Information Technology and Libraries 2019-06-19T05:57:14-07:00 Ken Varnum Open Journal Systems <!--<p style="font-size: 125%;"><strong>Due to a planned system update, article submissions will not be possible from April 4-8, 2019</strong></p>--> <p><em>Information Technology and Libraries</em> publishes material related to all <strong>aspects of information technology in all types of libraries</strong>. Topic areas include, but are not limited to, library automation, digital libraries, metadata, identity management, distributed systems and networks, computer security, intellectual property rights, technical standards, geographic information systems, desktop applications, information discovery tools, web-scale library services, cloud computing, digital preservation, data curation, virtualization, search-engine optimization, emerging technologies, social networking, open data, the semantic web, mobile services and applications, usability, universal access to technology, library consortia, vendor relations, and digital humanities.</p> Letter from the Editor (June 2019) 2019-06-17T20:15:16-07:00 Kenneth J. Varnum <p>Highlights of this issue include a new look to journal, regular columns, and the 2019 LITA/Ex Libris Student Writing Award-winning paper</p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Kenneth J. Varnum Moving Forward with LITA 2019-06-17T20:16:07-07:00 Bohyun Kim <p>Final column by outgoing LITA President Bohyun Kim.</p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Bohyun Kim Digital Faculty Development 2019-06-17T20:16:32-07:00 Cinthya Ippoliti <p>The library has always played an important role in faculty development. But with the rise of online degrees, being able to support faculty in a virtual context becomes increasingly challenging. This column analyzes some areas to consider when exploring the way in which libraries can continue to assist with these efforts.</p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Cinthya Ippoliti Online Ticketed-Passes 2019-06-17T20:15:42-07:00 Jeffrey Davis <p>Reviews the arrival of and technology supporting online ticketed-pass programs in libraries. These programs allow library patrons to reserve single-day tickets to local attractions of all kinds. Offerings began with traditional museums but now include science centers, zoos, gardens, performances, tours, classes, and more. Further discussed is the new service delivery paradigm this represents: complementary to in-house offerings, librarians are brokering and facilitiating public access to non-library resources in their region to meet member needs.</p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Jeffrey Davis No Need to Ask 2019-06-17T20:19:11-07:00 Dejah Rubel <p class="AbstractText"><span lang="EN-CA">This article will describe how permissionless metadata blockchains could be created to overcome two significant limitations in current cataloging practices: centralization and a lack of traceability. The process would start by creating public and private keys, which could be managed using digital wallet software. After creating a genesis block, nodes would submit either a new record or modifications to a single record for validation. Validation would rely on a Federated Byzantine Agreement consensus algorithm because it offers the most flexibility for institutions to select authoritative peers. Only the top tier nodes would be required to store a copy of the entire blockchain thereby allowing other institutions to decide whether they prefer to use the abridged version or the full version.</span></p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Dejah Rubel 50 Years of ITAL/JLA 2019-06-17T20:18:45-07:00 Brady Lund <p class="AbstractText"><span lang="EN-CA">Over five decades, </span><span lang="EN-CA">Information Technology and Libraries</span><span lang="EN-CA">(and its predecessor, the </span><span lang="EN-CA">Journal of Library Automation</span><span lang="EN-CA">) has influenced research and practice in the library and information science technology. From its inception on, the journal has been consistently ranked as one of the superior publications in the profession and a trendsetter for all types of librarians and researchers. This research examines </span><span lang="EN-CA">ITAL</span><span lang="EN-CA">using a citation analysis of all 878 peer-reviewed feature articles published over the journal’s 51 volumes. Impactful authors, articles, publications, and themes from the journal’s history are identified. The findings of this study provide insight into the history of </span><span lang="EN-CA">ITAL</span><span lang="EN-CA">and potential topics of interest to </span><span lang="EN-CA">ITAL&nbsp;</span><span lang="EN-CA">authors and readership. </span></p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Brady Lund Weathering the Twitter Storm 2019-06-17T20:16:58-07:00 Sharon Han <p class="AbstractText"><span lang="EN-CA">After a disaster, news reports and online platforms often document the swift response of public libraries supporting their communities. Despite current scholarship focused on social media in disasters, early uses of social media as an extension of library services require further scrutiny. The Federal Emergency Management Agency (FEMA) recognized Hurricane Sandy as one of the earliest U.S. disasters in which first responders used social media. This study specifically examines early uses of Twitter by selected public libraries as an information tool during Sandy’s aftermath. Results can inform uses of social media in library response to future disasters.</span></p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Sharon Han “Good Night, Good Day, Good Luck” 2019-06-17T20:17:50-07:00 Megan Ozeran Piper Martin <p class="AbstractText">This article presents the results of a pilot project that tested the application of algorithmic topic modeling to chat reference conversations. The outcomes for this project included determining if this method could be used to identify the most common chat topics in a semester and whether these topics could inform library services beyond chat reference training. After reviewing the literature, four topic modeling algorithms were successfully implemented using Python code: (1) LDA, (2) phrase-LDA, (3) DMM, and (4) NMF. Analysis of the top ten topics from each algorithm indicated that LDA, phrase-LDA, and NMF show the most promise for future analysis on larger sets of data (from three or more semesters) and for examining different facets of the data (fall versus spring semester, different time of day, just the patron side of the conversation).</p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Megan Ozeran and Piper Martin Information Security in Libraries 2019-06-17T20:17:25-07:00 Tonia San Nicolas-Rocca Richard J Burkhard <p class="AbstractText">Libraries in the United States handle sensitive patron information, including personally identifiable information and circulation records. With libraries providing services to millions of patrons across the U.S., it is important that they understand the importance of patron privacy and how to protect it. This study investigates how knowledge transferred within an online cybersecurity education affects library employee information security practices. The results of this study suggest that knowledge transfer does have a positive effect on library employee information security and risk management practices.</p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Tonia San Nicolas-Rocca and Richard J. Burkhard Wikidata 2019-06-19T05:57:14-07:00 Theo van Veen <p class="AbstractText">Library catalogues may be connected to the linked data cloud through various types of thesauri. For name authority thesauri in particular I would like to suggest a fundamental break with the current distributed linked data paradigm: to make a transition from a multitude of different identifiers to using a single, universal identifier for all relevant named entities, in the form of the Wikidata identifier. Wikidata (<span lang="EN-CA"><a href=""><span lang="EN-US"></span></a></span>) seems to be evolving into a major authority hub that is lowering barriers to access the web of data for everyone. Using the Wikidata identifier of notable entities as a common identifier for connecting resources has significant benefits compared to traversing the ever-growing linked data cloud. When the use of Wikidata reaches a critical mass, for some institutions, Wikidata could even serve as an authority control mechanism.</p> 2019-06-17T00:00:00-07:00 Copyright (c) 2019 Theo van Veen