Thursday, May 29, 2008

Signing off

Well that's it. The last couple of months has been full of "firsts" for me.
  • First two units completed of my Degree.
  • First ever Blog.
  • First assignment in 20 years.
  • First time I used online Chat.
  • First time I made a web page.
Not to mention all the new stuff I learnt about FTP, pinging, social bookmarking, lists, newsgroups, internet privacy, information ecologies, Boolean searches and the deep web.
So much and yet I know I've only touched the tip of the iceberg. It has been a fantastic trip and I've enjoyed it all.

Thanks to Cynthia & her team for keeping it interesting and informative and supportive. I hope my remaining units are of the same standard.
Cheers

Saturday, May 24, 2008

Module 5 - Information Ecologies

The metaphor of an ecology helps us to understand the internet and the way that we use it. We need to know more than just technical skills and how to do "stuff" on computers because these technologies impact us more broadly. Thinking of technologies as just a tool, limits us in how they can be applied in our lives. Indeed they eventually become a part of our lives. They have social, cultural and political ramifications.

Social and cultural conventions and practices have evolved on how we use it e.g. netiquette, social networking and privacy software. The internet was never designed with these in mind. It's design never considered that it would be a monumental storehouse of information and a predominant form of communication. These practices evolved over time by people using the technology. So as indiviuals, it may seem that we have this technology imposed on us but in fact we (collectively) do influence how these technologies are taken up and used.

“We define an information ecology to be a system of people, practices, values, and technologies in a particular local environment. In information ecologies, the spotlight is not on technology, but on human activities that are served by technology.”
(Nardi & O’Day, 1999)

So, an information ecology consists of
1. People,
2. Practices,
3. Values,
4. Technologies and a
5. Local environment

Considering this in the context of the environment I've spent a lot of time in lately - the local primary school community - I thought about how the internet has changed the way we interact and in fact how our children learn.
A couple of years ago I was asked to orgainise a large fundraising event to raise money for the P&C. The funds raised from the event were to be used to install "smartboards" (interactive whiteboards) which would bring the internet into the classroom in a fun an highly engaging way.

So, not only was the technology (the smartboards) the shared value for our coming together, the whole process of organising, communicating and gaining sponsorship for the event was facilitated by technology. The absence of the technology would have slowed the organisation considerably and many things would not have been possible.

Species: Parents, children, teachers, local business sponsors, local community - This represents a diversity of species whom all play a part and each dependent on others.

Evolving: A healthy ecology is not static. Newer, faster and different technologies introduced. In this case the very reason for the event was to enhance the learning environment for the children.

Technologies: E-mail, desktop publishing, databases and project management technologies were used to produce the event.

Keystone species: The absence of which the whole ecology would fall apart. In this case it is the children without whom the school community would not exist.

Locality: In the locale of the school community, the computer technology existed in the school as well as the businesses and homes of all the parents, sponsors and helpers.

Reference:
Merrick, H. (2004). Information Ecologies. The Curtin iLecture System. accessed from
http://webct.curtin.edu.au/SCRIPT/305033_a/scripts/serve_home

Module 4 - Evaluating the Web

Having done the assignment including the annotated bibliographies in a separate post I will not post them here as well. But, considering which 'body' of information (ie. the original 'snapshot' of the site, or my own, annotated, analytical version) would be most useful to refer back to, the answer is of course the latter. It is a consise summary of the site in my own words and helps me recall instantly the subject of the site.

In term of external users (i.e. if I included this site as a hyperlink or resource on a website) which body of information would best help them judge if the site was useful or of interest to them, well I think the answer is still my summary. I think a summary prepared by a human has to be better, more informative and concise than a search engine that just picks up a sentence which happens to contain the search word(s)and displays it. But having said that, it really depends whether the user is the type to stop and read this material and whether they value my judgement. They can only do this if they have an appreciation of my qualifications and motives.

Module 4 - Organising search information task

I have completed the assignment so I will stick with the children's art auction theme and have selected the following sites:

Spotlight on art 2009 - Trinity School Atlanta
http://www.trinityatl.org/gallery/index.aspx?LinkID=130&ModuleID=246

A showcase of class artworks ranging from preschool to year six. A collection of great ideas for collaborative pieces.

