Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends
Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends
Brian Kelly UKOLN University of Bath Bath, UK b.kelly@ukoln.ac.uk |
Paul Bevan National Library of Wales Aberystwyth Wales paul.bevan@llgc.org.uk |
Richard Akerman NRC CISTI Ottawa Canada scilib@gmail.com |
Jo Alcock University of Wolverhampton, Wolverhampton UK j.alcock@wlv.ac.uk |
Josie Fraser Consultant Leicester, UK josie@josiefraser.com |
Abstract
Following the initial excitement generated by Web 2.0 we are now seeing Web 2.0 concepts being adopted across many sectors. Libraries, with their responsibilities for facilitating access to information resources and engaging with their user communities, have been early adopters of Web 2.0, and the term 'Library 2.0' is now becoming accepted. But how should we ensure that Library 2.0 prototypes and demonstrators become embedded within the organisation and deliver effective services? Are organisations aware of the potential risks associated with making use of externally-provided services such as Facebook and YouTube, including misuse of such services, associated legal concerns as well as the dangers of making use of services for which there may be no formal contractual agreements?
In this paper the authors argue that the library sector - and indeed the wider cultural heritage, research and educational sectors - needs to recognise that the Web 2.0 world isn't an environment in which delivery of the user needs can necessarily be guaranteed. Rather we are in an environment in which institutions, and our users, need to take a risk management approach to the use of networked services.
The paper describes a framework which is being developed which aims to ensure that institutions have considered the risks associated with use of Web 2.0 technologies and services and have identified strategies for dealing with potential risks in order to achieve the goal of balancing the risks and benefits in order to maximise the dividends to be gained by use of 'Library 2.0'.
Web 2.0
The Web 2.0 term has now been widely accepted as a description of a new pattern of ways in which the Web is being used. We have progressed from the publishing paradigm which characterised what is now sometimes referred to as Web 1.0, in which small numbers of content creators made use of tools ranging from desktop HTML authoring tools though to enterprise Content Management Systems and corresponding editorial and quality assurance processes to produce content for passive consumption by end users. In a Web 2.0 environment large numbers of users are creating content using a seemingly ever-increasing variety of tools and devices with such content being made available via a wide variety of commercial Web 2.0 services including photographic sharing services such as Flick, video sharing services such as YouTube and social networking services such as MySpace and Facebook.
The characteristics of Web 2.0 were described by O'Reilly (2005). The key areas relevant to this paper include:
- Application areas including blogs and wikis, social sharing services and social networking services;
- The ease of reuse of content elsewhere through syndication formats such as RSS and Atom and other embedding technologies;
- A culture of openness and sharing, which has been helped through the development of copyright licences such as Creative Commons;
- The concept of the 'network as the platform' by which services are hosted on externally-hosted services and accessible over the network, rather than a managed service within the organisation.
Although the value of the Web 2.0 term has been questioned by some, it does provide a useful way of defining a new phase in the evolution of the Web.
Library 2.0
The impact of the Web 2.0 term can be seen by the subsequent popularity of the '2.0' meme in other sectors. Terms such as e-Learning 2.0, Library 2.0 and Enterprise 2.0 have been coined with definitions provided in Wikipedia (Wikipedia, 2008a), (Wikipedia, 2008b) and (Wikipedia, 2008c). These terms have clear links with the Web 2.0 term, described the application of Web 2.0 principles and use of Web 2.0 technologies within the content of e-learning, library and enterprise uses.
The term Library 2.0 was coined on the LibraryCrunch blog (Casey, 2005). Further discussions on the meaning of the term and suggestions on the benefits which Library 2.0 seeks to provide have been published by Chad and Miller (2005) and Miller (2006). However rather than seeking to provide a definition let us explore the ways in which Web 2.0 is being used in various library contexts.
Perspective from a National Library
The National Library of Wales has a remit to "collect, preserve and give access to all kinds and forms of recorded knowledge, especially relating to Wales and the other Celtic countries, for the benefit of the public, including those engaged in research and learning". As a result our readers represent a extremely varied demographic, reflecting the diversity of our published material, archival and other collections.
The Web and the online delivery of resources has been integral to the Library's service portfolio for many years, providing a access to its resources in a way which helps to overcome distance and availability issues. To this end, the Library has an extensive digitization programme which has provided virtual access to some of the greatest treasures in the collections through a 'Digital Mirror' (NLW, 2008a) using innovative access methods to deliver an enhanced user experience for remote readers.
The use of Web 2.0 approaches for Library 2.0 delivery is ingrained in the new Library strategy 'shaping the future' (NLW, 2008b) which outlines the Library's desire to explore collaborative and diverse models using external resources. This will allow the Library to leverage web platforms which are heavily focused on user engagement in order to deliver future services. Leading up to this shift in emphasis for web developments the Library conducted a review of how a National Library might understand the concept of 'Web 2.0' and how we might best make use of our existing digital resources in a Web 2.0 environment.
The Library has begun to increase the level of Web 2.0 services available by creating presences in online environments (including Facebook and YouTube) as well as by beginning to allow reuse of its data – initially through a pilot Wikipedia project. The Library is also developing an XML feed of its events (including exhibitions and talks) through the Typo3-based Content Management System underlying the Library's main Web site.
