Saturday, April 13, 2013


LSC 555 Spring 2013  Blog 5 Web Accessibility and Web 2.0   4/13/13    Linda Gwinn-Casey

            And the King will answer them, “I tell you the truth, just as you did it for one of the least of these brothers or sisters of mine, you did it for me.”  Matthew 25:40

            Universal Design is a growing field; one which seeks to provide access to physical spaces as well as the information world for all users, including those who have a disability.  As a society, we have a legal, ethical, and moral obligation to do so.  As parents, community members, educators, and librarians it is incumbent upon us to do so.  Specifically, “Section 508 of the U.S. Rehabilitation Act requires federal government Web sites to be made accessible to people with disabilities” (Brophy, P. & Craven, J., 2007).

             In LSC 555 Week 11 readings, the concept of Web Access was covered in relation to users who primarily are visually impaired or blind, whose primary obstacles to Web access are the lack of voice-over and ALT text on images to convey meaning (Brophy, P. & Craven, J., 2007).    Authors Brophy and Craven encourage designers to incorporate UD principles into Web page design by incorporating good interface and checkpoints, such as text for non-text entries, effective color combinations, the ability to freeze content, avoidance of pop-ups, provision of skip-navigation links, division of a page into groups, identification of links and use of clearly expressed language (Brophy, P. & Craven, J., 2007).

             In “Making the Right Decisions about Assistive Technology in Your Library”, author Christopher S. Gruder identified that “54% of adults with a disability use the computer” (Guder, 2012, p.15) and that one must consider how the assistive technology will be shared, licensed to one or several computers, to a network,  or to many sites through a USB.  Guder identified several aspects of Assistive Technologies and examples of each:

Screen Reading Technology-JAWS uses keystrokes, converts text to speech or Braille, mouse/monitor not needed;

Magnifying Technology-Zoom Text magnifier, converts text to sound, purchase on USB, enlarges text to screen, user controls;

Literacy Software-Read and Write GOLD, Kurzweil 1000, 3000-dictioanries word predictors, translators, highlighters, speech input and applications for voice command;

Speech Recognition-uses a voice to create documents, navigate web pages;

and Peripheral modifications such as headsets, speakers, microphones.

            After all, someone we care for could become one in the “54% of adults with a disability to use the computer” (Guder, 2012, p.15).

Brophy, P.& Craven, J. (2007).  Web accessibility . Library Trends. 55(4)950-972.

Gruder. (2012).  Making the Right Decisions about Assistive Technology in Your Library.  Library Technology Reports, 48(7), 14-21.

NET Bible (2006)  http://bible.cc/matthew/25-40.htm  Accessed 4/12/13.

 

Web 2.0

            In “Web 2.0 Features in University Library Web Sites”, authors N.S. Harinarayana and  N. Vasantha Raju looked at libraries and how they adopted and adapted what is referred to 2.0 technologies within university libraries.  The authors offered a brief review of terminology.  Ian Davis is credited as stating, “Web 1.0 took people to the information; Web 2.0 will take information to the people” (Harinarayana, N.S. & Raju, V. 2010, p.69).  Tim O’Reilly is credited with the neologism of “Web 2.0”, utilizing existing technologies in a socially interactive way and Michael Casey’s blog librarycrunch is credited with the phrase “Library 2.0” , blending existing technologies in a socially interactive way within library systems (Harinarayana, N.S. & Raju, N.V., 2010, p.69-70).

            The authors conducted studies and came to the conclusion that libraries tend to focus on implementing a small number of Web 2.0 technologies and identified the incorporation of blogs and RSS feeds as popular choices (Harinarayana, N.S. & Raju, N.V., 2010, p.76). The authors sited the growth of user-tagging systems within the University of Pennsylvania Library, referred to as “PennTagg” in conjunction with their OPAC system.  The authors also identified the potential for podcasts in library services, such as in story time for children, information literacy and assistance, teen reviews, music collections, audiobooks, events, databases, and training (Harinarayana, N.S. & Raju, N.V., 2010, p.79).

            Librarians must be wary of utilizing Web 2.0 technologies, as author Nicholas Joint shared in “The Web 2.0 Challenge to Libraries”.  Joint credits librarians as knowing what the users like, but cautions librarians that there are complications in Library 2.0 as “you are mounting an institutional service on an external, non-institutional server” and that “sharing of content must be clean, both technically and legally” (Joint, 2009, p.171).   Librarians would be wise to apply their knowledge of copyright laws, to establish safety protocol for user-sharing as in tagging, and to monitor Web 2.0 applications on a daily basis to avoid the posting of inappropriate comments and/or images.  Perhaps some safeguards, such as having a librarian review tags prior to adding them would give users the opportunity to share while maintaining ethical standards.

