Skip to main content

Home/ IMT122 OUA Group/ Group items matching "Libraries" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Abbate, J. (1999). Introduction. In Inventing the Internet. (E-Reserve) - 0 views

  •  
    Abbate, J. (1999). Introduction. In Inventing the Internet. Cambridge, Mass.: MIT Press. pp. 1-6. Retrieved from http://edocs.library.curtin.edu.au/eres_display.cgi?url=dc60105539.pdf
1More

Network Passwords | Infopeople - 0 views

  • Your library or organization should consider adopting the following rules for network passwords:Passwords may not be blankPasswords must be seven or more characters longPasswords must use a mixture of letters (upper and lower case), numbers and charactersPasswords must be changed on a regular basisPasswords must be successively unique (in other words, users shouldn't use the same password repeatedly)Passwords must never be written down or posted in an insecure location (such as on a monitor)In addition, consider adding these prohibitions:Passwords cannot be the user's name, the name of someone in their family, or their birth datePasswords must not be constructed by adding a numeral or character to the beginning or end of a regular word; this is too easily guessed (e.g."chair1")
12More

Academic Search Engine Spam and Google Scholar's Resilience Against it - 0 views

  • Web-based academic search engines such as CiteSeer(X), Google Scholar, Microsoft Academic Search and SciPlore have introduced a new era of search for academic articles.
  • With classic digital libraries, researchers have no influence on getting their articles indexed. They either have published in a publication indexed by a digital library, and then their article is available in that digital library, or they have not
  • citation counts obtained from Google Scholar are sometimes used to evaluate the impact of articles and their authors.
  • ...9 more annotations...
  • ‘Academic Search Engine Optimization’ (ASEO)
  • Citation counts are commonly used to evaluate the impact and performance of researchers and their articles.
  • Nowadays, citation counts from Web-based academic search engines are also used for impact evaluations.
  • Most academic search engines offer features such as showing articles cited by an article, or showing related articles to a given article. Citation spam could bring more articles from manipulating researchers onto more of these lists.
  • It is apparent that a citation from a PowerPoint presentation or thesis proposal has less value than a citation in a peer reviewed academic article. However, Google does not distinguish on its website between these different origins of citations[8].
  • Google Scholar indexes Wikipedia articles when the article is available as PDF on a third party website.
  • That means, again, that not all citations on Google Scholar are what we call ‘full-value’ citations.
  • As long as Google Scholar applies only very rudimentary or no mechanisms to detect and prevent spam, citation counts should be used with care to evaluate articles’ and researchers’ impact.
  • However, Google Scholar is a Web-based academic search engine and as with all Web-based search engines, the linked content should not be trusted blindly.
1More

Quantum Computing - 0 views

  •  
    Given the news that Australian researchers have developed a "qubit" - the building block for the future of Quantum computing (expected in about 10-15 years), this article may have some relevance for Library and Info Tech Managers.  
1More

Emerald | Diffusion of innovation theories and their relevance to understanding the rol... - 0 views

  •  
    Holland, M. (1997). Diffusion of innovation theories and their relevance to understanding the role of librarians when introducing users to networked information. The Electronic Library, 15(5), 389-394. doi:10.1108/eb045587 Start at part 2. Background and History p.390 
1More

NCDD Community News » What We're All About - 0 views

  •  
    This has me wondering if this is a part of the future of libraries!  What a fantastic innovation!  So positive and positively people-focussed.  Finding solutions to tough issues through dialogue and practical conversations.  There are important resources here!  
16More

Scot Colford, "Explaining free and Open Source software," - 0 views

  • Ten criteria must be met in order for a software distribution to be considered open source:
  • Free redistribution
  • the source code freely available to developers.
  • ...13 more annotations...
  • The license must permit modifications
  • Integrity of the author's source code
  • No discrimination against persons or groups
  • No discrimination against fields of endeavor
  • same license must be passed on to others when the program is redistributed.
  • License must not be specific to a product
  • License must not restrict other software
  • License must be technology-neutral
  • list of the nine most widely used licenses is
  • Apache Software License 2.0 (www.apache.org/licenses/LICENSE-2.0.html) New BSD License (www.opensource.org/licenses/bsd-license.php) GNU General Public License (GPL) (www.gnu.org/licenses/gpl.html) GNU Lesser General Public License (LGPL) (www.gnu.org/licenses/lgpl.html) MIT License (www.opensource.org/licenses/mit-license.php) Mozilla Public License 1.1 (MPL) (www.mozilla.org/MPL/MPL-1.1.html) Common Development and Distribution License (www.sun.com/cddl/cddl.html) Common Public License 1.0 (www.ibm.com/developerworks/library/os-cpl.html)  Eclipse Public License (www.eclipse.org/legal/epl-v10.html) [5].
  • common misconception, alluded to above, is that since the source code is freely distributed without royalty or licensing fee, open source applications are free of cost.
  • Free and open source software application users, on the other hand, must rely on development communities for support.
  • The pervasiveness of the World Wide Web guarantees that nearly every information organization is using free or open source software to perform some function.
9More

safer internet group - 5 Point Plan - 0 views

  • The Safer Internet Group brings together a diverse group of stakeholders who all share the goal of developing the Internet as a platform for education, communication and economic activity.
  • Australia needs to take effective action to ensure that Internet users, and particularly children, have a safe experience online, while ensuring that the benefits of the open Internet are available to all Australians.
  • We believe our way is comprehensive and practical. More importantly, we know it works. It delivers:
  • ...5 more annotations...
  • . More Effective Education
  • Comprehensive Policing of Illegal material on the Internet
  • User Tools that work
  • A new dialogue about Internet safety
  • Targeted Research of Internet Risks and Opportunities for Young People
  •  
    Safer Internet Group (2009) 5 Point Plan. Retrieved from http://www.saferinternetgroup.org/5pointplan.html (The Australian Library and Information Association is one of the members of the Safer Internet Group)
3More

User Security | Infopeople - 0 views

  • User identification is the process of establishing the user's identity and usually requires very little interaction on the user's part.
  • Authentication is the process of a user proving that s/he is actually the person who s/he claims.
  • Authorization is the final process in user-level security. It is the process of determining what resources a user can access after successful identification and authentication.
1More

Emerald | Evaluating and comparing discovery tools: how close are we towards next gener... - 0 views

  •  
    (Curtin Login) Yang, S. Q., & Wagner, K. (2010). Evaluating and comparing discovery tools: how close are we towards next generation catalog? Library Hi Tech, 28(4), 690-709. doi:10.1108/07378831011096312 Retrieved from http://www.emeraldinsight.com.dbgw.lis.curtin.edu.au/journals.htm?articleid=1896437&show=abstract
1More

2012 Horizon Report | EDUCAUSE.edu - 0 views

  •  
    Please read the Key Trends and the Critical Challenges sections at the start. The rest of the report is a very easy read if you are interested. Johnson, L., Adams, S., & Cummins, M. (2012). The NMC Horizon Report: 2012 Higher Education Edition. Austin, Texas: The New Media Consortium. Retrieved from http://www.educause.edu/Resources/2012HorizonReport/246056
1More

Kroski, E. (2008). Web 2.0. In Web 2.0 for librarians and information professionals - 0 views

  •  
    Kroski, E. (2008). Web 2.0. In Web 2.0 for librarians and information professionals. New York: Neal-Schuman.  (Available from: https://auth.lis.curtin.edu.au/cgi-bin/auth-ng/authredirect.cgi?redirurl=http://edocs.lis.curtin.edu.au/eres.cgi&url=dc60266981 )
« First ‹ Previous 41 - 60 of 73 Next ›
Showing 20 items per page