Google Analytic

Perpustakaan Digital UiTM

Infografik 3 komponen utama Model perpustakaan digital UiTM.

Repositori UiTM

The repository is a platform that contains sources of reference materials for learning and research purposes. The UiTM Library provides three repositories that provide a collection of digital materials through the repository of university institutions, Open Access and Local Content Hub.

My Knowledge Management

MyKM Portal provide the complete information search, categorization and personalization services that allow UiTM Library users to harness the collected enterprise knowledge assets from a single, logical point of access.

UiTM Institutional Repository

UiTM IR is a centre of digital collections, act as an open-access repository that collects, preserve and disseminates scholarly output by university members at Universiti Teknologi MARA.

UiTM LIBRARY MOBILE APP

With the mobile app, you can access information wherever you are and whenever you want to get the latest information on our library, access e-resources and many more.

UiTM DIGITAL SERVICES

22 UiTM Digital Services

Friday, January 13, 2012

Info ICT & Anda - Jenayah & Keselamatan Cyber - Berhati-hati



Salam semua, Tiada masa nak mambaca ,  nak tahu tentang " phishing" ,   "spoofing", "scamming",  dan lain-lain boleh dengar aje, cuma perlu  ada minimum  Windows Media Player, atau Quicktime atau any MP3 Player
http://jpstm.groupsite.com/file_cabinet/158006 Click File 
20120111ict-CyberSave.mp3
Selamat mendengar. 

Right Click this link and Save as
http://jpstm.groupsite.com/uploads/files/x/000/075/52c/20120111ict-CyberSave.mp3?1326442699
more info :
PUTRAJAYA - Kes jenayah siber semakin mengancam masyarakat apabila pihak berkuasa merekodkan 15,218 aduan sepanjang tahun lalu iaitu peningkatan 88 peratus berbanding tahun sebelumnya.
Kes yang paling mendapat perhatian ialah penipuan di Internet dengan melibatkan 5,328 aduan diikuti dengan spam (3,751) dan pencerobohan (3,699).
Menteri Sains, Teknologi dan Inovasi, Datuk Seri Dr. Maximus Ongkili berkata, kesemua aduan tersebut disalurkan kepada Pusat Bantuan Cyber999 yang dikendalikan sepenuhnya oleh CyberSecurity Malaysia.

"Trend ini membimbangkan kerana kalau dibandingkan dengan tahun 2010, jumlah aduan itu telah meningkat lebih 88 peratus," katanya pada Majlis Pelancaran Penyelesaian Sekuriti Internet Perisai di Pusat Konvensyen Antarabangsa Putrajaya (PICC) di sini semalam.
Teks ucapan beliau dibacakan oleh Pengerusi CyberSecurity Malaysia, Tan Sri Mohd. Azumi Mohamed.

Sumber :
http://www.kosmo.com.my/kosmo/content.asp?y=2012&dt=0111&pub=Kosmo&sec=Negara&pg=ne_03.htm 



More About :

Penggodam Organisasi dan Agensi Kerajaan Berjaya Ditangkap!

 


Remaja ketua penggodam ditangkap
WICKFORD, Britain - Polis menangkap seorang remaja di sini, England kerana disyaki menjadi ketua kumpulan penggodam antarabangsa, Lulz Security, yang bertanggungjawab melakukan serangan siber terhadap Agensi Perisikan Pusat (CIA) milik Amerika Syarikat (AS) dan Scotland Yard, lapor sebuah akhbar semalam.


Remaja tempatan berusia 19 tahun itu ditangkap dalam satu operasi bersama melibatkan polis Britain dan Biro Penyiasatan Persekutuan (FBI) juga dari AS.
Suspek kini disoal siasat di bawah Akta Penyalahgunaan Komputer dan Akta Penipuan Britain di sebuah balai polis di pusat bandar London.
"Tangkapan ini susulan siasatan terhadap pencerobohan rangkaian komputer sebilangan organisasi perniagaan dan agensi perisikan oleh kumpulan penggodam sama (Lulz Security)," kata seorang jurucakap Scotland Yard.
Lulz Security mendakwa bertanggungjawab menceroboh sistem komputer beberapa organisasi utama termasuk Agensi Jenayah Berat Terancang Britain, Senat Amerika Syarikat (AS) dan CIA selain firma permainan video Nintendo dan Sony.
Dalam satu mesej di Internet pada Ahad lalu, kumpulan itu mengisytiharkan perang serta-merta dan berterusan terhadap kerajaan dan syarikat keselamatan komputer di serata dunia.
Lulz Security menggesa pengikutnya supaya menceroboh dan merosakkan laman web kerajaan dengan keutamaan untuk mencuri dan mendedahkan maklumat sulit kerajaan termasuk e-mel dan dokumen.
Sasaran utama kumpulan itu adalah bank dan organisasi utama yang lain.
Laman web Agensi Jenayah Organisasi Serius merupakan sasaran terkini kumpulan pengodam tersebut kelmarin. - Agensi

