Assignment 4:Final Evaluative Report

Part A – Evaluative Statement

Learning objectives of this project has been achieved by evaluating the entire OLJ reflection and related resources for further study of the location. In particular, 3 OLJ entry will highlight the social media networks and tools survey recorded experience.

I have demonstrates of 3 points for my learning by OLJ

  • Understanding of social networking and Web 2.0
  • Ability to use and evaluate social media tools
  • Ability to apply knowledge in a practical content

The OLJ posts I will discuss in this evaluative statement are:
4.1 Activity : The Library Minute

Complete reading and activities module INF506, I more in-depth understanding of  these tools, as well as the features and functionality by diigo, Facebook’s group, and a second life. For the professional tool that allows me know more 4C standard on Web 2.0 Expresses, its appreciation to participate actively. My personal experience with these synergistic value of social networking technologies and tools, and trained me how they might be used, with a combination of traditional library services to support groups, communities and organizations to understand information and collaboration needs. I have specially developed how these tools can effectively serve my target audience, I know the academic library services need to do the best communication within  be best for our user ‘s society, culture, learning and information needs.

At the beginning INF506, I have never heard of the word library 2.0, I did not understand what the meaning. Although this is from my topic, a lot of experienced librarians and library still 2.0. The concept of struggling in reading clearly, I have begun to develop what it means for my understanding. In my post about using the Arizona State University’s Web 2.0 tools to achieve the 4C standard, I noticed reuse 4C standard cooperation, conversation, communities and content creation. I think, Arizona State University’s use of video, online chat, a user-centric content creation, such as personalized playlists and a list of research citations, as well as their use Social Networking tools such as Facebook, Twitter’s, WhatsApp, Flickr and Youtube, All contribute to the practice of Library 2.0. Check the Arizona State University (ASU) Libraries. (n.d.). in the further development of the practice known me how these tools may be used in an academic library environment. As “features a library 2.0 Collaboration environment makes its website, more personalized and user-driven place. “(Frank & Yan Quan, 2014, p. 121). I am also particularly impressed with how to use social networking tools, such as their blog “gateway” to meet student learning and use of technology to engage students’ interest in their books.
5.2 Activity: Web 2.0 Libraries and Information Agencies

I take some reasons/aims of why the libraries should be used on social media when I finished the activity. Also, I have evaluated 3 of library “, they using social software to support their users’ needs, and to participate in the potential power of my Web 2.0 technologies, to raise awareness of the development of library services. I have been inconceivable in the range of 3 library implementation amazed social networking technologies and found tools such as RSS, embed photo galleries or videos, Facebook pages, Twitter accounts, pod-casting, instant messaging widgets, blog, and online library demonstrates how to create wealth opportunities for creative participation and interaction with customers.

 

6.1 Activity: Finding authentic information in a socially networked world

I understand that other issues have risen in our social network in the world of older vocational identity, privacy, security and trust to be resolved. I was surprised to realize that, despite many platforms appear to be the first to provide the opportunity to create and express themselves, and our best hope in Facebook profiles, posts on Twitter and photos on Instagram and other shared version. In fact, we offer more larger and smaller control digital world has become our digital footprint. These “public privacy” concerns, which is something that I’m worried about control issues to ensure that they understand their growing digital footprint will be what is a problem posted in social media, and how we can make the Internet via what is judged. “Once the creation and dissemination of digital traces they leave our direct control, the general land in the hands of others” (how much control we have in our data? (n.d.))However, I believe it is important to consider the social networking site at work development strategy plan.

 



Part B – Reflective Statement

Through my study of INF506 I have developed a good understanding of a variety of social networking technologies and the features and functionality of various Social Networking tools, and particularly of how these tools can meet user’s information needs.

Present and past for my research, which has been most of the problems I like. As NetWorker social idea is I’ve been pondering for some time, because I was lost in the countless I read my work every week, and the lack of focus on sharing information and records related to the use of information, I gather. I started this topic in my social networking software list is very short in hindsight, but I have been WhatsApp, YouTube, Facebook and an avid user of Skype for some time, we have been introduced to the academic space. These are the common methods I quickly told many of my friends and colleagues to communicate. I use this Web 2.0 technology into both sides of the subject and my new position as Technical Coordinator learning in my college.

