Collection Development with the Help from Second Grade. A second-grade student brought a problem to my attention.
He explained that the library collection has only 1 or 2 copies of books on topics that children want to read. He illustrated his point with a poster. It was a portrayal of a boy looking for robot books that were nowhere to be found. We decided to ask all second-grade students to help solve the problem by searching for a topic of interest using the library catalog and determining if there were enough books for them to read. We started with a lesson on reading the results of a catalog search. Lesson: Reading Catalog Search Results Materials ProjectorComputerAccess to the online library catalogBook Request formsPencils Introduce the lesson by asking students to raise their hand if they ever left the library without a book that they wanted. Explain that you would like their help in ordering books on topics that children want to read. Display the library catalog for everyone to see. Type a subject in the search bar. Reflection Next Steps. Library Privacy Checklist for Students in K-12 Schools.
This checklist is intended to help libraries of all capacities take practical steps to implement the principles that are laid out in the Library Privacy Guidelines for Students in K-12 Schools.
Priority 1 are actions that hopefully all libraries can take to improve privacy practices. Priority 2 and Priority 3 actions may be more difficult for libraries to implement depending on their technical expertise, available resources, and organizational structure. Priority 1 Actions. Ranganathan on shyness: Get over it! - OCLC Next. Advice from the father of library science In 1931, S.R.
Ranganathan, a mathematician and librarian who is widely regarded as a founder of modern library science, published his seminal work, The Five Laws of Library Science. His five principles about managing the library get most of the publicity, but tucked away on page 65 is a gem of a quote sometimes overlooked but extremely important in our fast-changing world.
Internet Filtering at Schools Is Problematic. Giving all children access to the Internet and computing became a rallying cry for educators and elected leaders in the 1990s.
In March 1996, President Clinton and Vice President Gore led 20,000 volunteers in a one-day effort to connect thousands of California public schools to the “brave new world of mouse clicking and web surfing.” Yet that brave new world remains unconquered for many students and schools, especially in rural and high-poverty communities. Some have coined the term “digital redlining” to describe how advanced technology has been deliberately denied from certain areas based on geography as well as the race, ethnicity, and income of residents. In the intervening years, the spotlight has pivoted to the so-called “connectivity gap”—which hurts schools without high-speed Internet connections—and the homework gap—which hurts students unable to access wireless and broadband connections from home. This finding is confirmed by anecdotal and empirical evidence. A Copyright-Friendly Toolkit.
However fabulous Creative Commons and Public Domain content may be, sometimes you really need to use copyrighted material.
Say you plan to comment on popular media or current events. For instance, you may be planning to critique the portrayal of Native Americans in commercial films. You are going to want to “quote” some commercial films like Pocahontas, Lone Ranger, and Dances with Wolves. If you are reviewing a book, you may want to share its cover art. You may use copyrighted content without asking permission if you believe that your use falls under the doctrine known as Fair Use. NSTeens.org - Making Safer Choices Online. Critical Evaluation. Infographic: Get More Out Of Google. Web Evaluation: Does This Website Smell Funny to You? One of my friends spent this past weekend working with her 2nd grade daughter on a research project.
While her daughter flew through the arts and crafts portion and was able to handwrite the “sloppy copy” of her presentation, she struggled when it came to typing the final draft. She didn’t know where the period was. Tools for verifying and assessing the validity of social media and user-generated content - Journalist's Resource Journalist's Resource. Advocacy, Legislation & Issues. In the span of a single generation the Internet has revolutionized the basic functions and operations of libraries and schools and expanded exponentially both the opportunities and challenges these institutions face in serving their users.
During this time many schools and libraries in the United States have installed content filters on their Internet access. They have done so for a variety of reasons, not least of which is the requirement to comply with the Children’s Internet Protection Act (CIPA) in order to be eligible to receive federal funding or discounts through the Library Services and Technology Act, Title III of the Elementary and Secondary Education Act, and the Universal Service discount program (E-rate), or to comply with state filtering requirements that may also be tied to state funding.
What Would Winston Do? Here’s something a little different from Touch Press, the developers of the extraordinary Beethoven’s Ninth Symphony, The Waste Land, and Molecules, among other productions.
Their new app is interactive personal and political history, asking viewers to imagine how they would respond in situations that Winston Churchill confronted, as a young man and as Britain’s leader. Index, “Think Like Churchill’ (Touch Press) Aussie’s Jar'Edo Wens prank sets new record as Wikipedia’s longest-running hoax. Subtle vandalism: You won't find any rock art depicting Jar'Edo Wens on the walls of caves in the Kimberley.
Photo: Greg Totman Ten longest-running known Wikipedia hoaxes It has survived unchallenged for almost a decade, but Wikipedia editors have finally caught up with, and removed, an entry created by an anonymous Australian contributor who concocted a fake Aboriginal deity named Jar'Edo Wens. Things That Make the Librarian Angry — The Message. In library school we learned a lot about the reference interview; how to take what a patron was saying and convert it into an information need even when the patron might not even know exactly what they wanted.
The question “Can I do this?” Has a range of answers depending on what exactly is being asked. Is it technologically possible? Is it okay according to the rules of the system we work within? Is it allowed according to some set of laws that we can agree on? When an Open Library patron asks me over email if they can keep an ebook longer than the two-week lending period, the actual answers to these questions which are all some variant of “Can I do this?” Link to hoax sites in LM_Net archives. Hoax websites.