Assignment 4:Final Evaluative Report

Part A – Evaluative Statement

Learning objectives of this project has been achieved by evaluating the entire OLJ reflection and related resources for further study of the location. In particular, 3 OLJ entry will highlight the social media networks and tools survey recorded experience.

I have demonstrates of 3 points for my learning by OLJ

  • Understanding of social networking and Web 2.0
  • Ability to use and evaluate social media tools
  • Ability to apply knowledge in a practical content

The OLJ posts I will discuss in this evaluative statement are:
4.1 Activity : The Library Minute

Complete reading and activities module INF506, I more in-depth understanding of  these tools, as well as the features and functionality by diigo, Facebook’s group, and a second life. For the professional tool that allows me know more 4C standard on Web 2.0 Expresses, its appreciation to participate actively. My personal experience with these synergistic value of social networking technologies and tools, and trained me how they might be used, with a combination of traditional library services to support groups, communities and organizations to understand information and collaboration needs. I have specially developed how these tools can effectively serve my target audience, I know the academic library services need to do the best communication within  be best for our user ‘s society, culture, learning and information needs.

At the beginning INF506, I have never heard of the word library 2.0, I did not understand what the meaning. Although this is from my topic, a lot of experienced librarians and library still 2.0. The concept of struggling in reading clearly, I have begun to develop what it means for my understanding. In my post about using the Arizona State University’s Web 2.0 tools to achieve the 4C standard, I noticed reuse 4C standard cooperation, conversation, communities and content creation. I think, Arizona State University’s use of video, online chat, a user-centric content creation, such as personalized playlists and a list of research citations, as well as their use Social Networking tools such as Facebook, Twitter’s, WhatsApp, Flickr and Youtube, All contribute to the practice of Library 2.0. Check the Arizona State University (ASU) Libraries. (n.d.). in the further development of the practice known me how these tools may be used in an academic library environment. As “features a library 2.0 Collaboration environment makes its website, more personalized and user-driven place. “(Frank & Yan Quan, 2014, p. 121). I am also particularly impressed with how to use social networking tools, such as their blog “gateway” to meet student learning and use of technology to engage students’ interest in their books.
5.2 Activity: Web 2.0 Libraries and Information Agencies

I take some reasons/aims of why the libraries should be used on social media when I finished the activity. Also, I have evaluated 3 of library “, they using social software to support their users’ needs, and to participate in the potential power of my Web 2.0 technologies, to raise awareness of the development of library services. I have been inconceivable in the range of 3 library implementation amazed social networking technologies and found tools such as RSS, embed photo galleries or videos, Facebook pages, Twitter accounts, pod-casting, instant messaging widgets, blog, and online library demonstrates how to create wealth opportunities for creative participation and interaction with customers.

 

6.1 Activity: Finding authentic information in a socially networked world

I understand that other issues have risen in our social network in the world of older vocational identity, privacy, security and trust to be resolved. I was surprised to realize that, despite many platforms appear to be the first to provide the opportunity to create and express themselves, and our best hope in Facebook profiles, posts on Twitter and photos on Instagram and other shared version. In fact, we offer more larger and smaller control digital world has become our digital footprint. These “public privacy” concerns, which is something that I’m worried about control issues to ensure that they understand their growing digital footprint will be what is a problem posted in social media, and how we can make the Internet via what is judged. “Once the creation and dissemination of digital traces they leave our direct control, the general land in the hands of others” (how much control we have in our data? (n.d.))However, I believe it is important to consider the social networking site at work development strategy plan.

 



Part B – Reflective Statement

Through my study of INF506 I have developed a good understanding of a variety of social networking technologies and the features and functionality of various Social Networking tools, and particularly of how these tools can meet user’s information needs.

Present and past for my research, which has been most of the problems I like. As NetWorker social idea is I’ve been pondering for some time, because I was lost in the countless I read my work every week, and the lack of focus on sharing information and records related to the use of information, I gather. I started this topic in my social networking software list is very short in hindsight, but I have been WhatsApp, YouTube, Facebook and an avid user of Skype for some time, we have been introduced to the academic space. These are the common methods I quickly told many of my friends and colleagues to communicate. I use this Web 2.0 technology into both sides of the subject and my new position as Technical Coordinator learning in my college.

I achieved on how to process and share my knowledge has been served by two pieces of software. The first is WhatsApp, which I had been using for communicate with my library collogues and users, give some general Q&A, also give an feedback on work and to start and finish my online days with current entries. The second is Facebook, I used to promote the library news-book or e-resources about sites and tools to assist student and teacher.I think there are many libraries direction are to promote the popularization and service stations skills or be able to connect at the same level. I found my focus, first of all library services is more beneficial than trying to keep up with the best. I will always be connected from these smart people learn, but it will continue to focus on sharing in my college community. The tips, tools and sites that will help them become more for the students and the best teachers services.

