Thursday, November 02, 2006

Podcast A4: Security & Privacy

Heather Hawley's Podcast Script:
This podcast is on the security and privacy module. I talk about the current state of email spams, computer viruses and worms, spyware, adware, and phishing. I delve into the definitions of these malicious programs and provide examples of what they are from Technology for the Rest of Us, the BBC News, and my own personal experience. I also list the University of Arizona's, Security Incident Response Team recommendations for users to protect their computers.
Download file

Hold the Phone: VoIP Style

Remember our Course Introduction module, setting up and using Skype? Well, I thought this article was interesting and ties into our previous learning exercise using VoIP. From my yesterday’s RSS feed in the New York Times Technology Section, “Phones for that Other System”:
Netgear%20for%20skype.jpg


This article talks about how “until recently, the best you could hope for was an ‘operators standing by’ headset and microphone, which had to be tethered to a computer, which was itself tethered to a router.” It shows how the computer headphone is now morphing into new, familiar-looking VoIP phones to be more user friendly. The idea is that offering a familiar looking phone will open up the market to let Skype compete with landlines and cell phones.

Krug’s Trunk Test: My Assessments and Test Outcomes

Krug’s trunk test is an exercise to assess the usability, or specifically the “good navigation”, of a web site by having the user start from in “the bowels” of a site and assess from there whether the following questions may be answered “without hesitation”:

What site this is?
What page you are on?
What are the major sections of this site?
What are your options at this level?
Where you are in the scheme of things?
How you can search?
How you can get home?
(p85).

I performed this “trunk test” on the following websites and will discuss my final assessment of the answers to the above questions for each of these sites: Drugs & Alcohol page, Food Network's Party Ideas page, and the University of Arizona, School of Information Resources & Library Science’s About SIRLS page.

1. The TeensHealth.org's Drugs & Alcohol page has an overall nicely designed page with a clean and uncluttered layout. However, there are some issues that if addressed would make this a better and more effective informational website.

The first problem I noticed is that, although the Site ID is locatable and properly placed in the upper left corner, (Krug p64), the website’s sponsor, the Nemours Foundation, has an equally prominent listing on the right side of the page, making the site ID a bit confusing. This site’s design of the Site ID and Sponsor information forces the user to pause and think about which option may be the homepage, which is a clear violation of Krug’s mantra “Don’t Make Me Think!” (p11).

It’s much easier to tell what page the user is on, because the page name is on a prominent banner located in the top middle of the page. When I navigated to other areas of the site, I could see that the use of these page name banners was consistent which is “one of the most powerful usability principles” (Nielsen, Top Ten Mistakes in Web Design).

The major sections of the site are clearly laid out by the tabs navigation bar on the left hand side of the page. One issue here is that the sections tabs on left side of the page are not highlighted in some way to show the reader which tab has been selected. According to Krug, “if there’s no tab selected when I enter a site…I lose the impact of the tabs in the crucial first few seconds when it counts the most” (p84). Therefore, highlighted would make the tab navigation scheme effective.

The local navigation of this webpage is fairly well done. However one issue I encountered is that the links change to a very similar color after the user has visited it (from blue-gray to blue). At first I thought they didn’t change color, but after trying different browsers, I noticed there was a slight color change. This may be an issue for other users as well, and the end result is likely to cause confusion for users who may need cues to know which links have been previously visited. According to Jacob Nielsen, in Top Ten Mistakes in Web Design, “knowing which pages they've already visited frees users from unintentionally revisiting the same pages over and over again.”

The “you are here indicators” are the page name banners and in the use of breadcrumbs to show “the path from the homepage to where you are” (Krug, p76). Again, the use of highlighted tabs to cue the user on exactly which section they are on would make the use of these tabs more effective.

Users can search from any page and the search engine is well laid out with the search box at the top with a clearly defined “search” button. However, the search capabilities are fairly weak. Bad search is the number one mistake according to Jakob Nielsen’s Top Ten Mistakes in Web Design, because “overly literal search engines reduce usability in that they're unable to handle typos, plurals, hyphens, and other variants of the query terms.” I experimented with the search by purposely misspelling words like “alcahol” and “maryjuana” and even searching for ambiguous terms like “drinking” to see what the site’s search capabilities were. I came away disappointed since misspelled words resulted in “no results were found for your search”. Another problem is that the search criteria are not displayed on the search results page, which is a “Web Blooper” according to Jeff Johnson’s in his book GUI Bloopers (p342). Johnson points out that “when search services do not show the users’ search criteria on the results page, they are hindering their own effectiveness” (p342). Also, the results displayed for ambiguous search terms should be tightened up for more effective searching. For example, the search for the term “drinking” resulted in matches about water, and even sports nutrition. A search engine this weak could result in the loss of user interest because it’s so difficult to find results when searches are not good matches to what is in the webpage. I think this element of web design is especially important for a site that has a target audience of teens, who may not be sophisticated searchers. This site’s search engine needs to be configured to allow matches for descriptive terms or misspellings to allow effective searching.