 

Sources:

Harinarayana, N.S., &Raju, N.V. (2010). Web 2.0 features in university library web sites.  The Electronic Library, 28(1), 69-88.

Joint, N. (2009). The web 2.0 challenge to libraries.  Library Review, 58(3), 167-175.

 

           

 

 

 

Tuesday, April 2, 2013

Blog 4 Databases, Online Searching, and XML


LSC 555 Spring 2013                          Week 9:  Databases and Online Searching  Week 10: XML

Professor Kim                                     Linda Gwinn-Casey

Blog 4 Week 9  Part 1:  Federated Searching  and Databases-Keys to the Gated Community

            Is the ability to conduct federated searching across a library or digital environment really possible in the most comprehensive of ways today?  Envision a gated community and who has the rights to enter the gate.  If the security guard is off duty, an authorized resident must enter in a code on a keypad or swipe a card.  However, an unauthorized person may be able to use a crowbar to pry open the gates as well.  The former strategy is sanctioned, rule oriented, and seemless;  the latter is not, but the end result is that both strategies ended in access through the gates. Do we want scholarly information to remain proprietary for cardholders, or allow open access with a crowbar?

            In “How Scholarly is Google Scholar?  A Comparison to Library Databases”, authors Howland, Wright, Boughan, and Roberts succinctly identified the strength and weaknesses with regard to scholarly research using both (2009, p. 227).  The heart of the matter in this debate is about the “aboutness” of the information the user is seeking, who possesses the information, and who has access to it as well.  Information, time, and money are all prized commodities in our society today.  “Open source” refers to access that is freely available as in using Google Scholar, but databases are structured contractually and often involve contracts and monies, so the user has to have the key (usually in a form of a membership) to open the gate to these resources.  I surmise that the user would feel a sense of saving time by typing in keywords into a Google search box, which would yield a plethora of results; however, the real time saver would be to access the library database for access to more scholarly resources.

            In their study, the authors cited the merits of Google as relevancy ranking in a large universe of information and superiority in “retrieving appropriate citations” (Howland, Wright, Boughan, and Roberts, 2009, p.232).  The study showed that 76% of Google Scholar searches turned up library database results, in contrast of 47% of database searches that turned up Google Scholar results, justifying why many students use Google first for information gathering (Howland, et al., 2009, p.231-232).

            The authors stated that a database is “limited to its defined title list of content” (Howland, et al., 2009, p.231) and that librarians conduct searches using search queries, unlike users who use natural language (Howland, et al., 2009, p.233).

            How should we enter the gated community of information?  Think of Google Scholar as another tool in the toolbox.  As you reach into the toolbox, notice your library card. Use it to effortlessly open the gates to scholarly information and you will be all set!

Source:

Howland, J.L., Wright, T.C., Boughan, R.A., & Roberts, B.C. (2009). How scholarly is google scholar?  A comparison to library databases.  College & Research Libraries. 70(3), 227-234.

Copyright 2013

 

Blog 4  Week 10  Part 2:    XML- A Recipe for Success!

            Extensible Markup Language (XML) has been described as “design agnostic” by authors David Young in Phillip Madans in “XML:  Why Bother?” The main idea is that content and structure are linked in the digital world, but design is separate in XML; therefore, the same materials can easily be transposed into a wide array of formats.  Young and Madans encourage their readers to consider that “books” includes both digital and print worlds, and that information coded in XML provides more freedom of dissemination of that information because the design is a separate entity.  “When you start with XML, every format, print and digital, can be rendered simultaneously” (Young & Madans, 2009, p.252).

            In “Data Manipulation in an XML-Based Digital Image Library, author Naicheng  Chang illustrated XML as having three layers:  a data access tier (content), a web server tier (structure), and a presentation tier (design).    Chang posed that within an HTML page, XML data can be combined within HTML elements.  “In this sense, XML-enabled databases are likely to be the potential candidates to store and manage XML documents in digital libraries (Chang, 2004, p.71). 

            I liken the three layers to getting the ingredients to bake a favorite dessert:  pie.  The content is your favorite fruit filling (apple, of course!), the structure is in apple slices mixed with sugar, brown sugar, cinnamon and a dash of salt added in to make a syrup, and lastly  the dough.  The dough can take many forms...you may want a pie, a crepe, a pastry, a pancake, waffle or cobbler.  It’s the same filling that is being used, but the finished baked good will differ just as the content of the material is the same, whether it appears in print or digital.

Sources:

Chang, N.  (2005). Data manipulation in an XML-based digital library.  School of Library, Archive and Information Studies,39(1),62-72.

Young, D. & Madans, P. (2009).  Xml:  Why bother?  Publishing Research Quarterly, 25(3), 147-153.