7,848 research outputs found

    Reviving the Public Trustee Concept and Applying It to Information Privacy Policy

    Get PDF

    Library Resources: Procurement, Innovation and Exploitation in a Digital World

    Get PDF
    The possibilities of the digital future require new models for procurement, innovation and exploitation. Emma Crowley and Chris Spencer describe the skills staff need to deliver resources in hybrid and digital environments. The chapter demonstrates the innovative ways that librarians use to procure and exploit the wealth of resources available in a digital world. They also describe the technological developments that can be adopted to improve workflow processes and they highlight the challenges faced on this fascinating journey

    The Digital Identity of Graduate Students

    Get PDF
    Graduate students need a digital identity in order to be found by an academic colleague or a future employer. However, the lack of technical skills and familiarity with the necessary digital tools is a handicap even when graduate students use their personal social network accounts. The construction of their own professional brand starts with the choice of the right strategy and tools. Not all graduate students have the same goals, needs, requirements, and skills. Those who are doing a PhD do not need the same digital identity as those who are getting a master’s degree. In fact, their online visibility and their personal and professional goals are different. So the structure of their digital identity and the tools necessary for this identity must also be somewhat different. Furthermore, the use of the right online tools is not always easy to manage. The proper use of a tool and the right content for publication on social media are of prime importance. The use of different platforms such as scholarly social networks or professional social networks must be clearly distinguished. It is true that gaining online visibility helps the graduate student, and not only in his or her personal or professional lives. In the long term, online visibility also helps the institution where the graduate student is enrolled. Therefore, online reputation must be treated carefully

    Who’s Reading Your Wall? The Relationships among User Characteristics, Usage and Attitudes Regarding Official Academic Facebook Sites

    Get PDF
    As social networking websites continue to rise in popularity, their role as a communications tool for academic institutions raises intriguing questions. This is especially true of Facebook, which was originally begun as an exclusively college-based social network. Facebook potentially represents an opportunity to cost-effectively communicate with students, faculty and other members of the college community. The goals of this study were to provide descriptive statistics that might aid in better understanding if students currently do or do not visit academic Facebook pages and why they visit those pages, what is most likely to cause them to visit academic Facebook pages, and how universities might best utilize this tool as a means of communication. The implications of that data could be extremely useful, especially in regards to resource allocation and future university communications

    The Path of Internet Law: An Annotated Guide to Legal Landmarks

    Get PDF
    The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property. Justice Holmes’s classic essay on the path of the law drew upon six centuries of case reports and statutes. In less than twenty-five years, Internet law has created new legal dilemmas and challenges in accommodating new information technologies. Part I is a brief timeline of Internet case law and statutory developments for Internet-related intellectual property (IP) law. Part II describes some of the ways in which the Internet is redirecting the path of IP in a globalized information-based economy. Our broader point is that every branch of substantive and procedural law is adapting to the digital world. Part III is the functional equivalent of a GPS for locating the latest U.S. and foreign law resources to help lawyers, policymakers, academics and law students lost in cyberspace

    The Path of Internet Law: An Annotated Guide to Legal Landmarks

    Get PDF
    The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property. Justice Holmes’s classic essay on the path of the law drew upon six centuries of case reports and statutes. In less than twenty-five years, Internet law has created new legal dilemmas and challenges in accommodating new information technologies. Part I is a brief timeline of Internet case law and statutory developments for Internet-related intellectual property (IP) law. Part II describes some of the ways in which the Internet is redirecting the path of IP in a globalized information-based economy. Our broader point is that every branch of substantive and procedural law is adapting to the digital world. Part III is the functional equivalent of a GPS for locating the latest U.S. and foreign law resources to help lawyers, policymakers, academics and law students lost in cyberspace

    Health sciences libraries and public health education awareness in social media platforms

    Get PDF
    Information sciences in the current social media age cannot be thought of separately from social media platforms. The most popular of these platforms are Facebook and Twitter with regard to free and easy access and use. How can health sciences libraries and medical librarians help the users reach information services using these social media? The principal argument is that academic health sciences libraries should support their users by invoking public health education in social media platforms such as Facebook and Twitter. The Koç University School of Nursing Library’s objective is to use Facebook's insight attribute in order to evaluate how many people can reach public health education information using social media. In order to develop our argument, the methodology was defined by analysing our goals and metrics. This study focused on subject titles such as: injections, breast cancer, diabetics, first aid, hypertension, air pollution, infectious diseases, tuberculosis, quit smoking, cervical cancer, birth control, AIDS, etc. and content management tools such as like, share, timeline, photo post. The aim of this analysis was to discuss how medical libraries can use social media efficiently

    Usage pattern of Facebook among the students of Dhaka University: a study

    Get PDF
    The usage pattern of Facebook by the students of information science and library management (ISLM) department at Dhaka University was studied. Questionnaires were distributed to 160 B.A. (Honours) students of all four years of ISLM Department out of which 139 questionnaires were found usable. The study found that a large number of students create Facebook account after they enter the university. The present study also revealed that personality characteristics, gender, educational level, geographical area and age influence ISLM students’ patterns of Facebook use and their perceptions about Facebook. The findings of this study also indicate that use of Facebook would be a supplementary tool in university education