Third-party Web environments are key to the future delivery of library services and the Library is actively looking to explore how exposure of data in open formats can allow the use of leading edge user interfaces and Web front-ends. One concern for the Library is that 'spreading out' of services onto commercial and external sites might conflict with existing policies around accessibility, sustainability and a commitment to bilingual access.
The Library is also host to a Welsh Assembly Government funded project to provide an innovative and flexible service delivery platform for all types of libraries in Wales. The library.wales.org Web site (http://library.wales.org/) employs Web 2.0 technologies including social bookmarking and RSS to provide an alternative environment engaging with the public. This project explicitly includes the development of new services and the support of those services, allowing libraries to explore Web 2.0 technologies in a 'safe' environment where best practice can be easily shared.
The Web's changing nature provides an exciting and challenging environment for any library service and the National Library of Wales has sought to directly engage with the opportunities that Web 2.0 offers. The next few years will provide the Library opportunities to build upon the work described above and explore new ways of working with Library users in a networked environment.
Perspective from a University Library
The University of Wolverhampton has a large proportion of part-time students (some schools are up to 70% part-time). The University is also geographically spread across the region with five campuses in total. This means students do not always come into Learning Centres and often use the closest geographical centre rather than their subject specific centre. The University has recently adopted a University-wide Blended Learning strategy to support the changing nature of the students, and the Learning and Information Services department are developing ways to support students from wherever they choose to study. This includes use of e-journals and e-books, as well as virtual reference support and Web 2.0/Library 2.0 initiatives to support students online. Current Library 2.0 initiatives at the University include:
- Blogs:
- The University currently has five subject blogs to support students and staff of particular academic schools, along with an Electronic Resources blog for updates to services as well as a number of project-related blogs and internal communication blogs.
- Social Networking:
- The Learning Centres have a Facebook page which includes links to relevant parts of the University Web site, aggregated RSS feeds from the blogs and search applications. One of the most useful features of the page is sending updates to "fans" - another way of letting users know about the services and reaching them where they already are.
- Wikis:
- A number of small scale wikis are being used for sharing information.
- Online calendars:
- The University has been using Google Calendar to manage events. It has proved much easier than updating numerous places when timetables change or new events added: updates to the Google Calendar are reflected wherever the calendar is embedded. Users can also subscribe to the calendar or add single events to their own calendar. The shared calendar has also been used for scheduling purposes for busy induction weeks.
The University is aware of a number of challenges posed by these services, included dependencies on third party services, the need to raise staff awareness of the potential of these services, the need to facilitate cultural change and a willingness to engage with use of such services and the need to ensure that the services succeed in enhance the services provided to the user community.
Perspective from a Canadian Research Library
NRC-CISTI serves as the library for the National Research Council of Canada, with services provided both at a central campus library on the main campus in Ottawa, as well as at research institutes across Canada. CISTI is also Canada's National Science Library and Publisher.
Being a part of the Canadian Government introduces challenges for adoption of Library 2.0 technologies, as policy requires that all public-facing interfaces support both official languages, English and French, and in some cases that the content itself is translated into both languages. The NRC's Marsville initiative is an example, with blog content available in both English and French (NRC-CNRC, nd).
The arrival of Library 2.0 has created considerable challenges in a policy environment that was geared to Web 1.0. Policy making efforts are underway, and there is tremendous excitement about the potential for Web 2.0 to address long-standing knowledge management issues. In light of the complexities, a Federal Library Web 2.0 Interest Group supports the exchange of ideas between Canadian government libraries, and also to help demonstrate that it is possible to use Web 2.0 in a government content.
In terms of CISTI, the primary focus is experimenting with Library 2.0, in order to gather feedback from the researchers that we support. Using CISTI Lab, we provide prototypes of tools, such as a LibX toolbar, and use a wiki on the Lab site so that new information can be easily added.
One of the primary challenges is that CISTI operates within a highly federated organisation, with separate institutes devoted to different research areas. Many of the research workflows are already well established. This is why a gradual and experimental approach is taken to introducing new tools into the workflows. Additionally, researchers may have more in common with others in their discipline outside the organisation, so domain-specific sites such as ArXiV may be more natural gathering places.
Underpinning the Web applications is a Service-Oriented Architecture. In many areas we see that providing services for researchers to build upon may be a better match for the structure of our organisation.
Internally at the library, an Intranet wiki has been found to be extremely useful in coordinating work on projects, as all team members can view the information in a single place as well as add updates and corrections.
Canadian Higher Education does not operate within the same policy environment as the federal government, and serve a different research community. Many Canadian Universities are therefore employing a wide range of Library 2.0 approaches to reaching their community, including social networks such as Facebook, with over 8 million Canadians on Facebook, out of a population of 33 million (Profectio, 2008).
The popularity of this and other US-based services such as YouTube, Flickr and Twitter actually poses additional policy concerns, as US privacy laws are quite different from Canada's (Canada has a data protection model more like the European Union's). Nevertheless, with a high degree of broadband penetration and with a younger generation of researchers emerging that is comfortable with Web 2.0 tools, it is clear that Canadian academic libraries will need to continue to innovate.