 

Friday, November 11, 2011

Integrasi antara sistem di PTAR dan sistem SIMS UiTM

Integrasi antara sistem di PTAR dan sistem SIMS UiTM

Satu perbincangan tentang keperluan intergrasi bagi data pelajar dan staff  dengan sistem di PTAR seperti ILMU, EQPS, EZacces melalui ezproxy telah diadakan di meja perbincagan JPSTM pada 11 November 2011  

Data pelajar ini secara keseluruhan pelajar seluruh UiTM. Antara yang hadir wakil dari PSMB dan PTAR

Wednesday, October 19, 2011

InfoTech UiTM - TechnoUpdate 5 : UiTM Digital Library Services






HARI INFOTECH
Tarikh : 10 dan 11 Oktober 2011 

Masa : 9:00 pagi hingga 5:30 petang 
Tempat : Anjung Sri Budiman, UiTM Shah Alam 
http://faizar.posterous.com/ptarhari-it-infotech-uitm-2011

9.15 am: Give talk & Quiz in InfoTech UiTM - TechnoUpdate 5 : UiTM Digital Library Services
http://www.slideshare.net/faizar
UiTM Digital Library Services

Thursday, September 15, 2011

Best Jobs in America - Software Architect ranked No. 1

Software Architect
Chaiken, a software engineer for more than two decades, relishes the more collaborative work.
Top 100 rank: 1
Sector: Information Technology

What they do: Like architects who design buildings, they create the blueprints for software engineers to follow -- and pitch in with programming too. Plus, architects are often called on to work with customers and product managers, and they serve as a link between a company's tech and business staffs.

What's to like: The job is creatively challenging, and engineers with good people skills are liberated from their screens. Salaries are generally higher than for programmers, and a typical day has more variety.

"Some days I'll focus on product strategy, and other days I'll be coding down in the guts of the system," says David Chaiken, 46, of Yahoo in Sunnyvale, Calif., whose current projects include helping the web giant customize content for its 600 million users. Even though programming jobs are moving overseas, the face-to-face aspect of this position helps cement local demand.

What's not to like: You are often outside the management chain of command, making it hard to get things done.

Requirements: Bachelor's degree, and either a master's or considerable work experience to demonstrate your ability to design software and work collaboratively.

via :http://money.cnn.com/magazines/moneymag/bestjobs/2010/snapshots/1.html

It-arch-career-map
Advancing IT Architecture Professional Excellence
IT ARCHITECTURE CORE (ITAC) 
Formerly known as IASA Foundation Certified (IFC)
Iasa
About IASA
http://www.iasaglobal.org/iasa/About_Us.asp?SnID=179717337
http://content.iasahome.org/blog/
Architect Core Training (incl. IFC certification) 
Iasa Architect Core provides in-depth guidance for architects at all levels of capabilities that will change your career! 
IASA continues to expand its training course locations worlwide.
Sep. 26th 2011 - Sep. 30th 2011   Kuala Lumpur, Malaysia
Oct.    3rd 2011 - Oct. 7th 2011    Amsterdam, Netherlands
Oct. 10th 2011 - Oct. 14th 2011    Austin, TX, USA
Oct. 24th 2011 - Oct. 28th 2011    Seattle, WA, USA
Dec. 12th 2011 - Dec. 16th 2011   Milan, Italy
Jan. 23rd 2012 - Jan. 27th 2012    Boca Raton, Fl, USA
Please check each listing for more information. 
CITA-P Certification 
Earning a CITA-P Validates your experience as an IT Architect on a global level.  The certification is an industry standard, and the only truly global certification on the breadth of architectural skills and knowledge that is technology and vendor agnostic.
http://www.atdsolution.com/content/msc-malaysia-professional-capability-development
MSC Malaysia Professional Capability Development
MSC Malaysia Professional Capability Development is a programme that provides financial assistance to MSC Malaysia Status Organizations to enhance their local IT Professional’s skills and competency in good practices and emerging technologies by taking up professional certifications. 
 
 
Type of Financial Assistance
Financial assistance for MSC Malaysia Professional Capability Development is based on reimbursement basis.
Others:
Click on any of the following links to find out more about our architect communities. 

