SlideShare a Scribd company logo
1 of 17
Download to read offline
Tools for trusted content,[object Object],Sara Stefánsdóttir ,[object Object],Library and Information Service ,[object Object]
About,[object Object],550 staff3000 students,[object Object],150 faculty,[object Object],100 support,[object Object],300 teachers,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
Our users,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object],Male/female students,[object Object],Over 50% are 20-30 years,[object Object],Over 85% are fulltime,[object Object]
What’s their background?,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
“89 percentof collegestudentsusesearch engines tobeginaninformationsearch (whileonly2 percentstart from a librarywebsite).” (UniversityCollege London. 2008. InformationBehaviour of theResearcher of theFuture. A ciberbriefingpaper . Availablefrom: http://www.bl.uk/news/pdf/googlegen.pdf) ,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
“A noisy background”,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
RU library goes in for the noise,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
Using the noise,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
Ideas,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object],A pattern. ,[object Object],Different styles of use throughout history. ,[object Object],Working with the original idea still. ,[object Object]
Sara Stefansdottir                                                  Tools for trusted content,[object Object],... different ways to work with a single groundbreaking  idea...the sole! ,[object Object]
Original source, secondary and third,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
Ideas in text,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
Destroying it until it’s beautiful,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
This looks quiet enough...,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
Tools for trusted content,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
Facebook and twitter 	,[object Object],Facebook for students’ ongoing orientation with library and tools for trustedcontent. ,[object Object],EbscoHostnow offer sharingdevice,[object Object],Add thissharingtoolbar for professionalandusers,[object Object],Twitter for professionaluse, usedtofish for dialoguesoninformationretrieval. ,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]
References of interest:,[object Object],www.zotero.org/sarastef/items,[object Object],Sara Stefansdottir                                                  Tools for trusted content,[object Object]

More Related Content

Recently uploaded

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 

Recently uploaded (20)

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 

Tools for trusted content

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.

Editor's Notes

  1. Todays lecture will focus on how to reach undergraduates just starting out in their studies.
  2. A diverse group of people with different ideas about searching and finding. They may have different ideas about referencing. Being what is often called digital natives which describes the time they are born, into to the digital age. This does not mean they are digital geniuses.
  3. In my mind the library is the fountain of knowledge within the university. Be it communal fountain of knowledge. For all departments; students, faculty and teachers to use and enjoy. One of the library’s role is namely to provide access to trusted content. The peer-reviewed and the acknowledged scholarly content to work with in academia.However. This is mind-boggling to many students. The “trusted content”. Because: Being part of academia changes the way they are used to think about information. How they are used to search for it and how they find it. Most importantly though, how they use it.
  4. Image used: http://iloveyou.ge/uploads/Browser_Engine2.png
  5. Using popular culture to explain how ideas are referenced. Using google Scholar as a starting point to direct them into the world of database searching.Using Wikipedia as a tool to teach information literacy. The information there is on the quality rise. So many using it that (ref toRunarEggen’s lecture) institutions, individuals; educators are updating the information provided.
  6. This is one way of explaining how one idea: the gingham fabric has travelled through history.It’s a metaphor for how the “original idea” is still there, from 1885 -2010, with examples of how it has been utilized and displayed, students should be able to see that the origin of the fabric design is still there.
  7. The same goes for the sandal shoe. One idea worked upon into so many different ideas. But you can still spot the original idea.
  8. And now for a musical demonstration. (Please move the mouse over the action package located in the lower left corner of the slide to play sound example)Because citing references shouldn’t be such a hard idea to get. But with the copy/paste culture of the digital natives it sometimes can be. Top left is the original source (Pall Oskar)Next is the band citing Pall Oskar, the original source (Hjaltalin)Third is the band citing Hjaltalin (citing a secondary source; Retro Stefson). Retro Stefson publicly announced their version as a cover of Hjaltalin‘s cover.
  9. Image used: http://www2.napier.ac.uk/gus/figures/citations_references.gif
  10. As a way of getting students to relate to critical thinking. How they can base their ideas and work on others (citing references of course) and in a way, by thinking critically about the subject, they themselves can “destroy it until it’s beatiful”. This is critical thinking. I like the reverse effect of this phrase.
  11. Reykjavik University’s Library provides customized toolbars students, faculty and teachers can download Toolbar to direct students towards trusted content.Databases.This is where they can be more or less sure about finding trusted content to work with and cite.
  12. Go live for download and demonstration to database search. Toolbar download and use pushed at undergraduates but more importantly at those in year 2 and onwards. Google scholar will be our stepping stone into database searches with freshmen, 1. year students.
  13. Go live onto facebook. Also EbscoHost share bit. Add this to your browser. The library guiding students through the noise. So, inorder for studentstounderstandthedifferentcontext of informationweshouldfirstexplainwhatwemeanbyinformation (trustedcontentwithinacademia) andthatsomeoneshouldbecredited for someinformation/ideas – copyrightWeshouldalsoexploredifferentwaystoeducatestudents – tomaketheminformationliterateincludesincorporatingnewinformation platforms suchassocialmedia. RU incorporatesfacebook for students, twitter for professionalnetworking, and a youtubeaccounttoincorporatebothonyoutubeandtoconnectwith FB.