Friday, November 28, 2008

Muddiest Point 12

If a digital library has its security compromised, and data is stolen that is under copyright protection, can the library/organization that maintains the digital collection be legally liable?

Friday, November 21, 2008

Muddiest Point

I don't know if this counts as a muddiest point, but it's a thought. If a digital library is created in the interest of a specific population that is likely to be able to access the material in terms of how computer literate they are, ought we be concerned about making sure computer illiterate people can access it? Digital libraries are created with the grand intention of democratizing the materials, but in practice, we have to place serious limitations on who can access them anyways to abide by copyright laws. So, I feel like worrying about 'disenfranchising' the user group who are unable to use computers or the Internet is less of a problem than it is made out to be, and is rapidly becoming even less.

Week 12

Implementing Policies for Access Management

Just like regular libraries need access policies for users, so do digital libraries. They are constrained by copyright laws, and other requirements. This model is a dynamic model, allowing policies to change for users as required. The policy information is stored as metadata and is not implemented until the user attempts to access it, and the user must be authenticated. Different types of users (faculty, student) will have different policies, and the material in the library will have different policies (general, reserve, reference) depending on the role of the user. The operation for each type of material for each type of user will change. You can then create a policy table from these things.

Having a good user interface is vital to allowing these policies to be maintained without irritating the user. The user should not be bombarded with many requests for authentication, passwords, and other nonsense. It should appear as seamless as possible.

This article was a good set of guidelines for having good access management. It is important to balance the need to uphold copyright laws and the need to provide a good experience to the user. This seems to find that balance.

Lesk Ch 9

This chapter was informative and interesting on a number of levels. First of all, it presents this economic issues that digital libraries are facing in a very clear, straightforward way. It does this while also addressing the economic issues facing all libraries in the modern world: increasing cost of journal subscriptions, whether or not to only offer digital subscriptions, and the constant need to prove one's worth to the umbrella organization, despite the fact that the library brings in very little money. It discusses these things simply with plenty of explanation and examples. It is a good chapter for understanding library economics.


Arms Ch. 6

This chapter discussed many of the same things that Lesk did, dealing with the economic framework of a digital library. The interesting part of this ocmpared to Lesk was the discussion of the legal issues related to digital libraries, particularly in terms of copyright. We have had copyright laws for a long time, but they've come into a new light since the advent of the digital age. Libraries and publishers are still trying to work out what is a good way to charge for these things, and how to appease everyone.

Personally, I like the idea of paying for it using advertisement. As browsers and languages have become more advanced, it is possible to have less obtrusive advertising. Plenty of bloggers support themselves by including advertising, and it is becoming less stigmatized to do so. I see nothing wrong with a free institution support its product with advertising, as long as it is appropriate and not annoying.

Arms Ch 7

This chapter discussed many of the same topics that the first article did: access management. However, Arms went into greater detail about the protocol for access management, as well as delving into the world of digital library security and encryption. If you are going to try to restrict access to the materials in a digital library, you need to make sure that it is difficult for some one to illegally access them without authorization. Understanding encryption is necessary.


In closing, here is an insanely happy puppy frolicking through the field.

Friday, November 7, 2008

Weekly Response 10

Arms Ch. 8: Usability and interface design

Aspects of usability: interface design, functional design, data and metadata, computer systems and networks. These are built on the conceptual model.

Interface design: appearance on the screen and manipulation by the user

Functional design: functions available to the user

Data and metadata: provided by the library

Computer systems and networks: necessary to make everything work.

Desktop metaphor: pioneered by the amazing Apple, it is most common now: a graphical interface that mimics the idea of an actual desk with folders, files and documents on it.

Browser function: retrieve a file from a web server and render it on the computer.

Digital libraries must accept that browsers are how users access the DL.

Digital Library Design for Usability

Interface Usability: Learnability, efficiency, memorability, and errors.

Organizational Usability: accessibility, compatibility, integratibility into work places, and social-organizational expertise.

Take home message: Know your community. Make the DL software to serve them.

Evaluation of Digital Libraries

Digital library designers and digital library users are at war!

Evaluation of digital libraries is not widespread because they are very complex, it is too early in their development to evaluate them, nobody cares, there isn't enough money, and evaluation is not part of the culture. Hence, it is difficult for DL designers to realize that the users are angry. This is unfortunate, because libraries of any sort are supposed to cater to patrons. Without happy patrons, the DL will not be used. If it is not used, then funding will dry up. Make your users/patrons happy!

Designing User Interfaces

Usability goals:
1. Appropriate to user needs.
2. Must be reliable in function.
3. Must be standardized to ease learning.
4. Must complete projects on time and within budget.

Thoughts: This article lays out many of the ideas mentioned before, but in a more generalized sense. One of the ideas they talk about is standardization and compatibility. The more standardized a program is, and the more compatible it is between other programs and versions, the more successful it will be. Think Microsoft, Windows and the Office suite. It's success was a function of the compatibility and standardization of all of those things. What surprises me so much about Vista and the new Office 2007 suite is how much they abandoned that premise. Office is barely compatible with its previous versions, and they completely revamped everything so it is new and not standardized. No wonder no one likes it! Perhaps Windows should learn from its own lessons.