promoting innovation and technology in libraries
Friday, February 4, 2000
Embassy Suites Airport Hotel
The Contours of Cyberspace: An Adventure in Web-Based Education
3:15 p.m. - 4:15 p.m.
Colleen Bell, University of Oregon
This session will discuss one librarian's adventures in web-based
education, focusing on instructional design issues, the choice of
software, student responses and evalutions. The "Contours of
Cyberspace," a 4-credit, experimental course, was taught completely
online at the University of Oregon during spring term 1999, using the
WebCT courseware. Over 50 students vied for 25 seats, and enrollment
settled at 34 students. This session will discuss both the successes
and failures, and hopefully impart words of wisdom for those of you
contemplating your own adventures. There will be plenty of time for
questions and contributions from the audience.
has been the Library Instruction Coordinator at the University of Oregon
since October, 1996. She earned her MLIS from the University of Western
Ontario in 1991, and worked as an itinerant librarian in Canada for
three years before accepting a position as Systems Librarian at Eastern
Oregon University in 1994. She has been teaching in a variety of
capacities since 1987, and currently teaches at least one credit course
each year. This was her first experiment with teaching a web-based
course, and her second time teaching this particular course.
Cybergenealogy: Helping patrons with Genealogy on the Internet
Christopher D. Rumbaugh, Oregon State Library
Genealogy is one of the most popular hobbies, particularly among web
surfers, but you don't have to tell a librarian that! With the Internet
culture upon us, what can the librarian do to assist genealogy patrons
online? Christopher Rumbaugh brings over 10 years of genealogy
and 5 years of online experience together in a useful way to aid
librarians in directing these sometimes challenging patrons to the
resources they need. He'll show which sites to visit, which to avoid,
and discuss the various software packages for documenting family
Christopher Rumbaugh has been involved in genealogy research for
over 10 years. He first became interested while in high school when his
grandfather showed him a trunk full of old photographs and family
papers. Soon after, Christopher shared his enthusiasm and research
techniques by volunteering at a genealogy library. Since then he has
been lecturing at genealogy meetings and conferences, and instructing
a popular Chemeketa Community College Older Adult course entitled
"Cybergenealogy." Currently he is the LSTA/State Data Coordinator at
the Oregon State Library and an MLS candidate at the School of Library
and Information Management, Emporia State University (Kansas) at
Portland. Christopher enjoys genealogy, local history, ham radio and
music. He lives in Salem with his wife Gina and cats Noki and Romeo.
From Download your Workload to the Evil House of Cheat: Cybercheating,
Plagiarism, and Intellectual Property Theft
Theresa Gillis, Eastern Oregon University; Janeanne
Rockwell-Kincanon, Western Oregon University
Internet distribution of research materials does make plagiarism easier,
but it also makes it easier to catch the plagiarist. This session will
cover term paper mills on the Web, the use of translation software in
academic cheating, software and search engine resources to detect and
prevent academic dishonesty and intellectual property theft.
Theresa Gillis is Head of Reference and Instructional Services at
Eastern Oregon University. Janeanne Rockwell-Kincanon is the User
Education Librarian at Western Oregon University.
Securing Your Public PCs
Richard Wayne, University of Texas Southwestern Medical Center
This paper presents the issues and problems related to securing a PC
for patron use as well as several potential solutions.
As patron use of library microcomputers increases in importance,
maintaining the integrity of those computers also grows in importance.
The challenge from service and technical perspectives is providing
broad functionality on the computers while limiting potential
unintentional and intentional patron abuse of the computers.
A PC that provides the necessary patron functionality and that is also
secure is said to be locked-down. There are many ways to lock-down
a PC. An important first step is to select the appropriate hardware
and software. Lock-down can then be achieved through features
available in popular operating systems or through the implementation
of third party utilities.
The use of operating system security features may be a good option
for organizations with sufficient technical personnel. A plethora of
third party software can simplify the lock-down task and make it a
viable solution for almost any library. Lock-down can be achieved in
a number of different ways.
The lock-down choice should be made in the context of the needs of
the specific environment and the available technical resources.
Richard Wayne is the Assistant Director for Information Systems at
The University of Texas Southwestern Medical Center at Dallas Library.
Richard has worked with information technology for twenty-one years. He
has an M.B.A. with a concentration in Information Systems.
Ultimate Adaptation: Make It Simple Smarter Searching
Dale Vidmar, Southern Oregon University
While the continual "dumbing down" of Web search tools may cause the
experienced and savvy some concern, the shift toward simplicity may be
what is best for the common overall good of everyone. For professionals
and novices alike, having a keen understanding of the many specific
features available within search engines and directories is more than
a good idea, it is survival! It is the ultimate adaptation of power
searcher the ability to execute a search by knowing what works
known among Online Northwest circles as "Mr. Entertainment," is
an assistant professor and Electronic Resources and Instruction
Coordinator/Education and Communication Librarian at Southern
Oregon University. He has an M.L.S. from Kent State University.
Wednesday, 13-Dec-2006 09:32:49 PST