Although it should be easy for users to navigate “Home”, because there is a link for it located at the top left side of the page. However there is another violation of the “Don’t Make Me Think!” rule, because right next to link for “Home” is another link for “KidsHealth Home”. This is overly confusing, especially for users that are in the bowels of a site, to know exactly which one is the “right” home navigation link to use. Also, when users click on Home, the homepage opens in new browser, which is Mistake number nine of Top Ten Mistakes in Web Design. Neilsen explains why this constitutes bad design:
“The strategy is self-defeating since it disables the Back button which is the normal way users return to previous sites. Users often don't notice that a new window has opened, especially if they are using a small monitor where the windows are maximized to fill up the screen. So a user who tries to return to the origin will be confused by a grayed out Back button.”


2. The Food Network's Party Ideas page looks overwhelming with its rich media graphics and flash advertisement and the moving ticker in the heading; there are also four drop down menus and three search boxes, as well as numerous section headings and text boxes. Since my initial reaction is “Whoa! Where do I start?” obviously there is not a good use of “clear visual hierarchy” on this page (Krug, p31), nor an effort to “keep the noise down to a dull roar” (Krug p41). My first impression of the “busy-ness” [sic] and “visual noise” (Krug, p38) going on in this page is summed up by Krug: “When everything on the page is clamoring for my attention the effect can be overwhelming.” The use of moving banners and flash is mistake number seven of Nielsen’s Top Ten Mistakes in Web Design because “Web users have learned to stop paying attention to any ads that get in the way of their goal-driven navigation.”

The site ID is a locatable icon properly placed in the upper left corner.

The page you are on relies on the tabs navigation where the tab of the page you are on is reverse highlighted, but these tabs are also the major sections of the website. There is also very small breadcrumb at the top of the page. However, Krug warns against making the breadcrumb “do double duty” by using them in lieu of a page name because “it seems like it should work, but it doesn’t, probably because it fights our expectation that headings are flush left or centered not dangling in the middle of the page at the end of a list” (p79). Krug also suggests that the last item on this breadcrumb be boldface, which is not done here making the page identification more difficult. Another issue I noticed right away is that the URL is: http://www.foodnetwork.com/food/entertaining. This URL name is confusing to me because it contains the “food/entertaining” tag which is different from the page navigation tab for “Party Ideas” (and there is no tab for food and entertaining either).

The major sections of the site are clearly laid out by the tabs navigation bar across the top of the page and are nicely reverse highlighted to show which section the user is on (note that for this website, the sections correspond to pages).

The local navigation is simply a mess because it is spread out all over the page, although it also has three bulleted links in small type on the left side of the page. The links in the middle of the page and on left side of the page take the user to the same place to make the design of this website not only messy but redundant. According to Jakob Nielson in Reduce Redundancy: Decrease Duplicated Design Decisions,
“too many cross-references will create an overly complex interface and prevent users from understanding where they are and what options they have at that location. It's thus essential to limit cross-references to those alternatives that are both most important to users at their current location and most likely to help them overcome navigational dislocation.”


Also, the featured items look similar to advertisements, which users tend to ignore (Nielsen, Top 10 Mistakes in Web Design). Furthermore, these featured items make the mistake of asking users to “click here” which Nielsen says is “the oldest web design rule is to avoid using [“Click Here”] as the anchor text for a hypertext link” (p55). Instead Nielsen recommends using hyperlinks in “text that provides a short summary of what kind of additional information is available” (p55).

The “you are here indicators” again rely on the reverse highlighted tab and small breadcrumb (as do both the page and section identifiers).

You can search by putting your search term into one of the three search boxes on the page. One search box is labeled “Find an Episode”, but users may not know if they should search for an episode or topic. The other two search boxes seem to be the same, because they both gave me identical results, except one is located on the top middle of the page while the other is in the top left margin of the page. Figuring out which of the three search boxes to use is confusing and makes the user think much too much. Users must also select whether to search by “Recipes” or by “Topics” for the non- “Find an Episode” boxes which again makes the user think too much. However the search results properly show the search term the user has entered for the search process (Johnson, p342).

You can get home by clicking the Site ID graphic on the upper left hand corner of the page, or by searching hard for the tiny first breadcrumb labeled “Home”, or the equally tiny “Home” link at the bottom of the page. This is yet another example redundant links.