Fundraisingmom.comClass Projects for Fundraising
http://www.fundraisingmom.com/class-projects-for-fundraising-auction.htm

Contains some photos of artworks including ceramic pieces but a whole list of ideas for other projects.

I used the existing bookmarking feature of the Firefox browser and created a separate folder for these and other similar sites. Once bookmarked, by right clicking the bookmark it is possible to add a description to the bookmark to remind me later on what it is about.
The reason I used this method is so I can easily recall these and attach them to e-mails to others involved in this project. I did not use del.icio.us because I know the others involved are not likely to be familiar with this bookmarking site (presumptuous I know but most likely true) and it is much easier to e-mail.
I also did not want to download more software.

Tuesday, May 13, 2008

Module 4 - Boolean Searching Task

Taking the key words of my last search, if I typed "children's art auction" into the browser this would return the biggest number of hits.

If I wanted information most relevant to what I ACTUALLY wanted to look for I should type "children's +art +auction"

If I wanted information coming only from university sources I would type "children's +art +auction site:.edu"

Module 4 - Search Engine Task

As I'm getting involved in a children's art auction at my kid's school, I searched "children's art auction" for possible ideas. I limited my search to .au

Google came up with 9410 sites, although the relevance dropped away after the first dozen or so listings and really only a couple of these were what I was after. So even though it looked promising to start with, it wasn't worth going beyond the first page (which is what I usually find). First five were:

2007 Art Auction results - 6:59pm
The Jeans for Genes Art Auction raised over $275000 for the Children's Medical Research Institute. A record breaking $32000 for H.G Nelson's jeans added to ...
www.jeansforgenes.org.au/2007-Art-Auction-results/default.aspx - 48k - Cached - Similar pages - Note this
Art Auction Supporters
Children's Medical Research Institute · Life Stories · FAQ's · Meet the Team ... Art Auction Supporters. There are no articles to display in this folder. ...
www.jeansforgenes.org.au/Our-Art-Auction-Supporters/default.aspx - 37k - Cached - Similar pages - Note this
More results from www.jeansforgenes.org.au »
Art with a Heart : Art Auction & Fundraiser for Royal Far West ...
Art With A Heart Art Auction and Fundraiser for Royal Far West Children's Health Scheme was held on Wednesday 28 March 2007 at Will & Toby's Restaurant ...
www.artsconnect.com.au/artheart/home.htm - 9k - Cached - Similar pages - Note this
“Art meets science – the perfect Melbourne marriage” - Media ...
The charity art auction is an initiative of MCRI’s development board, a dynamic group of ... Located at the Royal Children's Hospital and affiliated to the ...
www.mcri.edu.au/pages/news-events/media/media-release.asp?rid=65&y=2005 - 22k - Cached - Similar pages - Note this
Collins Booksellers, Online Bookstore
Online Price: $14.95. Art Auction Mystery, Art Auction Mystery ... The Best of Children's Art and Craft, The Best of Children's Art and Craft ...
www.collinsbooks.com.au/popcat.asp?catmain=JNF000000&catsub=JNF006000&storeURL=collinsbooks - 44k - Cached - Similar pages - Note this
[Vancouver-arts] Vancouver Arts Calendar of Events April 2008
Wednesday 16th & Thursday 17th April - CHILDREN'S WORKSHOPS Harmony Flag Making ... The Art Auction will assist those selected artists to offer works of ...
lists.albany.wa.gov.au/pipermail/vancouver-arts/2008-March/000122.html - 12k - Cached - Similar pages - Note this


Copernic came back with a few sponsored sites and then a list of 10 matching sites, none of which were really what I was after but I was surprised it stopped there. I kept looking for page 2 but there was none. I suppose it recognises the search engine limitations and doesn't bother listing them all. First five were:

