SlideShare a Scribd company logo
Using Social Networking Tags  in a Library Setting Keith Kisser July 9, 2008
Social Networking Tags ,[object Object],[object Object]
Folksonomy ,[object Object],[object Object],[object Object]
Web 1.0 ,[object Object],[object Object]
Web 2.0 ,[object Object],[object Object]
Tags are part of the Web ,[object Object],[object Object]
3 ways Tags can be used  in a library: ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Bundles organize tags Tags
Del.icio.us in the library ,[object Object],[object Object]
[object Object],[object Object],[object Object]
Users select the way they view content
LibraryThing Record
 
Tags display in  Item Record LibraryThing in the OPAC
[object Object],[object Object],[object Object],[object Object]
Comments allow for users to contribute information
Flickr and Crowdsourcing ,[object Object],[object Object],[object Object]
 
Flickr as an extension of the library catalog ,[object Object],[object Object],[object Object]
Not everyone is a cataloger — This is a good thing ,[object Object],[object Object],[object Object]
Tags in the Library ,[object Object]
Works Cited ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You!

More Related Content

Viewers also liked

Web 2.0 for DCC
Web 2.0 for DCCWeb 2.0 for DCC
Web 2.0 for DCC
Eddie Byrne
 
Market Yourself Market Your Library: Social Networking for the Real World
Market Yourself Market Your Library: Social Networking for the Real WorldMarket Yourself Market Your Library: Social Networking for the Real World
Market Yourself Market Your Library: Social Networking for the Real World
Lori Reed
 
Digital Library Applications Of Social Networking
Digital Library Applications Of Social Networking  Digital Library Applications Of Social Networking
Digital Library Applications Of Social Networking
Linked Data Research Center, Seoul National University
 
Social Networking and Your Library
Social Networking and Your LibrarySocial Networking and Your Library
Social Networking and Your Library
Eddie Byrne
 
YouTube and Rural Library Service
YouTube and Rural Library ServiceYouTube and Rural Library Service
YouTube and Rural Library Serviceslakhansen
 
Social networking in library and information services marketing
Social networking in library and information services marketingSocial networking in library and information services marketing
Social networking in library and information services marketingJyothi Reddy
 
Academic Research on the Internet is New Library in Rural America
Academic Research on the Internet is New Library in Rural AmericaAcademic Research on the Internet is New Library in Rural America
Academic Research on the Internet is New Library in Rural America
wumoye
 
The Tools of Web 2.0
The Tools of Web 2.0The Tools of Web 2.0
The Tools of Web 2.0
Meredith Farkas
 

Viewers also liked (8)

Web 2.0 for DCC
Web 2.0 for DCCWeb 2.0 for DCC
Web 2.0 for DCC
 
Market Yourself Market Your Library: Social Networking for the Real World
Market Yourself Market Your Library: Social Networking for the Real WorldMarket Yourself Market Your Library: Social Networking for the Real World
Market Yourself Market Your Library: Social Networking for the Real World
 
Digital Library Applications Of Social Networking
Digital Library Applications Of Social Networking  Digital Library Applications Of Social Networking
Digital Library Applications Of Social Networking
 
Social Networking and Your Library
Social Networking and Your LibrarySocial Networking and Your Library
Social Networking and Your Library
 
YouTube and Rural Library Service
YouTube and Rural Library ServiceYouTube and Rural Library Service
YouTube and Rural Library Service
 
Social networking in library and information services marketing
Social networking in library and information services marketingSocial networking in library and information services marketing
Social networking in library and information services marketing
 
Academic Research on the Internet is New Library in Rural America
Academic Research on the Internet is New Library in Rural AmericaAcademic Research on the Internet is New Library in Rural America
Academic Research on the Internet is New Library in Rural America
 
The Tools of Web 2.0
The Tools of Web 2.0The Tools of Web 2.0
The Tools of Web 2.0
 

Similar to Web 2.0 Presentation

Library2 Presentation
Library2 PresentationLibrary2 Presentation
Library2 Presentation
Andrew Wesolek
 
MLA Flickr_v.Lisa.3.4.finaldraft
MLA Flickr_v.Lisa.3.4.finaldraftMLA Flickr_v.Lisa.3.4.finaldraft
MLA Flickr_v.Lisa.3.4.finaldraftErin Durrett
 
OUR space: the new world of metadata
OUR space: the new world of metadataOUR space: the new world of metadata
OUR space: the new world of metadata
Karen S Calhoun
 
Increasing NUS Libraries' Visibility in the Virtual World - Updated
Increasing NUS Libraries' Visibility in the Virtual World - UpdatedIncreasing NUS Libraries' Visibility in the Virtual World - Updated
Increasing NUS Libraries' Visibility in the Virtual World - Updated
KC Tan
 
Library 2.0
Library 2.0Library 2.0
Library 2.0
Arnab Nag
 
Library 2.0 Presentation (Ltr Group 2)
Library 2.0 Presentation (Ltr Group 2)Library 2.0 Presentation (Ltr Group 2)
Library 2.0 Presentation (Ltr Group 2)jenpost87
 
Library 2.0 Presentation
Library 2.0 PresentationLibrary 2.0 Presentation
Library 2.0 Presentation
bethbouwman
 
Library 2.0 Presentation: SC&I 550 Fall 2009
Library 2.0 Presentation: SC&I 550 Fall 2009Library 2.0 Presentation: SC&I 550 Fall 2009
Library 2.0 Presentation: SC&I 550 Fall 2009
guest4bff3e6
 
