Posts filed under ‘Collaboration’
Posted by Robert J. LackieThe American Library Association (ALA), the Federal Reserve, and I hope that many librarians and their libraries are participating in the first ever national Money Smart Week® @Your Library this week, April 2-9, 2011! Money Smart Week (a registered service mark of the Federal Reserve Bank of Chicago) events are taking place now at member libraries across the country covering topics from learning how to apply for a mortgage to teaching young people about credit to ID theft protection, with many resources uploaded to the Money Smart Week® @Your Library official site, linked above. Visit this site for information on this initiative and for news and important links you can use this week, right now!
Additionally, Rider University’s Center for Business Forensics (CBF) has hosted several free interactive panel presentations for the general public (students, staff, community members, etc.) and law enforcement personnel focusing on the major issues surrounding identity theft—including financial literacy—and providing insight into the widespread, varying, and serious nature of identity theft.Dr. Drew Procaccino, a professor of computer information systems at Rider, has organized and led these Identity Theft: What You Need to Know sessions with panels of experts from law enforcement, banking, legal, library, IT, CIS, and health care organizations. As a panelist several times and as a new member of the American Library Association’s Academic MSW@Your Library Committee, I want to again provide everyone with some frequently repeated “best practices” from the panel experts for detection and protection, especially since this week (until April 9, 2011), we are officially celebrating the 10th year anniversary of Money Smart Week. Here are the 10 best practices/advice from our panel of experts at Rider’s CBF sessions:
1. Shred with a crosscut or micro shredder pieces of mail that contain any personal information before throwing them in the trash at home or at work.
2. Place outgoing mail and retrieve incoming mail via a locking mailbox or official Postal Service box.
3. Use a virtual credit card number (available through most banks) for online purchases, rather than your “real” credit card—connected to your card, the virtual number can be set up to only be used once, for that one online purchase (or for longer, but only if you wish).
4. Keep an eye on your credit card when you are paying for something—don’t allow it to disappear out of your sight (skimming of your card could occur).
5. Inventory/photocopy what is in your wallet/purse and place that photocopy (back and front of cards) in a locked cabinet—if your wallet/purse is stolen, you have all the info.
6. Never respond to an unsolicited email from your bank, medical organization, etc., and don’t unsubscribe—don’t even click on the link, just delete it.
7. Cover the ATM keypad from prying eyes and cameras with one hand while you enter your PIN.
8. Review your credit reports (you can get a free one each year from each of the three credit reporting agencies, and if you stagger requests, you can get one every four months).
9. Clear private data from your browser (i.e., Firefox, IE, or Safari): delete temporary files, browsing history, cookies, cache, saved form information, and saved passwords, especially when using a public computer or kiosk at a library, hotel, airport, coffee shop, etc., and then shut down your browser.
10. Use different passwords for different sites—and try changing/updating your passwords to passphrases.
Last but least, my annually-updated free website, Personal Profiles and Other Publicly Available Information: An Internet Hotlist on Detecting and Protecting Your Digital Footprint, contains some of my favorite ID theft protection, privacy information, and financial assistance sites, among other things, found on experts’ sites on the free Web, including our Identity Theft: What You Need to Know seminar project’s 29-page handout from Rider University, available to all.
Remember, according to Terri Cullen, author of The Wall Street Journal Complete Identity Theft Guidebook: How to Protect Yourself from the Most Pervasive Crime in America, ( “…Identity theft covers several different specific crimes, and collectively,…is one of the easiest crimes to commit, one of the hardest to prosecute, and one that is drawing increasing attention from the media.” So, feel free to share this information with all of your patrons and students, especially because proactively protecting your digital footprint and your finances is much easier than dealing with them after the fact as a victim—being a victim can be a very emotional, time-consuming, and financially-unrewarding process. Again, prevent it from ever happening to you, and help others do the same.Anyway, I hope this all helps you during Money Smart Week® @Your Library this week, April 2-9, 2011. Enjoy partnering with and/or sharing pertinent information from your community groups, financial institutions, government agencies, educational organizations, and other financial experts this week to help all of our consumers learn to better manage and protect their personal finances!