Friday, September 9, 2011

Online Database / PDDT- ISI Web of Knowledge via EZ proxy problems resolve

20110906-webofknowledge-problems

Baru-baru ini sebelum cuti raya tempohari pihak Thomson Reuters pembekal Pangkalan Data Dalam Talian (PDDT) /Online database  ISI Web of Knowledge telah mengemaskini dan menaiktarafkan server mereka dari http://isiknowledge.com ke http://apps.webofknowledge.com ,

Keadaan ini tidak memberi kesan kepada pengguna PDDT dari dalam Kampus yang menggunakan IP Network UiTM namun ia memberi kesan kepada pengguna dari luar kampus yang menggunakan sistem EZProxy melalui web http://ezaccess.library.uitm.edu.my/   dimana mereka tidak boleh mengakses ISI Web of Knowledge seperti biasa.

Pihak JPJPD telah meletakan notis Gangguan Akses PDDT : ISI Web of Knowledge dilaman blog mereka http://jpjpd.blogspot.com/2011/08/gangguan-akses-pddt-isi-web-of.html

Berapa siri perbincangaan teknikal telah dilakukan diantara saya Faizar dan Hasnatul dari Unit Web, JPSTM , Nurul Diana dari JPJPD dan Thomson Reuters http://science.thomsonreuters.com/techsupport/  yang melibatkan Aswini Sridharan,Product Support Analyst kemudian Kallal Ghosh, Customer Technical Support Representative dari India dan terakhir dengan Simon Betts, Customer Support Representative dari Hong Kong

Beberapa configuration telah dilakukan akhirnya penyelesaian telah didapati dengan menukarkan config berikut:

Configuration sebelum ini:

Title ISI Web Of Knowledge
URL http://apps.webofknowledge.com/
Domain apps.webofknowledge.com

Ditukarkan kepada Configuration berikut

Title ISI Web Of Knowledge
Find value="http://
Replace value="http://^A
Find VALUE="http://
Replace VALUE="http://^A
Find rurl=http://
Replace rurl=http://^A
Find product_st_thomas=http://
Replace product_st_thomas=http://^A
Find return_url=http://
Replace return_url=http://^A
Find ST_URL=http://
Replace ST_URL=http://^A
Find "CIT.GATEWAY_URL">gateway.isiknowledge.com
Replace "CIT.GATEWAY_URL">^pgateway.isiknowledge.com^
Replace value='^pgateway.isiknowledge.com^/gateway/Gateway.cgi'
Find "CIT.GATEWAY_URL">gateway.webofknowledge.com
Replace "CIT.GATEWAY_URL">^pgateway.webofknowledge.com^
Replace value='^pgateway.webofknowledge.com^/gateway/Gateway.cgi'
OPTION COOKIE
Option DomainCookieOnly
Title Researcher ID
Option Cookie

Sekiranya ada isu sebegini untuk journal journal yang lain, boleh rujuk kepada url berikut:  http://www.oclc.org/us/en/support/documentation/ezproxy/db/

Alhamdulilah sekarang para pengguna ISI Web Of Knowledge dari luar kampus telah boleh menggunakan semula PDDT tersebut melalui web  EZProxy http://ezaccess.library.uitm.edu.my/

Login 

username: student no.

password: i/c no without hyphen (-)

Thursday, September 8, 2011

Online Diaries That Feel Like the Real Thing-Penzu


Name: Penzu

Quick Pitch: Penzu is a free online diary and personal journal with a focus on privacy. Securely record your thoughts and ideas with the ease of writing on a pad of paper.

Genius Idea: A big part of blogging has always been about sharing your thoughts with others, but sometimes, you really just want to record your thoughts and keep them private — like you would in a traditional paper journal. Penzu brings the paper-journal experience (and aesthetic) to the web and offers private-entry by default and the ability to protect your entries with a password or high-level encryption.

Although most blogging or journaling platforms will let you make an entry private or select who it is shared with, the process isn’t always easy to manage. Plus, if someone has access to your account, they can still access your journal entries.

Because Penzu entries are private by default, the chances of your personal thoughts being seen by the wrong person are considerably lower. Also, because you can password protect or encrypt entries, even if someone breaks into your account (or you forget to log out or something), there can still be one more barrier protecting what you write from someone else’s eyes.

Penzu’s aesthetic looks like a piece of notebook paper — which is a pretty cute effect. If you do want to share an entry with someone, you can create a public entry for it and give it to whomever you choose. Unlike other journal or blogging services, there isn’t a main index of all entries – so only the links you share publicly are accessible.

Penzu is incredibly easy to use – if you’ve used Tumblr or any other instant-write platform, you’ll be comfortable. Penzu also recently introduced the ability to attach photos from Flickr — or your computer — to your journal entries.

For users who want more control, Penzu offers Penzu Pro. Penzu Pro is $19 a year and it offers the ability to customize your Penzu backgrounds, format text, control the date for your entries (so you can backdate old entries), import entries from LiveJournal and export entries as text or PDF files. Penzu Pro also offers 256-bit AES encryption in addition to the standard password-lock option available on free accounts.