3. I chose to critique the University of Arizona, School of Information Resources & Library Science (SIRLS) web page because I must rely this website for crucial departmental information and it drives me crazy because the site is so user unfriendly it makes finding information difficult. For this exercise I looked at the About SIRLS page which is frankly a relief to be past the homepage, which manages to make most of Neilsen's Top 10 Mistakes in Web Design, including the use of crowded popup menus and link redundancy in triplicate . However, the About SIRLS page is okay, but with some corrections it could be made better (while the Homepage needs a complete overhaul).

The Site ID is locatable and properly placed in the upper left corner inside a banner with the school logo.

The page you are on is also easy to locate because the page name is bolded and located in the top left of the body of the page, and the navigation tab is reverse highlighted.

The major sections are fairly well done, but I would suggest that the subsections which are currently located on the left side of the page in table form be included in the tab menu at the top instead. Moving the section navigation links to tab subsections would be a more effective use of the tab navigation scheme already in place. But at the very least, the existing subsections should be highlighted when the user clicks on them.

The local navigation is nicely laid out on the page, with a bulleted list and underlined links. However, it could be made more user friendly by reducing the amount of redundant links such as the calendar which is also located in a table on the right side of the page and the Search & Index link. While the Search & Index link should be converted to a “simple search box” (Nielsen, Top 10 Mistakes in Web Design). Also, the duplicate calendar links are bad

“because [if] users don't know for sure when a feature is duplicated, they'll have to spend additional time figuring out whether the duplicate is a new feature or an old feature.”
(Nielsen, Reduce Redundancy: Decrease Duplicated Design Decisions).


Another problem is that the links do not change color which may cause users to unknowingly revisit the same sites repeatedly (Nielsen, Top 10 Mistakes in Web Design).

The “you are here indicators” are the page name heading in bold at the top left of the page, the use of breadcrumbs to show “the path from the homepage to where you are” (Krug, p76) and the use of reverse highlighted tabs to cue the user.

You can search by clicking on a link in the subsection menu located on the left side of the page or clicking on the link in the middle of the page. These are violations of both redundancy and requiring the user to click on a link for searching rather than providing a search box (Nielsen, Top 10 Mistakes in Web Design). However, since this site incorporates a Google search box, the search capabilities are robust with the proper listing of the user’s search terms (Johnson, p342).

You can get home by clicking on the “Home” tab in the section menu, or by clicking on the first breadcrumb labeled “Home”, the “Home” link at the bottom of the page or the SIRLS icon. Having this many links is again redundant, a better option would be to make one “Home” option “more prominent rather than duplicate it” (Nielsen, Reduce Redundancy: Decrease Duplicated Design Decisions).

References:
Johnson, Jeff. GUI Bloopers: Don’ts and Do’s for Software Developers and Web Designers. CA: Academic Press, 2000.

Krug, Steve. Don’t’ Make Me Think: A Common Sense Approach to Web Usability, 2nd Ed. IN: New Riders, 2006.

Nielsen, Jakob. Designing Web Usability. IN: New Riders, 2000.

Nielsen, Jakob. (2002). Reduce Redundancy: Decrease Duplicated Design Decisions. Jakob Nielson’s Alert Box. Accessed online on 10/15/06 at http://www.useit.com/alertbox/20020609.html.

Neilsen, Jakob. (Updated 2006). Top 10 Mistakes in Web Design. Jakob Nielson’s Alert Box. Accessed online on 10/15/06 at http://www.useit.com/alertbox/9605.html.

Risks involved in the YouTube buyout by Google

With all the media fanfare and speculation recently over the purchase of YouTube by Google, I wanted to share an excellent article I read about the ramifications of this buyout. The article is "The Battle Over YouTube", found on the October 9th issue of Newsweek.

The first major issue discussed is the well known controversy over YouTube’s airing of copyrighted material. For example, the music owned by the music company giant Warner, and the tentative profit sharing agreement that’s been reached between those two companies. But not all the music giants want to settle, like the biggest giant of all, Vivendi, which is threatening lawsuits. According to this article, since Google has bought out the company, and everyone knows that this company is rich (unlike the startup that was YouTube), they are now “a target for anyone who wants to sue."

The second major issue discussed, which is has not been widely publicized that I’m aware of, is the enormous operating expenses involved. The author quotes a source who estimates it to be “more than $2 million a month.”

Finally, the threat of startup competition is discussed. A popular YouTube video creator tells the author that he has “started experimenting elsewhere, advertising on his own Web site and trying out Revver.com”, even after being courted by YouTube.

I recommend reading this article because I think it provides more insight to the challenges ahead for this highly touted merger.