    Academic and Public Libraries’ Use of Web 2.0 Applications and Services in Mississippi

    Get PDF
    Libraries have guidelines and standards that hold them accountable to be effective institutions (Husid, 2010). The American Library Association’s (ALA) “Library Bill of Rights” sets six basic standards for all libraries to follow. Among other things, these standards encourage libraries to resist forms of censorship, grant access to all types of materials, and resist biases (ALA, 2007). However, as libraries have evolved, so have many of these guidelines and standards with respect to technology specifically. For example, the American Association of School Libraries (AASL) Standards for the 21st Century Learner requires that the students in today’s classroom strive to master technology skills (ALA, 2007). The Young Adult Library Services Association’s (YALSA) Public Library Evaluation Tool and The Competencies for Librarians Serving Youth: Young Adults Deserve the Best supports the use of social networking and Web 2.0 services like blogs and podcasts in the classroom and library (Husid, 2010). The Association of College and Research Libraries (ACRL) Standards for Libraries in Higher Education not only encourages academic libraries to educate students and build a sense of campus community, their principal performance indicator “Discovery” asks libraries to “enable users to discover information in all formats through effective use of technology and organization of knowledge” (ALA, 2011,pg. 9)

    Configuring the Networked Citizen

    Get PDF
    Among legal scholars of technology, it has become commonplace to acknowledge that the design of networked information technologies has regulatory effects. For the most part, that discussion has been structured by the taxonomy developed by Lawrence Lessig, which classifies code as one of four principal regulatory modalities, alongside law, markets, and norms. As a result of that framing, questions about the applicability of constitutional protections to technical decisions have taken center stage in legal and policy debates. Some scholars have pondered whether digital architectures unacceptably constrain fundamental liberties, and what public design obligations might follow from such a conclusion. Others have argued that code belongs firmly on the private side of the public/private divide because it originates in the innovative activity of private actors. In a forthcoming book, the author argues that the project of situating code within one or another part of the familiar constitutional landscape too often distracts legal scholars from more important questions about the quality of the regulation that networked digital architectures produce. The gradual, inexorable embedding of networked information technologies has the potential to alter, in largely invisible ways, the interrelated processes of subject formation and culture formation. Within legal scholarship, the prevailing conceptions of subjectivity tend to be highly individualistic, oriented around the activities of speech and voluntary affiliation. Subjectivity also tends to be understood as definitionally independent of culture. Yet subjectivity is importantly collective, formed by the substrate within which individuality emerges. People form their conceptions of the good in part by reading, listening, and watching—by engaging with the products of a common culture—and by interacting with one another. Those activities are socially and culturally mediated, shaped by the preexisting communities into which individuals are born and within which they develop. They are also technically mediated, shaped by the artifacts that individuals encounter in common use. The social and cultural patterns that mediate the activities of self-constitution are being reconfigured by the pervasive adoption of technical protocols and services that manage the activities of content delivery, search, and social interaction. In developed countries, a broad cross-section of the population routinely uses networked information technologies and communications devices in hundreds of mundane, unremarkable ways. We search for information, communicate with each other, and gain access to networked resources and services. For the most part, as long as our devices and technologies work as expected, we give little thought to how they work; those questions are understood to be technical questions. Such questions are better characterized as sociotechnical. As networked digital architectures increasingly mediate the ordinary processes of everyday life, they catalyze gradual yet fundamental social and cultural change. This chapter—originally published in Imagining New Legalities: Privacy and Its Possibilities in the 21st Century, edited by Austin Sarat, Lawrence Douglas, and Martha Merrill Umphrey (2012)—considers two interrelated questions that flow from understanding sociotechnical change as (re)configuring networked subjects. First, it revisits the way that legal and policy debates locate networked information technologies with respect to the public/private divide. The design of networked information technologies and communications devices is conventionally treated as a private matter; indeed, that designation has been the principal stumbling block encountered by constitutional theorists of technology. The classification of code as presumptively private has effects that reach beyond debates about the scope of constitutional guarantees, shaping views about the extent to which regulation of technical design decisions is normatively desirable. This chapter reexamines that discursive process, using lenses supplied by literatures on third-party liability and governance. Second, this chapter considers the relationship between sociotechnical change and understandings of citizenship. The ways that people think, form beliefs, and interact with one another are centrally relevant to the sorts of citizens that they become. The gradual embedding of networked information technologies into the practice of everyday life therefore has important implications for both the meaning and the practice of citizenship in the emerging networked information society. If design decisions are neither merely technical nor presumptively private, then they should be subject to more careful scrutiny with regard to the kind of citizen they produce. In particular, policy-makers cannot avoid engaging with the particular values that are encoded
    • 

    corecore