If you want to keep a record of your thoughts, but you don’t want to share them with the world (or with Google), you might want to give Penzu a try. What tools do you use for recording your private thoughts?

http://penzu.com/content/why

http://penzu.com/content/aboutus

http://blog.penzu.com/

http://penzu.com/content/buzz

http://penzu.com/content/products

FREE

  • Privacy First Penzu was designed to focus on privacy. Unlike blogging, your entries are private by default! More →
  • A Picture is Worth a Thousand…Insert your own photos (now with flickr) and bring your entries to life! More →
  • Share if You Want To You can share your individual entries via email or create a public link and share with the world. More →
  • Autosaving Write as much as you want for as long as you want and your work is saved as you type! More →
  • Instant Search Find long-lost entries quickly with our filtered search. Start typing and your results appear instantly. More →

PRO

  • Go Mobile! Use Penzu on your iPhone,iPad, Blackberry, and Android device. Instantly save, sync, and access offline.More →
  • Ultimate Privacy With Penzu Pro, you can protect your entries with military-grade 256-bit AES encryption. More →
  • Express Yourself Customize your entry backgrounds, pad style, and text formatting to suit your mood. More →
  • You Own Your Data Your entries can be exported to multiple formats giving you more control over your private data. More →
  • Penzu Post Send entries to your Penzu journal from any email address any time. Email setup@post.penzu.com to get started. More →

Friday, August 26, 2011

What Students Don't Know

Library_image_full

CHICAGO -- For a stranger, the main library at the University of Illinois at Chicago can be hard to find. The directions I got from a pair of clerks at the credit union in the student center have proven unreliable. I now find myself adrift among ash trees and drab geometric buildings.

Finally, I call for help. Firouzeh Logan, a reference librarian here, soon appears and guides me where I need to go. Several unmarked pathways and an escalator ride later, I am in a private room on the second floor of the library, surrounded by librarians eager to answer my questions.

Most students never make it this far.

This is one of the sobering truths these librarians, representing a group of Illinois universities, have learned over the course of a two-year, five-campus ethnographic study examining how students view and use their campus libraries: students rarely ask librarians for help, even when they need it. The idea of a librarian as an academic expert who is available to talk about assignments and hold their hands through the research process is, in fact, foreign to most students. Those who even have the word “librarian” in their vocabularies often think library staff are only good for pointing to different sections of the stacks.

The ERIAL (Ethnographic Research in Illinois Academic Libraries) project -- a series of studies conducted at Illinois Wesleyan, DePaul University, and Northeastern Illinois University, and the University of Illinois’s Chicago and Springfield campuses -- was a meta-exercise for the librarians in practicing the sort of deep research they champion. Instead of relying on surveys, the libraries enlisted two anthropologists, along with their own staff members, to collect data using open-ended interviews and direct observation, among other methods.

The goal was to generate data that, rather than being statistically significant yet shallow, would provide deep, subjective accounts of what students, librarians and professors think of the library and each other at those five institutions. The resulting papers are scheduled to be published by the American Library Association this fall, under the title: “Libraries and Student Culture: What We Now Know.”

One thing the librarians now know is that their students' research habits are worse than they thought.

At Illinois Wesleyan University, “The majority of students -- of all levels -- exhibited significant difficulties that ranged across nearly every aspect of the search process,” according to researchers there. They tended to overuse Google and misuse scholarly databases. They preferred simple database searches to other methods of discovery, but generally exhibited “a lack of understanding of search logic” that often foiled their attempts to find good sources.

However, the researchers did not place the onus solely on students. Librarians and professors are also partially to blame for the gulf that has opened between students and the library employees who are supposed to help them, the ERIAL researchers say. Librarians tend to overestimate the research skills of some of their students, which can result in interactions that leave students feeling intimidated and alienated, say the ERIAL researchers. Some professors make similar assumptions, and fail to require that their students visit with a librarian before embarking on research projects. And both professors and librarians are liable to project an idealistic view of the research process onto students who often are not willing or able to fulfill it.

“If we quietly hope to convert all students to the liberal ideals of higher education, we may miss opportunities to connect with a pragmatic student body,” wrote Mary Thill, a humanities librarian at Northeastern Illinois. “… By financial necessity, many of today’s students have limited time to devote to their research.” Showing students the pool and then shoving them into the deep end is more likely to foster despair than self-reliance, Thill wrote. “Now more than ever, academic librarians should seek to ‘save time for the reader.’ ”

Before they can do that, of course, they will have to actually get students to ask for help. That means understanding why students are not asking for help and knowing what kind of help they need, say the librarians.

