiences, common intellectual experiences, learning communities, writing – intensive courses, collaborative assignments and projects, undergraduate research, Value of Academic Libraries diversity/global learning, service learning/community -based learning, internships, capstone courses and projects

p. 14

Libraries support students’ ability to do well in internships, secure job placements, earn salaries, gain acceptance to graduate/professional schools, and obtain marketable skills.
librarians can investigate correlations between student library interactions and their GPA well as conduct test item audits of major professional/educational tests to determine correlations between library services or resources and specific test items.
p. 15 Review course content, readings, reserves, and assignments.
Track and increase library contributions to faculty research productivity.
Continue to investigate library impact on faculty grant proposals and funding, a means of generating institutional income. Librarians contribute to faculty grant proposals in a number of ways.
Demonstrate and improve library support of faculty teaching.
p. 20 Internal Focus: ROI – lib value = perceived benefits / perceived costs
production of a commodity – value=quantity of commodity produced × price per unit of commodity
p. 21 External focus
a fourth definition of value focuses on library impact on users. It asks, “What is the library trying to achieve? How can librarians tell if they have made a difference?” In universities, colleges, and community colleges, libraries impact learning, teaching, research, and service. A main method for measuring impact is to “observe what the [users] are actually doing and what they are producing as a result”
A fifth definition of value is based on user perceptions of the library in relation to competing alternatives. A related definition is “desired value” or “what a [user] wants to have happen when interacting with a [library] and/or using a [library’s] product or service” (Flint, Woodruff and Fisher Gardial 2002) . Both “impact” and “competing alternatives” approaches to value require libraries to gain new understanding of their users’ goals as well as the results of their interactions with academic libraries.
p. 23 Increasingly, academic library value is linked to service, rather than products. Because information products are generally produced outside of libraries, library value is increasingly invested in service aspects and librarian expertise.
service delivery supported by librarian expertise is an important library value.
p. 25 methodology based only on literature? weak!
p. 26 review and analysis of the literature: language and literature are old (e.g. educational administrators vs ed leaders).
G government often sees higher education as unresponsive to these economic demands. Other stakeholder groups —students, pa rents, communities, employers, and graduate/professional schools —expect higher education to make impacts in ways that are not primarily financial.
p. 29

Because institutional missions vary (Keeling, et al. 2008, 86; Fraser, McClure and
Leahy 2002, 512), the methods by which academic libraries contribute value vary as
well. Consequently, each academic library must determine the unique ways in which they contribute to the mission of their institution and use that information to guide planning and decision making (Hernon and Altman, Assessing Service Quality 1998, 31) . For example, the University of Minnesota Libraries has rewritten their mission and vision to increase alignment with their overarching institution’s goals and emphasis on strategic engagement (Lougee 2009, allow institutional missions to guide library assessment
Assessment vs. Research
In community colleges, colleges, and universities, assessment is about defining the
purpose of higher education and determining the nature of quality (Astin 1987)
.
Academic libraries serve a number of purposes, often to the point of being
overextended.
Assessment “strives to know…what is” and then uses that information to change the
status quo (Keeling, et al. 2008, 28); in contrast, research is designed to test
hypotheses. Assessment focuses on observations of change; research is concerned with the degree of correlation or causation among variables (Keeling, et al. 2008, 35) . Assessment “virtually always occurs in a political context ,” while research attempts to be apolitical” (Upcraft and Schuh 2002, 19) .
 Assessment seeks to document observations, but research seeks to prove or disprove ideas. Assessors have to complete assessment projects, even when there are significant design flaws (e.g., resource limitations, time limitations, organizational contexts, design limitations, or political contexts); whereas researchers can start over (Upcraft and Schuh 2002, 19) . Assessors cannot always attain “perfect” studies, but must make do with “good enough” (Upcraft and Schuh 2002, 18) . Of course, assessments should be well planned, be based on clear outcomes (Gorman 2009, 9- 10) , and use appropriate methods (Keeling, et al. 2008, 39) ; but they “must be comfortable with saying ‘after’ as well as ‘as a result of’…experiences” (Ke eling, et al. 2008, 35) .

+++++++++++++

Tenopir, C. (2012). Beyond usage: measuring library outcomes and value. Library Management33(1/2), 5-13.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dllf%26AN%3d70921798%26site%3dehost-live%26scope%3dsite

methods that can be used to measure the value of library products and services. (Oakleaf, 2010; Tenopir and King, 2007): three main categories

  1. Implicit value. Measuring usage through downloads or usage logs provide an implicit measure of value. It is assumed that because libraries are used, they are of value to the users. Usage of e-resources is relatively easy to measure on an ongoing basis and is especially useful in collection development decisions and comparison of specific journal titles or use across subject disciplines.

do not show purpose, satisfaction, or outcomes of use (or whether what is downloaded is actually read).

  1. Explicit methods of measuring value include qualitative interview techniques that ask faculty members, students, or others specifically about the value or outcomes attributed to their use of the library collections or services and surveys or interviews that focus on a specific (critical) incident of use.
  2. Derived values, such as Return on Investment (ROI), use multiple types of data collected on both the returns (benefits) and the library and user costs (investment) to explain value in monetary terms.

++++++++++++++++++
more on ROI in this IMS blog
http://blog.stcloudstate.edu/ims/2014/11/02/roi-of-social-media/

Zello for library use

learning from real life experience

Today’s report on the use of Zello (http://www.marketwatch.com/story/houston-residents-and-civilians-turn-to-zello-app-to-coordinate-rescue-efforts-2017-08-29) by Houston residents during Hurricane Harvey has parallels with the organizational efforts of using Zello by the Venezuelan people (https://zello.com/channels/k/b2dDl) in 2014. (https://advox.globalvoices.org/2014/02/23/walkie-talkie-app-zello-blocked-in-venezuela/)

Zello, HeyTell and Voxer Make Your Smartphone a Walkie-Talkie (NYT, 2012) are apps for smart phones and mobile devices.
They are free.
They do much more than a physical walkie-talkie (e.g. send visuals, record messages)
They are more environment friendly, since do not require physical presence and so much battery power: https://www.compareninja.com/tables/single/60573

Yo is a similar messaging app: http://blog.stcloudstate.edu/ims/2014/07/09/social-media-yo/

Library and University use:

In 2014, we proposed to the middle management the consideration of Yo as alarm system:

From: Miltenoff, Plamen
Sent: Tuesday, July 08, 2014 9:17 PM
To: ??????, Mark A. <???????@stcloudstate.edu>
Subject: FW: Yo at LRS

Good evening Mark

Based on the article below:

http://www.businessinsider.com/yo-updates-on-israel-missile-attacks-2014-7

The upper management might consider fire and/or tornado alarm app for SCSU students similarly to the one, which the Israelis are using to back up their alarm system.

I am confident that some other US school is already thinking about the same and developing probably the app.

