Click Here to Subscribe
The Technology Conference for Information Age Librarians • March 12-14, 2003 • Washington, DC
General Conference 
Friday, March 14

Track A:
Search Engines
Track B:
Security
Track C:
E-Resources
Track D:
Web Apps & Libraries
Conference
Program

FRIDAY KEYNOTE 

Cybercrimes & Safety Strategies for Internet Librarians
9:00 a.m. – 9:45 a.m.

Jayne Hitchcock, Author, Net Crimes & Misdemeanors

Outmaneuvering online spammers, scammers, and stalkers is not on the top of the list for most Internet librarians, but it should be as we work with our clients in many different environments. This thought-provoking keynote alerts us to the dangers and suggests some key strategies for safe workplaces, encryption, computer protection, and protecting children. This entertaining keynote speaker has learned these strategies firsthand and shares her experiences and knowledge.

Coffee Break — A Chance to Visit the Exhibits 
9:45 a.m. – 10:30 a.m. 


Computers in Libraries 2003 — Fri., March 14 
Track A: Search Engines
Sponsored by ONLINE magazine, this series of sessions covers what every searcher needs to know about search engines. It digs down to show the inner workings of the engines and takes a micro view, discusses new features, and compares the engines. The afternoon sessions take a focused look at Google for power searching, at some of the engines that might take over Google’s leadership role, and then looks at what libraries can learn from Google.

Moderated by
Dee Magnoni, Director, Library/Knowledge Lab, Frank W. Olin College of Engineering

Session A301 — Search Engine Showdown Update
10:30 a.m. – 11:15 a.m.

Greg Notess, Reference Librarian, Montana State University, and Creator, Search Engine Showdown

Expert searcher and industry watchdog Greg Notess looks at the search engine landscape in 2003. He highlights what’s new with Google and AllTheWeb, compares the current crop of major Web search engines, identifies new search engines and search features, and provides a wealth of tips for making the most of your searches when navigating the Net.

Session A302 — Search Engine Overlap: A “Micro” View
11:30 a.m. – 12:15 p.m. 

Ran Hock, Principal, Online Strategies, and Author, The Extreme Searcher’s Guide to Web Search Engines

Search engine users are familiar with the “macro” studies of search engine overlap, providing statistics from hundreds of millions of pages. However, what does overlap mean at the really practical level of our individual searches? Ran Hock takes a case-study approach at the level of an individual search. He dissects how many and what kinds of unique pages you get by searching multiple search engines, how important the additional information is likely to be, if duplicates or near duplicates are a part of the equation, and how consistent the overlap or lack of overlap is. The presentation addresses the central question, “How important is it, in a specific search, that I use more than one search engine?”

Lunch Break — A Chance to Visit the Exhibits 
12:15 p.m. – 1:45 p.m. 

Sessions A303 & A304 — Google Intensive: Power Searching & Beyond
1:45 p.m. – 2:30 p.m. & 3:15 p.m. – 4:00 p.m.

Gary Price, The Virtual Acquisition Shelf & Reference Desk
Chris Sherman, Associate Editor, Search Engine Watch

Gary Price and Chris Sherman, authors of the best-selling book, The Invisible Web, take an in-depth look at advanced search strategies using Google and other Web engines. They suggest many tips and techniques for power searching and then look at “Google busters”—new or newly improved search tools that may blow your favorite engine out of the water.

Coffee Break — A Chance to Visit the Exhibits 
2:30 p.m. – 3:15 p.m. 

Session A305 — Libraries vs. Google: Competing with Google
4:15 p.m. – 5:00 p.m. 

Chris Sherman, Associate Editor, Search Engine Watch
Greg Notess, Creator, Search Engine Showdown

Gary Price, The Virtual Acquisition Shelf & Reference Desk
Ran Hock, Principal, Online Strategies

Should academic or corporate users use the resources of the research library or simply type queries into Google? There are good reasons to believe that libraries offer more, but statistics suggest that users are increasingly choosing Google. What are the libraries’ strengths, and how can their offerings be made easier and more rewarding? How can the traditions of research and scholarship be kept alive? This session analyzes the strengths and weaknesses of the research media and explores how research libraries can enhance their strengths and reduce their weaknesses.


Track A:
Search Engines
Track B:
Security
Track C:
E-Resources
Track D:
Web Apps & Libraries
Conference
Program

Coffee Break — A Chance to Visit the Exhibits 
9:45 a.m. – 10:30 a.m. 
 