Podcast A3: Rich Media

Heather Hawley's Podcast Script:
This podcast is on the rich media module and I talk about some websites I have found that are good examples of rich media use. Sites include The New York Times, Zillow, and the Tucson Association of Realtors Multiple Listing Service. I delve into what these websites are and how they are using rich media, how they measure up to the Interactive Advertising Bureau standards and guidelines if applicable, and how rich media is used as an interactive informational tool in their products or services.
Download file

The Role of XML

My understanding of XML
My understanding of the role of Extensible Markup Language (XML) is that it is the next generation markup language, following (but not replacing) the original Hypertext Markup Language (HTML) on which the internet as we know it is based. However, unlike HTML, it allows data to be described. This XML language is an enhancement of the existing HTML internet building blocks: providing protocols for reliable global communication and delivering files, a language specifying how data should be displayed, and the graphical interface for displaying HTML data on the web. XML aims to improve on these building block elements by being “well formed” to provide consistency of data element assignment, providing enhanced tags that separate content and presentation, and is verifiable (Rhyno, p72-73).

Problems with HTML
The internet is based on TCP/IP, an innovation that began the phenomenon of the internet, and which allowed global communication by providing easy file and information sharing. However, there are some drawbacks to HTML. Namely, that HTML is mainly concerned with “content presentation and arrangement” (Rhyno, p72) of data in a webpage but not with data description. An example of this that author Art Rhyno gives is wanting to

“extract subject information, or even if you just want consistency in subject assignment, it becomes difficult without a commonly used tag like <subject> to mark, or delimit, where this information is contained…HTML is limited to a fixed set of tags. In this case, <subject> is not considered a valid HTML tag….” (p 73).


Besides the description issue, some additional issues with HTML are that it’s “graphics rich content” is problematic for displaying on screens of most small wireless devices and that even if graphics are removed, the HTML text is overwhelming and not very readable for the user (Coyle, p135).

XML: What it is
Coyle describes XML as a “meta-language” because it describes “how others may define their own data languages” (p 137); or more simply, a language to describe language. Therefore, XML is not a language like HTML, because it only sets out a framework to allow “users and industry groups to define their own domain-specific data definition languages” (Coyle, p139). According to Wikipedia, “languages based on XML are defined in a formal way, allowing programs to modify and validate documents in these languages without prior knowledge of their particular form.”

Relationship%20between%20XMLand%20HTML.jpg Image:http://www.idealliance.org/papers/xml2001/papers/html/images/03-03-05/xml-html-venn.jpg


A Breif History of XML and the W3C Influence
XML is derived from Standard Generalized Markup Language, which was itself based on Generalized Markup Language, that began the idea of a “formally defined document type” that can be “described with a set of rules” (Rhyno, p72). Some twenty years later, in 1996 the World Wide Web Consortium (W3C) became involved in developing XML (Rhyno, p72) because it was a less costly, more user friendly version of SGML and it could provide more meaningful data than HTML, yet wouldn’t replace it entirely (Desmarais, pp1-2).

timbl.jpg

Image: http://www.xml.com/2000/12/xml2000/timbl.jpg


XML and Libraries
The use of XML is very useful for libraries due to the following factors:

XML is well formed (Rhyno, p73): Meaning that the structure is sound because it contains the proper nesting with both an opening and closing tag (Desmarais, p7). This is crucial for libraries because they must have quality control over potentially “tens of thousands” of documents (Rhyno, p73).

XML can be validated and can ensure consistency (Rhyno, p73): This requires an XML parser or “validation mechanism…of a document type definition (DTD)” (Rhyno, p73) to “check incoming data against the rules defined in the DTD to verify that the data were structured correctly” (Desmarais, p3). Rhyno calls this validation step “one of the most important steps in managing a library’s digital collection” because it maintains consistency that is needed for “sharing the content with others” and for any future “migrations” of this information to a new system (Rhyno, p73).

XML separates content from presentation (Rhyno, p73): This goes back to the initial problem with HTML: namely that it doesn’t separate content from presentation, a task “which is fundamental in managing large collections of documents...” (Rhyno, p73).


seperating%20content%20from%20format.gif

Image: http://ils.unc.edu/~viles/xml/slides/img020.gif


Obviously the issue of separating content from presentation is important to libraries because their job is to provide and organize content from numerous sources. XML also allows meaning to be embedded into data that can be presented “in a format that is independent of device, programming language, operating system, or network platform” (Coyle, p138).

As noted, XML is useful for libraries and was considered for replacing the "aging" MARC format as their cataloging system (Desmarais, p3). The Library of Congress initially considered this shift by doing a feasibility study in 1995, then in 1998 they released a MARC document type definition (DTD) and software to convert MARC to XML (Desmarais, pp3-4). “The objective is to make machine-readable bibliographic data more open and interchangeable in the Internet environment” (Desmarais, p4).