Thanks for considering…

Plamen

++++++++++++++++++

From: Miltenoff, Plamen
Sent: Tuesday, July 8, 2014 8:59 PM
To: ???????, Colette ?????????
Cc: ??????, Joseph
Subject: Yo at LRS

Collette,

I am not sure if this news

http://www.businessinsider.com/yo-updates-on-israel-missile-attacks-2014-7

will increase your interest toward “Yo” since you said that you are not interested in politics

As shared with Joe several months ago about “Zello” being used in Venezuela  (http://www.huffingtonpost.ca/2014/02/21/venezuela-blocks-zello-ap_n_4830452.html ), ingenuity during political events can give us great ideas how to use social media apps in daily work

I would like to ask you again to consider testing Yo and sharing your ideas how we can apply it at LRS
It is worth checking the penetration of Yo among SCSU students and use it.

Thank you and lkng forward to hearing your opinion

Plamen

+++++++++++++++++++

benefits for the library and potentially for the campus:

  1. reduce financial cost: batteries for the walkie talkies and the wear off of the walkie talkie can be replaced by a virtual app (again, apps for each of the three potential candidates are free)
  2. environmentally friendly. Apps are virtual. Walkie talkies are physical
  3. improve productivity. walkie talkie allow only talk. Apps allow: audio, video (images) and text
  4. raise the level of critical thinking (increase productivity by proxy): the use of several media: text, visuals, audio will allow users to think in a wider diapason when troubleshooting and/or doing their tasks
  5. the library can be the sandbox to smooth out details of the application and lessons learned can help replace walkie talkies across campus with 21st century tools and increase productivity campus wide.

+++++++++++++++++++
previous posts on Zello in this IMS blog
http://blog.stcloudstate.edu/ims?s=zello

 

Privacy & Security in Today’s Library

Privacy & Security in Today’s Library by Amigos Library Services

From: Jodie Borgerding [mailto:Borgerding@amigos.org]
Sent: Wednesday, July 05, 2017 3:07 PM
To: Miltenoff, Plamen <pmiltenoff@stcloudstate.edu>
Cc: Nicole Walsh <WALSH@AMIGOS.ORG>
Subject: Proposal Submission for Privacy & Security Conference

Hi Plamen,

Thank you for your recent presentation proposal for the online conference, Privacy & Security in Today’s Library, presented by Amigos Library Services. Your proposal, The role of the library in teaching with technology unsupported by campus IT: the privacy and security issues of the “third-party,” has been accepted. I just wanted to confirm that you are still available to present on September 21, 2017 and if you have a time preference for your presentation (11 am, 12 pm, or 2 pm Central). If you are no longer able to participate, please let me know.

Nicole will be touch with you shortly with additional details and a speaker’s agreement.

Please let me know if you have any questions.

Thanks!
___________________

Jodie Borgerding Consulting & Education Services Manager Amigos Library Services 1190 Meramec Station Road, Suite 207 | Ballwin, MO  63021-6902 800-843-8482 x2897 | 972-340-2897(direct) http://www.amigos.org | borgerding@amigos.org

+++++++++++++++++

Bio

Dr. Plamen Miltenoff is an Information Specialist and Professor at St. Cloud State University. His education includes several graduate degrees in history and Library and Information Science and terminal degrees in education and psychology.

His professional interests encompass social media, multimedia, Web development and design, gaming and gamification, and learning environments (LEs).

Dr. Miltenoff organized and taught classes such as LIB 290 “Social Media in Global Context” (http://web.stcloudstate.edu/pmiltenoff/lib290/) and LIB 490/590 “Digital Storytelling” (http://web.stcloudstate.edu/pmiltenoff/lib490/) where issues of privacy and security are discussed.

Twitter handle @SCSUtechinstruc

Facebook page: https://www.facebook.com/InforMediaServices/

The virtuality of privacy and security on the modern campus:

The role of the library in teaching with technology unsupported by campus IT: the privacy and security issues of the “third-party software” teaching and learning

Abstract/Summary of Your Proposed Session

The virtualization reality changes rapidly all aspects of learning and teaching: from equipment to methodology, just when faculty have finalized their syllabus, they have to start a new, if they want to keep abreast with content changes and upgrades and engagement of a very different student fabric – Millennials.

Mainframes are replaced by microcomputers, microcomputers by smart phones and tablets, hard drives by cloud storage and wearables by IoT. The pace of hardware, software and application upgrade is becoming unbearable for students and faculty. Content creation and methodology becomes useless by the speed of becoming obsolete. In such environment, faculty students and IT staff barely can devote time and energy to deal with the rapidly increasing vulnerability connected with privacy and security.

In an effort to streamline ever-becoming-scarce resources, campus IT “standardizes” campus use of applications. Those are the applications, which IT chooses to troubleshoot campus-wide. Those are the applications recommended to faculty and students to use.

In an unprecedented burgeoning amount of applications, specifically for mobile devices, it is difficult to constraint faculty and students to use campus IT sanctioned applications, especially considering the rapid pace of such applications becoming obsolete. Faculty and students often “stray” away and go with their own choice. Such decision exposes faculty and students, personally, and the campus, institutionally, at risk. In a recent post by THE Journal, attention on campuses is drown to the fact that cyberattacks shift now from mobile devices to IoT and campus often are struggling even with their capability to guarantee cybersecurity of mobile devices on campus. Further, the use of third-party application might be in conflict with the FERPA campus-mandated policies. Such policies are lengthy and complex to absorb, both by faculty and students and often are excessively restrictive in terms of innovative ways to improve methodology and pedagogy of teaching and learning. The current procedure of faculty and students proposing new applications is a lengthy and cumbersome bureaucratic process, which often render the end-users’ proposals obsolete by the time the process is vetted.

Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision-making?

Abstract

The pace of changes in teaching and learning is becoming impossible to sustain: equipment evolves in accelerated pace, the methodology of teaching and learning cannot catch up with the equipment changes and atop, there are constant content updates. In an even-shrinking budget, faculty, students and IT staff barely can address the issues above, less time and energy left to address the increasing concerns about privacy and security.

In an unprecedented burgeoning amount of applications, specifically for mobile devices, it is difficult to constraint faculty and students to use campus IT sanctioned applications, especially considering the rapid pace of such applications becoming obsolete. Faculty and students often “stray” away and go with their own choice. Such decision exposes faculty and students, personally, and the campus, institutionally, at risk. In a recent post by THE Journal (http://blog.stcloudstate.edu/ims/2017/06/06/cybersecurity-and-students/), attention on campuses is drawn to the fact of cyberattacks shifting from mobile devices to IoT but campus still struggling to guarantee cybersecurity of mobile devices on campus. Further, the use of third-party applications might be in conflict with the FERPA campus-mandated policies. Such policies are lengthy and complex to absorb, both by faculty and students and often are excessively restrictive in terms of innovative ways to improve methodology and pedagogy of teaching and learning. The current procedure of faculty and students proposing new applications is a lengthy and cumbersome bureaucratic process, which often render the end-users’ proposals obsolete by the time the process is vetted.

Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision-making?

http://blog.stcloudstate.edu/ims/2017/06/06/cybersecurity-and-students/

Anything else you would like to add

3 take-aways from this session:

  • Discuss and form an opinion about the education-pertinent issues of privacy and security from the broad campus perspective, versus the narrow library one
  • Discuss and form an opinion about the role of the library on campus in terms of the greater issues of privacy and security

Re-examine the thin red line of the balance between standardization and innovation; between the need for security and privacy protection a

++++++++++++++
presentation:
https://www.slideshare.net/aidemoreto/the-virtuality-of-privacy-and-security-on-the 

chat – slide 4, privacy. please take 2 min and share your definition of privacy on campus. Does it differ between faculty and students?  what are the main characteristics to determine privacy

chat – slide 5, security. please take 2 min and share your definition of security on campus regarding electronic activities. Who’s responsibility is security? IT issue [only]?

poles: slide 6, technology unsupported by campus IT, is it worth considering? 1. i am a great believer in my freedom of choice 2. I firmly follow rules and this applies to the use of computer tools and applications 3. Whatever…

chat –  slide 6, why third party applications? pros and cons. E.g. pros – familiarity with third party versus campus-required

pole, slide 6, appsmashing. App smashing is the ability to combine mobile apps in your teaching process. How do you feel about it? 1. The force is with us 2. Nonsense…

pole slide 7 third party apps and the comfort of faculty. How do you see the freedom of using third party apps? 1. All I want, thank you 2. I would rather follow the rules 3. Indifference is my middle name

pole slide 8 Technology standardization? 1. yes, 2. no, 3. indifferent

chat slide 9 if the two major issues colliding in this instance are: standardization versus third party and they have impact on privacy and security, how would you argue for the one or the other?

+++++++++++++++
more on security in education in this IMS blog
http://blog.stcloudstate.edu/ims?s=security

more on privacy in education in this IMS blog
http://blog.stcloudstate.edu/ims?s=privacy

library user

The Library in the Life of the User. Engaging with People Where They Live and Learn

http://www.oclc.org/content/dam/research/publications/2015/oclcresearch-library-in-life-of-user.pdf
p. 18
Library staff
The roles of librarians change with changes in user needs and demands and the technology employed. A survey conducted for Research Libraries UK found skill gaps in nine key areas in which subject librarians could be supporting researchers’ needs. Even though many librarians may want to hire new staff with these skills, a survey found that the reality for most will be training existing staff.
Definitions of library services will change. We need to grow the ways users can engage with whatever they value from libraries, whether papyrus rolls, maker spaces or data management instruction.
p. 19
What is the Unique Selling Point (USP) of libraries vis-à-vis other information service providers?
p. 21
Librarians should measure the effectiveness of services based on the users’ perceptions of success. Librarians also should move beyond surveys of how library space is being used and should conduct structured observations and interviews with the people using the space. It is not enough to know that the various spaces, whether physical or virtual, are busy. Librarians need to understand when and how the spaces are being used.

p. 33 What is Enough? Satisficing Information Needs

Role theory explains that: “When people occupy social positions their behavior is determined mainly by what is expected of that position rather than by their own individual characteristics” (Abercrombie et al., 1994, p. 360).
Rational choice theory is based on the premise that complex social behavior can be understood in terms of elementary individual actions because individual action is the elementary unit of social life. Rational choice theory posits that individuals choose or prefer what is best to achieve their objectives or pursue their interests, acting in their self-interest (Green, 2002). Stated another way, “When faced with several courses of action, people usually do what they believe is likely to have the best overall outcome” (Scott, 2000).
When individuals satisfice, they compare the benefits of obtaining “more information” against the additional cost and effort of continuing to search (Schmid, 2004)
p. 38
This paper examines the theoretical concepts—role theory, rational choice, and satisficing—by attempting to explain the parameters within which users navigate the complex information-rich environment and determine what and how much information will meet their needs.
p. 39
The information-seeking and -searching research that explicitly addresses the topic of “what is good enough” is scant, though several studies make oblique references to the stopping stage, or to the shifting of directions for want of adequate information. Kraft and Lee (1979, p. 50) propose three stopping rules:
1. The satiation rule, “where the scan is terminated only when the user becomes satiated by finding all the desired number of relevant documents”;
2. The disgust rule, which “allows the scan to be terminated only when the user becomes disgusted by having to examine too many irrelevant documents”; and
3. The combination rule, “which allows the user to be seen as stopping the scan if he/she is satiated by finding the desired number of relevant documents or disgusted by having to examine too many irrelevant documents, whichever comes first.”
p. 42
Ellis characterizes six different types of information activities: starting, chaining, browsing, differentiating, monitoring and extracting. He emphasizes the information- seeking activities, rather than the nature of the problems or criteria used for determining when to stop the information search process. In a subsequent article, Ellis (1997) observes that even in the final stages of writing, individuals may continue the search for information in an attempt to answer unresolved questions or to look for new literature.
p. 43
Undergraduate and graduate students
Situations creating the need to look for information (meeting assignment requirements):
• Writing research reports; and
• Preparing presentations.
Criteria used for stopping the information search (fulfilling assignment requirements):
1. Quantitative criteria:
— Required number of citations was gathered;
— Required number of pages was reached;
— All the research questions were answered; and
— Time available for preparing.
2. Qualitative criteria:
— Accuracy of information;
— Same information repeated in several sources;
— Sufficient information was gathered; and
— Concept understood.
Criteria used for stopping the information search (fulfilling assignment requirements):
1. Quantitative criteria:
— Required number of citations was gathered;
— Required number of pages was reached;
— All the research questions were answered; and
— Time available for preparing.
2. Qualitative criteria:
— Accuracy of information;
— Same information repeated in several sources;
— Sufficient information was gathered; and
— Concept understood.
p. 44
Faculty
Situations creating the need to look for information (meeting teaching needs):
• Preparing lectures and presentations;
• Delivering lectures and presentations;
• Designing and conducting workshops;
• Meeting scholarly and research needs; and
• Writing journal articles, books and grant proposals.
Criteria used for stopping the information search (fulfilling teaching needs):
1. Quantitative criteria:
— Time available for: preparing lectures and presentations; delivering lectures
— And presentations; and designing and conducting workshops; and
— Fulfilling scholarly and research needs.
2. Qualitative criteria:
— Every possible synonym and every combination were searched;
— Representative sample of research was identified;
— Current or cutting-edge research was found;
— Same information was repeated;
— Exhaustive collection of information sources was discovered;
— Colleagues’ feedback was addressed;
— Journal reviewers’ comments were addressed; and
— Publisher’s requirements were met.
1. Quantitative criteria for stopping:
— Requirements are met;
— Time constraints are limited; and
— Coverage of material for publication is verified by colleagues or reviewers.
2. Qualitative criteria for stopping:
— Trustworthy information was located;
— A representative sample of sources was gathered;
— Current information was located;
— Cutting-edge material was located;
— Exhaustive search was performed; and
— Exhaustive collection of information sources was discovered.
p. 53