The 4C standard for social media (Gates, J., 2009) was a great guide to start my shift. It also served as the importance of your online character as their representation to remind online. Presented to our online courses from the Arizona State University (ASU) Libraries. (n.d.) YouTube video is also a key part of my service to my information forward planning. Library for the new social network presence caused a lot of thinking about what can work at my college library. It is a good News will continue to mean the community I have started to share links and can continue to use the website as well as in the future.

In conclusion, I as a social Net Worker. I had to jump in with Facebook as a key there. I immediately thought of how much I do not like the format, and privacy issues compared to interactive academic forum. “Facebook, even though I am particularly disgusted, I start adding to my timeline, avatar profile and create. The more I do, I prefer it can offer. This is a great lesson in this matter, you have to immerse In your own tool, we see the benefits, but I simply use Facebook as a social network, not a professional, although expected production line will blur more in the future (Woodward, 2012) decision. I admit that this is true, In my personality, and not reluctant to take the plunge.

On this issue, I have seen countless social media blog, articles and books, as well as more investigation. One such article written by Schrier (2011) share, I intend to take complete information professionals valuable comments. He especially like me who wrote the first three recommendations. Schrier advised me to find people there talking and listening; I participated in the study; I try to be transparent to build trust. He continued to advance reminders, planning and having a social media policy, both sides agreed to allow the use of moral responsibility and the use and management of social media. Policies to ensure a planned and effective way of social media (Bryson, 2007).

Schools must provide navigation for students, judges and the creation of advanced communications (Albert, 2013). I realize the truth, social media is here to stay, I have to stay aware of trends (Timmerman, 2012) obligations. With this inevitable fact (Cohen, 2012), I must ensure that students are taught how to manage their social networks in an ethical manner, so I need to do some responsible for all transactions.

 

References

Alber, R. (2013). Deeper learning: Defining twenty-first century literacy. In Edutopia, 21 January [blog]. Retrieved January 12, 2016 fromhttp://www.edutopia.org/blog/twenty-first-century-literacy-deeper-learning-rebecca-alber

Arizona State University (ASU) Libraries. (n.d.). The Library Channel. Retrieved January 23, 2016 from https://lib.asu.edu/librarychannel

Bryson, J. (2007). Chapter 10: Policy making. Managing information services: A transformational approach (pp. 125-130). Retrieved January 12, 2016 fromhttp://CSUAU.eblib.com/patron/FullRecord.aspx?p=429668

Cohen, H. (2012). Dr Suess’ 7 social media lessons. In Ragan’s PR Daily, 6 January [blog]. Retrieved January 23, 2016 fromhttp://www.prdaily.com/Main/Articles/10491.aspx#

Gates, J. (2009). The 4Cs of web 2.0 and storytelling. In The learning evolution. Retrieved January 23, 2016 from http://learnev.blogspot.com.au/2009/12/4-cs-of-web-20-and-storytelling.html

How Much Control Do We Have Over Our Data? (n.d.) In ‘Me and My Shadow’ Retrieved January 12, 2016  from https://myshadow.org/how-much-control-do-we-have-over-our-data

Schrier, R. A. (2011). Digital librarianship & social media: The digital library as conversation facilitator. D-Lib Magazine, 17(7/8). Retrieved January 12, 2016 from http://dlib.org/dlib/july11/schrier/07schrier.html

Timmerman, H. (2012). Social mediais here to stay: 10 things you should know. In Preview Networks, 9 February [blog]. Retrieved January 16, 2016 fromhttp://previewnetworks.com/blog/social-media-stay-10/

Woodward, M. (2012). Blurring the lines between work and personal life on Facebook. In Fox Business, 16 January [blog]. Retrieved January 14, 2016 fromhttp://www.foxbusiness.com/personal-finance/2012/01/16/blurring-lines-between-work-and-personal-life-on-facebook/

 

6.1.c Activity: Finding authentic information in a socially networked world

6.1.c What policy issues have resulted from social networking

Authenticity social network in the world have an impact on creating and location information. As information professionals in elementary and high school environment, it is necessary to ensure that students are equipped with the skills, do both.

Creating Authentic Content

Web 2.0 tools such as blog, wikis and micro-blogging space allows students in our college survey mode, global connectivity, display work and achievements, and to “further” evidence useful tool. In Journell, Ayers and Beeson (2014), Heafner and Friedman (2008) states that “the use of Internet-based network technology in an academic environment, more and more research base advocates.” The tools to do this. This academic integrity and to create and publish content online real meaning, other users may wish to access and use. It is important to “let our voices real, strong not invade our privacy.” (Sawyer, 2015). Use only photo or people licensed name; all references cited from the content has been read; remain “in the subject” content; ensure that the work has been edited by a second or third party.