I achieved on how to process and share my knowledge has been served by two pieces of software. The first is WhatsApp, which I had been using for communicate with my library collogues and users, give some general Q&A, also give an feedback on work and to start and finish my online days with current entries. The second is Facebook, I used to promote the library news-book or e-resources about sites and tools to assist student and teacher.I think there are many libraries direction are to promote the popularization and service stations skills or be able to connect at the same level. I found my focus, first of all library services is more beneficial than trying to keep up with the best. I will always be connected from these smart people learn, but it will continue to focus on sharing in my college community. The tips, tools and sites that will help them become more for the students and the best teachers services.

The 4C standard for social media (Gates, J., 2009) was a great guide to start my shift. It also served as the importance of your online character as their representation to remind online. Presented to our online courses from the Arizona State University (ASU) Libraries. (n.d.) YouTube video is also a key part of my service to my information forward planning. Library for the new social network presence caused a lot of thinking about what can work at my college library. It is a good News will continue to mean the community I have started to share links and can continue to use the website as well as in the future.

In conclusion, I as a social Net Worker. I had to jump in with Facebook as a key there. I immediately thought of how much I do not like the format, and privacy issues compared to interactive academic forum. “Facebook, even though I am particularly disgusted, I start adding to my timeline, avatar profile and create. The more I do, I prefer it can offer. This is a great lesson in this matter, you have to immerse In your own tool, we see the benefits, but I simply use Facebook as a social network, not a professional, although expected production line will blur more in the future (Woodward, 2012) decision. I admit that this is true, In my personality, and not reluctant to take the plunge.

On this issue, I have seen countless social media blog, articles and books, as well as more investigation. One such article written by Schrier (2011) share, I intend to take complete information professionals valuable comments. He especially like me who wrote the first three recommendations. Schrier advised me to find people there talking and listening; I participated in the study; I try to be transparent to build trust. He continued to advance reminders, planning and having a social media policy, both sides agreed to allow the use of moral responsibility and the use and management of social media. Policies to ensure a planned and effective way of social media (Bryson, 2007).

Schools must provide navigation for students, judges and the creation of advanced communications (Albert, 2013). I realize the truth, social media is here to stay, I have to stay aware of trends (Timmerman, 2012) obligations. With this inevitable fact (Cohen, 2012), I must ensure that students are taught how to manage their social networks in an ethical manner, so I need to do some responsible for all transactions.

 

References

Alber, R. (2013). Deeper learning: Defining twenty-first century literacy. In Edutopia, 21 January [blog]. Retrieved January 12, 2016 fromhttp://www.edutopia.org/blog/twenty-first-century-literacy-deeper-learning-rebecca-alber

Arizona State University (ASU) Libraries. (n.d.). The Library Channel. Retrieved January 23, 2016 from https://lib.asu.edu/librarychannel

Bryson, J. (2007). Chapter 10: Policy making. Managing information services: A transformational approach (pp. 125-130). Retrieved January 12, 2016 fromhttp://CSUAU.eblib.com/patron/FullRecord.aspx?p=429668

Cohen, H. (2012). Dr Suess’ 7 social media lessons. In Ragan’s PR Daily, 6 January [blog]. Retrieved January 23, 2016 fromhttp://www.prdaily.com/Main/Articles/10491.aspx#

Gates, J. (2009). The 4Cs of web 2.0 and storytelling. In The learning evolution. Retrieved January 23, 2016 from http://learnev.blogspot.com.au/2009/12/4-cs-of-web-20-and-storytelling.html

How Much Control Do We Have Over Our Data? (n.d.) In ‘Me and My Shadow’ Retrieved January 12, 2016  from https://myshadow.org/how-much-control-do-we-have-over-our-data

Schrier, R. A. (2011). Digital librarianship & social media: The digital library as conversation facilitator. D-Lib Magazine, 17(7/8). Retrieved January 12, 2016 from http://dlib.org/dlib/july11/schrier/07schrier.html

Timmerman, H. (2012). Social mediais here to stay: 10 things you should know. In Preview Networks, 9 February [blog]. Retrieved January 16, 2016 fromhttp://previewnetworks.com/blog/social-media-stay-10/

Woodward, M. (2012). Blurring the lines between work and personal life on Facebook. In Fox Business, 16 January [blog]. Retrieved January 14, 2016 fromhttp://www.foxbusiness.com/personal-finance/2012/01/16/blurring-lines-between-work-and-personal-life-on-facebook/

 

6.1.c Activity: Finding authentic information in a socially networked world

6.1.c What policy issues have resulted from social networking

Authenticity social network in the world have an impact on creating and location information. As information professionals in elementary and high school environment, it is necessary to ensure that students are equipped with the skills, do both.