The Risks
Identifying the Risks
UKOLN has been providing a number of workshops aimed at the higher education and cultural heritage sectors which aim to provide an understanding of the potential of Web 2.0 and also to identify potential barriers to the effective deployment and use of such services and explore ways in which such barriers can be addressed. Feedback is available from several of these workshops (UKOLN, 200d), (UKOLN, 2008e). This information, which has been provided by practitioners within the sectors has informed the ideas described in this paper.
Sustainability Risks
As described by (Walk, 2008), commenting on a recent Google Apps outage, John Proffitt, IT services director at APTI, an Alaskan public TV station, was quoted by (Perez, 2008) as saying:
"It was constant troubleshooting, testing, research, posting to the Google Apps forums and so on. Plus there's the emotional strain of wondering whether you completely screwed up by moving everyone to Google Apps as our sole e-mail system. That's what freaked me out: Did Google just make me look like an idiot?"
We are currently seeing much debate on whether or not institutions should be embracing the software-as-a-service (SaaS) model and, in particular, making use of remote Web 2.0 services. Why run local services, when you can simply find a remote service to provide for your needs?
Perhaps this is a model for the future but is the right model for the present? There is growing evidence that we are entering a global recession. Is this a good moment for public sector organisations to begin a brave experiment with outsourcing services to remote companies?
Google are clearly not a fly-by-night company – their size makes it likely that they will survive an economic downturn. But the vast majority of Web 2.0 companies are a fraction of the size of Google. As it is, many Web 2.0 services appear to exist with no visible means of support, other than venture capital. We can imagine that venture capital can become harder to find in a period of economic down-turn. Much Web 2.0 service delivery is supported through an advertising model, relying on a revenue stream coming from a small percentage of advertisements 'clicked' on. Again, perhaps people are less likely to respond to advertisements in a recession?
Chris Adie, who spoke on Managing the Risks of Web 2.0 (Adie, 2008) at the Eduserv Foundation Symposium, made the related point that Web 2.0 services which rely on a global scale in terms of numbers of users and/or on social networks will become decreasingly useful if the number of users drops. Essentially, the network effect works both ways. Chris Adie also referred to the University of Edinburgh Guidelines for Using External Web 2.0 Services (Edinburgh, 2007) and spoke of the risks involved in the institution's use of remote Web 2.0 services, especially in terms of compliance with the Data Protection Act.
Once we got past the recession at the end of the dot-com bubble in the first years of this century, the notion of an open-source operating system had reached a level of sufficient maturity for it to enter the mainstream. Web 2.0 services and SaaS as a viable, mainstream approach will likely reach similar levels of maturity in time. But perhaps now, more than ever, institutions need to make sober appraisals of their options for service delivery or procurement.
Failures in the services provided by Web 2.0 companies are happening. Kelly (2008a) has described a personal example of this with the Squirl service for managing small collections. The service's interface to Amazon seemed to fail, with no Amazon book record being retrieved form the service. Further investigation revealed, worryingly, that the service's data export function was also broken, meaning that the data could not be easily exported from the service. In addition it also appears that Squirl's fault-reporting email address is no longer functional.
Such considerations need not, however, mean that organisations will need to shy away from use of third party services. If this was the case them we would not entrust our savings to banks, but would keep the cash hidden under our mattress. Rather there is a need for use to evaluate the risks and to develop risk management strategies. Let us now explore some other types of risk.
Digital Preservation Risks
Are we in danger of living in the digital dark ages, as some have suggested, with Web-based resources disappearing as organisational policies and priorities change and technologies change?
A project on the Preservation of Web Resources (JISC PoWR) was funded by the JISC in order to explore more deeply the challenges faced by institutions and to provide recommendations and develop advice on best practices.
The first workshop organised by the JISC PoWR project provided an opportunity for participants to hear about and discuss barriers to preservation including organisational, legal, technical and resource issues. As described in a report on the event (Emmott, 2008) "The challenges are significant, especially in terms of how to preserve Web resources" although there was agreement that the "core message to practitioners was therefore to start building an internal network amongst relevant practitioners as advice and guidance emerge".
The Human Factors
It would be a mistake to regard the risks in providing services based on use of externally-hosted services are only concerned with the sustainability of the services themselves. There is a need to appreciate the risks associated with the human element. This might include the initial adopters and enthusiasts losing interest in services such as blogs and wikis, resulting in blogs which are not longer being regularly updated, wikis which fail to be maintained and inappropriate comments or automated comment spam failing to be removed from services. The wiki containing a directory of UK Library blogs (UK Library Blogs, 2008) includes details of a number of blogs which have not been updated for some time, with the entry for the Hampshire and Isle of Wight Library Land blog stating "Not updated since September 2007 and may be defunct".