Choosing What to Hold and What to Fold: Database Quality Decisions in Tough ...
Choosing What to Hold and What to Fold: Database Quality Decisions in Tough ...Choosing What to Hold and What to Fold: Database Quality Decisions in Tough ...
Choosing What to Hold and What to Fold: Database Quality Decisions in Tough ...
tfons
 
Folksonomies-Group 4
Folksonomies-Group 4Folksonomies-Group 4
Folksonomies-Group 4
m_willis
 
Building a school library 2.0
Building a school library 2.0Building a school library 2.0
Building a school library 2.0
Dana Dukic
 
Supplemental Handout: GALILEO and Web 2.0 Tools Info
Supplemental Handout:  GALILEO and Web 2.0 Tools InfoSupplemental Handout:  GALILEO and Web 2.0 Tools Info
Supplemental Handout: GALILEO and Web 2.0 Tools Info
Buffy Hamilton
 
Collections 2.0 Slideshare
Collections 2.0 SlideshareCollections 2.0 Slideshare
Collections 2.0 Slideshare
Margaret Mellinger
 
Demystifying & Integrating Web 2.0 at the Metropolitan Museum of Art
Demystifying & Integrating Web 2.0 at the Metropolitan Museum of ArtDemystifying & Integrating Web 2.0 at the Metropolitan Museum of Art
Demystifying & Integrating Web 2.0 at the Metropolitan Museum of Art
Jennie Pu
 
Library 2.0 & the Humanities
Library 2.0 & the HumanitiesLibrary 2.0 & the Humanities
Library 2.0 & the Humanities
Nicole C. Engard
 
Ltr 2 Handout
Ltr 2   HandoutLtr 2   Handout
Ltr 2 Handoutjenpost87
 
Library 2.0 Handout
Library 2.0 HandoutLibrary 2.0 Handout
Library 2.0 Handout
bethbouwman
 
Images reviews tags and recommendations - Ya Wang
Images reviews tags and recommendations - Ya WangImages reviews tags and recommendations - Ya Wang
Images reviews tags and recommendations - Ya Wang
Electronic Resources & Libraries
 

Similar to Web 2.0 Presentation (20)

Library2 Presentation
Library2 PresentationLibrary2 Presentation
Library2 Presentation
 
MLA Flickr_v.Lisa.3.4.finaldraft
MLA Flickr_v.Lisa.3.4.finaldraftMLA Flickr_v.Lisa.3.4.finaldraft
MLA Flickr_v.Lisa.3.4.finaldraft
 
Web 2
Web 2Web 2
Web 2
 
OUR space: the new world of metadata
OUR space: the new world of metadataOUR space: the new world of metadata
OUR space: the new world of metadata
 
Increasing NUS Libraries' Visibility in the Virtual World - Updated
Increasing NUS Libraries' Visibility in the Virtual World - UpdatedIncreasing NUS Libraries' Visibility in the Virtual World - Updated
Increasing NUS Libraries' Visibility in the Virtual World - Updated
 
MLA Handout 2012
MLA Handout 2012MLA Handout 2012
MLA Handout 2012
 
Library 2.0
Library 2.0Library 2.0
Library 2.0
 
Library 2.0 Presentation (Ltr Group 2)
Library 2.0 Presentation (Ltr Group 2)Library 2.0 Presentation (Ltr Group 2)
Library 2.0 Presentation (Ltr Group 2)
 
Library 2.0 Presentation
Library 2.0 PresentationLibrary 2.0 Presentation
Library 2.0 Presentation
 
Library 2.0 Presentation: SC&I 550 Fall 2009
Library 2.0 Presentation: SC&I 550 Fall 2009Library 2.0 Presentation: SC&I 550 Fall 2009
Library 2.0 Presentation: SC&I 550 Fall 2009
 
Choosing What to Hold and What to Fold: Database Quality Decisions in Tough ...
Choosing What to Hold and What to Fold: Database Quality Decisions in Tough ...Choosing What to Hold and What to Fold: Database Quality Decisions in Tough ...
Choosing What to Hold and What to Fold: Database Quality Decisions in Tough ...
 
Folksonomies-Group 4
Folksonomies-Group 4Folksonomies-Group 4
Folksonomies-Group 4
 
Building a school library 2.0
Building a school library 2.0Building a school library 2.0
Building a school library 2.0
 
Supplemental Handout: GALILEO and Web 2.0 Tools Info
Supplemental Handout:  GALILEO and Web 2.0 Tools InfoSupplemental Handout:  GALILEO and Web 2.0 Tools Info
Supplemental Handout: GALILEO and Web 2.0 Tools Info
 
Collections 2.0 Slideshare
Collections 2.0 SlideshareCollections 2.0 Slideshare
Collections 2.0 Slideshare
 
Demystifying & Integrating Web 2.0 at the Metropolitan Museum of Art
Demystifying & Integrating Web 2.0 at the Metropolitan Museum of ArtDemystifying & Integrating Web 2.0 at the Metropolitan Museum of Art
Demystifying & Integrating Web 2.0 at the Metropolitan Museum of Art
 
Library 2.0 & the Humanities
Library 2.0 & the HumanitiesLibrary 2.0 & the Humanities
Library 2.0 & the Humanities
 
Ltr 2 Handout
Ltr 2   HandoutLtr 2   Handout
Ltr 2 Handout
 
Library 2.0 Handout
Library 2.0 HandoutLibrary 2.0 Handout
Library 2.0 Handout
 
Images reviews tags and recommendations - Ya Wang
Images reviews tags and recommendations - Ya WangImages reviews tags and recommendations - Ya Wang
Images reviews tags and recommendations - Ya Wang
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Web 2.0 Presentation

Editor's Notes

  1. “Forecasting the Opportunities Emerging Technologies Offer the Library within the University Environment.”