1 / 40

No Boundaries

No Boundaries. Jane Macoustra Tai-Pan Research Internet Librarian International 17 th October 2006. Michael Moore on Librarians. “I really didn't realize the librarians were, you know, such a dangerous group.

dbarajas
Download Presentation

No Boundaries

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. No Boundaries Jane Macoustra Tai-Pan Research Internet Librarian International 17th October 2006

  2. Michael Moore on Librarians “I really didn't realize the librarians were, you know, such a dangerous group. They are subversive. You think they're just sitting there at the desk, all quiet and everything. They're like plotting the revolution, man. I wouldn't mess with them. You know, they've had their budgets cut. They're paid nothing. Books are falling apart. The libraries are just like the ass end of everything, right?”

  3. No Boundaries We will take a brief look at: • What we mean by no boundaries • Different ways to communicate across the time zones • What has worked best for the SLA Asian Chapter • Conduct a live visual Skype to Australia

  4. What do we mean by No Boundaries? • There’s no restriction to whom you can contact: colleagues, suppliers, customers, family & friends, distance learning • Time zones no longer matter for a geographically dispersed community • Communicate anywhere in the world and communicate cheaply

  5. Types of communication systems Some of the pitfalls: • Snail mail, E-mail, Telephone & mobile – all have drawbacks • Conference calls & video conferencing • Virtual Reference, Podcasts, blogs & RSS • Discussion lists & forums, SMS, COP

  6. Types of communication systems • VOIP At the time we looked, we found Skype easy to use • It’s free; a bonus for communities in developing countries

  7. Another dispersed community Consider how terrorists communicate with each other. • They use all communication systems available • They use codes, pseudonyms and aliases so they cannot easily be identified

  8. Another dispersed community • Their communications are multilingual - harder for monitoring • Their communications include using propaganda via web sites and discussion forums that frequently change locations to avoid being identified • Propaganda: who else uses it? The Royal Family

  9. Terrorism Monitoring So what about the people who monitor terrorism? • Those who work in counter-terrorism use the same techniques to monitor the same systems to try and pick up the signals from organiser to terrorist • Not a lot is known about the threats posed through Internet use so far

  10. Terrorism Monitoring “There are eight different ways in which contemporary terrorists use the Internet, ranging from psychological warfare and propaganda to highly instrumental uses such as fundraising, recruitment, data mining, and coordination of actions.”

  11. Terrorism Monitoring • They use different portals on the web for tracking terrorism and disseminating that information – it is a constantly evolving medium for them • BUT – there are language barrier problems that cause delays • Consider the info reporting challenges when there is an alert – decisions are based on what?

  12. Terrorism Monitoring • A US parody for NSA Wiretapping by Walt Handelsman, Newsday: http://www.newsday.com/media/flash/2006-06/23671673.swf • A gripe about surveillance privacy monitoring in the US by the Nat Security Agency. However, NO government is innocent regarding privacy invasion in any medium

  13. Terrorism Monitoring • International monitoring evolves from Enigma coding used by the Germans in WWII. This cryptographic coding system for communication apparently - was eventually used to develop the birth of the Internet • When will - or should librarians start to take bigger roles in this sort of research? They get enough practice in classification, metadata, taxonomy, data mining and co-ordination skills

  14. Communication for research • Anonymity can be achieved using different communication systems • BUT - your writing style can give away your identity! Beware and alter your writing abilities to an extent where you cannot be recognised

  15. Communication for research • Add spelling mistakes on purpose – dumb down a little, but not to the point of stupid • Discussion forums and blogs – obtain feedback • Others don’t need to know who you are or why you want specific information

  16. Communication for research • Anonymouse is a tool to avoid being tracked when you are surfing the Web. Look at allnettools.com • Chinese often use these tools so no one can monitor what they’ve been looking at on the Web. Access these gateways to mask IP addresses to stop official bodies monitoring what you search

  17. Communication for medical research Virtual Reference services “Chasing the Sun” An international virtual reference service between health libraries • Gives 24 hour access to vital medical information between health professionals using global time differences to its advantage

  18. Communication for the SLA Asian Chapter The Asian Chapter has experimented in a number of ways to maintain frequent communication. We are currently making the most use of: • E-mail, Discussion Lists, RSS, COP and VOIP, and we are going to attempt virtual visits for Asian conferences

  19. Communication for the SLA Asian Chapter • Discussion Lists are used for the Chapter members to gain access to copies of AGM & Board Minutes, conference details, newsletter alerts, jobs and discussions

  20. Communication for the SLA Asian Chapter One Asian member is currently in a war torn zone: • They have a long walk to get to the nearest Internet café; contact is sporadic • Communication is basic; we maintain flexibility when considering how we keep in contact with our members

  21. Communication for the SLA Asian Chapter • COP. The practice of using COP is used to hold the meetings of the Board • There is control over who can access COP and they have to be a Board member to access certain areas • Easier dissemination of the “discussions” at the Board meetings

  22. Communication for the SLA Asian Chapter • Attempt of a virtual SLA Presidential handover to incoming President will take place at a conference in Asia this year • Untested so far • Back up is what?

  23. Communication for the SLA Asian Chapter • VOIP – Skype, Jabber, Yahoo, MSN, AIM, Sametime (Lotus), Plaxo • So far we have only only tested Skype and Plaxo. The majority of Board members use these • Basic requirement: access to a computer & maybe headphones and/or webcam

  24. How can VOIP be used? • Board Meetings and HE, distance learning, school kids – how do people enjoy learning? • Novelty factor for learning and visual communication is as important as attending in a classroom – learning methodologies for individuals

  25. How else can VOIP be used? • Facsimile reduction? attach Word documents and send via VOIP – not ready • Reduced telephony costs to the company; consider the savings that a call centre could make by changing over to new technology

  26. Drawbacks • Employees may not be allowed to load VOIP on their computers at the moment • They cannot access VOIP through the company firewall • Installation via the company, not individual employees accounts – monitoring of employee activities? Difference between a phone call?

  27. SKYPE

  28. A Demonstration Jeanette Regan, Canberra, Australia – Treasurer of the SLA Asian Chapter. Contact is via Skype with a webcam

  29. Acknowledgements • The Dark Web Portal: Collecting and Analysing the Presence of Domestic and International Terrorist Groups on the Web http://ai.arizona.edu/research/terror/publications/ITCS_Dark_Web_submission.pdf • How Modern Terrorism Uses the Internet http://www.usip.org/pubs/specialreports/sr116.pdf

  30. Acknowledgements • Chasing the Sun http://www.salus.sa.gov.au/cts/ctsmain.htm and http://www.salus.sa.gov.au/cts/ctsmembers.htm • A rogue RSS feed: http://meredith.wolfwater.com/wordpress/index.php - but read with care

  31. Acknowledgements • Michael Moore on Librarians: http://www.buzzflash.com/interviews/2002/03/Michael_Moore_031302.html • http://news.bbc.co.uk/1/hi/technology/4808882.stm

  32. Any Questions? Jane Macoustra Tai-Pan Research 1 Mitre Close, Sutton, Surrey, SM2 5HJ England http://www.tai-panresearch.com Tai-pan@blueyonder.co.uk Tel:+44(0)208 395-6603 ormobile: 07786 432639 This material is based on a presentation given at Internet Librarian International 16-17th October 2006, organised by Information Today, Inc., 143 Old Marlton Pike, Medford, NJ 08055, USA. Phone 1 (609) 654-6266. http://www.infotoday.com

More Related