“Screenagers” and Live Chat Reference: Living Up to the Promise

p. 81

Sense-Making and Synchronicity: Information-Seeking Behaviors of Millennials and Baby Boomers

p. 84 Millennials specific generational features pertinent to libraries and information-seeking include the following:

Immediacy. Collaboration. Experiential learning. Visual orientation. Results orientation.  Confidence.
Rushkoff (1996) described the non-linearity of the thinking patterns of those he terms “children of chaos,” coining the term “screenagers” to describe those who grew up surrounded by television and computers (p. 3).
p. 85
Rational choice theory describes a purposive action whereby individuals judge the costs and benefits of achieving a desired goal (Allingham 1999; Cook and Levi 1990; Coleman and Fararo 1992). Humans, as rational actors, are capable of recognizing and desiring a certain outcome, and of taking action to achieve it. This suggests that information seekers rationally evaluate the benefits of information’s usefulness and credibility, versus the costs in time and effort to find and access it.
Role theory offers a person-in-context framework within the information-seeking situation which situates behaviors in the context of a social system (Mead 1934; Marks 1996). Abercrombie, et al. (1994, p. 360) state, “When people occupy social positions their behavior is determined mainly by what is expected of that position rather than by their own individual characteristics.” Thus the roles of information-seekers in the academic environment influence the expectations for performance and outcomes. For example, faculty would be expected to look for information differently than undergraduate students. Faculty members are considered researchers and experts in their disciplines, while undergraduate students are novices and protégés, roles that place them differently within the organizational structure of the academy (Blumer, 2004; Biddle, 1979; Mead, 1934; Marks, 1996; Marks, 1977).

+++++++++++++++++
more on research in this IMS blog
http://blog.stcloudstate.edu/ims?s=research

NMC Horizon Report 2017 Library

NMC Horizon Report > 2017 Library Edition

http://www.nmc.org/publication/nmc-horizon-report-2017-library-edition/

PDF file 2017-nmc-horizon-report-library-EN-20ml00b

p. 26 Improving Digital Literacy

As social networking platforms proliferate and more interactions take place digitally, there are more opportunities for propagation of misinformation, copyright infringement, and privacy breaches.
http://blog.stcloudstate.edu/ims/2017/03/28/fake-news-3/
http://blog.stcloudstate.edu/ims/2017/03/28/fake-news-resources/

p. 34 Embracing the need for radical change

40% of faculty report that their students ” rarely” interact with campus librarians.

Empathy as the Leader’s Path to Change | Leading From the Library, By on October 27, 2016, http://lj.libraryjournal.com/2016/10/opinion/leading-from-the-library/empathy-as-the-leaders-path-to-change-leading-from-the-library/

Empathy as a critical quality for leaders was popularized in Daniel Goleman’s work about emotional intelligence. It is also a core component of Karol Wasylyshyn’s formula for achieving remarkable leadership. Elizabeth Borges, a women’s leadership program organizer and leadership consultant, recommends a particular practice, cognitive empathy.

Leadership in disruptive times, , First Published September 27, 2016, http://journals.sagepub.com/doi/full/10.1177/0340035216658911

What is library leadership?  a library leader is defined as the individual who articulates a vision for the organization/task and is able to inspire support and action to achieve the vision. A manager, on the other hand, is the individual tasked with organizing and carrying out the day-to-day operational activities to achieve the vision.Work places are organized in hierarchical and in team structures. Managers are appointed to administer business units or organizations whereas leaders may emerge from all levels of the hierarchical structures. Within a volatile climate the need for strong leadership is essential.  

Leaders are developed and educated within the working environment where they act and co-work with their partners and colleagues. Effective leadership complies with the mission and goals of the organization. Several assets distinguish qualitative leadership:

Mentoring. Motivation. Personal development and skills. Inspiration and collaboration. Engagement. Success and failure. Risk taking. Attributes of leaders.

Leaders require having creative minds in shaping strategies and solving problems. They are mentors for the staff, work hard and inspire them to do more with less and to start small and grow big. Staff need to be motivated to work at their optimum performance level. Leadership entails awareness of the responsibilities inherent to the roles of a leader. However, effective leadership requires the support of the upper management.

p. 36. Developments in Technology for Academic and Research Libraries

http://horizon.wiki.nmc.org/Horizon+Topics

  1. consumer technologies
  2. Digital strategies are not so much technologies as they are ways of using devices and software to enrich teaching, learning, research and information management, whether inside or outside the library. Effective Digital strategies can be used in both information and formal learning; what makes them interesting is that they transcended conventional ideas to create something that feels new, meaningful, and 21st century.
  3. enabling technologies
    this group of technologies is where substantive technological innovation begins to be visible.
  4. Internet technologies.
  5. learning technologies
  6. social media technologies. could have been subsumed under the consumer technology category, but they have become so ever-present and so widely used in every part of society that they have been elevated to their own category. As well-established as social media is, it continues to evolve at a rapid pace, with new ideas, tools, and developments coming online constantly.
  7. Visualization technologies.  from simple infographics to complex forms of visual data analysis. What they have in common is that they tap the brain’s inherent ability to rapidly process visual information, identify patterns, and sense order in complex situations. These technologies are a growing cluster of tools and processes for mining large data sets, exploring dynamic processes, and generally making the complex simple.

new horizon report 2017 technologies

 

 

p. 38 Big Data
Big data has significant implications for academic libraries in their roles as facilitators and supporters of the research process. big data use in the form of digital humanities research. Libraries are increasingly seeking to recruit for positions such as research data librarians, data curation specialists, or data visualization specialists

p. 40  Digital Scholarship Technologies

digital humanities scholars are leveraging new tools to aid in their work. ubiquity of new forms of communication including social media, text analysis software such as Umigon is helping researchers gauge public sentiment. The tool aggregates and classifies tweets as negative, positive, or neutral.

p. 42 Library Services Platforms

Diversity of format and materials, in turn, required new approaches to content collection and curation that were unavailable in the incumbent integrated library systems (ILS), which are primarily designed for print materials. LSP is different from ILS in numerous ways. Conceptually, LSPs are modeled on the idea of software as a service (SaaS),which entails delivering software applications over the internet.

p. 44 Online Identity.
incorporated  the  management of digital footprints into their programming and resources

simplify the idea of digital footprint as“data about the data” that people are searching or using online. As resident champions for advancing digital literacy,304 academic and research libraries are well-positioned to guide the process of understanding and crafting online identities.

