Current Cites

February 2009

Edited by Roy Tennant

Contributors: Charles W. Bailey, Jr., Warren Cheetham, Alison Cody, Susan Gibbons, Leo Robert Klein, Roy Tennant,

"Top Web 2.0 Security ThreatsSecure Enterprise 2.0 Forum  (17 February 2009)( - This report highlights several security vulnerabilities created by Web 2.0 applications. These include more familiar threats such as phishing, insecure authentication procedures, and insufficient measures taken to prevent automatic account creation/link spamming. Two of the more interesting flaws included were information leakage and information integrity, neither of which is a technical flaw. Instead, they are risks created by the fact that more and more of us are doing things online. "Information leakage" refers to the accidental exposure of sensitive corporate information: the number of employees over time, or turnover at the managerial level. The report notes that by simply surfing sites like LinkedIn, competitors can easily aggregate information to put together a corporate profile. "Information integrity" refers to the spread of misinformation, either intentional or accidental. Erroneous information posted to Wikipedia is perhaps the first example that comes to mind, but in the corporate world this could include bad information posted to a company intranet, or a slow growth of online misinformation that sets off rumors about a company within its industry. While the report is aimed at IT professionals exploring Web 2.0 technologies for enterprise use, the flaws and vulnerabilities pointed out do not disappear when these technologies are used in educational settings, and are worth considering - particularly for special libraries. (It should be noted that the report does not offer solutions to these flaws, but simply points them out and offers some basic information and examples.) - AC

ARL Digital Repository Issues Task Force, . The Research Library's Role in Digital Repository Services: Final Report of the ARL Digital Repository Issues Task Force  Washington, DC: Association of Research Libraries, January 2009.( - In this report, the Association of Research Libraries Digital Repository Issues Task Force takes an in-depth look at institutional repositories (IRs) and the roles that research libraries should play in them. It's a big picture analysis that focuses on major IR issues, and it includes a horizon analysis that envisions what the IR environment will look like in 2015. It suggests a half-dozen areas of focus for research libraries' IR efforts, and includes with a call to action that recommends five major actions for them to take regarding IRs. In conclusion, the report states: "Some may wonder if libraries can afford to develop repository services, especially in a time when research institutions face shrinking resource bases. The Task Force members believe that neither research libraries, nor the institutions they serve, can afford to do without repository services. Such services have a powerful potential to enable key work and enhance the effectiveness of a wide range of functions across research institutions. Researchers and scholars with access to a spectrum of repository services will possess a substantial advantage in conducting cutting edge research, delivering high quality teaching, and contributing valuable services to society." - CB

Albanese, Andrew. "In New Letter, Library Associations Voice Strong Opposition to Anti-NIH Bill Library Journal Academic Newswire  (17 February 2009)( - The Fair Copyright in Research Works Act (H.R. 801), re-introduced in the House by Rep. John Conyers (D-MI), would repeal the NIH Public Access Policy and prevent other federal agencies from enacting similar open access policies. Ten associations and advocacy groups, including the American Association of Law Libraries, the American Library Association, the Association of College and Research Libraries, the Association of Research Libraries, the Greater Western Library Alliance, and the Special Libraries Association, have sent a letter to House Judiciary Committee members opposing the bill. Here's an excerpt: "The NIH Public Access Policy advances science, improves access by the public to federally funded research, provides for effective archiving strategies for these resources, and ensures accountability of our federal investment. Given the proven success of the revised NIH Public Access Policy and the promise of public access to federally funded research, we firmly oppose H.R. 801 and ask that you do the same." Both the Alliance for Taxpayer Access and ALA have issued calls to action, with the ALA call including a Web form where citizens whose Representatives serve on the Judiciary Committee can contact those House members by e-mail about the bill. - CB