Search Results 1 - 10 of 10 for children's art auction site:.au 1
1. Cerebral Palsy League of Queensland
Provides services to children and adults with Cerebral Palsy and related disabilities and their families who live in Australia.
http://www.cplqld.org.au [Ask.com]
2. P&O Cruises Australia - On board the Ship
... to attend a Fine Arts Auction where you will be shown some of the most beautiful ... works of art by simply raising your hand.
http://www.pocruises.com.au/html/on-board-the-ship.cfm [Ask.com]
3. Art with a Heart : Art Auction & Fundraiser for Royal Far West ...
Art with a Heart : Art Auction & Fundraiser for Royal Far West Children's Hospital...
http://www.artsconnect.com.au/artheart [Ask.com]
4. 2006 Art Auction results
The Jeans for Genes Art Auction was a great success. Over $200,000 was raised on the night with Hugh ... the Celebrity Jeans for Genes Art ...
http://www.jeans4genes.com.au/auction-2006.php [Ask.com]
5. Sydney art auction to fund pools for remote communities - ABC News ...
Sydney art auction to fund pools for remote communities ... Art auction success to help Indigenous communities 4 Nov 2005 - 124 weeks ago ...
http://www.abc.net.au/news/stories/2005/11/03/1496664.htm [Ask.com]

I was not sure what deep web meant and how within Copernic, I could set it up to search at least three search engines (including one that will search the 'deep web').

After reading about Boolean logic I tried to use children's +art +auction to improve the search and I got a far better list. In fact I found exactly what I was looking for. BINGO!

Module 4 - Downloading Tools/Plugins

Looking at the list of software tools available, I realised I did not have Real One player installed so I downloaded this. I also downloaded Copernic Desktop Search engine as I tend to use Google almost exclusively simply because it is there in my toolbar and I should probably branch out a bit and see if it makes a difference. The offline browser/copiers did not interest me as fixed price unlimited broadband access makes this a little redundant.

Sunday, May 11, 2008

Module 3 - Web 2.0

These are the differences I see between simple hyperliked list of relevant websites and the blinklist page all of which relate to the metadata provided by he users.
1. The number of blinks tells me how many times that item has been visited via the blinklist which clues me to it's popularity.
2. I can possibly gain information about who created the list and their credibility or qualifications.
3. There is a summary of the article/link which I can read to determine it's relevance.
4. I can see if any of my fellow students have "blinked" and if I like link to their blinklist pages if they have them.
5. I can take advantage of or participate in the voting system to rate a link/resource.

There are obvious advantages to this medium which allows the users of the information to add value for the benefit of future users.

Module 3 - Blogging

What do I really think of Blogging? Hmmmm, well considering at the start of this unit I had heard of them, had probably found a few over the years in my searches but had NEVER thought I would actually start one, I can see now I was closed to the idea of their usefulness. Don't get me wrong, I don't feel the need to start sharing intimate details of my thoughts and life with the world at large, or at least anyone interested in reading it, but I can see that there are people who write well (or think they do) and want the opportunity to share information. I can also see how there are ways in which the Blog can be useful in the workplace (project management) and how it offers a solution that a static website cannot - mainly that the "postings" do not require anyone to be proficient in HTML coding or needing special access. It's all there, it's very easy and it's immediate.

In a social sense, the very number of blogs which according to blog herald numbered in excess of 50 million in 2005, indicates there are many people out there with something to say and obviously derive some fulfillment from this. However, in this site, Caslon Analytics member Bruce Arnold states
Several studies indicate that most blogs are abandoned soon after creation (with 60% to 80% abandoned within one month, depending on whose figures you choose to believe) and that few are regularly updated.

The 'average blog' thus has the lifespan of a fruitfly. One cruel reader of this page commented that the average blog also has the intelligence of a fly.

Which sums it up for me really and who has the time to trawl the Net looking for the good stuff....not me, that's for sure. If I'm looking for something specific, I'll Google it and see what comes up but I tend to steer clear of rambling blog sites.

Thankfully I read that people are moving to Twitter and Facebook instead of updating their blogs. Which begs the question, what happens to abandoned blogs? Who cleans up all the blogs that have been abandoned and clog up the Net? No-one is the short answer. I reckon, if your blog hasn't been updated in a while, say a couple of years, they should be automatically deleted.

Saturday, May 3, 2008

Conceptual Research and Reflection Project

  1. Concept 1: Asynchronicity

“Asynchronous electronic communication is not the opposite of real-time, synchronous communication: rather it describes forms of communication that appear differently 'located in time' depending on the perspective of the sender and receiver.” (Allen, n.d.)

I have assumed that by “opposite” in the above concept statement, it implies that synchronous communication is superior or preferable to asynchronous communication in some way and I agree with the remainder of the statement that it is not the opposite, merely different.

