Cybercrimes
& Safety Strategies for Internet Librarians
9:00 a.m. – 9:45
a.m.
Jayne Hitchcock,
Author, Net Crimes & Misdemeanors
Outmaneuvering
online spammers, scammers, and stalkers is not on the top of the list for
most Internet librarians, but it should be as we work with our clients
in many different environments. This thought-provoking keynote alerts us
to the dangers and suggests some key strategies for safe workplaces, encryption,
computer protection, and protecting children. This entertaining keynote
speaker has learned these strategies firsthand and shares her experiences
and knowledge.
Coffee
Break — A Chance to Visit the Exhibits
9:45 a.m. – 10:30
a.m.
Computers
in Libraries 2003 — Fri., March 14
Track A: Search
Engines
|
|
Sponsored by ONLINE magazine,
this series of sessions covers what every searcher needs to know
about search engines. It digs down to show the inner workings of
the engines and takes a micro view, discusses new features, and
compares the engines. The afternoon sessions take a focused look
at Google for power searching, at some of the engines that might
take over Google’s leadership role, and then looks at what libraries
can learn from Google.
Moderated by Dee
Magnoni, Director, Library/Knowledge Lab, Frank W. Olin College
of Engineering
Session
A301 — Search Engine Showdown Update
10:30 a.m. – 11:15
a.m.
Greg Notess,
Reference Librarian, Montana State University, and Creator, Search Engine
Showdown
Expert searcher
and industry watchdog Greg Notess looks at the search engine landscape
in 2003. He highlights what’s new with Google and AllTheWeb, compares the
current crop of major Web search engines, identifies new search engines
and search features, and provides a wealth of tips for making the most
of your searches when navigating the Net.
Session
A302 — Search Engine Overlap: A “Micro” View
11:30 a.m. – 12:15
p.m.
Ran Hock,
Principal, Online Strategies, and Author, The Extreme Searcher’s Guide
to Web Search Engines
Search engine users
are familiar with the “macro” studies of search engine overlap, providing
statistics from hundreds of millions of pages. However, what does overlap
mean at the really practical level of our individual searches? Ran Hock
takes a case-study approach at the level of an individual search. He dissects
how many and what kinds of unique pages you get by searching multiple search
engines, how important the additional information is likely to be, if duplicates
or near duplicates are a part of the equation, and how consistent the overlap
or lack of overlap is. The presentation addresses the central question,
“How important is it, in a specific search, that I use more than one search
engine?”
Lunch
Break — A Chance to Visit the Exhibits
12:15 p.m. – 1:45
p.m.
Sessions
A303 & A304 — Google Intensive: Power Searching & Beyond
1:45 p.m. – 2:30
p.m. & 3:15 p.m. – 4:00 p.m.
Gary Price,
The Virtual Acquisition Shelf & Reference Desk
Chris Sherman,
Associate Editor, Search Engine Watch
Gary Price and
Chris Sherman, authors of the best-selling book, The Invisible Web,
take an in-depth look at advanced search strategies using Google and other
Web engines. They suggest many tips and techniques for power searching
and then look at “Google busters”—new or newly improved search tools that
may blow your favorite engine out of the water.
Coffee
Break — A Chance to Visit the Exhibits
2:30 p.m. – 3:15
p.m.
Session
A305 — Libraries vs. Google: Competing with Google
4:15 p.m. – 5:00
p.m.
Chris
Sherman, Associate Editor, Search Engine Watch
Greg
Notess, Creator, Search Engine Showdown
Gary Price,
The Virtual Acquisition Shelf & Reference Desk
Ran Hock,
Principal, Online Strategies
Should academic
or corporate users use the resources of the research library or
simply type queries into Google? There are good reasons to believe
that libraries offer more, but statistics suggest that users are
increasingly choosing Google. What are the libraries’ strengths,
and how can their offerings be made easier and more rewarding?
How can the traditions of research and scholarship be kept alive?
This session analyzes the strengths and weaknesses of the research
media and explores how research libraries can enhance their strengths
and reduce their weaknesses.
Coffee
Break — A Chance to Visit the Exhibits
9:45 a.m. – 10:30
a.m.
Computers
in Libraries 2003 — Fri., March 14
Track B: Security
|
|
Security has become
even more important to information professionals over the last year. This
track looks at the many aspects of security—security applications in libraries
as well as virtual Web applications—and considers the implications of security
for access to information and privacy.