Posted by Robert J. Lackie
The American Library Association (ALA) has announced in October 2010 a partnership with the Federal Reserve Bank of Chicago to make “Money Smart Week @ Your Library” a national initiative from April 2-9, 2011, and things are beginning to heat up now in late December—at least for this national initiative!
Celebrating its 10th year in 2011, Money Smart Week’s mission is to promote personal financial literacy (Note: Money Smart Week is a registered service mark of the Federal Reserve Bank of Chicago). Throughout the 10-year history of Money Smart Week, libraries have been instrumental in facilitating and hosting quality Money Smart Week events. For instance, libraries of all types in Illinois (and Chicago), Indiana, Iowa (and Quad cities), Michigan, West Virginia, and Wisconsin participated in Money Smart Week in 2010, partnering with community groups, financial institutions, government agencies, educational organizations, and other financial experts to help consumers learn to better manage their personal finances.
ALA and the Federal Reserve hope that even more librarians and their libraries will be participating in the first ever national Money Smart Week this spring, from April 2-9, 2011. Events will take place at member libraries across the country and will and cover topics from learning how to apply for a mortgage to teaching young people about credit. We all, librarians included, can benefit from that! Watch this site ( http://www.chicagofed.org/webpages/education/msw/index.cfm ) for information on joining the initiative, for news, and for important links you can use right now.
I will be posting again later this week requesting info from all Library Garden readers on programming ideas, as I am now, as of this month, on the Academic Money Smart Week @ Your Library Committee for ALA.
Posted by John LeMasney
Yesterday (March 14th) was Pi day in Princeton, a celebration corresponding with Einstein’s birthday, and I saw (a little bit too late, I’m afraid) a suggestion from Janie Hermann to repost a great article which I sent her on “10 amazing life lessons” that one could interpret from Einstein’s quotes.
The article is at http://www.dumblittleman.com/2010/03/10-amazing-lessons-albert-einstein.html and the ideas from that article are listed in this illustration here.
In keeping with my visual posting plans for LG, I used Inkscape to make this image. I started with the famous Lucien Aigner image of Einstein at a chalkboard, and bitmap traced it in grayscale mode with 4 layers, which results in a posterized, if very recognizable image made out of points and lines. I extended the blackboard and using the calligraphy and gradient tools made a smooth transition between what’s in the photo and a gray neutrality. Then, I took the content of the post and laid it out in the right side of the image.
Thanks Albert, for all you brought to our lives. Thanks Lucien for the great image. Thanks to Janie for the suggestion. Thanks to you for taking a moment to remember Einstein with me.
Related articles by Zemanta
- Happy Pi Day & Happy Birthday Albert Einstein [Moment of Geek] (buckdaddyblog.com)
- Pi Day and Thinking About “Pi” (lockergnome.com)
- Albert Einstein: birthday greetings (scienceblogs.com)
Hi, everyone! One of my favorite librarians and open source advocates (Nicole Engard) just Tweet DMed me and asked if I ever shared officially the tools I mentioned in a discussion session on Presentation Tools and Techniques at Pres4Lib at Princeton Public Library. I replied no, with regrets. I figured if she’s wondering about it, maybe you are too!
By the way, if you like our articles, please share them on Twitter, Facebook, and anywhere else you like.
I use a pretty well structured, personally vetted workflow for developing presentations and blog posts that involves developing an outline, collecting images, preparing images, research and citations. Let me share some of the tools that I use to accomplish these tasks just about every time.
Google Docs Presentations
I stopped using Microsoft PowerPoint a few years ago and have not looked back. While I would consider using the open source alternative of OpenOffice.org’s presentation tool, by instead choosing a presentation tool in the cloud, I get the ability to edit and present anywhere where I’m connected, the ability to edit offline with Google Gears installed on Firefox, the common ability to add images, draw pictures, embed my slideshows (!), allow people to automatically see the latest greatest embedded versions of my presentations up to the second after I’ve updated them, allow for collaboration and co-viewing and if I absolutely must, export to a PDF for offline sharing and presentation disaster backup. I can even make a PPT for someone who insists on it.