As Goldberg (Goldberg, 2000) explains synchronous communication is where both communicants are in the same place (either physically or virtually) at the same time. This may be fast or slow. “Examples of fast are video and voice; an example of slow, text based chat.”

There are obvious advantages to synchronous communication like the immediacy of reactions and understanding and less chance of misunderstanding due to auditory or visual cues. However the obvious disadvantages are the time and physical constraints that prevent people being in the same place (even virtually) at the same time.

Looking at the immediacy firstly, this may not always be an advantage. Certainly in the sphere of online learning, the ability to take time to reflect before responding means that that response is more considered and valuable. It can also minimise the incidence of rash, ill-mannered responses. Gray (Gray, 1996) expresses it well in saying “Electronic communication can radically change the dynamics of a discussion in ways which, when they are appropriate, can be very helpful”.

We know the learning experience and quality of understanding is certainly enhanced by face to face communication. This can be achieved with synchronised communication tools like pod-casts and video conferencing but they are costly and limited. I feel however that if the face to face aspect isn’t there, the quality of learning is not significantly compromised. In the absence of visual and auditory cues it is just necessary to adopt new rules of communication. The use of emoticons in e-mail messages can convey emotional content.

In some ways the absence of face to face contact may allow people to become more uninhibited, to loosen up and express themselves more openly. Psychologists call this ‘the online disinhibition effect’.

“You don’t have to worry about how other look or sound when you say something. Seeing a frown, a shaking head, a sigh, a bored expression,.can slam the brakes on what people are willing to express.” (Suler, 2002)

Removing these physical reactions and body language, encourages more people to speak up. In other forums where people are anonymous, it can trigger rudeness and anger that would never be expressed face to face but in on-line learning this is unlikely. A greater contribution from diffident participants is an advantage here.

Addressing the time and physical constraints, the existence of asynchronous communication in web-based learning has significantly changed higher education. It is now available to people who live remotely and cannot travel to University or people whose other commitments prevent them attending at scheduled times (like me).

In my case this aspect is a distinct advantage and not some compromise I am being forced to endure. The control I am able to exercise over my own learning is quite liberating. Indeed, the sense of community on-line between students and teachers appears quite strong and communication between teacher and student is easily facilitated and indeed, occurs more frequently that in an on-campus situation.

E-mail distribution lists, another form of asynchronous communication brings people together who are scattered geographically and therefore in different time zones. Although the discussion through these lists is slower, it is in no way less valuable. The sheer number of these lists is testimony to this.

The examples above show that asynchronous communication is neither inferior nor the “opposite” of synchronous communication. It is merely different. It may be slower but it has distinct advantages which have opened lines of communication that never before existed.


Annotated Bibliography

Site 1: Goldberg, M. (2000). Synchronous vs. Asynchronous: Some Thoughts. Retrieved 26 March 2008, from http://www.webct.com/service/ViewContent?contentID=2339346

As an educator Goldberg draws on personal experience and that of thousands of colleagues he has spoken with to debunk the idea that once high quality synchronous communication is widely available then asynchronous communication will be redundant.

He does this by pointing out the important advantages in teaching and learning of asynchronous communication like e-mail and bulletin boards. It has its own character, advantages and disadvantages. The article is relevant because this is exactly the point made in the concept and his points are pertinent to my reflection.

He expresses the opinion that electronic asynchronous tools have brought about a revolution which an improvement in synchronous communication tools cannot hope to replicate.

Site 2: Suler, J. (2002). The Psychology of Cyberspace. Retrieved 24 March, 2008, from http://www-usr.rider.edu/~suler/psycyber/disinhibit.html

This is an article extracted from Suler’s book and explores the reasons why people say and do things in cyberspace that they wouldn’t do in the face-to-face world. This “disinhibition effect” is brought about by a range of factors all discussed at length. Some of these factors are very pertinent like the person’s invisibility, absence of status, gender, race or wealth which offers a level playing field as well as the asynchronicity that exists.

The relevance to my reflection is that it supports the argument that asynchronous communication has its own advantages one of which is that people are more likely to contribute and be heard.

  1. Concept 26: Privacy and Security

“The Internet is a profoundly ‘open’ system …….. Conceptually, the Internet challenges us to take greater responsibility for the protection of privacy and security than perhaps we are used to when dealing with the media.” (Allen, n.d.)