Locating Authentic Content

In turn, positioned content is credible may be an ongoing challenge students. Find the most effective sites, especially when such a ready-made website in the search results, such as Wikipedia. Wikipedia can be used as’ a take-off point. “(Ghose, 2015), but students need to develop strategies to make major decisions which information is missing, and further looking for specific content. Using websites such as Wikipedia can educate students the scope of information literacy stakeholders concerned and their credibility within the use and development of student awareness of these issues. students can learn how to be critical thinkers, adopt best practice search and positioning strategy.

Only when students teach specialized skills to their identity and other information, they begin to feel confident in the Exploration and Use of dynamic online Web2.0 environment for their own needs.

References

Sawyer Hanson, K. (2015). Finding balance between online privacy and authenticity. Collective Bias. Retrieved fromhttp://collectivebias.com/blog/2015/04/finding-balance-between-online-privacy-and-authenticity/

Journell, W., Ayers, C. A., & Beeson, M. W. (2014). Tweeting in the classroom: Twitter can be a smart instructional tool that links students with real-time information and connects them to authentic discussions beyond school walls. Phi Delta Kappan95(5), 53.

Ghose, T. (2015). Can you trust Wikipedia on Science? Live Science. Retrieved from http://www.livescience.com/51926-are-wikipedia-science-pages-trustworthy.html

6.1 Activity: Identity, privacy, security and trust

6.1

Social networks Ironically, despite many platforms appear to be the first to provide the opportunity to create and express themselves, and our best hope in Facebook profiles, posts on Twitter and photos on Instagram and other shared version, in fact, we offer more larger and smaller control digital world has become our digital footprint. “Once the creation and dissemination of digital traces they leave our direct control, the general land in the hands of others” ((nd) how much control we have in our data?). For this reason, it is important that we try to ensure that we effectively in the digital world of information gives the best opportunity to manage our online identity in a positive performance.

But there are, even if we do our best to our “digital shadow” ((n.d.) how much control we have in our data?) It can be misunderstood concerns. Difficulties in her online blog article “scholar, Google yourself,” Doctors Inge Mewburn  discuss and deliberate control online identity management profile is what will Google search, but even as she said, “This is a consistent presentation some ways very confusing numbers outside world “((11 August 2015) scholars, Google yourself).

In its decision to admit, even though we may provide personal information at any given time a small aspect, digitized it is recorded, is “exporting data” essentially ((n.d) how much control we have what we should share is very important in our data?) still can put them together to create a more comprehensive information than we would like. this also applies to the organization, and for this reason it is used according to the policy on behalf of the organization as well as monitoring and management social media participation is important.

Ways of retaining some privacy online are discussed in the article ‘Internet Privacy Laws Australia: 5 Ways to Better Protect Yourself Online’ (9 June 2015) these involve taking note of the types of platforms or webpages which ask for information, protecting passwords and privacy settings on accounts and mobile devices as well as being aware of credible websites and scams.

 

References
How Much Control Do We Have Over Our Data? (n.d.) In ‘Me and My Shadow’ Retrieved January 12, 2016  from https://myshadow.org/how-much-control-do-we-have-over-our-data

I, Mewburn. Scholar, google thyself (2015, August 11). In ‘The thesis Whisperer’, Retrieved January 13, 2016 from http://thesiswhisperer.com/2015/08/11/scholar-google-thyself/

Law Answers Australia Blog team. Internet Privacy Laws Australia: 5 Ways to Better Protect Yourself Online’ (2015, June 9 ) In Law Answers Australia.com.au Retrieved January 16,2016 from https://www.lawanswers.com.au/blog/internet-privacy-laws-australia-5-ways-to-better-protect-yourself-online/

5.2 Activity: Web 2.0 Libraries and Information Agencies

5.2 Examples of Web 2.0 working for libraries & info agencies

Three libraries that I know of that use social networking to meet their goals are Hong Kong Public Library, Hong Kong Baptist University Libraries and Hong Kong University Libraries.

In investigating these libraries I have developed a list of reasons why libraries should be on social media:

  • Promotion and market reasons, many forms of these three libraries use social media for this purpose, as a result, they are exposed to hundreds of current and potential members to share their offer.
  • Educational program opportunities, which provide three libraries electronic tutorials and publicity through their YouTube page. This use of social media in order to make the library service extends beyond their physical libraries, and provide more services than they might otherwise be able to, due to the physical capacity constraints, budget and time of limited.
  • Social media is a way to further support services already in place. Online chat option, web pages and blog discussions backing review these libraries are meant to prove that they can assist the customer and service issues to a wider audience and more effective. In the reviewer’s staff use Facebook, allows members to post comments and share how usually provided by the service staff in the library can share a further example, faster access to more members.
  • Using social media tools, operating in the enterprise, it is also a valuable resource to help the library. Tools such as WhatsApp, Facebook and Google+ are among internal staff, and to reach a wider audience of potential new and effective way employees communicate quickly and effectively.
  • In order to remain relevant member who is getting the time difference, or who may not live physical access capabilities. By using social media libraries and the services provided are not so easy to be forgotten or not used. There is the emergence of a social media mean greatly increased the accessibility of members.