Moderated by Marshall
Breeding, Library Technology Officer, Vanderbilt University
Session
B301 — Security Primer
10:30 a.m. – 11:15
a.m.
Marshall Breeding,
Library Technology Officer, Vanderbilt University
This overview session
looks at all the dimensions of security, some of which are more of a concern
to libraries than others. From encryption to dealing with viruses, get
a clear picture of both the threats and types of currently available security.
Learn what you need to consider in creating strong security measures for
your library.
Session
B302 — Network Security in Libraries
11:30
a.m. – 12:15 p.m.
Frank
Cervone, Assistant University Librarian for Information Technology,
Northwestern University
What
is it that actually happens when a network is attacked? With the large
investment that libraries have in electronic resources, it is important
that librarians understand the threats, vulnerabilities, and legal issues
related to computer hacking and network attacks. This session discusses
how to keep up with the dynamic vulnerabilities inherent in a network and
how to protect your library’s resources. Find out what a computer hack
is, learn how to evaluate the various types of software and hardware that
provide protection, and understand how to identify sources of potential
exposure and develop a plan to close those exposures.
Lunch
Break — A Chance to Visit the Exhibits
12:15 p.m. – 1:45
p.m.
Session
B303 — Where Has All the Data Gone? Database Cleaning and Homeland Security
1:45 p.m. – 2:30
p.m.
Moderator:
Donna Scheeder, Congressional Research Service, Library of
Congress
Greg Notess,
Reference Librarian, Montana State University, & Author, Government
Information on the Internet
Gary D. Bass, OMB Watch
What
is the appropriate balance between a citizen’s right to access
government information on the Web and national security? What
is the current status of efforts to scrub the Web of government
information considered by some to be a national security risk?
Can the Web ever be scrubbed? What about privacy? How much information
is too much information? This is a hot topic sparked by the Bush
administration’s war on terror and emphasis on homeland security.
Hear a lively discussion on these and other issues regarding government
information on the Web.
Coffee
Break — A Chance to Visit the Exhibits
2:30 p.m. – 3:15
p.m.
Session
B304 — Barbarians at the Gate: Securing Your Web Site and Intranet
3:15 p.m. – 4:00
p.m.
Brian Pomeroy,
Assistant Director, Web Technology, The Children’s Hospital of Philadelphia
Computer security,
it’s been said, is a process, not a product. Threats are abundant and more
serious than ever before ... and often not what you think. Security encompasses
a variety of issues: technical, managerial, social, legal, and even political.
This session covers the common threats to system security, specifically
Web sites and intranets, and some strategies, policies, and procedures
for protecting systems from attack and compromise.
Session
B305 — Can You Secure a Public Access Computer Without Third-Party Software?
YES!
4:15 p.m. – 5:00
p.m.
David Anasco,
Electronic Services Specialist, Howard County Library
Can you secure
a computer for public access use without purchasing expensive third-party
software? The answer is yes. Using native security features built in to
the Windows NT and Windows 2000 operating systems, libraries can offer
customers a secure and still highly usable public access computer. This
session discusses why this is more than just a cost-effective solution,
but also a workable and secure solution.
Coffee
Break — A Chance to Visit the Exhibits
9:45 a.m. – 10:30
a.m.
Computers
in Libraries 2003 — Fri., March 14
Track C: E-Resources
|
|
The challenges and
questions surrounding the selection, acquisition, organization, distribution,
and management of digital content continue to grow. Should we purchase
just the electronic version or the paper? What are the copyright implications?
Which of our non-electronic collections should be digitized —and how? The
speakers in this track have dealt with these questions in their libraries.
Learn from their hard-won experience.
Organized and moderated
by Stephen Abram, Micromedia ProQuest
Session
C301 — Managing Content and E-Resources on the NIST Virtual Library (NVL)
10:30 a.m. – 11:15
a.m.