The threat to privacy and security from the Internet comes from many different areas. The nature of the threat also varies from the seemingly innocuous (collection of statistical information) to the malicious and damaging (viruses and identity hijacking). Aside from the obvious precautions of discerning to whom personal information about yourself is given, there are more insidious methods used by organizations and cyber criminals of which we should be aware. I will discuss a few of these below.


Cookies


Cookies were originally intended to give website owners visitor tracking information and then, only data already possessed by the website. However, there are extra features that may be added by programmers which combine personal information that you may supply to the website with the cookie. These cookies can then be used to build up a profile of your Web usage and online spending patterns. The marketing implications of this are then exploited. Ways to deal with cookies is to:

· Set your browser to delete the cookies file whenever you start the browser.

· Profile your browser to be notified before cookies are written to your computer although this can become annoying because there are so many.

· Install one of the many software products which reject or manage cookies for you.

(Protecting Your Privacy on the Internet, 2008)


Spyware, Adware, Malware and Key loggers

With the proliferation of free software able to be downloaded from the Internet at breakneck speed, comes the associated risk of privacy-invasive software.

It includes:

· Spyware which secretly downloads onto your PC and operates to collect information,

· Adware which uses the information collected to generate targeted advertisements,

· Malware spreads disorder and corrupts systems and networks,

· Key loggers record keystrokes to harvest passwords among other information and

· Data harvesting programs to collect e-mail addresses to proliferate the whole process.

The Storm infection prevalent in 2007 was achieved very simply by directing recipients to maliciously constructed websites containing reports of ravaging European storms. The visitor was completely unaware that this infection had happened. Fortunately the many free spyware detection programs that were run to detect and remove these infections have contained the spread. At one point it was feared that 10 million computers (McMillan, 2007) were infected worldwide, but in hindsight it was more like 500,000. (Microsoft, 2008)

The Microsoft report emphasises that a significant risk of infection continues to emanate from spam e-mail which accounts for over 90% of all e-mail messages sent. “The flood of spam creates a potent vector for Malware attacks and phishing attempts.”(Microsoft, 2008)

The Platform for Privacy Project is an initiative of the W3C. “The aim of P3P is to increase user trust and confidence in the Web by providing a mechanism for ensuring that users can be informed about privacy policies before they release personal information” (J. M. Reagle Jr. & Wenning, 2000 - 2008) It appears to be a toothless tiger however as there is no way to ensure organisations actually act within the boundaries of their own policies.

So, it appears that privacy and security issues will be part of our life with the Internet for some time yet and it pays to keep up to date with current activity. As always, vigilance is the key to security.



Annotated Bibliography

Site 1: Protecting Your Privacy on the Internet (2008). The Office of the Privacy Commissioner. Retrieved 3 April. 2008, from http://www.privacy.gov.au/internet/internet_privacy/

This site was very useful in this reflection as it is very current and written in simple English for the non-technical reader. The Office of the Privacy Commissioner’s role is to promote and protect privacy in Australia. In relation to the Internet this website offers sensible advice on protecting your privacy and has dozens of links to software (free as well as for sale) which it recommends to achieve good security. From anti-spam software to Web bug removers and everything in between, I found this source both pertinent for this assignment and my own Web practices.

Site 2 Brown, A. (2006). They Know All About You. Guardian.co.uk. Retrieved 10th April 2008, from http://www.guardian.co.uk/world/2006/aug/28/usa.searchengines

In this article on Internet Privacy (Brown, 2006) discusses how an AOL research site published a database containing 23 million searches made over a three month period for 650,000 of its customers. The database was only available for several hours before AOL realised the privacy of the individuals was not properly protected and removed it. The profiling information that was able to be extracted from this database (for those who copied it) was alarming.

The incident gave us a glimpse of the type of information and details the big search engines are able to determine about us via cookies which are stored in their systems for up to 30 years.


  1. Concept 23. Human-computer interfaces

“The Internet lessens the recognition of difference between humans and computers because, at a distance, it often feels similar to communicate and act on the Internet regardless of whether one is speaking with a human or a machine.” (Allen, n.d.)