Computers in Libraries 2003 — Fri., March 14 
Track B: Security 
Security has become even more important to information professionals over the last year. This track looks at the many aspects of security—security applications in libraries as well as virtual Web applications—and considers the implications of security for access to information and privacy. 

Moderated by Marshall Breeding, Library Technology Officer, Vanderbilt University

Session B301 — Security Primer
10:30 a.m. – 11:15 a.m. 

Marshall Breeding, Library Technology Officer, Vanderbilt University

This overview session looks at all the dimensions of security, some of which are more of a concern to libraries than others. From encryption to dealing with viruses, get a clear picture of both the threats and types of currently available security. Learn what you need to consider in creating strong security measures for your library.

Session B302 — Network Security in Libraries
11:30 a.m. – 12:15 p.m. 

Frank Cervone, Assistant University Librarian for Information Technology, Northwestern University

What is it that actually happens when a network is attacked? With the large investment that libraries have in electronic resources, it is important that librarians understand the threats, vulnerabilities, and legal issues related to computer hacking and network attacks. This session discusses how to keep up with the dynamic vulnerabilities inherent in a network and how to protect your library’s resources. Find out what a computer hack is, learn how to evaluate the various types of software and hardware that provide protection, and understand how to identify sources of potential exposure and develop a plan to close those exposures.

Lunch Break — A Chance to Visit the Exhibits 
12:15 p.m. – 1:45 p.m. 

Session B303 — Where Has All the Data Gone? Database Cleaning and Homeland Security
1:45 p.m. – 2:30 p.m. 

Moderator: Donna Scheeder, Congressional Research Service, Library of Congress
Greg Notess, Reference Librarian, Montana State University, & Author, Government Information on the Internet
Gary D. Bass, OMB Watch

What is the appropriate balance between a citizen’s right to access government information on the Web and national security? What is the current status of efforts to scrub the Web of government information considered by some to be a national security risk? Can the Web ever be scrubbed? What about privacy? How much information is too much information? This is a hot topic sparked by the Bush administration’s war on terror and emphasis on homeland security. Hear a lively discussion on these and other issues regarding government information on the Web.

Coffee Break — A Chance to Visit the Exhibits 
2:30 p.m. – 3:15 p.m. 

Session B304 — Barbarians at the Gate: Securing Your Web Site and Intranet
3:15 p.m. – 4:00 p.m. 

Brian Pomeroy, Assistant Director, Web Technology, The Children’s Hospital of Philadelphia

Computer security, it’s been said, is a process, not a product. Threats are abundant and more serious than ever before ... and often not what you think. Security encompasses a variety of issues: technical, managerial, social, legal, and even political. This session covers the common threats to system security, specifically Web sites and intranets, and some strategies, policies, and procedures for protecting systems from attack and compromise. 

Session B305 — Can You Secure a Public Access Computer Without Third-Party Software? YES!
4:15 p.m. – 5:00 p.m. 

David Anasco, Electronic Services Specialist, Howard County Library

Can you secure a computer for public access use without purchasing expensive third-party software? The answer is yes. Using native security features built in to the Windows NT and Windows 2000 operating systems, libraries can offer customers a secure and still highly usable public access computer. This session discusses why this is more than just a cost-effective solution, but also a workable and secure solution.


Track A:
Search Engines
Track B:
Security
Track C:
E-Resources
Track D:
Web Apps & Libraries
Conference
Program

Coffee Break — A Chance to Visit the Exhibits 
9:45 a.m. – 10:30 a.m. 
 
Computers in Libraries 2003 — Fri., March 14 
Track C: E-Resources 
The challenges and questions surrounding the selection, acquisition, organization, distribution, and management of digital content continue to grow. Should we purchase just the electronic version or the paper? What are the copyright implications? Which of our non-electronic collections should be digitized —and how? The speakers in this track have dealt with these questions in their libraries. Learn from their hard-won experience.

Organized and moderated by Stephen Abram, Micromedia ProQuest

Session C301 — Managing Content and E-Resources on the NIST Virtual Library (NVL)
10:30 a.m. – 11:15 a.m. 