Creating Authentic Content

Web 2.0 tools such as blog, wikis and micro-blogging space allows students in our college survey mode, global connectivity, display work and achievements, and to “further” evidence useful tool. In Journell, Ayers and Beeson (2014), Heafner and Friedman (2008) states that “the use of Internet-based network technology in an academic environment, more and more research base advocates.” The tools to do this. This academic integrity and to create and publish content online real meaning, other users may wish to access and use. It is important to “let our voices real, strong not invade our privacy.” (Sawyer, 2015). Use only photo or people licensed name; all references cited from the content has been read; remain “in the subject” content; ensure that the work has been edited by a second or third party.

Locating Authentic Content

In turn, positioned content is credible may be an ongoing challenge students. Find the most effective sites, especially when such a ready-made website in the search results, such as Wikipedia. Wikipedia can be used as’ a take-off point. “(Ghose, 2015), but students need to develop strategies to make major decisions which information is missing, and further looking for specific content. Using websites such as Wikipedia can educate students the scope of information literacy stakeholders concerned and their credibility within the use and development of student awareness of these issues. students can learn how to be critical thinkers, adopt best practice search and positioning strategy.

Only when students teach specialized skills to their identity and other information, they begin to feel confident in the Exploration and Use of dynamic online Web2.0 environment for their own needs.

References

Sawyer Hanson, K. (2015). Finding balance between online privacy and authenticity. Collective Bias. Retrieved fromhttp://collectivebias.com/blog/2015/04/finding-balance-between-online-privacy-and-authenticity/

Journell, W., Ayers, C. A., & Beeson, M. W. (2014). Tweeting in the classroom: Twitter can be a smart instructional tool that links students with real-time information and connects them to authentic discussions beyond school walls. Phi Delta Kappan95(5), 53.

Ghose, T. (2015). Can you trust Wikipedia on Science? Live Science. Retrieved from http://www.livescience.com/51926-are-wikipedia-science-pages-trustworthy.html

6.1 Activity: Identity, privacy, security and trust

6.1

Social networks Ironically, despite many platforms appear to be the first to provide the opportunity to create and express themselves, and our best hope in Facebook profiles, posts on Twitter and photos on Instagram and other shared version, in fact, we offer more larger and smaller control digital world has become our digital footprint. “Once the creation and dissemination of digital traces they leave our direct control, the general land in the hands of others” ((nd) how much control we have in our data?). For this reason, it is important that we try to ensure that we effectively in the digital world of information gives the best opportunity to manage our online identity in a positive performance.

But there are, even if we do our best to our “digital shadow” ((n.d.) how much control we have in our data?) It can be misunderstood concerns. Difficulties in her online blog article “scholar, Google yourself,” Doctors Inge Mewburn  discuss and deliberate control online identity management profile is what will Google search, but even as she said, “This is a consistent presentation some ways very confusing numbers outside world “((11 August 2015) scholars, Google yourself).

In its decision to admit, even though we may provide personal information at any given time a small aspect, digitized it is recorded, is “exporting data” essentially ((n.d) how much control we have what we should share is very important in our data?) still can put them together to create a more comprehensive information than we would like. this also applies to the organization, and for this reason it is used according to the policy on behalf of the organization as well as monitoring and management social media participation is important.

Ways of retaining some privacy online are discussed in the article ‘Internet Privacy Laws Australia: 5 Ways to Better Protect Yourself Online’ (9 June 2015) these involve taking note of the types of platforms or webpages which ask for information, protecting passwords and privacy settings on accounts and mobile devices as well as being aware of credible websites and scams.