"This study has changed, profoundly, how I see my role at the university and my understanding of who our students are,” says Lynda Duke, an academic outreach librarian at Illinois Wesleyan. “It’s been life-changing, truly.”

Exploding the ‘Myth of the Digital Native’

The most alarming finding in the ERIAL studies was perhaps the most predictable: when it comes to finding and evaluating sources in the Internet age, students are downright lousy.

Only seven out of 30 students whom anthropologists observed at Illinois Wesleyan “conducted what a librarian might consider a reasonably well-executed search,” wrote Duke and Andrew Asher, an anthropologist at Bucknell University, whom the Illinois consortium called in to lead the project.

Throughout the interviews, students mentioned Google 115 times -- more than twice as many times as any other database. The prevalence of Google in student research is well-documented, but the Illinois researchers found something they did not expect: students were not very good at using Google. They were basically clueless about the logic underlying how the search engine organizes and displays its results. Consequently, the students did not know how to build a search that would return good sources. (For instance, limiting a search to news articles, or querying specific databases such as Google Book Search or Google Scholar.)

Duke and Asher said they were surprised by “the extent to which students appeared to lack even some of the most basic information literacy skills that we assumed they would have mastered in high school.” Even students who were high achievers in high school suffered from these deficiencies, Asher told Inside Higher Ed in an interview.

In other words: Today’s college students might have grown up with the language of the information age, but they do not necessarily know the grammar.

“I think it really exploded this myth of the ‘digital native,’ ” Asher said. “Just because you’ve grown up searching things in Google doesn’t mean you know how to use Google as a good research tool.”

Even when students turned to more scholarly resources, that did not necessarily solve the problem. Many seemed confused about where in the constellation of library databases they should turn to locate sources for their particular research topic: Half wound up using databases a librarian “would most likely never recommend for their topic.” For example, “Students regularly used JSTOR to try to find current research on a topic, not realizing that JSTOR does not provide access to the most recently published articles,” Duke and Asher wrote in their paper, noting that “articles typically appear in JSTOR after 3-5 years, depending on their publisher.” (JSTOR was the second-most frequently alluded-to database in student interviews, with 55 mentions.)

Years of conditioning on Google had not endowed the Illinois Wesleyan students with any searching savvy to speak of, but rather had instilled them with a stunted understanding of how to finely tune a search in order to home in on usable sources, concluded the ERIAL researchers.

Regardless of the advanced-search capabilities of the database they were querying, “Students generally treated all search boxes as the equivalent of a Google search box, and searched ‘Google-style,’ using the ‘any word anywhere’ keyword as a default,” they wrote. Out of the 30 students Duke and Asher observed doing research, 27 failed to narrow their search criteria at all when doing so would have turned up more helpful returns.

Unsurprisingly, students using this method got either too many search results or too few. Frequently, students would be so discouraged they would change their research topic to something more amenable to a simple search.

“Many students described experiences of anxiety and confusion when looking for resources -- an observation that seems to be widespread among students at the five institutions involved in this study,” Duke and Asher wrote.

These results can be taken in a positive light: as the library building has receded as a campus mecca, librarians have often had to combat the notion that online tools are making them irrelevant. The evidence from ERIAL lends weight to their counterargument: librarians are more relevant than they have ever been, since students need guides to shepherd them through the wilderness of the Web. Indeed, students who had attended library orientations or tutorials showed more proficiency than those who had not.

There was just one problem, Duke and Asher noted: “Students showed an almost complete lack of interest in seeking assistance from librarians during the search process.” Of all the students they observed -- many of whom struggled to find good sources, to the point of despair -- not one asked a librarian for help.

In a separate study of students at DePaul, Illinois-Chicago, and Northeastern Illinois, other ERIAL researchers deduced several possible reasons for this. The most basic was that students were just as unaware of the extent of their own information illiteracy as everyone else. "Some students did not identify that they were having difficulties with which they could use help," wrote anthropologist Susan Miller and Nancy Murillo, a library instruction coordinator at Northeastern Illinois. "Some overestimated their ability or knowledge."

Another possible reason was that students seek help from sources they know and trust, and they do not know librarians. Many do not even know what the librarians are there for. "I don't think I would see them and say, 'Well, this is my research, how can I do this and that?' " one senior psychology major told the researchers. "I don't see them that way. I see them more like, 'Where's the bathroom?' " Other students imagined librarians to have more research-oriented knowledge of the library but still thought of them as glorified ushers.

"Librarians are believed to do work unrelated to helping students," wrote Miller and Murillo, "or work that, while possibly related to research, does not entitle students to relationships with them."