Susan Makar,
Research Consultant, National Institute of Standards and Technology (NIST)
In May 2002, the
Information Services Division (ISD) of Technology Services (TS) at the
National Institute of Standards and Technology (NIST) implemented a content
management system that greatly facilitates maintenance of the Division’s
Web site, the NIST Virtual Library (NVL). Content on the NVL is managed
using an off-the-shelf content management system, eMPower, and an in-house
SQL database, the NVL Resource Administration System. Together these systems
provide a seamless interface for NVL users, while allowing ISD staff to
easily and quickly create and edit Web pages. This session describes the
team effort of Reference Services and Information Technology staff in designing,
populating, implementing, and maintaining these systems, as well as the
training process that allows almost 20 ISD staff members to have ownership
of various sections of the NVL.
Session
C302 — JPEG2000 for Digital Archiving and Internet Distribution
11:30
a.m. – 12:15 p.m.
James
Janosky, Business Development Manager, Aware, Inc.
The
JPEG2000 standard (ISO 15444-1) brings the advantages of advanced wavelet
compression techniques to digital archiving without the barriers of proprietary
solutions. Preserving rare documents and photographs presents a unique
set of requirements that is perfect for JPEG2000. Librarians are trying
to balance the need of making Special Collections accessible to the public
while preserving them for future generations. JPEG2000 allows you to save
a lossless digital archive, extract a highly compressed quality layer from
the single master for transmission, and decode the JPEG2000 file in the
Web browser. The layered file format supports extracting any quality layer
(any effective compression ratio) or any resolution level. Join this session
to understand the capabilities of the new JPEG2000 digital image compression
standard and how it can be used for digitizing collections for archives
and Internet distribution.
Lunch
Break — A Chance to Visit the Exhibits
12:15 p.m. – 1:45
p.m.
Session
C303 — Current Legal Concerns for E-Resources
1:45 p.m. – 2:30
p.m.
Lesley Ellen
Harris, Copyright, Licensing and E-Commerce Attorney and Consultant
This session discusses
the current status of licensing and copyright. It covers all the things
you need to know to keep you out of trouble by highlighting the current
legal landscape and dealing with the implications for librarians.
Coffee
Break — A Chance to Visit the Exhibits
2:30 p.m. – 3:15
p.m.
Session
C304 — Planning for Long-Term Management of Online Learning Resources:
A Digital Library Approach
3:15 p.m. – 4:00
p.m.
Robert Downs,
Senior Digital Archivist and Officer of Research, Columbia University
In collaboration
with various stakeholders, digital librarians, and others responsible for
managing digital resources can create plans to prepare effectively for
the long-term management of online learning resource acquisitions. Considerations
for planning include the purpose, strategic relevance, scientific validity,
pedagogical applicability, currency, usage, usability, hardware dependencies,
software requirements, availability, accessibility, security, and intellectual
property restrictions associated with each digital resource. Evaluating
candidate digital acquisitions in terms of these and related issues can
support digital library managers in planning for the levels of service
to be provided and in identifying the resource requirements for implementing
and sustaining such services.
Session
C305 — Digital Metrics & Collections
4:15 p.m. – 5:00
p.m.
Eric Djiva Kamal,
Systems Administrator, Stony Brook University
Andrew White,
Assistant Director for Library Information Systems, Stony Brook University
Richard Matthews,
Head of Reference and Research Services, Wichita State University Libraries
Susan Gibbons,
Digital Initiatives Librarian, University of Rochester, Rush Rhees Library
Academic libraries
are facing a crucial need for reliable e-metrics to manage their online
collections. The usage reports from publishers are seldom useful for decision-making
due to a lack of standards. Eric Kamal and Andrew White demonstrate that
local electronic use statistics can be feasibly developed in an open-source
environment. Hear their library’s strategies and experiences, and learn
their secrets! The second presentation focuses on how to deal with state
government publications that increasingly are “born digital” or distributed
electronically with their print equivalents less freely available. It addresses
models for permanent public access and the state of relevant technology.
The third speaker, Susan Gibbons, discusses institutional digital repositories
and why libraries should play major roles in these projects. She outlines
how to develop a set of local requirements for a software system to run
the repository and the different categories of systems available (along
with their pros and cons).
Coffee
Break — A Chance to Visit the Exhibits
9:45 a.m. – 10:30
a.m.
Computers
in Libraries 2003 — Fri., March 14
Track D: Web
Applications & Libraries
|
|
This track focuses
on libraries as builders and creators of information products and services.
Hear about some of these new information services that excite and delight
users. Discover how libraries are using personalization, integration with
course management systems, and special digital collections to provide
better user services. In some cases libraries need to change workflow behind
the scenes to handle electronic resources or consider redesigning Web sites
from the bottom up to offer next-generation services.