Accessibility Issues
Many public sector organisations around the world, such as libraries, universities and other educational institutions will have both legal and ethical requirements to ensure that their resources and services can be accessed by people with disabilities. In the UK the SENDA Legislation (Special Educational Needs Act) extended the remit of the DDA (Disability Discrimination Act) to educational institutions, which requires organisations to take reasonable measures to ensure that people with disabilities aren't discriminated against unfairly. The Web Content Accessibility Guidelines (WCAG) developed by the W3C Web Accessibility Initiative (WAI) play an important role in documenting approaches which can help to ensure that Web resources can be rendered by Web browsers and assistive technologies to users with a range of disabilities.
It is sometimes felt that all Web resources must conform with WCAG guidelines, and that this requirement will rule out the deployment of many Web 2.0 services, which may be dependent on technologies which are deprecated in the WAI guidelines. However as Sloan (2006) describes the WCAG 1.0 guidelines have significant limitations, including their reliance on browsers which conform with User Agent Accessibility Guidelines (UAAG) and authoring tools which conform with Authoring Tool Accessibility Guidelines (ATAG).
Maximising the Dividends
This paper has summarized some of the benefits to a diverse range of user communities which Library 2.0 and Web 2.0 seeks to deliver. The paper has provided examples of the risks associated with such approaches and has touched on some of the possible ways in which such risks are being addressed. In this section we summarise some of the broad approaches which can help to ensure that institutions maximize the potential dividends which Web 2.0 seeks to provide.
Advocacy
Although awareness of Web 2.0 is widespread in many circles, there is still a need for advocacy of the benefits to be gained which needs to be provided, especially to senior managers and organisations which may traditionally be resistant to change. The research interests and the need to engage with young people often help to ensure that higher educational institutions are early adopters of innovations. However in other sectors such drivers will be missing and even in higher education there may be resistance to changes, especially if the benefits of changes to existing working practices are not obvious.
Within the UK UKOLN has taken a high profile in promoting the benefits of Web 2.0 to a variety of communities, including higher education and the cultural heritage sector. Such advocacy activities have included many presentations at national and regional events, including UKOLN's annual Institutional Web Management Workshops (UKOLN, 2008a) and a series of regional workshops aimed at the cultural heritage sector (UKOLN, 2008f), (UKOLN, 2008g) and (UKOLN, 2008h).
Listening
Advocacy activities need to be complemented by listening activities, which help to provide a better understanding of both specific requirements within organisations and the various concerns which may be expressed.
UKOLN workshops, including those on Exploiting the Potential of Wikis (UKOLN, 2006) and Exploiting the Potential of Blogs and Social Networks (UKOLN, 2007), together with a number of more recent workshops aimed at museums, libraries and archives described above have featured use of wikis as a mechanism for gaining feedback on both potential use of Web 2.0 services and for documenting concerns and barriers encountered or expected by practitioners in the sector. The UK Web Focus blog (http://ukwebfocus.wordpress.com/) provides both a dissemination and communications forum for discussion and debate on best practices on use of Web 2.0 services.
Training, Education, Staff Development and New Media Literacy
The library community has a tradition of providing training and support for library users. Libraries are beginning to take a lead in providing training and awareness in Web 2.0 concepts and tools. In some cases such training may be focused at staff within the library, as described in a blog post by Owen Stephens (Stephens, 2008).
Web 2.0 services themselves have rich potential in the delivery of training and staff development. In 2006 UKOLN's annual Institutional Web Management Workshop (IWMW 2006) began experimenting in use of video-conferencing technologies to provide access to a remote audience. The success of this experiment and the growing willingness within the digital library development and support communities to seek to make greater use of communications technologies, such as streaming video and live blogging services meant that the video stream of the IWMW 2008 event had an audience (which peaked at about 180 viewers on the final day) which was of the same order of magnitude as the live audience at the event (Kelly 2008c). It should be noted that the speakers were informed of the live streaming of the talks prior to the event and has the option of opting-out.
Amplified Conferences
This example of an 'amplified conference' (Wikipedia, 2008) reflects a growing trend at IT and e-learning conferences. We are also seeing an awareness that the main challenges are not necessarily the technical ones but the human issues including having an understanding of the purposes that the technologies are being used for, addressing the potential distractions that such technologies may cause and the legal and ethical challenges related to issues such as data protection, privacy and social inclusion.
A debate on the potential distractions caused by use of networked technologies in a conference environment has been commented on the Ed Techie (Weller, 2008) and UK Web Focus blogs (Kelly, 2008c). The debate has parallels with discussions on changes in the physical library space, from a quiet environment for individual reading to a social space for community activities. We are seeing developments of approaches which seek to address the concerns of the two camps, ranging from use of the physical space, with separate areas for those who wish to use their PCs and those prefer a quieter environment, through to, perhaps, the development of hardware solutions which minimise noise made when typing.
The issues of data protection and privacy may be more complex to address. Many people are happy to be included in photographs and videos and for these to be made available online. However as Andy Powell has described (Powell, 2007) sometimes individuals may object to this, which can possibly result in such images being removed from public Web sites and the effort of any associated processing of the resources having to be written off. It may be argued that an approach to addressing such matters may be based on human sensitivities to such issues and flexibility rather than imposing blanket bans. However the need for Acceptable Use Policies in such cases has been described by (Kelly, 2005).