If we look at the evolution of the computer in society over the past 50 years, it is apparent that the human-computer interface became an issue in the personal computer boom of the 1980’s and the World Wide Web revolution of the 90’s.(Hirschman, 1999) PC’s were smaller, cheaper and more available than ever before. No longer were just technocrats the users, but everyone from preschoolers to retirees. This drove the need to create more user-friendly interfaces and this drive continues today.

We see applications that are more intuitive and simplistic with drag and drop, cut and paste, point and click, and push button actions which mimic human behaviour. “A good application interface hides the complexity from the user and allows the user to work more naturally.” (Necat, 2007) We have all interacted with speech recognition software, whether calling for a taxi or getting information from a bank, they enable us, the customers, to interact with databases over the phone (whether we want to or not). I think the speech synthesizers in use today still have a nonhuman quality about them which prevents us wholly embracing them.

Experiments have been conducted for quite some time into human interaction with computers which prove that humans can be tricked into believing and behaving as if they are communicating with another human being but it seems, not for long.

One in particular dating back to 1964 was ground breaking and involved a computer program called Eliza developed by a German professor named Joseph Weizenbaum. A person would type in English to a computer terminal and Eliza was programmed to respond to certain key words and phrases and interact in a way that resembled human conversation. Students were fooled into revealing personal details about themselves not understanding that they were talking to a computer. (Markoff, 2008)

Another well known experiment was the creation of a bot named Julia who existed in Multi-User Dungeons (MUDs) which were popular in the 1990’s. They were “text-based, online fantasy spaces where users participated in role-playing games and chat with other users.” (Tse, 2005) Julia (who superseded Colin) was one of the more successful bots to pose as a human and prove that it was possible to fool users into lengthy conversations. Eventually the programmed and sometimes strange responses revealed to many players that she was a bot.

These experiments tell me that when one unwittingly realises they have been communicating with a machine, one is likely to feel foolish. This is something that can prevent acceptance of this technology.

One practical use to which artificial intelligence (AI) is being put is in the form of “Sam”. Sam is a virtual child computer interface that employs behaviors such as emotion, personality and conversation to encourage and assist children to engage in story telling. The idea is to improve literacy through collaborative play. The visual interfaces still are unable to incorporate the many faceted nuances of everyday conversation. Gestures, eye gaze movements, facial expressions and speech tone are important elements in achieving credibility. Unnatural or awkward interactions are distracting and lessen their usefulness. (Tse, 2005) The AI used in these programs still has a way to go.

I do believe there are times where we communicate and act the same way whether we are communicating with a human or a machine but this is not yet an everyday occurrence. It is fair to say that this move to an “intelligent Internet” has not been as rapid as forecasted say, five years ago. We are however moving closer.


Annotated Bibliography


Site 1: Tse, C. W. (2005). Evaluating Sam: Iterative Design of a Story Listening System and Embodied Conversational Agent. NORTHWESTERN UNDERGRADUATE RESEARCH JOURNAL, 2 (May 2005). Retrieved 10 April 2008, from http://www.topgrad.com/NURJ%202005%2001.pdf

This research paper published in a University research journal evaluates the Sam project, an Embodied Conversation Agent and Story Listening System designed to improve children’s literacy by engaging them in storytelling and collaborative play.

The technology it utilises is pertinent to this concept statement as its aim is to make children think that they are interacting with another child. Its success is evaluated in the article and ways in which it might be improved by future development are suggested. It suggests that developments in the field of artificial intelligence could make it more convincing and realistic.


Site 2: Foner, L. (1999). A sociological look at muds, Julia, and those who interact with her. Retrieved 11 April. 2008, from http://lcs.www.media.mit.edu/people/foner/Julia/section3_3.html

This web page is part of a larger document which discusses the sociological usefulness of Julia, a bot who pose as a user in Multi-User Dungeons (MUDs) which were popular in the 1990’s. Julia was programmed with artificial intelligence which enabled her to interact with the human visitors.

It is very interesting to read transcripts of the dialogue that went on as users were unaware that they were communicating with a computer programme and how eventually, her identity was revealed through the strange responses she sometimes gave. The reaction of some users to this discovery is also interesting. Words used were “shallow, void, hollow, superficial, and fake“.