 

References
How Much Control Do We Have Over Our Data? (n.d.) In ‘Me and My Shadow’ Retrieved January 12, 2016  from https://myshadow.org/how-much-control-do-we-have-over-our-data

I, Mewburn. Scholar, google thyself (2015, August 11). In ‘The thesis Whisperer’, Retrieved January 13, 2016 from http://thesiswhisperer.com/2015/08/11/scholar-google-thyself/

Law Answers Australia Blog team. Internet Privacy Laws Australia: 5 Ways to Better Protect Yourself Online’ (2015, June 9 ) In Law Answers Australia.com.au Retrieved January 16,2016 from https://www.lawanswers.com.au/blog/internet-privacy-laws-australia-5-ways-to-better-protect-yourself-online/

5.2 Activity: Web 2.0 Libraries and Information Agencies

5.2 Examples of Web 2.0 working for libraries & info agencies

Three libraries that I know of that use social networking to meet their goals are Hong Kong Public Library, Hong Kong Baptist University Libraries and Hong Kong University Libraries.

In investigating these libraries I have developed a list of reasons why libraries should be on social media:

  • Promotion and market reasons, many forms of these three libraries use social media for this purpose, as a result, they are exposed to hundreds of current and potential members to share their offer.
  • Educational program opportunities, which provide three libraries electronic tutorials and publicity through their YouTube page. This use of social media in order to make the library service extends beyond their physical libraries, and provide more services than they might otherwise be able to, due to the physical capacity constraints, budget and time of limited.
  • Social media is a way to further support services already in place. Online chat option, web pages and blog discussions backing review these libraries are meant to prove that they can assist the customer and service issues to a wider audience and more effective. In the reviewer’s staff use Facebook, allows members to post comments and share how usually provided by the service staff in the library can share a further example, faster access to more members.
  • Using social media tools, operating in the enterprise, it is also a valuable resource to help the library. Tools such as WhatsApp, Facebook and Google+ are among internal staff, and to reach a wider audience of potential new and effective way employees communicate quickly and effectively.
  • In order to remain relevant member who is getting the time difference, or who may not live physical access capabilities. By using social media libraries and the services provided are not so easy to be forgotten or not used. There is the emergence of a social media mean greatly increased the accessibility of members.

4.1 Activity : The Library Minute

4.1.a What is Library 2.0.

Library websites have evolved with Web 2.0 technologies and the principles of 4Cs.

4Cs

Arizona State University (ASU) Libraries are trying through their website, social network integration, “features a library 2.0 Collaboration environment makes its website, more personalized and user-driven place. “(Frank & Yan Quan, 2014, p. 121).

Arizona State University Library has accepted the 4C standard Web 2.0 in the following ways:

  • Collaboration: ‘Library Minute – Study Spaces’ is the workspace of a simple notification of the user video library to large groups of individuals. While encouraging cooperation between students and experts, for the opportunity to appear online this collaboration rarely.
  • Conversation: The ‘Library Minute – Ask a Librarian’ Links clearly explains various methods can be used to dialogue with other ways for a variety of applications, online and in person. Also, the tools such as WhatsApp, Line, Skype, Twitter and Facebook allow online conversations between the library and users.
  • Community: Arizona State University library using Facebook and Twitter social media tools to connect users to the library as an online community. Facebook is the most popular social networking tools, but there are also active on the Arizona State University’s website a few followers. Twitter is more effective with 3077 followers anywhere who give their community access, any time on any device, such as ‘Library Minute – Mobile Web’.
  • Content Creation: The ability to create online content for users unavailable. Content creation is the only library professionals. ‘Library Minute – Refworks’ is a reference manager, the user can use it to create citations for his work, is a form of content you can use YouTube’s example.

On ‘Library Minute – Social Connection’ shown that Arizona State University Library intention to do this. It has made a good effort, connected by Web 2.0, especially community and dialogue 4C standard user. While Web 2.0 technology alone does not make Library 2.0 environment and more work needs to be done to achieve the principles of collaboration and content creation.

References

Arizona State University (ASU) Libraries. (n.d.). The Library Channel. Retrieved December 23, 2015 from https://lib.asu.edu/librarychannel

Frank, B. & Yan Quan, L. (2014). Web 2.0 applications’ usage and trends in top US academic libraries. Library Hi Tech, 32(1), 120-138.

 

3.6 Activity: User Review Sites

3.6b

  • What are your thoughts about the credibility or quality of user reviews?

I personally use a user review sites such as TripAdvisor and Openrice themselves. I think in the comments provided in these sites reputation and quality have been involved bear a balanced view. Social network comments are not many other ways to be held personally accountable for their views, might use an alias, and may be trying to shake the other potential customers about their motives. I personally feel that to understand what would motivate me to comment on such sites in a negative or positive way, help me distinguish comments and appreciated my own views and expectations may be very different from the comments of people’s credibility.