I typically log in to Google Docs, create a title slide for my topic, and then immediately develop an agenda slide, which I then begin to outline with the topics (and slides) that I want to cover in my talk. My style emphasizes simple broad topics which I elaborate on in spontaneous ways. I try to keep the number of words on slides to an absolute minimum. I usually make a slide for each of my topics, and I then try to look for stories, photos, and illustrations that lead the people in the audience to start thinking about my topics before I introduce them verbally or textually.
Creative Commons vetting via Google Image Search
Google Image Search is far and away the best image search tool I’ve come across (with the ability to search for line art, faces, and by color, etc.), especially now, since the recent addition of the license search feature in the advanced image search tool, which allows me to search according to Creative Commons licenses applied by designers and photographers to their images all over the web. This is especially important for me because I don’t just want to just use other peoples’ images in my work without their consent. I want to respect the wishes of image creators. By using the license restrictions, I can quickly find images available for commercial use, images allowed to be modified, images that simply require attribution, and even images in the public domain.
When we respect the rights of creators and innovators, and celebrate others’ work properly, I believe we engage in modeling important aspects of information literacy, if not common humanity.
I’ll search for a topic keyword, often choosing CC-attribution licensing, which allows me the greatest flexibility with which to use the images, to modify them, use them in commercial situations, and promote creative commons licensing, while simply being required to include attributive references to the original image author. I will very often name the file locally with the name of the author of the image, in the format “by username.jpg” or “from nameofwebsitedotcom.jpg” so that I have a built in back-reference.
Once I have the images I want to use in my presentation saved to my local hard drive in a project folder, I often need to tweak, categorize, combine, title, tag, and integrate the images. While I can do this in a myriad of different utilities, tools, and applications, none of them have quite the combination of speed, comprehensive toolset, ease of use, functions, smoothness, or slickness of Google’s Picasa. Once you have downloaded and installed this free tool, you can use a Google account to store images in free named online galleries and keep them synchronized for free. With the number and variety of images I work with in my design and presentation work, I am thrilled that I have Picasa to help me wrangle them all.
I use it to tag, group, move, geocode, describe, upload, tweak, collage, print, and watermark my images for presentations, design work, papers, and everything else. It is a free, versatile, and irreplaceable tool in my personal tool set.
Zotero is a Firefox extension that allows for the single click based collection, categorization, tagging, editing, and even full text storage of web based database entries, books, articles, presentations, images and other standard citable sources. The amazing thing it that it automatically recognizes and collects metadata when it is present in a form that Zotero understands. This might sound like a difficult thing for content providers to implement, but all I had to do to make my WordPress blogs compliant was to install a single metadata-providing plugin (COinS) that offers my name, the title of posts, the publication date and other automatically generated metadata in blogging to Zotero users. Other sources who provide the relevant metadata to Zotero include major scholarly databases like Ebsco, newspapers like the New York Times, online booksellers like Amazon, and blogs and wikis around the world.
If I haven’t hooked you in to using Zotero yet, did I mention that with two clicks, you get properly formatted bibliographies in APA, MLA, and other citation styles? After I’ve visited books on Amazon and collected their data, or after I’ve found articles on Google Scholar and collected their data, or after I’ve grabbed creative commons licensed images from Flickr and collected their data, I can simply select all of them in my Zotero database, right click, and choose “Make bibliography from selected sources” which I then choose to send to clipboard, then paste right into my final slide, reference area of my paper, or wherever else I need to respect copyright or usage license. It is also a phenomenal way to meet the requirements of CC Attribution.
Number 5, QuoteURLtext (https://addons.mozilla.org/en-US/firefox/addon/4292) is another Firefox Extension that does one thing, but does it exceptionally well. It copies the highlighted text on a page along with the date and time, URL, and page title to the clipboard so that you can easily paste some casual piece of information (such as a tasty tech tip, a quick statistic, a delicious quotation, or a little known fact) into a slide, paper, or post without having to go so far as to reference it in APA style. It’s like a casual little sister utility to the powerhouse that is Zotero.