The library sector may have a responsibility for ensuring its users have an understanding of the potential of networked technologies, having the confidence to make use of such technologies, the sensitivity to be aware of other's concerns and the ability to be responsive to concerns and difficulties. At one stage the library's responsibility may have been concerned with information literacy: ensuring that the users were comfortable in making use of networked technologies such as search engines, and could evaluate the information they accessed. However in a Web 2.0 environment the responsibilities towards the user community may be much broader, including supporting the user as a content creator and the associated ethical dimensions to this (e.g. plagiarism, copyright, etc.). The term transliteracy which has been defined as "The ability to read, write and interact across a range of platforms, tools and media from signing and orality through handwriting, print, TV, radio and film, to digital social networks" (Wikipedia, 2008e) may be a better term to describe the educational services which Librarians may need to provide to support their users in making effective use of the Library 2.0 environment.
Preservation in a Web 2.0 Environment
JISC PoWR is finalizing its guidelines on advice for Web preservation, which includes advice on use of Web 2.0 services. As described in a presentation on this subject (Kelly, 2008d) the use of syndication technologies (such as RSS) and the ease by which content can be made available in a wider of locations can help to address preservation and sustainability concerns.
The ease of content creation and the huge diversity of ways in which Web 2.0 services are being used can mean that the disposal of resources is more relevant than in an environment in which the creation of digital data was a time-consuming and resource-intensive task. Organisations may well decide that the preservation of digital resources such as Twitter posts or Skype telephone calls and instant message chats is not required.
Personal Responsibilities and Blog Content
Details of a case study involving the establishment of, disappearance and re-appearance of an e-Learning blog have been described (Kelly, 2008e). This case study involved the Auricle e-learning blog which was established by Derek Morrison, an early adopter and head of the e-learning team at the University of Bath in January 2005. Following a period of secondment and departure form the University, the blog was deleted from public access due to security concerns regarding the underlying blog software. A blog post described the loss of this possibly valuable historical resource was written, but prior to publication it was discovered that the blog had been revived at a new (and more stable) location, with previous blog posts still available (Morrison, 2008).
Individual, Departmental, Institutional, National or Global Responsibilities?
In the previous example responsibility for preservation of was taken by the blog owner. But who more generally should take responsibility for ensuring that use of Web 2.0 in its broadest sense provides the expected dividends to the users, to the institution and, indeed, to society?
In a rapidly changing environment we will continue to see early adopters and enthusiasts making use of emerging technologies before institutions are in a position to provide a safe, secure and managed provision of such services. The example described previously in which motivated individuals were prepared to take responsibility for the migration of their resources may apply in a number of situations, but this is not a scaleable solution.
If we accept that a simple banning of use of such services is not an appropriate response, with significant risks to not engaging with a Web 2.0 environment, we will then need to identify appropriate strategies for assessing and managing the risks of use of services.
There will be a need for individuals to understand and manage such risks as increasingly individuals are using Web 2.0 services to support social activities. Institutions may have a responsibility in their new media literacy strategies to ensure that members of staff and students are made aware of possible risks. The corresponding risk management approaches may be relevant for use of services used by individuals but in a work context.
The institution may chose to develop its own policies in risk assessment and risk management, although in large institutions and devolved organisations the implementation may be left to departments or even individuals. This approach could require departments to develop approaches which are relevant to the department's particular interests – a new media research department, is likely to wish to exploit networked services in ways which are not appropriate for the payroll department.
In a blog post about the unavailability of an institutional blogging service at the University of Bath in 2004 Derek Morrison suggested there could be a role for a national service offering such facilities: "Had a central agency like JISC offered a blog hosting service with guarantees of editorial control and sustainability for authors then I would have seriously considered that route" (Morrison, 2008). JISC now provide a blog service (JISC Involve) for use by the UK's higher and further education sector. However although this service should be responsive to the needs and requirements of its community, there can be no guarantee that changes in policy or funding will not force changes to the services – and indeed policy changes by the AHRB funding council did result in the closure of the national AHDS service. It is also by no means clear that a national service will have the flexibility provided by the commercial sector. National services may also be forced to limit their access to members of the community, which may act as a barrier to those who value the availability to liaise and communicate with a wider community. It is questionable, for example, whether a national micro-blogging services similar to Twitter would be successful.
This leads to the question of the institution's role in a Web 2.0 environment. Is it as a provider of services, a gateway to services, an aggregator of data hosted remotely, a provider of education and training, a quality assurance and risk management assessor, or perhaps some other role?
A Culture of Openness
The provision of training and staff development courses is helped by the availability of resources with Creative Common licences, which allows for their reuse, perhaps for non-commercial use. There is a likelihood that Library 2.0 advocates will have embraced Web 2.0's culture of openness and have a willingness to allow their resources to be reused by others.
UKOLN have recently released a number of briefing document covering a variety of Web 2.0 areas which are available with a Creative Commons licence (UKOLN, 2008b) provide the resources under this licence was made in order to maximize the organisation's impact within the higher and further education and cultural heritage sectors. This decision also reflects an organizational culture of openness in which slides used in many presentations have made use of Creative Commons licences and access to the resources maximised though use of popular sharing services such as Slideshare.