Susan Makar, Research Consultant, National Institute of Standards and Technology (NIST)

In May 2002, the Information Services Division (ISD) of Technology Services (TS) at the National Institute of Standards and Technology (NIST) implemented a content management system that greatly facilitates maintenance of the Division’s Web site, the NIST Virtual Library (NVL). Content on the NVL is managed using an off-the-shelf content management system, eMPower, and an in-house SQL database, the NVL Resource Administration System. Together these systems provide a seamless interface for NVL users, while allowing ISD staff to easily and quickly create and edit Web pages. This session describes the team effort of Reference Services and Information Technology staff in designing, populating, implementing, and maintaining these systems, as well as the training process that allows almost 20 ISD staff members to have ownership of various sections of the NVL.

Session C302 — JPEG2000 for Digital Archiving and Internet Distribution
11:30 a.m. – 12:15 p.m. 

James Janosky, Business Development Manager, Aware, Inc.

The JPEG2000 standard (ISO 15444-1) brings the advantages of advanced wavelet compression techniques to digital archiving without the barriers of proprietary solutions. Preserving rare documents and photographs presents a unique set of requirements that is perfect for JPEG2000. Librarians are trying to balance the need of making Special Collections accessible to the public while preserving them for future generations. JPEG2000 allows you to save a lossless digital archive, extract a highly compressed quality layer from the single master for transmission, and decode the JPEG2000 file in the Web browser. The layered file format supports extracting any quality layer (any effective compression ratio) or any resolution level. Join this session to understand the capabilities of the new JPEG2000 digital image compression standard and how it can be used for digitizing collections for archives and Internet distribution.

Lunch Break — A Chance to Visit the Exhibits 
12:15 p.m. – 1:45 p.m. 

Session C303 — Current Legal Concerns for E-Resources
1:45 p.m. – 2:30 p.m. 

Lesley Ellen Harris, Copyright, Licensing and E-Commerce Attorney and Consultant

This session discusses the current status of licensing and copyright. It covers all the things you need to know to keep you out of trouble by highlighting the current legal landscape and dealing with the implications for librarians.

Coffee Break — A Chance to Visit the Exhibits 
2:30 p.m. – 3:15 p.m. 

Session C304 — Planning for Long-Term Management of Online Learning Resources: A Digital Library Approach
3:15 p.m. – 4:00 p.m. 

Robert Downs, Senior Digital Archivist and Officer of Research, Columbia University

In collaboration with various stakeholders, digital librarians, and others responsible for managing digital resources can create plans to prepare effectively for the long-term management of online learning resource acquisitions. Considerations for planning include the purpose, strategic relevance, scientific validity, pedagogical applicability, currency, usage, usability, hardware dependencies, software requirements, availability, accessibility, security, and intellectual property restrictions associated with each digital resource. Evaluating candidate digital acquisitions in terms of these and related issues can support digital library managers in planning for the levels of service to be provided and in identifying the resource requirements for implementing and sustaining such services.

Session C305 — Digital Metrics & Collections
4:15 p.m. – 5:00 p.m. 

Eric Djiva Kamal, Systems Administrator, Stony Brook University
Andrew White, Assistant Director for Library Information Systems, Stony Brook University
Richard Matthews, Head of Reference and Research Services, Wichita State University Libraries
Susan Gibbons, Digital Initiatives Librarian, University of Rochester, Rush Rhees Library

Academic libraries are facing a crucial need for reliable e-metrics to manage their online collections. The usage reports from publishers are seldom useful for decision-making due to a lack of standards. Eric Kamal and Andrew White demonstrate that local electronic use statistics can be feasibly developed in an open-source environment. Hear their library’s strategies and experiences, and learn their secrets! The second presentation focuses on how to deal with state government publications that increasingly are “born digital” or distributed electronically with their print equivalents less freely available. It addresses models for permanent public access and the state of relevant technology. The third speaker, Susan Gibbons, discusses institutional digital repositories and why libraries should play major roles in these projects. She outlines how to develop a set of local requirements for a software system to run the repository and the different categories of systems available (along with their pros and cons).


Track A:
Search Engines
Track B:
Security
Track C:
E-Resources
Track D:
Web Apps & Libraries
Conference
Program

Coffee Break — A Chance to Visit the Exhibits 
9:45 a.m. – 10:30 a.m. 
 
Computers in Libraries 2003 — Fri., March 14 
Track D: Web Applications & Libraries
This track focuses on libraries as builders and creators of information products and services. Hear about some of these new information services that excite and delight users. Discover how libraries are using personalization, integration with course management systems, and special digital  collections to provide better user services. In some cases libraries need to change workflow behind the scenes to handle electronic resources or consider redesigning Web sites from the bottom up to offer next-generation services. 