XML Applications
Besides solving data content issues for the library, XML is useful for integrating technologies and being able to deliver critical information in other industries. For example, I found an article on XML in Wired News titled; XML Zooms onto Gov’t Tech Agenda. This article is about how “declining sales among U.S. automakers have clinched government support for XML standards.” This is in reference to the Enterprise Integration Act of 2002, which was made into law due to the declining profits of U.S. carmakers (Ford, GM, and DaimlerChrysler), after a report by the National Institute of Standards and Technology whose findings showed that data-quality errors caused by interoperability resulted in financial losses of $1 billion per year (Steakly, 2002). The idea here is that XML can help U.S. industries save billions of dollars by streamlining and integrating their manufacturing or business processes so that they can compete in the global marketplace.

Another article I located in the New York Times Technology section entitled, Software Out There that also addresses the interoperability issue. The idea here is that “blocks of interchangeable software components are proliferating on the Web and developers are joining them together to create a potentially infinite array of useful new programs” (Markoff, 2006). According to this article, the main reason for this shift from proprietary systems to one of interoperability is due to open source software and XML which allows “simple and efficient to exchange digital data over the Internet” (Markoff, 2006). Markoff quotes a Microsoft Chief Technical Officer, Ray Ozzie, as saying: "I'm pretty pumped up with the potential for R.S.S. to be the DNA for wiring the Web." Since RSS is based on an XML system, this is obviously a great example of XML extending the enterprise of the web.

todays%20vs%20tomorrows%20web.jpg

Image: http://www.tiresias.org/cost219ter/florence/images/dardailler_fig01.jpg


My Thoughts on the Impact of XML on the Digital Divide Issue
The Markoff article got me thinking about XML and the impact it has on the web and how this in turn, and more importantly, impacts the digital divide. Last night I read in The Economist, the article Splitting the Digital Difference about new ideas for narrowing this divide like giving children laptops, or hard wiring multiple users to a central computer they all share, or cell phones that can carry data and link shared PC's to the internet. This just makes me realize how important the XML standards are for truly “sharing” information. These XML standards will enable data to be shared and understood regardless of the device used or needs of the individual or entity using it to access, provide, or manage information.

References:
Coyle, Frank P. Wireless Web: A Manager’s Guide. NJ: Addison-Wesley, 2001.

Desmarais, Norman. The ABC’s of XML: The Librarian’s Guide to the eXtensible Markup Language. TX: New Technology Press, 2000.

Markoff, John. “Software Out There.” New York Times 5 April 2006. Accessed 26 Sept 2006, online: http://www.nytimes.com/2006/04/05/technology/techspecial4/05lego.html?ex=1159416000&en=ef2d38c1eebed9bf&ei=5070

Rhyno, Art. “Introduction to XML.” In Technology for the Rest of Us, ed Nancy Courney. CT: Libraries Unlimited, 2005.

Steakly, Lia. “XML Zooms onto Gov’t Tech Agenda” Wired News 11 Nov 2002. Accessed 26 Sept 2006, online: http://www.wired.com/news/politics/0,56287-0.html

Web 2.0 Winners & Losers Poll Results

Since Professor Glogoff talked what the web 2.0 means in his most recent podcast on Core Web Technologies, "Web 2.0", when I came across this reader poll in my RSS feed today in the Wired News Technology section, I thought I’d share. If you’re interested, check out who got voted the best and worst websites in The Web 2.0: Winners and Losers.

So I’m bringing gossip back to the blog, since it’s almost like the best & worst dressed at the Emmys, except about the highly touted internet 2.0. Enjoy!

Podcast A2: Podcast on Podcasts

Heather Hawley's Podcast Script:
I talk about the podcasts that I have subscribed to, how long they seem to have been in existence, whether there are corresponding websites, the length of each of the podcasts that I listened to and a summary of what was discussed. I also note what I found interesting about them, why I decided to subscribe to that particular podcast, how I listened to it, and who I would recommend these podcasts to.
Download file

My Experience using Live Bookmarks

My Live Bookmarks:
I chose two Live Bookmarks for Activity #4 in the Course introduction: Wired Technology Section and the New York Times Technology Section. I used to check only these sporadically, but since setting up the live bookmarks on every computer I use including my work computer, my home desktop and my laptop, I now check these feeds daily.

Effect of Live Bookmarks on my Online News Browsing:
Setting up Live Bookmarks has definitely heightened my use of the web for daily news because I am following headlines from multiple sources now instead of only browsing and reading selected articles from the New York Times. And I used to never read technology news, but now this is a major part of what I follow, so I’ve learned a lot. It has been beneficial for me to read this since it helps me relate to what we are discussing or learning about in our Introduction to Technology class. It’s also a great way to supplement the information we get from Professor Glogoff.