Web 2.0 in an a Time of Economic Trouble
How should institutions response in their uses of Web 2.0 services at a time of a global recession? Let us consider the economic risks to various stakeholder communities which may undermine the services provided by libraries:
- Externally-hosted Web 2.0 providers:
- What if the services provided by Google, Yahoo, etc. prove uneconomic and the services are shut down or the terms and conditions changed, with perhaps free-to-use services becoming subscription services?
- Our institutions:
- What if the economic downturn affects the sustainability of the IT services provided within our institutions?
- Our national services:
- What if the national services provided for our communities are similarly adversely affected, with users preferring the services provided by the global services?
- Our information providers:
- What if the services provided by individuals who use Slideshare, Flickr, etc. aren't sustainable because the individuals may face redundancy, early retirement, etc.?
- Our funding organisations:
- What if our funding bodies have less funds available, and are forced to stop or reduce the level of funding provided to national or institutional services?
- Our user communities:
- What if our users' expectations or interests change?
It should be clear that to dismiss externally-hosted services at a time of economic turmoil would be too simplistic an approach. Rather there is a need to develop risk assessment and risk management approaches across a wide range of scenarios.
Risk Assessment and Risk Management
An approach being developed at UKOLN is to document significant use of externally-hosted Web 2.0 services, to include a description of why the service is being used, a statement on the perceived risks and details of how such risks would be addressed.
This approach was taken at UKOLN's Institutional Web Management Workshop (IWMW) in 2005, with the latest risk assessment document being available for the IWMW 2008 event (UKOLN, 2008c) taking such risks included:
- Support UKOLN's Role
- An important role for UKOLN is to keep abreast of emerging new technologies in order to provide advice on best practices to its stakeholder communities.
- Advise Our Communities
- Many institutions have an interest in Web 2.0, including technologies which provide social networking services and integration of content for diverse sources. Making use of such technologies allows use to provide effective advice, based on experiences gained.
- Provide Richer Experiences To Our Users
- Thehosted services aim to provide useful services to the target audience - participants at the event.
- Minimise Resource Efforts
- In order to minimise scarce software development expertise, we use services which are freely available.
- Provide A Test Bed
- We will seek to host appropriate services after the workshop in order to monitor changes to the services, such as withdrawal of or changes to the licence conditions, enhancements to the services, etc.
- Gain Experience Prior To Service Deployment
- Evaluation of the services can provide feedback on the merits of the services which will be valuable if the services are deployed more widely.
- Maximising Impact
- If the technologies prove significant demonstration at the event provides an opportunity to maximise impact by exposure to 170 delegates.
- "Eating Our Own Dog Food"
- As UKOLN is active in advising on the development of innovative new networked services, we should be seem to be making use of innovative services ourselves.
Examples of possible risks and the risk assessment and risk management strategies taken were:
- Use of a 3rd party usage statistics service: a well-established service was used, with data being provided in any case on the Web service.
- Use of a video blog: there were risks that the data may not be able to be extracted from the service. However as the video related directly to specific aspects of the event the long-term management of the content was not felt to be required.
- Use of del.icio.us to bookmark resources: del.icio.us is a well-established service. In case of problems it should be possible to make use of del.icio.us APIs to migrate the content to another services.
- Use of Google search facility: Google is a well-established and profitable service, and its search facility is central to its service.
- Use of the Eventbrite online booking service: although further information about this company is not available as it was used for informal purposes, its loss would not have been significant.
Accessibility Issues
A holistic framework for Web accessibility is described by Kelly (2007) in which accessibility guidelines are treated as useful guidelines, to be used when their use is appropriate, and not as formal standards whose use is mandated. Further work (Kelly, 2008f) describes how this approach is particularly suited to a Web 2.0 environment in which content may be surfaced in a variety of environments (use of syndication technologies such as RSS, JavaScript widgets, etc.). This approach is based on the belief that universal accessibility is a false goal, as accessibility is dependent on complex issues such as the context and intended purpose of use, and not just the technical aspects of the Web resource itself. Rather than seeking universal access, the view is one based on widening participation and social inclusion which seeks to ensure that the purpose of a service can be provided to the target audience.
Protecting Young People
The use of Library 2.0 to deliver services to young people, whether in the context of use in schools or colleges or the services provided by public libraries for young people presents a set of additional challenges which tend not to be of significant concern in higher education. These specific risks include legal and ethical requirements to protect young people from inappropriate content and threatening or dangerous online encounters.
Childnet International (http://www.childnet-int.org/) is a non-profit organisation which aims to "help make the Internet a great and safe place for children". Digizen (http://www.digizen.org/) is a project sponsored by Childnet to foster the development of the 'digital citizenship' skills needed to both negotiate and contribute to the development of an online environment. As well as reading, writing and numeracy there is a recognition of the need to be media literate - to understand how to find, evaluate, manage and use information online.
The Digizen project recognises that the Internet provides a social space for people to communicate, collaborate, and create but acknowledges that there are risks as well as opportunities. The approach which has been taken is to argue that simply blocking certain sites or outlawing particular behaviours are not in themselves guarantees of safety. Online communities have to take responsibility in negotiating acceptable behaviour and ensuring that everybody's experience is a positive one.