Organized and moderated by Darlene Fichter, Data Services Librarian, University of Saskatchewan

Session D301 — The Blogging Explosion—Libraries and Weblogs
10:30 a.m. – 11:15 a.m. 

Darlene Fichter, Data Services Librarian, University of Saskatchewan and columnist, ONLINE magazine

Blogs are a goldmine for “emergent information” on the web. Not only have libraries and librarians started to mine this information, but many have joined the blogging community and become creators of innovative Weblogs. This session discusses how blogs can help you produce instant content for your Web site and market libraries and library services. It covers different types of blogs, popular free and low cost blogging services, as well as new software packages for blogging. Our expert highlights new blog features and add-ons that help you create dynamic resource sites.

Session D302 — Taking MyLibrary to the Next Level: Customizing Library Resources to the Course Level
11:30 a.m. – 12:15 p.m. 

Susan Gibbons, Digital Initiatives Librarian, University of Rochester, Rush Rhees Library

The University of Rochester Libraries has developed a home-grown solution to improve access to library resources that is tailored to individual courses. Built on the concepts behind NCSU’s MyLibrary, a ColdFusion, database driven, open-source program enables bibliographers to link resources to courses at a broad level (all 100-level Sociology courses) and at a specific level (Professor Smith’s Sociology 118). With a click of a mouse, a student gets a Web page of “best library resources,” including books, journals, databases, Web sites, media, and librarian, customized for his/her individual course. Most of the resource information is pulled, on the fly, directly from the integrated library system, eliminating the need to maintain and update two databases. With assistance from in-house usability staff, the University of Rochester Libraries has successfully created a product that is graphically oriented and extremely easy to use.

Lunch Break — A Chance to Visit the Exhibits 
12:15 p.m. – 1:45 p.m. 

Session D303 — Library Site Redesign from the Ground Up: Abbott Labs Case Study
1:45 p.m. – 2:30 p.m. 

Susan M. Jarrell, Senior Systems Analyst, Abbott Laboratories
Betsy Larson, Digital Library Systems Analyst, Abbott Laboratories

Find out what prompted the Abbott Laboratories Library to undertake a redesign project for their Web site. Learn how Abbott recognized and identified critical issues that led to a decision to re-develop the site. Get a bird’s-eye view of the process, including highlights of group brainstorming sessions to jump start the redesign efforts, team composition, use of an external moderator, short-term (6 months) goals, near-long-term (18 months) goals, and long-term dreams (24+ months). Check the pulse—the status of short-term goals—and share their reflections on lessons learned, challenges, and successes.

Coffee Break — A Chance to Visit the Exhibits 
2:30 p.m. – 3:15 p.m. 

Session D304 — Web-Based Application Design: How to Create Designs That Work for Your Employees
3:15 p.m. – 4:00 p.m. 

Eric Hards, Senior Web Designer, Lockheed Martin

More and more organizations are replacing legacy programs with Web-based applications. Many developers are not experienced with designing usable Web applications. This session, for any developer or designer working on Web based applications, provides guidelines for designing usable applications. It focuses on the use of standard design techniques to create applications that result in efficient employee use. Don’t make the mistake of reproducing a text based legacy application on the Web. Users expect more and developers need to understand how to create applications that employees can use quickly.

Session D305 — Library Users Reap the Benefits of Integration: Case Studies
4:15 p.m. – 5:00 p.m. 

Christine Drew, Babson College
David King, IT Project Manager, Kansas City Public Library

In this session, learn how librarians in two organizations have creatively responded to new challenges and how they work with integrated information and tools to serve users better. At Babson College, the liaison librarians implemented a proactive action plan enabling the library’s inclusion into all Blackboard course sites. Through the benefits of access and participation in these sites, librarians now actively engage faculty in improving student information-literacy skills through virtual communities. David King describes the problem faced by Kansas City Public Library’s Special Collections department, which needed to merge three databases of historical information about Kansas City, an OPAC catalog, and over 9,000 static HTML pages into one database. The solution was a single SQL database, with Web-based search capabilities and back-end administrative and data-entry functions.
 


Track A:
Search Engines
Track B:
Security
Track C:
E-Resources
Track D:
Web Apps & Libraries
Conference
Program

 
Information Today, Inc. 
143 Old Marlton Pike • Medford, NJ 08055 
Phone: 609/654-6266 • Fax: 609/654-4309 
E-mail: custserv@infotoday.com
Information Today, Inc. Home Page CIL 2003 Home