My Other Live Bookmarks:
Since completing this Live Bookmark activity, I have since added the following live bookmarks: the New York Times Science and Health sections, the Technician which is the student newspaper from North Carolina State University, Democracy Now, and the Christian Science Monitor.

I chose to add the New York Times Science and Health sections because I am taking a SIRLS Medical Online Searching class, and a major part of this is following current news about medical issues. My project in this class will be on type 2 diabetes, so it’s beneficial for me to monitor any breaking or current news about this disease.

I chose to add the The Technician because it is the student paper for North Carolina State University, where I plan to apply for a Library Fellow position after graduation. Since I’m not overly familiar with this school, I have subscribed to the paper’s feed so that I can learn more about the school and stay informed on their issues. I think this is a good way to get information on and to think about how a librarian could be involved with supporting these students, especially how library technologies could be of help.

I chose to add both Democracy Now! and the Christian Science Monitor because their news coverage is outside mainstream media and is a good way to get a more balanced media coverage of current issues. So reading these news sources along with reading the New York Times keeps me informed about breaking news as well as news analysis.

Live Bookmarks and a RSS Feed Aggregator:
Because I have so many Live Bookmark feeds now, I am interested experimenting with a RSS aggregator. I first learned about this service after reading about it in Fagan Finder. I think this service could be an excellent resource for monitoring news that is relevant to my classes so I have signed up for a free aggregator from FeedReader. Because I now have all these live bookmarks to view, I look forward to experimenting with Feedreader to find out more about adding specific resources, like my current Live Bookmarks. This would allow me to not only view the ones I currently subscribe to, but to also get an overview of all these other news sources for information.

A Report on Radio Frequency Identification (RFID) Technology

RFID Technology: What it is
RFID is a radio frequency identification system that is automated and allows data collection and transfer as well as the computer identification of specific objects.

RFID technology uses a combination of radio frequency and microchip technologies (Schnell p43). The tags, which are both readable and writable, contain memory microchips and antennas (Schnell p44). Yet they can be so tiny as to be “paper thin” (Schnell p44) or even “smaller than a grain of rice” (Garfinkel & Rosenberg, pxxvii). These microchip tags are attached to objects so that the object’s data can be read remotely using the radio frequency waves (Schnell p43).

How exactly does this technology work? The tag’s microchip contains a “unique identifier and other information, the reader extracts the information on the tag”, while the antenna sends radio waves between the tag and the reader to “excite the microchip allowing the stored information to be read” (Schnell p44).

rfid.jpg

Image from: www.tagnology.com/rfid.htm


There are also two different types of radio frequency (RF) tags: passive and active. The difference between the two is that an active tag contains a battery powered system while the passive tag is powered solely from the radio signals it receives. Active tags have the advantage of being readable from greater distances because the system doesn’t rely on a RF signal for power, while passive tags have the advantage of being much smaller and cheaper and have a longer “shelf life” because they don’t need battery replacements (Garfinkel & Holtzman, p17).

Origins and Current Use
RFID technology was originally used by the British government in World War II “to identify their own aircraft returning from sorties over occupied Europe” (Mullen & Moore, p5). It was later used by the U.S. government for monitoring nuclear or hazardous materials in the late 1960s (Mullen & Moore, p5). Then in 1977, this technology was released for public use (Mullen & Moore, p5).

Today this technology is applied to various products that most people recognize such as: the E-ZPass electronic toll collection system, vehicle remote keyless entry systems, and in retail for debit payment or for identifying products (Schnell p44).

RFID Systems in Libraries
Libraries also employ this technology which can offer more benefits than the older barcode technology. In the chapter, “Radio Frequency Identification (RFID)”, author Eric Schnell lists the ways in which RFID technology is superior to barcodes (incidentally, barcodes are the technology employed by the UA Main library). According to Schnell, the advantages are that: visible tags are not required, tags can be placed anywhere, multiple tags can be read at once, they “are more tamper resistant than barcodes”, and they can provide both security and identification at once (Schnell, p44).

Schnell also lists the possible components of RFID systems used in libraries and explains their functions.