Libraries are becoming integral players in helping students understand how to create and manage their online identities. website includes a social media skills portal that enables students to view their digital presence through the lens in which others see them, and then learn how they compare to their peers.

p. 46  Artificial Intelligence

https://www.semanticscholar.org/

p. 48 IoT

beacons are another iteration of the IoT that libraries have adopted; these small wireless devices transmit a small package of data continuously so that when devices come into proximity of the beacon’s transmission, functions are  triggered based on a related application.340 Aruba Bluetooth low-energy beacons to link digital resources to physical locations, guiding patrons to these resources through their custom navigation app and augmenting the user experience with location-based information, tutorials, and videos.

students and their computer science  professor  have  partnered  with   Bavaria’s State Library to develop a library app that triggers supplementary information about its art collection or other points of interest as users explore the space

+++++++++++++++++++++++++++
more on Horizon Reports in this IMS blog
http://blog.stcloudstate.edu/ims?s=horizon+report

social media and altmetrics

Sugimoto, C. R., Work, S., Larivière, V., & Haustein, S. (2016). Scholarly use of social media and altmetrics: a review of the literature. Retrieved from https://arxiv.org/abs/1608.08112
https://arxiv.org/ftp/arxiv/papers/1608/1608.08112.pdf
One of the central issues associated with altmetrics (short for alternative metrics) is the identification of communities engaging with scholarly content on social media (Haustein, Bowman, & Costas, 2015; Neylon, 2014; Tsou, Bowman, Ghazinejad, & Sugimoto, 2015) . It is thus of central importance to understand the uses and users of social media in the context of scholarly communication.
most identify the following major categori es: social networking, social bookmarking, blogging, microblogging, wikis , and media and data sharing (Gu & Widén -Wulff, 2011; Rowlands, Nicholas, Russell, Canty, & Watkinson, 2011; Tenopir et al., 2013) . Some also conside r conferencing, collaborative authoring, scheduling and meeting tools (Rowlands et al., 2011) or RSS and online documents (Gu & Widén -Wulff, 2011; Tenopir et al., 2013) as social media. The landscape of social media, as well as that of altmetrics, is constantly changing and boundaries with othe r online platforms and traditional metrics are fuzzy. Many online platforms cannot be easily classified and more traditional metrics , such as downloads and mentions in policy documents , have been referred to as altmetrics due to data pr ovider policies.
the Use of social media platforms for by researchers is high — ranging from 75 to 80% in large -scale surveys (Rowlands et al., 2011; Tenopir et al., 2013; Van Eperen & Marincola, 2011) .
but
less than 10% of scholars reported using Twitter (Rowlands et al., 2011) , while 46% used ResearchGate (Van Noorden, 2014) , and more than 55% use d YouTube (Tenopir et al., 2013) —it is necessary to discuss the use of various types of social media separately . Furthermore, there i s a distinction among types of us e, with studies showing higher uses of social media for dissemination, consumption, communication , and promotion (e.g., Arcila -Calderón, Piñuel -Raigada, & Calderín -Cruz, 2013; Van Noorden, 2014) , and fewer instances of use for creation (i.e., using social media to construct scholarship) (British Library et al., 2012; Carpenter, Wetheridge, Tanner, & Smith, 2012; Procter et al., 2010b; Tenopir et al., 2013) .
Frequently mentioned social platforms in scholarly communication research include research -specific tools such as Mendeley, Zotero, CiteULike, BibSonomy, and Connotea (now defunct) as well as general tools such as Delicious and Digg (Hammond, Hannay, Lund, & Scott, 2005; Hull, Pettifer, & Kell, 2008; Priem & Hemminger, 2010; Reher & Haustein, 2010) .
Social data sharing platforms provide an infrastructure to share various types of scholarly objects —including datasets, software code, figures, presentation slides and videos —and for users to interact with these objects (e.g., comment on, favorite, like , and reuse ). Platforms such as Figshare and SlideShare disseminate scholars’ various types of research outputs such as datasets, figures, infographics, documents, videos, posters , or presentation slides (Enis, 2013) and displays views, likes, and shares by other users (Mas -Bleda et al., 2014) . GitHub provides for uploading and stor ing of software code, which allows users to modify and expand existing code (Dabbish, Stuart, Tsay, & Herbsleb, 2012) , which has been shown to lead to enhanced collaboratio n among developers (Thung, Bissyande, Lo, & Jiang, 2013) . As w ith other social data sharing platforms, usage statistics on the number of view and contributions to a project are provided (Kubilius, 2014) . The registry of research data repositories, re3data.org, ha s indexed more than 1,200 as of May 2015 2 . However, only a few of these repositories (i.e. , Figshare, SlideShare and Github) include social functionalities and have reached a certain level of participation from scholars (e.g., Begel, Bosch, & Storey, 2013; Kubilius, 2014) .
Video provide s yet another genre for social interaction and scholarly communication (Kousha, Thelwall, & Abdoli, 2012; Sugimoto & Thelwall, 2013) . Of the various video sharing platforms, YouTube, launched in 2005, is by far the most popular
A study of UK scholars reports that the majority o f respondents engaged with video for scholarly communication purposes (Tenopir et al., 2013) , yet only 20% have ever created in that genre. Among British PhD students, 17% had used videos and podcasts passively for research, while 8% had actively contributed (British Library et al., 2012) .
Blogs began in the mid -1990s and were considered ubiquitous by the mid- 200 0s (Gillmor, 2006; Hank, 2011; Lenhart & Fox, 2006; Rainie, 2005) . Scholarly blogs emerged during this time with their own neologisms (e.g., blogademia , blawgosphere , bloggership) and body of research (Hank, 2011) and were considered to change the exclusive structure of scholarly communication
Technorati, considered t o be on e of the largest ind ex of blogs, deleted their entire blog directory in 2014 3 . Individual blogs are also subject to abrupt cancellations and deletions, making questionable the degree to which blogging meets the permanence criteria of scholarly commu nication (Hank, 2011) .
ResearchBlogging.org (RB) — “an aggregator of blog posts referencing peer -reviewed research in a structured manner” (Shema, Bar -Ilan, & Thelwall, 2015, p. 3) — was launched in 2007 and has been a fairly stable structure in the scholarly blogging environment. RB both aggregates and —through the use of the RB icon — credentials scholarly blogs (Shema et al., 2015) . The informality of the genre (Mewburn & Thomson, 2013) and the ability to circumve nt traditional publishing barr iers has led advocates to claim that blogging can invert traditional academic power hierarchies (Walker, 2006) , allow ing people to construct scholarly identities outside of formal institutionalization (Ewins, 2005; Luzón, 2011; Potter, 2012) and democratize the scientific system (Gijón, 2013) . Another positive characteristic of blogs is their “inherently social” nature (Walker, 2006, p. 132) (see also Kjellberg, 2010; Luzón, 2011 ). Scholars have noted the potential for “communal scholarship” (Hendrick, 2012) made by linking and commenting, calling the platform “a new ‘third place’ for academic discourse” (Halavais, 2006, p. 117) . Commenting functionalities were seen as making possible the “shift from public understanding to public engagement with science” (Kouper, 2010, p. 1) .
Studies have also provided evidence of high rate s of blogging among certain subpopulations: for example, approximately one -third of German university staff (Pscheida et al., 2013) and one fifth of UK doctoral students use blogs (Carpenter et al., 2012) .
Academics are not only producers, but also consumers of blogs: a 2007 survey of medical bloggers foundthat the large majority (86%) read blogs to find medical news (Kovic et al., 2008)

