Articles Posted in Library News and Views

This year’s “60 Sites in 60 Minutes” program was standing room only! We had over 300 people attend. If you missed the session, or were there but want to see the presenters’ notes, you can go to the Power Point presentation with all the details. http://drop.io/60sites

Thanks again to Gayle Lynn-Nelson and John DiGilio for putting this program together.

E-Mail from Martha L. Foote, M.L.I.S. Chair, SLA Legal Division.

Courtney Selby, the Collection Development/Instructional Services Librarian at the Mabee Legal information Center, University of Tulsa has summarized the results of her recent survey:

Last week I sent out a 4 question survey about recent changes in bindery policies and procedures in academic libraries. I received 16 replies (thanks so much!) and wanted to summarize them here. There were a few key similarities that I did want to point out. It looks like budgetary considerations are the primary motivators in most respondents’ review of bindery policies. Some folks did note that space considerations factored into their decisions, and those librarians often indicated that they also chose to discard unbound volumes after 2 to 3 years. Most respondents indicated that they had ceased binding journal titles available in HeinOnline, though most also continued to bind journals and bar materials from their home states. All respondents that mentioned CLE’s noted that they will continue to bind them.

· (budget reasons) stopped all binding except for exceptional cases, such as important books or books that are falling apart

According to Ed O’Keefe in a June 5, 2009 Washington Post article, “Library Officials Accused of Interference”, Senator Charles E. Grassley has written a sharply worded letter to the Librarian of Congress , James H. Billington, stating “…Your office attempts to influence and/or control [the Office of Inspector General] appear to be in direct contravention of the principles underlying the creation of the Inspector General”. The article explains that the question is whether top officials at the Library of Congress interfered with investigations conducted by its “independent watchdogs” such as the Office of the Inspector General and whether they have admonished investigators for the tone and focus of their investigations.

For additional information on this topic see our April 30, 2009 posting on this blog which provides additional information and a link to the Marhc 2009 report of the Office of the Inspector General regarding information technology planning at the Library of Congress: Information Technology Strategic Planning: A Well Developed Framework is Essential to Support the Library’s Current and Future Infortation Technology (IT) Needs , Report Number 2008-PA-105 March 2008.

Web based criminal justice issues cannot be addressed in a rational manner without also the establishment and ongoing maintenance of a trusted and resilient information and communications infrastructure. Realizing the paramount importance of these objectives the Obama administration has been engaging in a mumber related activities including President Obama’s recent call for the creation of a cybersecurity coordinator who will orchestrate and integrate federal cybersecurity policies and agendas, and the release by the White House of a Report: Cyberspace Policy Review: Assuring a Trusted and Resilient Information Infrasturcture

These measures could not be more timely. The increasing rate that information on the web is being compromised in many ways including identity theft, willful distortion of information,and illegal wiretapping to name a few. Other organizations such as the American Association of Law Libraries (AALL) have long been concerned with issues related to the continuing integrity or authenticity of information on the web and are actively engaged in developing recommendations and helping others understand the importance of achieving and maintaining information authenticity of the web but additional help and support is needed. It is therefore most encouraging to see indications that the Obama administration is interested in taking an active role in addressing these and related issues.

The following are links to documents and articles discussing recent cybersecurity initiatives of the Obama administration.

Late in October 2008 rumors were circulating around the lbrary community that OCLC was in the process of updating its Guidelines for the Use and Transfer of OCLC Derived Records These rumors proved true; OCLC published its new policy on Sunday November 2, 2008. The reaction to these changes was sufficiently “swift and harsh” that on November 19, 2008 OCLC removed the original updated version and released a second updated version on November 19. Since that time reaction has continued to be animated, resulting in a continuing series of meetings, proposed changes, commentaries etc.

What is the present status of this discussion? To help answer that question Phyllis Post, who attended the May 2009 OCLC Members Council Meeting where a presentation was made by OCLC, has provided a brief but most helpful update which I received as an e-mail. With the permission of Phyllis I am posting her message below:

Colleagues,

In a recent e-mail Robert Richards, a Law Librarian and Legal Information Consultant from Philadelphia, mentions a recent Associatiion of Research Libraries (ARL) preservation report, “Safeguarding Collections at the Dawn of the 21st Century: Describing Roles & Measuring Contemporary Preservation Activities in ARL Libraries,” http://www.arl.org/bm~doc/safeguarding-collections.pdf .. More details are at http://www.arl.org/news/pr/preservation-14may09.shtml The report is organized around three main sections: Preservation Functions; Networked Digital Environment; and Collaboration. Within each section, background and analysis are provided and recommendations offered for consideration by ARL

We are delighted to see the updated List of Law Library Blogs. It was originally compled by Bonnie Shucha, University of Wisconsin Law School, and has been updated by Michael Robak, University of Illinios College of Law. When viewing this list it is important to note that it contains only law library blogs; all others have been removed. Many thanks to Bonnie for her pioneering efforts in creating the original list and to Michael for maintaining it at a high standard.

Rob Richards, a law librarian and legal information consultant in Philadelphia writes: “A list of empirical studies of law-related information behavior is now available at http://home.comcast.net/~richards1000/InformationBehavior.html . If you know of additional studies not listed, I’d be grateful to learn of them. Persons interested in this topic may be interested to know of the availability of a major new dissertation on this topic:

Stephann Makri, A Study of Lawyers’ Information Behaviour Leading to the Development of Two Methods for Evaluating Electronic Resources (2008) (unpublished Ph.D. dissertation, University College London), also available at http://eprints.ucl.ac.uk/14729/ .” We are always grateful to Rob for sharing such insights with us.

According to C.G. Lynch’s provocative artice in the CIO Insider Newsletter,Twitter’s growing popularity is exposing a considerable “fraility” of writing among those tweet. He observes that Twitter’s 140 character message format demands concise, engaging writing “and that’s a skill that a lot of people don’t have. To read more of Mr. Lynch’s practical, expert advice click here.

As for where to write, sometimes it seems as though tweeting or twittering is almost universal. Amy Hale-Jenke, Head of Reference at the 5th Circuit Court of Appeals has found many fellow twittering, or tweeting, law librarians by going to the Twitter Yellow Pages. To “meet” all types of legal professionals, including law librarians who like to tweet, you can also go to Justia’s Legal Birds, a “Twitter Community.” Perhaps all of this gives the quotation, “birds of a feather flock together” a special meaning. Thinking of all this one wonders if tweets are becoming sort of information age variations of haiku that are being spread around the web.

Contact Information