<Jeopardy Daily Double Music> Bonus Tool: Zemanta: </Jeopardy Daily Double Music>
Finally, Zemanta (a play on semantic) is another Firefox extension that shows up in a sidebar when you are using supporting applications, such as Gmail, Blogger, WordPress, and other applications (check out their site for more). I desperately wish it worked with Google Docs Presentations, but nothing hints at that yet. Here’s why I care: All of the photos, captions, tags, post story articles, and even some of the links to referential sources were all suggested, generated and placed with a single click each using Zemanta. As I type, Zemanta autoscans sources with CC licensed imagery, content, and resources related semantically to my content. Let me reiterate: As I type. All I need to do to add it to my post is simply to click. Clickety-clickety.
A pleasure to speak with you as always, I hope you learn to love these great free tools for developing your presentations just as much as I do.
Related articles by Zemanta
- A Simple Way to Specify Image Licenses (thaibrother.com)
- Back to School: 10 Must-Have Firefox Extensions for Students (mashable.com)
- 10 Browser Based Research Tools (imakethingswork.com)
This week, we’re pleased to have a guest post from two wonderful librarians:
- Justin Hoenke is the Teen Librarian for the Cape May County Library.
- Melissa Brisbin is the Media Librarian for the Cape May County Library.
Thanks for sharing this with LG readers! -PB
Justin: I’ll start off by saying this. It’s been two weeks since our Teen Library Lock-In ended and I’m not sure if I’ve recovered yet. My brain is still a bit fuzzy and I still don’t think I’ve caught up on sleep. If I tend to ramble or get lost when I’m talking, we’ll just blame it on that. You got my back Melissa?
Melissa: I’ll watch your back if you watch mine. I’m still sort of in a sleep-induced coma.
The Initial Idea
Justin: My Teen Advisory Board kept on talking about how they wanted to spend the night in the library. I thought they were sort of crazy at first, but the longer I thought about it the more it seemed like a really great idea. And I had this feeling that the teens would freak out and love the program.
I did some research on how these types of events were structured. I must say that without the guidance of the teen librarians at both the Corvallis-Benton County Library and the Willingboro Public Library I wouldn’t have ever got our Library Lock-In off the ground. I borrowed bits and pieces from their lock-in programs and created an outline and a permission slip. With these two things in hand, I had something to give my directors.
Melissa: One of the biggest concerns we had when constructing the Cape May County Library Teen Lock-In was how to keep our participants entertained and out of trouble. We decided that the best way to go about this was to implement activities such as an Library Olympics and a scavenger hunt, combined with an ongoing marathon of Harry Potter movies, crafts, and computer access, as well as continuous usage of our video game systems, such as the Wii, Playstation 3, and Xbox.
Justin: The idea was to start the lock in right after our weekly game night ended. The games would already be set up and I thought gaming, especially Rock Band, would be a good community building game where the kids could get to know one another. After the scheduled events such as the library Olympics and the scavenger hunt, things got a bit looser. We had one room dedicated to a Harry Potter movie marathon, the video games still set up, one room for tabletop gaming, and crafts in the children’s room. We wanted to have some structure to the program but at the same time let teens be teens and have some random (and very supervised) fun.
Justin: Once I got the OK from my directors to have the lock-in, I knew that I had to assemble a REALLY good team of librarians and library associates to help run the event. I sort of felt like I was putting together “The A-Team” of Library Lock In staff members. I knew I had to have the right blend of people who the teens could identify with and not feel intimidated by. I ended up with 7 (counting myself) chaperones for the thirty teens that had signed up. That’s roughly 4 teens to every chaperone, which is something I thought was manageable.