Mahrt and Puschmann (2014) , who defined science blogging as “the use of blogs for science communication” (p. 1). It has been similarly likened to a sp ace for public intellectualism (Kirkup, 2010; Walker, 2006) and as a form of activism to combat perceived biased or pseudoscience (Riesch & Mendel, 2014. Yet, there remains a tension between science bloggers and science journalists, with many science journals dismissing the value of science blogs (Colson, 2011)

.
while there has been anecdotal evidence of the use of blogs in promotion and tenure (e.g., (Podgor, 2006) the consensus seem s to suggest that most institutions do not value blogging as highly as publishing in traditional outlets, or consider blogging as a measure of service rather than research activity (Hendricks, 2010, para. 30) .
Microblogging developed out of a particular blogging practice, wherein bloggers would post small messages or single files on a blog post. Blogs that focused on such “microposts” were then termed “tumblelogs” and were described as “a quick and dirty stream of consciousness” kind of blogging (Kottke, 2005, para. 2)
most popular microblogs are Twitter (launched in 2006), tumblr (launched in 2007), FriendFeed (launched in 2007 and available in several languages), Plurk (launched in 2008 and popular in Taiwan), and Sina Weibo (launched in 2009 and popular in China).
users to follow other users, search tweets by keywords or hashtags, and link to other media or other tweets
.

Conference chatter (backchanneling) is another widely studied area in the realm of scholarly microblogging. Twitter use at conferences is generally carried out by a minority of participants

Wikis are collaborative content management platforms enabled by web browsers and embedded markup languages.
Wikipedia has been advocated as a replacement for traditional publishing and peer review models (Xia o & Askin, 2012) and pleas have been made to encourage experts to contribute (Rush & Tracy, 2010) . Despite this, contribution rates remain low — likely hindered by the lack of explicit authorship in Wikipedia, a cornerstone of the traditional academic reward system (Black, 2008; Butler, 2008; Callaway, 2010; Whitworth & Friedman, 2009) . Citations to scholarly documents —another critical component in the reward system —are increasingly being found i n Wikiped ia entries (Bould et al., 2014; Park, 2011; Rousidis et al., 2013) , but are no t yet seen as valid impact indicators (Haustein, Peters, Bar -Ilan, et al., 2014) .
The altmetrics manifesto (Priem et al., 2010, para. 1) , altmetrics can serve as filters , which “reflect the broad, rapid impact of scholarship in this burgeoning ecosystem”.
There are also a host of platforms which are being used informally to discuss and rate scholarly material. Reddit, for example, is a general topic platform where users can submit, discuss and rate online content. Historically, mentions of scientific journals on Reddit have been rare (Thelwall, Haustein, et al., 2013) . However, several new subreddits —e.g., science subreddit 4 , Ask Me Anything sessions 5 –have recently been launched, focusing on the discussion of scientific information. Sites like Amazon (Kousha & Thelwall, 2015) and Goodreads (Zuccala, Verleysen, Cornacchia, & Engels, 2015) , which allow users to comment on and rate books, has also been mined as potential source for the compilation of impact indicators
libraries provide services to support researchers’ use of social media tools and metrics (Lapinski, Piwowar, & Priem, 2013; Rodgers & Barbrow, 2013; Roemer & Borchardt, 2013). One example is Mendeley Institutional Edition, https://www.elsevier.com/solutions/mendeley/Mendeley-Institutional-Edition, which mines Mendeley documents, annotations, and behavior and provides these data to libraries (Galligan & Dyas -Correia, 2013) . Libraries can use them for collection management, in a manner similar to other usage data, such as COUNTER statistics (Galligan & Dyas -Correia, 2013) .
Factors affecting social media use; age, academic rank and status, gender, discipline, country and language,

++++++++++++++++++++++++++
h-index

http://guides.library.cornell.edu/c.php?g=32272&p=203391
https://en.wikipedia.org/wiki/H-index

+++++++++++++
more on altmetrics in this IMS blog:
http://blog.stcloudstate.edu/ims?s=altmetrics

computers in library conference

computers in libraries conference

March 28-30 preconference workshops March 27 hyatt regency crystal city
arlington, va
http://conferences.infotoday.com/documents/221/CIL2017-Advance-Program.pdf

W5: Want Media Coverage? Add Press Room to Your Website

9:00 a.m. – 12:00 p.m.

Kathy Dempsey, Editor, Marketing Library Services newsletter Owner, Libraries Are Essential consultancy

Library marketers crave media attention and coverage, but most don’t know how to get it. The first step is having a Press Room as part of your library’s website. This workshop, led by a member of the media who’s also a library marketing expert, shows you how to build a Press Room that works. It includes how your library benefits from having an online Press Room, even if you don’t have a marketing department; where it belongs in your website hierarchy; what content members of the press expect to find there; SEO basics and PR tactics to lead reporters to your online Press Room; why building relationships with the media is vital; how press coverage affects your library’s usage, funding, brand recognition, and position in the community. Help ensure positive coverage by adding this strategic tool to your website.

W8: Video: Hands-On Learning & Practice

9:00 a.m. – 12:00 p.m.

Jennifer E. Burke, President, IntelliCraft Research, LLC

In this half-day workshop, a former advertising executive and trainer of strategic storytelling in marketing shares secrets on how to create video that has an impact on your community. Join her to shoot, edit, and polish a video while gathering tips, techniques, and strategies to create your own video-a medium which grabs communities in exciting new ways!

W10: Implementing an Internet of Things Infrastructure & Apps

9:00 a.m. – 12:00 p.m.

May Chang, Assistant Director, LibraryTechnology, East Carolina University
Mehdi Mohammadi, Graduate Assistant, Western Michigan University

The Internet of Things (IoT) is becoming widespread in academia as well as industry. It refers to connecting smart objects with built-in unique identifiers and sensors to communicate with each other autonomously. This enables actionable insights and ultimately makes the environment around us smarter. This workshop looks at how libraries can incorporate the IoT and reviews different aspects of developing an IoT infrastructure and creating your own application. It is based on four layers of IoT application architecture: the physical layer, the communications layer, application and services layer, and data analytics. Speakers discuss the potentials and challenges of IoT applications, including the footprint of IoT applications, i.e., a high volume of sensory data, the tools and methods for data analytics. As a case study, they focus on location-aware applications using iBeacons and smartphone sensors to show how all the IoT elements work together. Gain a better understanding of the usefulness of IoT in libraries, learn the main elements and underlying technologies of IoT applications, and understand the difference between a wide range of IoT devices, protocols and technologies to choose the right ones for your IoT application. Get budget and resource estimates and more. Come with a basic understanding of JavaScript/ HTML5/ CSS and your laptop for hands-on development practice. An instruction document will be provided for the attendees to prepare their system before the workshop.

W15: Tech Trends for Libraries in 2017 & Beyond

1:00 p.m. – 4:00 p.m.

David Lee King, Digital Services Director, Topeka & Shawnee County Public Library and Publisher, davidleeking.com

Technology has changed the face of libraries and is continuing to change how we work and how we deliver services to customers. This workshop introduces emerging technology trends and shows how those trends are reshaping library services. Examples are provided of how to incorporate these evolving trends into libraries. Attendees learn what trends to look for, find out the difference between a technology trend and a fad, and get ideas on how their library can respond to technology as it emerges.