Co-opting the influence of professors

In lieu of librarians, whose relationship to any given student is typically ill-defined, students seeking help often turn to a more logical source: the person who gave them the assignment -- and who, ultimately, will be grading their work. “[R]elationships with professors … determine students’ relationships with libraries,” wrote Miller and Murillo. "In the absence of an established structure ensuring that students build relationships with librarians throughout their college careers, professors play a critical role in brokering students' relationships with librarians," they wrote.

Because librarians hold little sway with students, they can do only so much to rehabilitate students’ habits. They need professors' help.

Unfortunately, professors are not necessarily any more knowledgeable about library resources than their students are. “Faculty may have low expectations for librarians, and consequently students may not be connected to librarians or see why working with librarians may be helpful,” wrote Miller and Murillo.

Several recent studies by the nonprofit Ithaka S+R have highlighted the disjunct between how professors view the library and how the library views itself: library directors see the library as serving primarily a teaching function; professors see it above all as a purchasing agent. Miller and Murillo heard echoes of that in their study. “I think that what happens is the librarians know how to search for sources, but sometimes don’t know how to do research,” one anthropology professor told them.

Professors are usually willing to try to put students on the right path. However, “a student will not necessarily succeed in research if he or she relies on the professor alone,” wrote Miller and Murillo. “… [Some] faculty members seemed to assume that students would pick up how to do library research, or that a one-shot instruction session, which at times professors erroneously assumed students previously had, would have been enough.”

This finding resonated with the librarians gathered here in Chicago. “Students do enough to get by,” says Lisa Wallis, a Web services librarian at Northeastern Illinois. “If they aren’t told to use [specific library] databases, they won’t.” And many professors, like many librarians, overestimate the research fluency of their students. For example, a professor might tell students to find “scholarly sources” without considering that students do not actually know what a “scholarly source” is, says Logan, the Chicago reference librarian.

At DePaul, “One of the professors said, ‘You mean they come to the library without the assignment?’ ” says Paula Dempsey, the coordinator of reference services there. “Yes. Yes, they do.”

Heather Jagman, a coordinator of library instruction at DePaul, described this as the “curse of prior knowledge” -- a phenomenon to which both professors and librarians are vulnerable. Teaching and library faculty are likely to have been exceptionally skilled researchers as undergraduates. Career academics might have a hard time putting themselves in the shoes of a student who walks into the library knowing practically nothing.

Pragmatism vs. Idealism

Part of the challenge for faculty in learning to serve students more effectively might be adjusting their expectations to the realities of what students already know -- and can be reasonably expected to learn -- in the space of a given assignment, says Thill, the humanities librarian at Northeastern Illinois.

In her contribution to the ERIAL tome, called “Pragmatism and Idealism in the Academic Library,” Thill wrote about the tension between library pragmatism -- the desire to satisfy the minimum requirements of a research assignment -- and library idealism, which glorifies the tedious unearthing and meticulous poring-over of texts. Unsurprisingly, most students tacked toward pragmatism, while “librarians and professors [repeatedly] wished that students could invest more time in contemplation and discovery, painting an idealized portrait of students leisurely wandering the stacks or pensively sitting down to await inspiration.”

Her findings, based on open-ended interviews with 30 faculty members and nine librarians at Northeastern Illinois and DePaul, pointed to the tension between the idealized view of academic research and the practical matters of deadlines and other limitations -- a tension librarians often have to resolve. If a student needs sources on a topic but does not know how to retrieve them, does the librarian find the source for him? Does she nudge him in the right direction but make sure he finds it himself? Librarians often have to walk that line between giving a person a fish and teaching her how to fish, proverbially speaking, says Thill. And the answer can rightly vary based on how quickly she needs a fish, whether she has the skills and coordination to competently wield a pole, and whether her ultimate goal is to become a master angler.

“Obviously I’m not saying we just have to be paper pushers -- just pushing out whatever it is the student wants,” Thill says. “But I think that, in general, we make decisions assuming that everyone is a career academic.”

This is treading on treacherous ground, and Thill knows it. The debate over whether librarians should be complicit in students’ efforts to “satisfice” -- that is, do what they can to get by and graduate -- can be a contentious one, since it runs to the root of what the library (and higher education in general) is for.

“To be honest I was almost afraid to write this paper,” she says, sitting in a conference room at the Northeastern Illinois library. “Whenever I talked to people about what my paper was about, they got their backs up.”

Thill says she does not think “satisfice” should be a dirty word. In her paper, she points to a 2008 NASPA Foundation study that indicated only 6 percent of college students earn a degree because they “like to learn for learning’s sake.” Back at the University of Illinois at Chicago, Logan mentioned the fact that a growing proportion of students are adult learners and first-generation students with jobs and family obligations. If these students are trying to “satisfice,” it probably isn't so that they'll have more time to goof off, she said.