  1. Concept 32. Virtually a Library

"A library is, fundamentally, a system organised according to shared, accepted sets of classifications and organisations, and on that basis that it is impossible to access the information except through categories (either in a catalogue or by browsing collocated books on a shelf). The World Wide Web has no such shared system, and is technologically capable of a large degree of searching for information directly – ‘full text searching’. What advanced users seek to do is to exploit the advantages of the idea of a library in a way that suits their personal needs, effectively creating personal virtual libraries." (Allen, n.d.)

The WWW differs from the traditional library where author and subject based catalogues are used to find information, in that information can be reached from an unlimited number of sources. The hypertext feature of the WWW has created an information base which is non-linear in nature. One page contains links to another, which contains links to another….and so on. When following links, it is very easy to become “lost”. Fortunately, browsers allow us to retreat to earlier pages with ease which makes them a very powerful and efficient research tool.

However, with the volume of web pages being added every day and the Web’s exponential growth, finding information of a high quality becomes increasingly time-consuming. Information is no longer logically organized and there is no systematic way of retrieving it. (Nguyen, 2000)

The cataloguing system of the past has been replaced with search engines like Google with full-text searching ability. When you have invested time and effort to find something useful, you want to be able to find it again with ease.

The absence of reliable catalogues in the WWW makes it necessary to create one’s own cataloguing system and there are many choices available. Every browser has the ability to “bookmark” pages on our computer or network which makes them available for future reference. You can place these links into logically ordered folders by subject. There are sites like Del.icio.us or Ma.gnolia which are social bookmarking sites where you can share your favourite bookmarked sites with everyone else.

When the WWW was in its infant stages, Tim Berners Lee started a virtual library which still exists today. It’s information page states

“The WWW Virtual Library (VL) is the oldest catalogue of the Web, started by Tim Berners-Lee, the creator of HTML and of the Web itself, in 1991 at CERN in Geneva. Unlike commercial catalogues, it is run by a loose confederation of volunteers, who compile pages of key links for particular areas in which they are expert; even though it isn't the biggest index of the Web, the VL pages are widely recognised as being amongst the highest-quality guides to particular sections of the Web.” (History of the Virtual Library, 1991-2008).

Interestingly, my probing revealed many broken links. But there are several other virtual libraries containing lists of websites that are trustworthy, so they do exist. (Ackermann, 2008) (Librarian's Internet Index, 2008)

This leads to the issue of credibility and accuracy. When searching for information on the Web it is necessary to evaluate the quality of the information. Comparing it to a traditional library consisting of books, journals and articles which go through a filtering process before they are published and catalogued, the Web provides no such authentication. Anyone can publish a page to the Web. (Ackermann, 2008) (Nguyen, 2000)

Naturally, librarians are frustrated when students use popular and easy to use web search engines which lead them to unedited, poor information instead of using library catalogues containing filtered and authoritative reference material. However library catalogues are considered to be too rigid and hard to use. For instance, in researching the asynchronicity topic, would I look under IT or Psychology or both? Some libraries have started using using Del.icio.us to bridge this gap by creating tags and bookmarks organised by subject and incorporating these into their own Web sites. Del.icio.us offers borrowers familiarity and ease of use and lowers the barrier to participation. (Rethlefsen, 2007) What results is bookmark collections organized by humans and not search engine software.

In spite of it’s shortcomings in the WWW’s cataloguing and organization of information I think they are outweighed by the convenience, efficiency and ease of use of the Web. These flaws can be overcome with the savvy use of Web bookmarking tools.

Annotated Bibliography

Site 1: Rethlefsen, M. L. (2007). Tags Help Make Libraries Del.icio.us: Library Journal.com. Retrieved 1 May. 2008, from http://www.libraryjournal.com/article/CA6476403.html

This article describes how social bookmarking tools like Del.icio.us are assisting libraries to overcome difficulties borrowers have using library catalogues and databases. Borrowers prefer the familiar interface and the persistent access that Del.icio.us offers. Its ease of use also allows less technically savvy librarians to contribute to collections instead of this resting with one or two librarians.

Library catalogues and databases only address broad categories but in Del.icio.us librarians can “tag” worthy links for a specific audience like local school assignment topics. This information is relevant because it demonstrates how the libraries have indeed exploited the idea of the library system in a way that suits their personal needs.