Making it all work
Melissa: As an example of one of our planned activities, I will highlight the obstacle course, which like the scavenger hunt, was created to promote fun activities that would also reflect library usage. For instance in the obstacle course, all participants were told to carry a book on their head, paperback of course, and then proceed to the next activity. Teens had to carry a book on their head, walk with the book while wearing box shoes, crab walk with a book on their stomach, jump down an aisle while still carrying the book and find works written by a variety of author(s), and finally dig though a box filled with scrap paper in order to locate a library card that had a Teen sticker on it. All participants worked in teams and were timed. For the winners, we planned an award ceremony that was similar to the Olympics, complete with medals for first, second, and third place.
Justin: Call me a hippy, but I’m all about good and positive vibrations. I always wanted to make sure that both the chaperones and the teens all respected each other and created a positive community.
Melissa: We also wanted to stress to teens the importance of good behavior, and how exceptional actions would be acknowledged and rewarded. We implemented a Good Behavior Chart. Teens were awarded stickers that they could post next to their name in order to win an array of prizes at the end of the night. I have to admit at first we were not sure if this idea would work, or if teens would see the idea as somewhat immature and childish. However, like teens have a tendency of doing, at least for me, they proved to be an exceptional group of young adults. They really went above and beyond to help out the librarians and each other. There was definitely on ongoing competition among the teens, but it was never malicious. They were all super positive and a lot of fun to hang out with.
The Actual Event
Justin: I got into work the day of the event at 4:30 and made sure all the loose ends were tied up by the time we started at 7pm. The first few hours were a bit hectic in getting all the teens together and in one place. Once that was done, we started off on the scheduled events. Some teens didn’t want to join in, so that was a bit difficult in explaining to them that they had to be there and once these things were done they’d have a bit more freedom.
Melissa: Once we were finished with the scheduled events, the Teens were allowed to be in either one of three rooms. They were great about telling us where they were going and we didn’t experience any problems with them disappearing. Most of teens just meandered between games, movies, crafts, and lots and lots of conversations.
Justin: We asked the teens at the beginning of the program to always tell at least one chaperone where they were going. We told them that this was one of the most important things they could do throughout the night. They were amazing
Justin: The alternate title for this section is “This is what we’ll do differently the next time around.”
We had one incident at the lock in that sounded the alarms. During a game of hide and seek/manhunt, two teens collided with each other. One had glasses on, so the other teen got quite a big gash on their head. It was big enough that stitches were needed. We had to call their parents at 1am and let them know what happened. They came to the library and we had to go to the Emergency Room. I accompanied the teen and the parent there, and 20 minutes later, the teen was all stitched up and ready to go. The parent let the teen come back to the library. I feel like I lucked out on this one. Incident reports had to be filled out and the overall mood of the lock-in really changed after that.
Melissa: Yes, everyone really mellowed out, such as a lot less horsing around, and became more interested in hanging out, talking to one another, and playing video games.
What We Have Learned and What the Teens Taught Us
Melissa: The overall of theme of the entire Lock-In was camaraderie. It was evident from the beginning that there was a relatively wide range of ages and maturity levels, as well as groups and interests. However, throughout the night, it became extremely evident that all the teens were just interested in hanging out with each other in an array of activities. The entire Teen Lock-In produced a fantastic sense of community atmosphere. In all, this event was A LOT OF FUN WITH A GREAT FLOW AND POSITIVE INTERACTION. It was a fantastic opportunity to librarians to get to the teens and vice versa. We have received a great response from teens, parents, and administration. We will definitely plan more Teen Lock-Ins for the future, using the knowledge and lessons we have learned from our initial experiences with this program.
Justin: I thought 30 teens would be manageable, but now that I think about it the next time around I’d limit it to 20, possibly 25 teens and maybe have it twice a year. I also may reconsider having any kind of hide and seek activities since we had a bit of a snafu this last time. But it worked so well and the teens loved it! Agh!
P.S. For those wondering where the title comes from…The most common response to “We’re having an all night sleepover at the library with 30 teens ages 12-18 was “ARE YOU CRAZY?”
P.P.S For more photos of the lock in, click here for our Flickr gallery