There is also the somewhat dissonant fact that despite what the Illinois institutions now know about their students’ poor information literacy skills, many of those students have continued to pass their courses and eventually graduate. “I think we definitely saw that students are managing to get through without the level of certain research skills that we would like to see,” Asher told Inside Higher Ed.

“It’s not about teaching shortcuts, it’s about teaching them not to take the long way to a goal,” says Elisa Addlesperger, a reference and instruction librarian at DePaul. “They’re taking very long, circuitous routes to their goals.… I think it embitters them and makes them hate learning.” Teaching efficiency is not a compromise of librarianship, adds Jagman; it is a value.

Librarians and teaching faculty certainly have an obligation to encourage good, thorough research, says Thill, but they also have a responsibility to serve students -- and that means understanding the limitations of library idealism in practice, and acting pragmatically when necessary.

Monday, August 22, 2011

How Social Networks Might Change the Way We Read Books

Social-mediareadbook3

Reading hasn’t always been seen as a solitary act. Our first experiences with books demonstrate that: before we know how to read, we often have people — a parent, a teacher — reading out loud to us. But once we know how to read, there’s a sense that we’re supposed to read silently and oftentimes, read alone. Even so, we’re still compelled to share what we’re reading with others — whether we’re reading for school or for pleasure.

It’s no surprise then, considering the ever-present “social” online world, that we’ve seen the rise of social reading websites, applications and features. 

Over the last few weeks, for example, Amazon has expanded the social features connected with its “Public Notes. “Public Notes” have been available since the beginning of the year, allowing readers to share publicly their highlights and notes from the Kindle books they’re reading. Now Amazon has made it so that if you link your Twitter and Facebook accounts, you automatically follow all of your friends and followers from those networks. As Wired’s Tim Carmody points out, it’s “a little bit creepy” to have the default setting do this, and you have to uncheck a box that automatically broadcasts your reading status too. But there are more granular controls for making public which books you’re reading, as well as the passages you highlight.

The social element can add depth to the understanding of what’s being read, just as book clubs do.

Amazon isn’t the only company to offer this connection between reading and social networks either. Last week, Google too made it easy to share titles of what you’re reading from Google Books to Google Plus. And Amazon and Google join a long list of other reading-oriented social networks, such asGoodreads, wherein you can keep track of what you read, as well as what others read, and of course, talk about books. 

Many teachers already use sites like Goodreads in their classes, creating private groups — “book clubs,” if you will — where students can talk about their assigned reading, write reviews, take quizzes, and the like. Unlike the nascent social networks being built around the Amazon Kindle or Google Books, a site like Goodreads doesn’t require that everyone have the same “hardware” — the same printed edition or the same e-reader, for example.

But there’s a lot of potential once and if students do share hardware, particularly when it comes to e-readers and e-books. As we noted in our recent coverage of Highlighter, we’re seeing lots of ways to mark up content, make notes in the margins, and share or save these electronically. But there’s also the potential for real-time interaction, within the e-book itself, where readers can hold discussions within the text and within the app itself.

That may seem like anathema to the idea of the solitary reading experience. And critics will point out that the social aspect create distractions from reading. But we can also argue that the social element can add depth to the understanding of what’s being read, just as book clubs do. Peers can help define words and concepts that are sometimes hard to grasp when reading alone.

Readers: have you used any social reading sites or features, or do you plan to? We’d love to hear your thoughts on how this has changed your reading habits.

 via: http://mindshift.kqed.org/2011/08/how-social-networks-might-change-the-way-we-read-books/

http://www.google.com.my/search?q=How+Social+Networks+Might+Change+the+Way+We+Read+Books&sourceid=ie7&rls=com.microsoft:ms:IE-Address&ie=&oe=&redir_esc=&ei=1MJRTt7hDoiyrAeM4_CsAg

 

 

Friday, August 19, 2011

11 Ways To Use Technology To Thank Your Donors | Idealware

This article was originally published in the August 2011 issue of The NonProfit Times.

Organizations use technology to engage donors, manage them in databases, and even accept their donation payments online. With a little creative thinking you can save staff time on this important step and increase the likelihood that donors will give again.

Such classic techniques as thank-you letters, phone calls, events and special gifts will never go out of style. Many of these translate surprisingly well to online or technology-enhanced techniques, providing both new ways to make donors feel appreciated and, in some cases, organizational savings.

Here are 11 ideas ranging from the simple to the high-tech to get started. 
  • Personalized Emails. Most organizations are already sending automatic emails to people who have donated online. A little creativity can increase the impact of those emails. Nonprofits with a small staff can pass around a list of donors and their email addresses and have a couple of different people send personal emails thanking them. Better yet, organizations that serve a certain populace, such as schoolchildren or artists, can line up a few of them to write personalized thank-yous that show people the power their gifts have to change lives. There’s no cost other than staff time.
     