Site 2: Ackermann, E. (2008). Evaluating Information Found on the World Wide Web. Retrieved 3 May. 2008, from http://www.webliminal.com/search/search-web12.html

Search engines may provide full text search capabilities narrowing the field but for research you must narrow it further to find reliable, credible and accurate sources of information.

This site provides guidelines to evaluate information retrieved from the WWW. In it, Ackermann provides a list of virtual libraries containing reliable sources of information which have been filtered by information specialists.

Also contained is a checklist of things to consider in evaluating the credibility of a particular source or the information it contains. Things like currency, purpose and objectivity are important as is the qualifications and experience of the author or organisation publishing the site.


References:

Ackermann, E. (2008). Evaluating Information Found on the World Wide Web. Retrieved 3 May. 2008, from http://www.webliminal.com/search/search-web12.html

Allen, M. (n.d.). Internet Communications Concepts Document: Curtin University. Retrieved 24 March 2008, from http://webct.curtin.edu.au/SCRIPT/305033_a/scripts/serve_home

Brown, A. (2006). They Know All About You. Guardian.co.uk. Retrieved 10th April 2008, from http://www.guardian.co.uk/world/2006/aug/28/usa.searchengines

Goldberg, M. (2000). Synchronous vs Asynchronous: Some Thoughts: Online Teaching and Learning Newsletter. Retrieved 26 March 2008, from http://www.webct.com/service/ViewContent?contentID=2339346

Gray, N. (1996). The Internet: New ways of Working and Learning: University of Glasgow. Retrieved 24 March 2008, from http://nxg.me.uk/note/1996/new-ways/

Hirschman, L. (1999). Intelligent Human-Computer Interfaces. In The Edge. Vol. 3, (MITRE Publications).

History of the Virtual Library (1991-2008). The WWW Virtual Library. Retrieved 1 May. 2008, from http://vlib.org/admin/history

J. M. Reagle Jr., & Wenning, R. (2000 - 2008). P3P and Privacy on the Web FAQ: W3C. Retrieved 3 April. 2008, from http://www.w3.org/P3P/P3FAQ.html#What%20is%20P3

Librarian's Internet Index (2008). Califa Library Group. Retrieved 3 May. 2008, from http://lii.org/

Markoff, J. (2008, March 13, 2008). Joseph Weizenbaum, Famed Programmer, Is Dead at 85. The New York Times. Retrieved 10 April 2008, from www.nytimes.com/2008/03/13/world/europe/13weizenbaum.html?partner=rssnyt&emc=rss

McMillan, R. (2007). Storm Worm Now Just a Squall. Retrieved 3 May. 2008, from http://www.pcworld.com/article/id,138721-c,virusesworms/article.html

Microsoft (2008). Microsoft Security Intelligence Report July through December 2007 Key Findings Summary. Retrieved 3 May. 2008, from http://download.microsoft.com/download/f/f/d/ffd1f8b8-afcc-4ed1-a635-2caa8b96ac2f/KeyFindings_MS_Security_Report_Jul-Dec07.pdf

Necat, D. B. (2007). The Changing Face of Human Computer Interfaces: BCS Communication. Retrieved 10 April. 2008, from www.bcs.org/server.php?show=ConWebDoc.10049

Nguyen, T. T. (2000). OASIS:Student Evaluation Methods for World Wide Web Resources: University of Hawaii at Manoa. Retrieved 1 May. 2008, from http://www2.hawaii.edu/~nguyen/web/

Protecting Your Privacy on the Internet (2008). The Office of the Privacy Commissioner. Retrieved 3 April. 2008, from http://www.privacy.gov.au/internet/internet_privacy/

Rethlefsen, M. L. (2007). Tags Help Make Libraries Del.icio.us: Library Journal.com. Retrieved 1 May. 2008, from http://www.libraryjournal.com/article/CA6476403.html

Suler, J. (2002). The Psychology of Cyberspace. Retrieved 24 March. 2008, from http://www-usr.rider.edu/~suler/psycyber/disinhibit.html

Tse, C. W. (2005). Evaluating Sam: Iterative Design of a Story Listening System and Embodied Conversational Agent. NORTHWESTERN UNDERGRADUATE RESEARCH JOURNAL, 2(May 2005). Retrieved 10 April 2008, from http://www.topgrad.com/NURJ%202005%2001.pdf