Digizen has developed resources to on best practices to support young people in their use of social networking services which includes a Social Networking evaluation chart (Digizen, nd 1), a summary of the benefits and opportunities the services can provide (Digizen, nd 2) and of the barriers and risks (Digizen, nd 3).
Conclusions
This paper has given examples of ways in which Web 2.0 and Library 2.0 technologies and approaches are being used. The paper acknowledges that there are risks associated with use of third party services, in providing greater autonomy to users, in providing access to such services to users with disabilities and to young people. However the authors feel that there are risks, potentially greater risks, in failing to engage with a rapidly changing environment. The paper describes various approaches which can be taken to minimizing such risks in order to maximize the dividends which Library 2.0 seeks to provide.
References
Adie (2008) Web 2.0: Managing the risks, C. Adie, Eduserv Symposium 2008 <http://www.eduserv.org.uk/foundation/symposium/2008/presentations/chrisadie>
Casey (2005)
Working Towards a Definition of Library 2.0, LibraryCrunch blog, Oct 2005.
Retrieved September 25, 2008 from
<http://www.librarycrunch.com/2005/10/working_towards_a_definition_o.html>
Chad and Miller (2005)
Do Libraries matter? The Rise of Library 2.0, K. Chad and P. Miller, Talis White Paper, November 2005.
Retrieved September 25, 2008 from
<http://www.talis.com/downloads/white_papers/DoLibrariesMatter.pdf>
Digizen (nd 1)
Evaluating social networking services, Digizen.org.
Retrieved September 25, 2008 from
<http://www.digizen.org/socialnetworking/checklist.aspx>
Digizen (nd 2) Benefits and opportunities, Digizen.org.
Retrieved September 25, 2008 from
<http://www.digizen.org/socialnetworking/benefits.aspx>
Digizen (nd 3) Barriers and risks, Digizen.org.
Retrieved September 25, 2008 from
<http://www.digizen.org/socialnetworking/risks.aspx>
Edinburgh (2007)
Guidelines for using external services, University of Edinburgh.
Retrieved September 25, 2008 from
<https://www.wiki.ed.ac.uk/display/Web2wiki/Web+2.0+Guidelines>
Emmott(2008)
Preservation of Web Resources: Making a Start, Ariadne, Jul 2008.
Retrieved September 25, 2008 from
<http://www.ariadne.ac.uk/issue56/jisc-powr-rpt/>
Kelly (2005)
Using Networked Technologies To Support Conferences, B. Kelly, E.
Tonkin and P. Shabajee, EUNIS 2005, June 2005.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/papers/eunis-2005/paper-1/>
Kelly (2007)
Accessibility 2.0: People, Policies and Processes, B.
Kelly, D. Sloan, S. Brown, J. Seale, H. Petrie, P. Lauke, and S.
Ball, WWW 2007 Banff, Canada, 7-11 May 2007.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/papers/w4a-2007/>
Kelly (2008a)
Squirl: When Web 2.0 Services Break, UK Web Focus blog, 25 Aug 2008.
Retrieved September 25, 2008 from
<http://ukwebfocus.wordpress.com/2008/08/25/squirl-when-web-20-services-break/>
Kelly (2008b)
Usage Statistics for the IWMW 2008 Live Video Stream, UK Web Focus blog, 14 Aug 2008.
Retrieved September 25, 2008 from
<http://ukwebfocus.wordpress.com/2008/08/14/usage-statistics-for-the-iwmw-2008-live-video-stream/>
Kelly (2008c)
How Rude! Use Of WiFi Networks At Conferences, UK Web Focus blog, 12 May 2008.
Retrieved September 25, 2008 from
<http://ukwebfocus.wordpress.com/2008/05/12/how-rude-use-of-wifi-networks-at-conferences/>
Kelly (2008d)
JISC PoWR Workshop 2: Preservation and Web 2.0, JISC PoWR blog, 31 Jul 2008.
Retrieved September 25, 2008 from
<http://jiscpowr.jiscinvolve.org/2008/07/31/jisc-powr-workshop-2-preservation-and-web-20/>
Kelly (2008e)
Auricle: The Case Of The Disappearing E-learning Blog, PoWR blog, 1
Sep 2008. >Retrieved September 25, 2008 from
<http://jiscpowr.jiscinvolve.org/2008/09/01/auricle-the-case-of-the-disappearing-e-learning-blog/>
Kelly (2008f)
One World, One Web ... But Great Diversity, B. Kelly, L. Nevile,
EA. Draffan and S. Fanou, WWW 2008 Beijing, China, 21-22 April
2008. Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/papers/w4a-2008/>
Miller (2006)
Library 2.0: The Challenge of Disruptive Innovation, P. Miller, Talis White Paper, February 2006.
Retrieved September 25, 2008 from
<http://www.talis.com/resources/documents/447_Library_2_prf1.pdf>
Morrison (2008)
Third Life - Auricle: the next generation, Auricle blog,3 Sep 2008.
Retrieved September 25, 2008 from
<http://www.auricle.org/auriclewp/?p=427>
O’Reilly (2005)
What Is Web 2.0?, T. O'Reilly, 30 September 2005.