Circulation Stations: updates circulation and collection records

Staff Processing Stations: processes new materials, writes data to the tag, and updates collection records

Shelf-Management Readers: hand held devices that handles inventory and data searching (for “retrieval or weeding” purposes)

Theft Deterrence Gates: an alarm system that checks “security status of materials”

Self-Checkout Stations: checks patron identification, checks out items, deactivates security and prints receipt

Return Drops: contains scanners for automatic check-in of materials and updates circulation and collection records

Sorting Stations: handles automatic materials sorting (combined with book drop) (Schnell, p44).


rfid.jpg

Image from: http://www.d-techdirect.com/images/RFID/main.jpg


Costs
Associated costs of RFID technology for libraries can be large, with the cost of the RF tags representing “about half the overall cost (Schnell p48). Schnell gives the following cost estimates, as of mid 2004: tags $0.80, tags for DVD’s $1.50, tags for VHS tapes about $2.00, anti-theft security device components $4,000, server with interfaces for RFID hardware and an integrated library system $15,000 and a self-check-out machine $20,000 (p48). So, for a rough cost breakdown for libraries implementing an RFID system: for a library with 40,000 items the estimated cost is $70,000, or for a library with 100,000 items the estimated cost is $166,000 (Bowen Ayre, p235).

Impact and Implications: Positives
However, RFID technology may have a positive impact on libraries because it can “offer potential cost savings in the operation and management of resources” by: increasing speed of processing materials, improving management of collections, improving sorting, allowing real time updating of records and reducing theft (Schnell, p45).

The impact and implications for businesses is similar. RFID technology is currently being used in business for manufacturing, distribution and inventory, retail, document tracking, security, food supplies, healthcare (Mullen & Moore, pp8-10).

I recently did a news search for RFID and came across several articles about businesses using this technology. After doing a google search I found “IBM to Provide Network to Monitor Cattle” This article is about IBM creating a “remote system to transmit the body temperature of cattle to ranchers, dairy farmers, feedlot owners and government regulators.” In the op-ed piece “It Tracks Your Every Move...at the Water Park” the author talks about his vacation experience at a water park in Pennsylvania where they used bracelets with RFID technology which allowed for hotel access and for purchasing food and tokens.

Impact and Implications: Negatives
However RFID technology also has it's critics. In today’s news, “Wal-Mart Expands Use of RFID Tracking”:

“Despite the best efforts of privacy advocates, Wal-Mart pressed forward with its plans to use RFID, saying it planned to roll out the technology to another 500 stores during this fiscal year. The expansion would mean over a quarter of the company's 3,900-plus stores, including its Sam's Club subsidiary, would use RFID to manage its inventory.”


As noted in the Wal-Mart article, RFID is a controversial technology because of privacy concerns. The major issues are that RFID could be used for profiling and surveillance (Weinberg, p89). In the Wal-Mart article, privacy advocates are concerned about surveillance, claiming that RFID tags could “possibly [be] allowing Wal-Mart to track its customers without their knowledge.”

Privacy issues also remain a top library ethics concern. RFID can have a negative impact on libraries integrity if patron’s “movements and reading habits” are tracked, or have their “information gathered and used to market unwanted products and services” (Schnell, pp49-50).

However, Schnell posits that RFID use in libraries is no more of a threat to patrons’ privacy than traditional circulation databases, or any other debit card or toll pass technology (Schnell, p50). Firstly because of the short “read range” of most libraries RFID systems would make it technically impossible without installing “an array of RFID readers” which is not economically feasible; and secondly because most libraries purge their records kept on patrons once items are returned in order to protect their privacy and ward off USA Patriot Act intrusions (Schnell, p50.)

To help libraries navigate the privacy issue, while utilizing this technology, author Lori Bowen Ayre surveys and lists some best practice guidelines for libraries preparing to use or currently using RFID technology. Among these are:

Libraries need to be open about using RFID and this includes providing literature to inform patrons about their rational for using RFID, its objective, and the policy and procedures of its use.

Signs should be posted to inform patrons that this technology is being used, describe what type of information is being collected, and a privacy statement should be provided along with a description of how this type of technology differs from the older technologies used.

No personal information should be stored on the tags; nor should any information describing the tagged item, in order to prevent this information being read by unauthorized users.

“All communications between tag and reader should be encrypted via a unique encryption key” (not unlike the 802.11 Standard for LAN’s). (Bowen Ayre, p240).


References:
Bowen Ayre, Lori. “Wireless Tracking in the Library: Benefits, Threats, and Responsibilities.” In RFID: Applications, Security, and Privacy, eds. Simson Garfinkel and Beth Rosenberg. NJ: Addison-Wesley, 2005.

Foy, Paul. “IBM to Provide Network to Monitor Cattle” Forbes. 24 Aug. 2006. 9 Sept. 2006 http://www.forbes.com/business/energy/feeds/ap/2006/08/24/ap2972207.html

Garfinkel, Simson and Holtzman, Henry. “Understanding RFID Technology.” In RFID: Applications, Security, and Privacy, eds. Simson Garfinkel and Beth Rosenberg. NJ: Addison-Wesley, 2005.

Garfinkel, Simson and Rosenberg, Beth, Eds.“Preface.” In RFID: Applications, Security, and Privacy, eds. Simson Garfinkel and Beth Rosenberg. NJ: Addison-Wesley, 2005.