Brown, Malcolm. "The NetGens 2.0: Clouds on the HorizonEDUCAUSE Review  44(1)(January/February 2009): 66-67. ( - "NetGens 1.0" to "NetGens 2.0" is how the author describes the shift in tech requirements of today's college undergrads. In the space of four years, they've gone from an environment where getting a laptop was a big deal to one where pretty much everyone is born with a laptop. Reports indicate that today's 18-29 year olds are the most connected group in history; they're also interacting online the most. The author naturally wonders how these habits will affect IT requirements in higher ed. - LRK

Hadro, Josh. "The LJ Academic Newswire Newsmaker Interview: Brad Wheeler on the HathiTrustLJ Academic Newswire  (9 January 2009)( - One of the more important recent developments in libraries is the creation of the Hathi Trust by the University of Michigan, Indiana University, and a number of other large research institutions to hold the files digitized by the Google Books project at those various institutions. Since you're talking about millions of digitized books, with all the resulting page images and OCR'd text, the technical challenges are substantial. In this interview, Wheeler reveals some of the technology and techniques behind the Hathi Trust and how they are planning to put up a public interface to this archive. This is definitely an initiative to watch, and this piece gives a look under the hood for those of us interested in the technical infrastructure that supports it. [Full disclosure: I blog for LJ and work for OCLC, which is collaborating with the Hathi Trust] - RT

Head, Alison J., and Michael B.  Eisenberg. "Finding Context: What Today's College Students Say about Conducting Research in the Digital Age  (February 2009)( - This preliminary report from the Project Information Literacy at the Information School, University of Washington, is the result of student discussion groups held on 7 U.S. campuses. The message is that research is more, not less, difficult in the digital age and that students are struggling to place their research needs within proper contexts. Plenty of implications for libraries here that deserve our careful thought. The Project Information Literacy project is continuing with a focus on "early adult" research processes and the impact of the design of online resources on them, so keep an eye on the project's website. - SG

Kennan, Mary Anne, and Danny A.  Kingsley. "The State of the Nation: A Snaphot of Australian Institutional RepositoriesFirst Monday  14(2)(2 February 2009)( - The development of institutional repositories in Australia has been stimulated by government policy and funding which supports open access and the dissemination of research. This paper provides a snapshot of what this policy has produced. In 2003 the Australian government provided funding for the development of research information infrastructure, which stimulated several testing and implementation projects. One of the projects investigated the feasibility of using open source software. Most of the universities surveyed for this paper have, or soon will have institutional repositories with open access to the public. Despite this wide take-up, funding for the projects is not secure. The existence of institutional mandates (requiring researchers to deposit published works in the repository) is not widespread, but likely to grow. Libraries and library staff play a very clear role in developing and managing repositories within their institutions, with some sharing the load with information technology departments. - WC

Matthews, Brian. "Web Design Matters: Ten Essentials For Any Library SiteLibrary Journal  (15 February 2009)( - As the subtitle promises, Matthews lays out ten "essentials" for good library web site design. They are, in summary form, 1) Promotion, 2) Segmentation, 3) Visual Cues, 4) Inspiring Photos, 5) Search Boxes, 6) Mobile-Friendly Pages, 7) Feedback, 8) Redundancy, 9) Analytics, 10) An Easy Way to Ask for Help. See the article for details on what these mean, and most usefully, links to example sites that epitomize these techniques. [Disclosure: I blog for LJ] - RT

de Groat, Greta. Future Directions in Metadata Remediation for Metadata Aggregators  Washington, DC: Digital Library Federation, February 2009.( - This is an interesting report for anyone who has labored in the orchard of metadata aggregation (as I have). de Groat reviews various aspects of the following metadata elements: topical subjects, genre, names, geographic information, dates, title information, type of resource, addressable raw object, rights, and identifiers. For each of these she identifies one or more desired services (for example, a desired service for genre is "Ability to accurately and consistently search by genre when appropriate"). For each of those desired services she looks at metadata support, existing tools, desired tools, provides comments and occasionally a bibliography. A glossary and appendices are included. Highly recommended for any metadata wranglers. - RT