Organized and moderated
by Darlene Fichter, Data Services Librarian, University of Saskatchewan
Session
D301 — The Blogging Explosion—Libraries and Weblogs
10:30 a.m.
– 11:15 a.m.
Darlene
Fichter, Data Services Librarian, University of Saskatchewan
and columnist, ONLINE magazine
Blogs are a
goldmine for “emergent information” on the web. Not
only have libraries and librarians started to mine this information,
but many have joined the blogging community and become creators
of innovative Weblogs. This session discusses how blogs can help
you produce instant content for your Web site and market libraries
and library services. It covers different types of blogs, popular
free and low cost blogging services, as well as new software packages
for blogging. Our expert highlights new blog features and add-ons
that help you create dynamic resource sites.
Session
D302 — Taking MyLibrary to the Next Level: Customizing Library Resources
to the Course Level
11:30
a.m. – 12:15 p.m.
Susan
Gibbons, Digital Initiatives Librarian, University of Rochester, Rush
Rhees Library
The
University of Rochester Libraries has developed a home-grown solution to
improve access to library resources that is tailored to individual courses.
Built on the concepts behind NCSU’s MyLibrary, a ColdFusion, database driven,
open-source program enables bibliographers to link resources to courses
at a broad level (all 100-level Sociology courses) and at a specific level
(Professor Smith’s Sociology 118). With a click of a mouse, a student gets
a Web page of “best library resources,” including books, journals, databases,
Web sites, media, and librarian, customized for his/her individual course.
Most of the resource information is pulled, on the fly, directly from the
integrated library system, eliminating the need to maintain and update
two databases. With assistance from in-house usability staff, the University
of Rochester Libraries has successfully created a product that is graphically
oriented and extremely easy to use.
Lunch
Break — A Chance to Visit the Exhibits
12:15 p.m. – 1:45
p.m.
Session
D303 — Library Site Redesign from the Ground Up: Abbott Labs Case Study
1:45 p.m. – 2:30
p.m.
Susan M. Jarrell,
Senior Systems Analyst, Abbott Laboratories
Betsy Larson,
Digital Library Systems Analyst, Abbott Laboratories
Find out what prompted
the Abbott Laboratories Library to undertake a redesign project for their
Web site. Learn how Abbott recognized and identified critical issues that
led to a decision to re-develop the site. Get a bird’s-eye view of the
process, including highlights of group brainstorming sessions to jump start
the redesign efforts, team composition, use of an external moderator, short-term
(6 months) goals, near-long-term (18 months) goals, and long-term dreams
(24+ months). Check the pulse—the status of short-term goals—and share
their reflections on lessons learned, challenges, and successes.
Coffee
Break — A Chance to Visit the Exhibits
2:30 p.m. – 3:15
p.m.
Session
D304 — Web-Based Application Design: How to Create Designs That Work for
Your Employees
3:15 p.m. – 4:00
p.m.
Eric Hards,
Senior Web Designer, Lockheed Martin
More and more organizations
are replacing legacy programs with Web-based applications. Many developers
are not experienced with designing usable Web applications. This session,
for any developer or designer working on Web based applications, provides
guidelines for designing usable applications. It focuses on the use of
standard design techniques to create applications that result in efficient
employee use. Don’t make the mistake of reproducing a text based legacy
application on the Web. Users expect more and developers need to understand
how to create applications that employees can use quickly.
Session
D305 — Library Users Reap the Benefits of Integration: Case Studies
4:15 p.m. – 5:00
p.m.
Christine Drew,
Babson College
David King,
IT Project Manager, Kansas City Public Library
In this session,
learn how librarians in two organizations have creatively responded to
new challenges and how they work with integrated information and tools
to serve users better. At Babson College, the liaison librarians implemented
a proactive action plan enabling the library’s inclusion into all Blackboard
course sites. Through the benefits of access and participation in these
sites, librarians now actively engage faculty in improving student information-literacy
skills through virtual communities. David King describes the problem faced
by Kansas City Public Library’s Special Collections department, which needed
to merge three databases of historical information about Kansas City, an
OPAC catalog, and over 9,000 static HTML pages into one database. The solution
was a single SQL database, with Web-based search capabilities and back-end
administrative and data-entry functions.
|