72
‘The Frictionless Library’ Following Ranganathan Towards "Five Principles for Networked Libraries” Tony Hirst Department of Communication & Systems, The Open University

Jibs keynote (draft)

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Jibs keynote (draft)

‘The Frictionless Library’Following Ranganathan Towards "Five Principles for Networked Libraries”

Tony HirstDepartment of Communication & Systems,

The Open University

Page 2: Jibs keynote (draft)

“Back to the Future and into the Cloud”

Page 3: Jibs keynote (draft)

Ranganathan `31: The Five Laws

Page 4: Jibs keynote (draft)

Adaptive Efficient Relevant Democratic Access (to knowledge)

Page 5: Jibs keynote (draft)

Modalities of Constitutional ArgumentThese methods of reasoning and ways of making arguments determine the ways in which constitutional propositions are characterized as valid from a legal point of view. These methods might be divided or recategorized in different ways, but the following six forms or

modalities of constitutional argument are widely accepted: (1) historical—relying on the intentions of the framers and ratifiers of the Constitution (see Original Intent;

History, Court Uses of); (2) textual—looking to the meaning of the words of the Constitution alone, as they would be interpreted by an average contemporary American

today; (3) structural— inferring structural rules from the relationships that

the Constitution mandates; (4) doctrinal—applying rules generated by

precedent; (5) ethical—deriving rules from those moral commitments of the

American ethos that are reflected in the Constitution; and (6) prudential—seeking to balance the costs and benefits of a particular rule. A modality is the way in which a proposition is characterized as true.

Read more: http://www.answers.com/topic/constitutional-interpretation#ixzz1mjX2jgoc

Page 6: Jibs keynote (draft)

Historical Textual Structural Doctrinal Ethical Prudential

1st Law

2nd Law

3rd Law

4th Law

5th Law

Page 7: Jibs keynote (draft)

http://www.answers.com/topic/constitutional-interpretation

Page 8: Jibs keynote (draft)
Page 9: Jibs keynote (draft)

“Furthur”, Joe Mabel

Page 10: Jibs keynote (draft)
Page 11: Jibs keynote (draft)

5The Fifth LawThe library is a growing organism

Ranganathan `31

historical, textual, structural, doctrinal, ethical, prudential

Page 12: Jibs keynote (draft)

…and the Library lives in a networked world…

Page 13: Jibs keynote (draft)

Structure in data - h

ierarchies

Page 14: Jibs keynote (draft)

Hierarchical data and treemaps - medals

Pivot tables

Page 15: Jibs keynote (draft)

Couple of network graphs to make the point…

Page 16: Jibs keynote (draft)

Network activity is sensitive to network structure

Page 17: Jibs keynote (draft)

YOU can influence the network structure

Page 18: Jibs keynote (draft)
Page 19: Jibs keynote (draft)

Page Rank

Page 20: Jibs keynote (draft)

Persistent side-effects

Page 21: Jibs keynote (draft)

Page Rank

Page 22: Jibs keynote (draft)

Or maybe not-so-persistent side-effects…?

Page 23: Jibs keynote (draft)

Edge Rank

Page 24: Jibs keynote (draft)

1The First LawBooks are for use

Ranganathan `31

historical, textual, structural, doctrinal, ethical, prudential

Page 25: Jibs keynote (draft)

<A>CCESS

Page 26: Jibs keynote (draft)

“friction”

Page 27: Jibs keynote (draft)

http://www.meanboyfriend.com/overdue_ideas/2011/11/openly-connect/

I’ve started to think about factors affecting reuse as being causes of friction .... This may not be an exhaustive list, but the things I can see that create friction in the reuse of

data are:

Explicit restrictions on reuse

Uncertainty about possible restrictions on reuse

Unusual or unfamiliar interfaces and formats

Lack of information on data and where the data is available

Sometimes you might deliberately introduce friction – perhaps you don’t want your data to be reused by just anyone, for any purpose. I don’t see friction as bad per se – we

just need to be aware of it, and especially avoid introducing friction when we don’t mean to.