Retrieved September 25, 2008 from
<http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html>
NLW (2008a)
The Digital Mirror, National Library of Wales.
Retrieved September 25, 2008 from
<http://www.llgc.org.uk/index.php?id=122>
NLW (2008b)
Shaping the
future: The Library's strategy 2008-2009 to 2010-2011,
National Library of Wales. Retrieved September 25, 2008 from
<http://www.llgc.org.uk/fileadmin/documents/pdf/Strategy2008-2011.pdf>
NRC-CNRC (nd) Canadian National Marsville, National Research Council Canada. Retrieved September 25, 2008 from <http://www.nrc-cnrc.gc.ca/eng/education/marsville/>
Perez (2008)
Gmail leaves Google Apps admins nervous, Infoworld, 15 Aug 2008.
Retrieved September 25, 2008 from
<http://www.infoworld.com/article/08/08/15/Google_Apps_admins_jittery_about_Gmail_hopeful_about_future-IDGNS_1.html>
Powell (2007) JISC
CETIS conference - day 1, eFoundations blog, 21 Nov 2007.
Retrieved September 25, 2008 from
<http://efoundations.typepad.com/efoundations/2007/11/jisc-cetis-conf.html>
Profectio (2008)
Facebook Camp Continues Growth in Toronto, Reaches 8 Million
In Canada, Profectio, 11 July 2008. Retrieved September 25, 2008 from
<http://profectio.com/facebook-camp-continues-growth-in-toronto-reaches-8-million-in-canada>
Sloan (2006)
Contextual Web Accessibility - Maximizing the Benefit of Accessibility Guidelines,
WWW2006 Edinburgh, Scotland 22-26 May 2006.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/papers/w4a-2006/>
Stephens (2008)
Learning 2.0 at Imperial, Overdue Ideas blog, 24 July
2008. Retrieved September 25, 2008 from
<http://www.meanboyfriend.com/overdue_ideas/2008/07/learning-20-at-imperial.html>
UK Library Blogs (2008)
UKLibrary Blogs / Bloggers.
Retrieved September 25, 2008
from <http://uklibraryblogs.pbwiki.com/>
UKOLN (2006)
Exploiting The Potential Of Wikis, UKOLN, Nov 2006.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/events/workshops/wiki-workshop-2006/>
UKOLN (2007)
Exploiting The Potential Of Blogs and Social Networks, UKOLN, Nov 2007.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/events/workshops/blogs-social-networks-2007/>
UKOLN (2008a)
Institutional Web Management Workshop series, UKOLN.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/events/workshops/iwmw/>
UKOLN (2008b)
UKOLN IntroBytes, UKOLN.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/cultural-heritage/documents/>
UKOLN (2008c)
Risk Assessment for IWMW 2008 Web Site, UKOLN. Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/events/workshops/webmaster-2008/risk-assessment/>
UKOLN (2008d)
Sharing Made Simple Workshop: Copy of Event Wiki UKOLN.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/cultural-heritage/events/sharing-made-simple-20080910/wiki/>
UKOLN (2008e)
MLA Yorkshire Workshop:Workshop Feedback, UKOLN.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/events/workshops/
mla-yorkshire-2008-05/feedback>
UKOLN (2008f)
MLA Yorkshire Workshop, 12 May 2008, UKOLN.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/web-focus/events/workshops/mla-yorkshire-2008-05/>
UKOLN (2008g)
MLA London Workshop, 14 July 2008, UKOLN.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/cultural-heritage/events/mla-london-2008-07/>
UKOLN (2008h)
CyMAL Workshop, 10 September 2008, UKOLN.
Retrieved September 25, 2008 from
<http://www.ukoln.ac.uk/cultural-heritage/events/sharing-made-simple-20080910/>
Walk (2008)
“Did Google just make me look like an idiot?”, Paul Walk's Blog, 17 August 2008.
Retrieved September 25, 2008 from
<http://blog.paulwalk.net/2008/08/17/did-google-just-make-me-look-like-an-idiot/>
Weller (2008)
Making Connections 2.0, Ed Techie Blog, 2 May 2008.
Retrieved September 25, 2008 from
<http://nogoodreason.typepad.co.uk/no_good_reason/2008/05/making-connecti.html>
Wikipedia (2008a)
e-Learning 2.0, Wikipedia. Retrieved September 25, 2008 from
<http://en.wikipedia.org/wiki/E-Learning_2.0>
Wikipedia (2008b)
Library 2.0, Wikipedia. Retrieved September 25, 2008 from
<http://en.wikipedia.org/wiki/Library_2.0>
Wikipedia (2008c)
Enterprise 2.0, Wikipedia.
Retrieved September 25, 2008 from
<http://en.wikipedia.org/wiki/Enterprise_2.0>
Wikipedia (2008d)
Amplified Conferences, Wikipedia. Retrieved September 25, 2008 from
<http://en.wikipedia.org/wiki/Amplified_conference>
Wikipedia (2008e) Transliteracy, Wikipedia. Retrieved September 25, 2008 from
<http://en.wikipedia.org/wiki/Transliteracy>