  • eNewsletters. Many nonprofits have newsletters. It’s easy to turn them into enewsletters to email to donors, or to create a periodic enewsletter exclusively for donors offering short articles about special projects they’ve funded. Asking celebrities or experts to write a guest article or answer questions can give a newsletter a bit of appeal, and compelling stories and interviews can be of real interest to donors.
     
  • Online Profiles. Organizations can use their newsletters, blogs or websites to profile donors on an ongoing basis. To appeal to the widest possible audience, they can profile “typical” donors -- not necessarily the most generous or the ones who have been giving the most years running -- as a powerful thank-you. A profile of someone who gives a small amount despite their limited income because a nonprofit’s mission is near and dear to them, or who has a great personal story as to why they support an organization, can inspire other donors to give more.
     
  • Online Gifts. Many nonprofits offer incentives such as T-shirts or coffee mugs to those who make a certain level of donation. What about online gifts of appreciation instead of, or in addition to, these real-world gifts? Offering donors access to a mission-related webinar provided by experts, or to an online Q&A with a “celebrity,” can be a rewarding thank you. Organizations can mine their networks for potential candidates -- people are often grateful for the opportunity to contribute if given the chance. Other ideas include a mobile app related to the organization or mission, or an online game. As opposed to physical gifts, many online gifts cost nearly the same whether they’re given to one person or to hundreds of thousands.
     
  • Social Media Shout-Outs. It’s a good idea to thank people publicly, say in a list-wide email, because there’s a certain momentum to donations -- they can gather speed along with mass -- and because some people like the credit. But there’s a lot to be said for the perception of intimacy a personal contact can create, which is why the best campaigns incorporate both. Using multiple channels to give donors rolling shout-outs during an ongoing campaign can include Facebook, Twitter, email and a blog. For example, a “Donors of the Week” post on Facebook, or a thank-you can be tweeted every time someone gives more than a certain dollar amount, like bartenders ringing the bell for a big tip. Linking to donors’ own sites or blogs, if they have them, is another subtle means of thanking them.
     
  • Highlight Early Donors. Approaching a set of major donors early in the campaign to seed a matching fund that would then be promoted to other prospects through emails and the website can work particularly well for corporate donors. It allows them to essentially “sponsor” the email and online fundraising campaign, and gives them publicity for their gifts. 
     
  • Website Leader Board. For friend-to-friend fundraising campaigns, in which supporters raise money from their own networks on behalf of an organization, it’s possible to create an online leader board where fundraisers “compete” good-naturedly against each other’s campaigns. These public rankings can be a powerful way to thank high performing teams and to incent others to do even more.
     
  • Real Time Giving Updates. For live events where people are encouraged to give, with a little technical know-how, it’s easy to project the gifts onto a screen as they’re received. This can be as simple as typing the gifts into a document that’s projected from a laptop, to posting them in real time on Twitter and projecting the organization’s Twitter stream. Twitter also allows community members who aren’t there in person to vicariously experience the excitement -- and be inspired to give online.
     
  • Videos and Photos. More and more organizations are harnessing the power of video to capture and convey emotion often lost in email, and with video capabilities now included in nearly every camera and phone, it’s never been easier. From a staff sing-along to a classroom full of children thanking donors for their gifts, the ideas are seemingly limitless. Videos can be fun, or they can be serious. It’s up to the nonprofit to set the tone. Photos can be used in a similar way, for example, as a slide-show set to music that shows constituents or events or the beneficiaries of funding. These can be posted on the website and sent to donors as links in their thank you emails.
     
  • Interactive Thank You Pages. When donors click a button to donate online, they typically see a thank-you web page. Enhancing this page with something more compelling, like a Flash fireworks display or a thank-you video or slideshow, can provide a more exciting option. Since the donor’s name and information is already in the system, it’s possible to personalize the video, for example, by superimposing the donor’s name onto a “Thank You” sign held by a child served by the organization.
     
  • QR Codes. Growing in popularity, QR codes are the black-and-white graphics that look like bar codes that link people to a website when they scan them with their smartphone cameras. Including a QR code in a thank-you mailing or email is an innovative way to send donors to one of the web pages or videos discussed earlier. It also provides tech savvy donors an easy way to follow a link, and doesn’t require anything but the space in the letter. 

Most of these ideas can be executed for free by someone with a firm grasp of computers. Some might require an investment, some specialized knowledge, or the help of a programmer, writer or consultant. But donors are the lifeblood of your organization, making them feel appreciated is a good way to show gratitude and keep them donating.