Page 28: Jibs keynote (draft)
Page 29: Jibs keynote (draft)

“static friction”Credentials

AuthenticationTraining Requirements

Registration fee

Page 30: Jibs keynote (draft)

“dynamic friction”Transaction Fees

QuotasLicense conditions

Format/representation conversions

Page 31: Jibs keynote (draft)

DIS

COVE

RY Find relevant resource identifiers

Resolve resource identifiers to

accessible locations

Page 32: Jibs keynote (draft)

DIS

COVE

RY

Find relevant resource identifiers

Resolve resource identifiers to

accessible locations

RECO

VERY

Page 33: Jibs keynote (draft)

DIS

COVE

RY

Find relevant resource identifiers

Resolve resource identifiers to

accessible locations

RECO

VERY

click-thru

sear

ch te

rms

Page 34: Jibs keynote (draft)

2The Second LawEvery reader his or her book

Ranganathan `31

historical, textual, structural, doctrinal, ethical, prudential

Page 35: Jibs keynote (draft)

Democratic Access

Page 36: Jibs keynote (draft)

Find relevant resource identifiers

Resolve resource identifiers to

accessible locations

DIS

COVE

RYRE

COVE

RYse

arch

term

s

click-thru

Page 37: Jibs keynote (draft)

Find relevant resource identifiers

Accessible locations

Inaccessible locations

DIS

COVE

RYRE

COVE

RYse

arch

term

s

click-thru

Page 38: Jibs keynote (draft)

Known Individuals

Known Communities

The “wider public”

Page 39: Jibs keynote (draft)
Page 40: Jibs keynote (draft)
Page 41: Jibs keynote (draft)
Page 42: Jibs keynote (draft)

Networks can emerge from loosely co-ordinated action

Page 43: Jibs keynote (draft)

Networks may codify “common knowledge”

Page 44: Jibs keynote (draft)

3The Third LawEvery book its reader

Ranganathan `31

historical, textual, structural, doctrinal, ethical, prudential

Page 45: Jibs keynote (draft)

Relevant Democratic Access

Page 46: Jibs keynote (draft)

THEN…

Index + Search Terms -> Candidate Results

Candidate Results + Ranking -> Results Page(s)

Page 47: Jibs keynote (draft)

Page Rank

Page 48: Jibs keynote (draft)

Find relevant resource identifiers

Accessible locations

Inaccessible locations

DIS

COVE

RYRE

COVE

RYse

arch

term

s

click-thru

Page 49: Jibs keynote (draft)

NOW…

There is no Google Ground Truth any more…

Page 50: Jibs keynote (draft)

the invisible librarian

Page 51: Jibs keynote (draft)
Page 52: Jibs keynote (draft)

“frictionless sharing”

Page 53: Jibs keynote (draft)
Page 54: Jibs keynote (draft)

Brian’s “Trusted Social Librarian”

Page 55: Jibs keynote (draft)

4The Fourth LawSave the time of the reader

Ranganathan `31

historical, textual, structural, doctrinal, ethical, prudential

Page 56: Jibs keynote (draft)

Efficient Relevant Democratic Access

Page 57: Jibs keynote (draft)

Find relevant resource identifiers

Accessible locations

Inaccessible locations

DIS

COVE

RY &

RE

DIS

COVE

RYRE

COVE

RYse

arch

term

s

click-thru

Page 58: Jibs keynote (draft)

Find relevant resource identifiers

Accessible locations

Inaccessible locations

DIS

COVE

RY &

RE

DIS

COVE

RYRE

COVE

RYse

arch

term

s

click-thru

Page 59: Jibs keynote (draft)
Page 60: Jibs keynote (draft)

“Furthur”, Joe Mabel

Page 61: Jibs keynote (draft)
Page 62: Jibs keynote (draft)
Page 63: Jibs keynote (draft)

Brian’s “Trusted Social Librarian”

Page 64: Jibs keynote (draft)

“user interface friction”

Pfeiffer Consultinghttp://www.pfeifferreport.com/trends/UIF_Report.pdf

Page 65: Jibs keynote (draft)

User interface friction is the resistance that the implementation and execution of a user interface feature imposes on the user of a program, device, or operating system.

User Interface Friction is not related to the functionality of an application program, and does not depend on the processing power of a computer, although these can be mitigating factors.

The same application program, functioning on two different operating systems can yield different overall UIF because of differences in the way the user interface responds.

User interface friction can result in significant productivity loss when it occurs on frequently repeated operations.

Page 66: Jibs keynote (draft)

open development and “issue reports”

Page 67: Jibs keynote (draft)

5The Fifth LawThe library is a growing organism

Ranganathan `31

historical, textual, structural, doctrinal, ethical, prudential

Page 68: Jibs keynote (draft)

Adaptive Efficient Relevant Democratic Access

Page 69: Jibs keynote (draft)

Network activity is sensitive to network structure and

dynamics

Page 70: Jibs keynote (draft)

YOU can influence the network structure and its dynamics

Page 71: Jibs keynote (draft)
Page 72: Jibs keynote (draft)

@psychemedia

blog.ouseful.info