Mullen, Dan and Moore, Bert. “Automatic Identification and Data Collection: What the Future Holds.” In RFID: Applications, Security, and Privacy, eds. Simson Garfinkel and Beth Rosenberg. NJ: Addison-Wesley, 2005.

Oswald, Ed. “Wal-Mart Expands Use of RFID Tracking.” Beta News 12 Sept. 2006. 12 Sept. 2006 http://www.betanews.com/article/WalMart_Expands_Use_of_RFID_Tracking/1158092179

Pogue, David. “It Tracks Your Every Move...at the Water Park.” New York Times 30 May 2006. 9 Sept. 2006 http://www.nytimes.com/2006/05/30/technology/poguesposts/30pogues-posts.html?ex=1158206400&en=34c50456bffa9703&ei=5070

Schnell, Eric H. “Radio Frequency Identification (RFID).” In Technology for the Rest of Us, ed Nancy Courney. CT: Libraries Unlimited, 2005.

Weinberg, Jonathan. “RFID, Privacy, and Regulation.” In RFID: Applications, Security, and Privacy, eds. Simson Garfinkel and Beth Rosenberg. NJ: Addison-Wesley, 2005.

What I learned from Molyneux and Drew in the book "Technology for the Rest of Us"

I will discuss the two new topics I learned after reading Molyneux’s “Computer Networks” and Drew’s “Wireless Local Area Networks” chapters from the book, Technology for the Rest of Us. From Molyneux, I learned about partial and full mesh network architectures and the OSI Reference Model concept. From Drew, I learned about the 802.11 Standard for LAN’s, and about WLAN security protocols.
From Molyneux, I learned that a full-mesh network is when each device is interconnected, while in a partial mesh network, devices do not need to be connected to every other device (p 4). To show the benefits of a partial mesh network, Molyneux gives the illustration of a phone network in a full mesh network scenario: every time a new phone is added to the network, it would require a connection “to all other phones in the country” (p 4). Because of this, Molyneux points out that full mesh network designs are usually constrained to small applications (p 4). Therefore, besides feasibly, a major benefit of a partial mesh network is cost reduction because not all devices require connections (p 5).

Molyneux also introduced me to the concept of the OSI Reference Model of network design. This model provides the basis “for comparison and teaching purposes” of all other networking protocols (p 9). This model is multilayered and includes the physical, data link, network, transport, session, presentation, and application levels. Because of this, most information professionals specialize in one layer because “each involves its own technologies, is complex, and requires different skills” (p 9). Molyneux has also proposed a “Layer 8” for libraries whose decision making is

“about what the networks will be used for [which] is a function decided outside the OSI Model- it is related to what the mission of the institution is and how networks can advance that mission” (p 10).


From Drew I learned about the 802.11 Standard for LAN’s, which Drew characterizes as “the most important event in the growth of WLAN’s” (p 16). This standard was adopted in 1997 by the Institute of Electrical and Electronics Engineers (IEEE) and it “describes the protocols and sets a common framework for all developers” (p 16). This standard guarantees purchasers “greater bandwidth” and manufacturers’ compliance with the standard so that devices can “talk with each other no matter what the brand” (p 16).

Drew also taught me about WLAN security including VPN, WEP, WPA and TKIP protocols. VPA means virtual private network, and this protocol requires network authentication before accepting users onto the network and data encryption during transmition (p18). WEP means Wired Equivalency Privacy and this protocol uses an algorithm or “key” for data encryption that is “built into” most access points; it is also the most widely used security protocol (p18). WPA means Wi-Fi protected access and this protocol has been “designed to overcome the basic weaknesses of WEP by providing improved encryption of data and by improving authorization routines” (p19). This protocol requires a password or “preshared key” that the “access point and client use…to generate new keys on other devices on the network” (p 19). And finally, TKIP means Temporal Key integrity Protocol, and it is an algorithm that “provides improved security recognition of the origin of the data being transmitted or received, and greatly improved authentication” (p 19). Drew taught me that security protocols for WLAN’s are important for a secure network so that data can’t be captured and new protocols are being continually developed for even greater security.

References:
Robert E. Molyneux, "Computer Networks," in Technology for the Rest of Us: A Primer on Computer Technologies for the Low-tech Librarian, ed. Nancy Courtney, 1-14 (Westport, Connecticut: Libraries Unlimited, 2005).

Wilfred Drew, Jr., "Wireless Local Area Networks," in Technology for the Rest of Us: A Primer on Computer Technologies for the Low-tech Librarian, ed. Nancy Courtney, 15-22 (Westport, Connecticut: Libraries Unlimited, 2005).