  • Could they be used as good evidence of the quality of services or products?

I think more study needs to be done to the motivation behind the comment before the reason for these reactions may be used in this manner. Sunrise from the daily consumption points such comments may be worried that they may have doubts, they tried to keep the discussion favorable evidence. Because, accommodation if a person is determined, but some aspects of advertising provides a lower standard, and advertisers own rating conflict, for example, these may be the price, available images, location and so on, so in this case other comments can be useful as evidence.

  • How do you think about charging customers for leaving bad reviews on Tripadvisor?

I think it is inappropriate, in violation of the rights of customers, freedom of speech. From a business perspective, it can be harmful, if many of the comments have been posted negative feedback but if these statements are credible, then it is reasonable to other consumers have knowledge in this area. Enterprises should probably give their business problem, use these views to their own advantage and the right to work, they should have the right to respond to such comments. Those companies who own or work of such charge or limit their products actively express opinions on the same concept, this may just be misleading. It is to achieve a freedom of information and ensure accountability and projected into another example of the difficulties of balancing the credibility of the information society between.

3.2 Activity: Twitter

Twitter

I have found the useful Twitter accounts for my interests.

1. NY Public Library

To encourage lifelong learning, advanced knowledge and strengthen communities. There provide many images for your reading interest.

2. SCMP News

The SCMP Twitter is that you have up-to-date information at your fingertips, including the daily news.

Tweets by @SCMP_News

3. Penguin Books USA

Information provided by their new products, there is a good recommendation to purchase library from time to time.

4. Hong Wrong Blog

In politics, culture, science and technology, business and news feature stories. Many thought-provoking commentary can be found here.

5. NASA

If you love the outer space, you’ll love this Twitter account.

Tweets by @NASA

2.1 Activity: What is Web 2.0?

What is Web 2.0

What is Web 2.0?

Web 1.0 is Web 2.0 pioneer. Web 2.0 is located on the World Wide Web, enabling users to gather information and provide or publish the site. It allows people from around the world to connect and interact through the Internet, allowing users to add at any time involved in the information to a Web site or blog, you can have access to it may be made to see their own ideas. As Barnatt (2008) interpretation of Web 2.0. Mentioned interaction can occur between two or more users, two or more online services, or individual Internet users and software.

mod2_smlandscape2015

Web 2.0 business model is collaboration. Many sites appearing daily SMS button, such as YouTube, Twitter, Instagram and Facebook buttons, allowing users to share information to his or her followers options.

References

Barnatt, C. (2008) Explaining Web 2.0. In Explaining Computers.Retrieved 25 November, 2015 from https://youtu.be/7BAXvFdMBWw

 

Assignment 1

Assignment 1: OLJ Creation & First Entry

(a) Define what social networking is (in your own words);

For simplistic definition, Social networking is to establish a connection to expand their business and / or the development of social interaction through personal practice.

human-network

Also, I would be defined it is human cooperation on the internet, because people through to establishes interconnected online communities (sometimes known as social graphs) that help people make the good contacts and resolve some problem in life.

( b) List what social networking technologies and sites you already use (for personal, work and study purposes);

To date, I have use of social networking technologies included:

  • Facebook – For keep in touch with family, friends and colleagues. Sometimes for Posting, Reading, Sharing and ‘Likes’ articles of interest.
  • WhatsApp – Communicating with family, friends, students and colleagues.
  • Instagram – Use to take the photo or video and share them on a variety of social networking platforms, such as Facebook, Twitter and Flickr.
  • Google+ – I primarily use to post or share myself like Facebook.
  • Twitter – I primarily use to follow the special group for my interest as HKNEWS, K-pop and Games ,etc.
  • Diigo – link curation and resources, used mainly for CSU study purposes.
  • Evernote – an underutilised resource that I primarily use to replicate learning requirements.
  • Flickr – I primarily use to backup my photo taken and sharing with friends. Now, I use to access the CSU studies.

(c) Describe what you expect to learn from completing INF506.

I look forward to learning the new or not used social networking tools from INF506. Learn more about social networking and application development through the learning process in the future. At the same time, I hope that through these tools can help to facilitate the application of my life and work.