 

W16: UX Design for Broader Discovery

1:00 p.m. – 4:00 p.m.

Stephanie Rosso, Principal Web Developer, Hennepin County Library
Amy Luedtke, Senior Librarian, Information Programs and Services, Hennepin County Library
Iain Lowe, BiblioCommons Inc.

While patrons have embraced using online technology to access their public library, most of these interactions are limited to borrowing transactions. If libraries are to be truly relevant in the digital world, we need to nudge patrons out of the well-worn pattern of log-in/transact /log-out and find ways to get them to linger long enough to discover the richness the library has to offer beyond borrowing items, while offering them opportunities to add their own voice to the library’s online community. This workshop explores design patterns and techniques for introducing content to patrons at appropriate moments in their learned workflows. It considers how to encourage patrons to add their voice to the library community and overcome concerns about privacy and security. It shares research and experience from BiblioCommons and Hennepin County Public Library’s efforts and looks at analogs from other domains. Workshop participants will be asked to participate actively in a hands-on session to solve a specific design challenge in teams.

My note: Ha. Even the public library understands that service goes beyond “borrowing items” and must have “patrons to add their voice.” Only in the academic library, prevails the opinion that librarians are those omnipotent and all-knowing lecturing types.

B103: Website Redesign: Techniques & Tools

1:15 p.m. – 2:00 p.m.

Dana Haugh, Web Services Librarian, Stony Brook University
Roy Degler, Associate Professor, Digital Library Services, Digital Resources and Discovery Services, Oklahoma State University
Emily R Mitchell, Librarian / Webmaster, SUNY Oswego

Join three web experts to learn about tips, tools, and techniques for taking the pain out of website redesigns. Haugh provides advice on the visual design of your next site and shows some examples of library web redesigns. Degler takes a look at why many libraries are using popular, free, CSS-based frameworks such as Bootstrap; explains how the grid layout works; and shows how the built-in responsive design layouts can deliver a site that works on desktop, smartphones, and tablets. Often the biggest challenge in redesign isn’t the visual design, content management system or coding. It’s the people and politics. Everyone thinks they know what the library website should look like, but no two people—let alone groups—can ever agree. How do you move ahead with a library redesign when you’re facing conflicting demands from the administration, co-workers, users, and stakeholders? Mitchell tackles this challenge head on and points out the weapons that we have at hand—from data to documentation; and discusses how to wield those weapons effectively to win (almost) any fight in order to build a great website. Grab lots of insights and ideas from this experienced panel.

C102: Digital Literacy & Coding Program Models

11:15 a.m. – 12:00 p.m.

Karen Walker, E-Services & Digital Access Manager, Jacksonville Public Library
Brandy McNeil, Associate Director – Tech Education & Training, The New York Public Library
Steven Deolus, Technology Training Program Coordinator, TechConnect (Technology Training Program Department), The New York Public Library

This session looks at how one library created a technology class and programming model that spans a 21-branch, 844-square-mile library system. It discusses mobile classrooms and how Chromebooks, MacBooks, tablets, and other equipment are used to create “classrooms” throughout the system. It shares how the library is focusing on members and programming for the community, for instance, the development of Spanish language, 50+ and immigrant/refugee programming. It looks at developing new programs and instructors using the 3D model from printer to pens, from tablets to coding, from core expertise to everyone. NYPL speakers discuss how coding is the new black! They discuss how to launch a coding program at your library, how to expand the age range of current coding programs, how to promote events related to your program to gain participants, how to get staff buy-in, how to educate staff, and how to create partnerships with some of the biggest names in the game. The NYPL Tech- Connect program will help you plan out all your needs to take your existing or non-existing coding programs further.

My note: one more proof that digital literacy is not “information literacy dressed in the new verbal cloth” of “digital literacy,” but entails way more topics, skills and knowledge. Information Literacy is a 1990s concept. Time to upgrade to 2016 concepts and recognize that digital literacy requires skills beyond handling information. Moreover, information today is way more complex then the skills being taught, since information from social media is more complex then information from news media and it entails technology skills, which one does not have to preside upon for handling news media

E104: From Textbook to Activism: Engaging Students in Social Issues They Care About

2:15 p.m. – 3:00 p.m.

Janie Pickett, Head Librarian, Eureka High School, Eureka, Mo.
Anna Gray, Social Studies Teacher, Eureka High School, Eureka, Mo.

recent collaborative effort between a high school social studies teacher and a school librarian transformed a “same-old” unit on social movements in the 20th century into a dynamic study of effective social activism—and how students can become effective activists. Using both primary and secondary resources, students learned to analyze social issues, then to identify the type of activism that proved effective for those issues. Next, students selected social situations important to them, analyzed the changes they sought to effect, and determined a means of activism to effect that change in practical—and often surprising—ways. The project’s design and implementation is straightforward and replicable. This session provides concrete steps to follow, specific patterns for locating learning resources, and reproducible forms that educators can carry back to their own campuses.

B202: Managing Tech & Innovation

11:45 a.m. – 12:30 p.m.

Jen Baum Sevec, Senior Metadata and Acquisitions Librarian, Library Of Congress
Brett Williams, Systems & Liaison Librarian, University of Toronto Mississauga

Sevec offers leaders at any level the opportunity to up their game by learning current management strategies for technology and innovation. Library leaders and constituents engage in the nearly constant interplay of enabling technology and innovations to explore a wealth of information and greater depth of data in the Information Age. A framework for managing this interplay is provided as well as an understanding of the dynamic lifecycle inherent in technological innovations and constituent demands. Williams provides an introduction to Wardley Value Chain Mapping, an innovative IT planning processes discussed by Simon Wardley on his blog Bits and Pieces. He shares specific examples of how this tool can be used by systems librarians, library administrators, and library IT decision makers.

B203: Finding Your Social Media Voice

1:45 p.m. – 2:30 p.m.

Meghan Kowalski, Head, Preservation, The Catholic University of America
Kirsten Mentzer, Technology Specialist, Northern Virginia Community College’s Medical Education Campus
Alexandra Radocchia Zealand, Web Editor, New Media Developer and Video Producer, Web Team, Arlington Public Library PLA, VLA, ALA, LLAMA
Lennea R. Bower, Program Specialist, Virtual Services, Montgomery County Public Libraries

This session provides an in-depth look at how to speak in social media. Each institution and organization’s social media accounts has a personality. How you say something is just as important as what you say and why you say it. Your voice on social media says a lot to your followers. If done well, your tone will help to attract and keep an audience. The wrong kind of voice will turn people away. Finding the right voice can be difficult and involves a lot of trial and error. Speakers provide tips for finding the right voice and presenting the best personality for your intended followers. Social media is no longer the “new kid on the block,” and the panel highlights the best ways to communicate content, being real, tone, and more. They showcase what kinds of tones can be used and how to find the “real voice” for your accounts, why those voices are (or are not) successful for those accounts; and how to make your chosen voice sustainable and consistent across your accounts.

C203: Migrating & Developing With Drupal

1:45 p.m. – 2:30 p.m.

June Yang, Senior Librarian, International Monetary Fund
Linda Venable, Systems Librarian, International Monetary Fund
Elizabeth Zoby, Information Specialist, PAE, National Institute of Corrections (NIC)
Billy Mathews, Web Developer, PAE, National Institute of Corrections (NIC)

Migrating to a new ILS system is not easy, and it is even more challenging when faced with a very tight deadline. Presenters share the recent experience of migrating from SirsiDynix Symphony to Alma within 5 months: what worked, what didn’t, lessons learned, and what to prepare in advance of the migration. They also share some insight about post migration work related to data cleanup, workflows review, etc. Zoby and Mathews share their development of the NIC micro-sites using Drupal, an open-source content management software, to create dynamic websites that make accessing material easy and user-friendly. Instead of having to download and shift through large PDF documents, users can access the content on easily searchable websites which can be edited by authorized users. See how the NIC Information Center is using these sites to help customers and the public access information in innovative ways.

D202: Funding Opps for Digital Library Initiatives

11:45 a.m. – 12:30 p.m.

Trevor Owens, Digital Archivist, Office of Strategic Initiatives, Library Of Congress
Nicole Ferraiolo, Program Officer, Scholarly Resources, Council on Library & Information Resources
Joel Wurl, Senior Program Officer, National Endowment for the Humanities

Discovering and deciphering guidelines for grant programs is a daunting and challenging process. This session provides an opportunity to directly hear from and ask questions about grant opportunities for digital libraries’ initiatives to program officers from different government and private funders. Following brief overviews of the relevant funding opportunities at their organizations, panelists discuss the kinds of projects that best fit their specific programs. Get suggestions on how to develop a competitive proposal and insights on the application and review process. Panelists consider themes and trends from the digital library projects that have received funding, such as digitization, open educational resources, linked data, crowdsourcing, open access publishing, emulation and virtualization, and data visualization. By bringing together representatives from different funders, this session offers a unique opportunity to connect directly with program officers and identify new opportunities and approaches for funding.

A301: Augmented Reality & Learning

10:45 a.m. – 11:30 a.m.

Ashley Todd-Diaz, Head, Special Collections & University Archives, Towson University
Earl Givens, Head, Systems & Technology, Catawba College
Art Gutierrez, Head, Technical Services, Emporia State University
Bethanie O’Dell, Virtual Learning Librarian, Emporia State University

Just when you thought the battle of augmented reality (AR) was over with Pokémon GO, libraries across the nation have been exploring additional AR options in order to meet the needs of the mobile learners walking through their doors. With the use of free AR software, four individuals team up to become the ultimate masters of AR. Hear from a panel of closely networked professionals, each with a unique story of embedding AR into specific library services directed for higher education. These stories range from embedding AR with liaison departments to incorporating AR into information literacy sessions (both online and face-to-face).

A304: Multimodal Learning: From Textbooks to Playlists

2:45 p.m. – 3:30 p.m.

Laurie Burruss, Professor, Pasadena City College

Colleges, universities, and libraries are considering adding video making, or visual literacy, as a core skill. Preparing individuals for a highly visual communication landscape requires critical thinking to offset consumerism as well as multimodal learning and cognitive skills. Researching, creating, and sharing video playlists are important ways to create personalized learning pathways and promote continuous learning. Explore a number of case studies that demonstrate the positive learning outcomes of multimodal learning in academic and corporate settings and discover how to create playlists that can be annotated, edited, and shared across teams.

B304: Raspberry Pi

2:45 p.m. – 3:30 p.m.

David Bennett, Systems Librarian, Robert Morris University

Raspberry Pi is an inexpensive computing tool that is ideal for new projects within libraries. It’s a powerful single board computer that plays high-definition video, yet it’s only the size of a credit card. The Raspberry Pi 3 was released in February of 2016, and the built-in networking options make it an exciting fit for library applications. Learn how Raspberry Pi can be used as a people counter, a dedicated OPAC, a social media tool, and more.

D302: Upping Our “Gamification”: Speaking Millennials’ Language

11:45 a.m. – 12:30 p.m.

David Folmar, Emerging Technology Librarian, Main Branch, Richmond Public Library Author, Game It Up! Using Gamification to Incentivize Your Library

Be tech-smart and culture-savvy by using game-design thinking and gaming activities to connect with current users in a fun way and draw in new ones. Hear from a library communicator who literally wrote the book on this topic. Online games are incredibly popular; libraries, book apps, and learning institutions are leveraging this to bring in new audiences and engage with existing ones in new ways. Why are they doing this, what is the benefit, and how do you make it work to promote your library? Get the answers here!

D303: Library Story in Video

1:45 p.m. – 2:30 p.m.

Jennifer E. Burke, President, IntelliCraft Research, LLC

Video is a powerful, emotional storytelling medium that plays well in social media, and its use is still fast-growing. Video can spread your library’s story, and you can do it without hiring an expensive pro. A tech-savvy info pro shares basic video facts, along with her favorite tools, tips, and techniques that almost anyone can use for creating short, compelling videos to promote library services, staffers, and resources.

My note: my mouth ran dry to repeat this to the SCSU library. In vain. 1. make a low-cost social-media type of movie of 30 sec each week/month. 2. post on a prominent place on the library web page. 3. Have web form harvest info from patrons on the issu[s] reflected in the video 4. mirror video on the social media 5. aim as ultimate goal patrons (students, faculty, staff) furbishing the video footage instead of library staff
Why is it soooo difficult to comprehend?

E302: Zero to Maker: Invention Literacy & Mobile Memory Lab

11:45 a.m. – 12:30 p.m.

Dominique China, Information Services Librarian, Brampton Library
Colleen Dearborn, Adult Services Librarian, Alsip-Merrionette Park Library, Alsip, Ill.

Invention literacy is not just about understanding how a thing is made or how it works; it is also the ability to use that knowledge to bring one’s own ideas into reality. China gives examples of how one public library is empowering children, teens, and adults to become “invention-literate” through its maker programming. Find out how a combination of high- and low-tech equipment, safe and accessible learning environments, and a unique community partnership is nurturing invention, creative confidence, innovation, and entrepreneurship. Sparked by the CIL 2016 Hawkins and Mears talk about personal digital archiving and the DCPL Memory Lab, Dearborn shares her library’s inexpensive journey to create a mobile memory lab program. She discusses the acquisition of equipment and technology, the demo classes, lesson plans about personal archiving, outreach to other community organizations, and providing classes on related topics, such as saving and uploading images, backing up files and using cloud storage, writing and self-publishing memoirs, conducting oral interviews with veterans and other family memories, coding and saving memories on a website, etc. Future plans include digitizing local history documents, a community website with links to these documents, as well as to our patrons’ digitized images, videos, interviews and memoirs.

+++++++++++++++++++++
more on technology in library in this IMS blog
http://blog.stcloudstate.edu/ims?s=technology+library

1 2 3 9