You are a SPECIAL Librarian! You are a Military Librarian!

Archive | Current Events

ARL [Association of Research Libraries] to Host National Digital Stewardship Resident: Apply by July 20, 2016

ARL to Host National Digital Stewardship Resident: Apply by July 20

Would you like to develop, apply, and advance your digital stewardship knowledge and skills in a real-world setting? Did you earn a master’s or doctoral degree in a field engaged in the stewardship of digital materials within the past two years?

Apply to participate in the 2016–2017 National Digital Stewardship Residency (NDSR) program, developed by the Library of Congress and the Institute of Museum and Library Services to build a dedicated community of professionals who will advance the nation’s capabilities in managing, preserving, and making accessible the digital record of human achievement.

Five candidates will be selected for five paid residencies in the Baltimore-Washington area starting in September 2016. The 2016–2017 projects are:

·         Association of Research Libraries—Bringing Life to Research Objects: Managing the Digital Life Cycle of Research from Creation to Stewardship through the Open Science Framework and SHARE

·         Food & Drug Administration, Office of Science & Engineering Laboratories, Center for Devices & Radiological Health—Enabling Open Science through the Center for Devices & Radiological Health (CDRH) Science Data Catalog

·         Georgetown University Library—Bring It All Home: Building Digital Preservation Processes for Digital Preservation Platforms

·         John Hopkins University Sheridan Libraries—Large-Scale Digital Stewardship: Preserving Johns Hopkins University’s Born-Digital Visual History

·         World Bank Group—Data Stewardship and Preservation Program

Association of Research Libraries NDSR Project

The resident selected to work with the Association of Research Libraries (ARL) will prototype the process of linking the output from a university research unit to a library digital repository through the Open Science Framework—an open source tool that integrates and supports research workflow. Working with senior colleagues at ARL, a data librarian at George Washington University (GWU) Libraries who works with the SHARE project, and staff at the Center for Open Science, the resident will participate in the full life cycle of digital stewardship, including metadata creation and other documentation, data management planning, and access and preservation through the institutional repository. The resident will also participate in selecting the research unit at the outset of the appointment.

This residency will include technical curation training; visits to the Center for Open Science in Charlottesville, Virginia; hands-on work with researchers and librarians at GWU; and deep exposure to open source, open science tools. Upon completion of the residency, the candidate will have created documentation that other research units and libraries can replicate, thereby contributing to the advancement of the research library role in research data management and to digital stewardship in the academy. The successful resident will have interest and/or experience in library repository platforms, experience or strong interest in programming, and excellent communication skills.

More Information and Application

For additional information about the National Digital Stewardship Residency program and to apply, visit the NDSR website. The application deadline is 11:59 p.m. EDT, Wednesday, July 20, 2016. Applicants must be US citizens.

Posted in Current Events, Students0 Comments

DMIL Member Interview with Deb Knox

DMIL Member Interview with Deb Knox

How did you get involved in military librarianship?

I am actually a vendor who is responsible for sales to the federal government for my employer.  From the very first time I attended MLW I fell in love with the military librarians and have been a big supporter ever since then.

How did you get involved in DMIL?

It was one of the chapters I picked when I joined SLA.  I belong to DMIL and DGI as well as my State chapter.  I think the best thing we can do as vendors is support our patrons while I will freely admit that is not my primary reason for hanging around.  Most of you have become friends and many of you are not customers and will never be customers.  DMIL as a community really reached out to me.  I highly recommend vendors getting involved in the communities they support for networking and to become familiar with the unique challenges military librarians face.

What has been your best experience working for the military?

I just love the open nature of the military librarians.  They are witty, honest and straightforward.  I like that so many of them are well traveled and have wonderful stories to tell.  Frankly, I don’t think about any of them as customers, just friends.

What has been your best experience being involved in DMIL?

I absolutely love the MLW conference.   It is my favorite conferences and I feel well treated when I am there unlike any other conference where all they care about is your money.

What positions in DMIL have you held?

I have been on the planning committee several times and have been the corporate director when it was a viable position. I currently am the Unit Planner for SLA 2017.

If someone were to visit your library or your town, what would you be sure to show them or recommend that they see?

Our beautiful bridges that were built by and with the Army Corps of Engineers.  We have protected waterways and marshes so it has been a long term project connecting all our barrier island beaches to the mainland.

Please recommend one LIS-specific book or article that you read recently that you found particularly good. What makes it worthwhile?

Two of my recent reads were “Why Epiphanies Never Occur to Couch Potatoes” by Mark Amtower and Change to Strange by Daniel M. Cable.  I mostly read for enjoyment but this year vowed to read one self help book for every fiction novel.

If you were to recommend one book, just for fun, what would it be?

I really enjoyed Extreme Measures.  I love all the books by Vince Flynn and am working my way through the series.  I secretly think I am getting an inside view of spying and behind the scenes government operations.  Probably all fantasy but I let myself be a secret agent during that time.

 

Posted in Current Events, Features, slider0 Comments

Phishing Emails and You — Monthly Cyber Security Tips Newsletter

Phishing Emails and You

From the Desk of Desk of Thomas F. Duffy, Chair, MS-ISAC

Be Aware of Phishing Scams

First and foremost you should utilize a spam filter (this service is should be provided by your email provider), keep all of your systems patched and your anti-virus software up to date. The second line of defense against phishing is you. If you are vigilant, and watch for telltale signs of a phishing email, you can minimize your risk of falling for one. Telltale signs of a potential phishing email or message include messages from companies you don’t have accounts with, spelling mistakes, messages from the wrong email address (e.g. info@yourbank.fakewebsite.com instead of info@yourbank.com), generic greetings (e.g. “Dear user” instead of your name), and unexpected messages with a sense of urgency designed to prompt you into responding quickly, without checking the facts. “Resume” and “Unpaid Invoice” are popular attachments used in phishing campaigns. Here are some scenarios you may encounter:Reserved: Social engineering refers to the methods attackers use to manipulate people into sharing sensitive information, or taking an action, such as downloading a file. Sometimes social engineers interact with the victim to persuade the victim to share details or perform an action, such as entering information into a login page.

  • An email appearing to be from the “fraud department” of a well-known company that asks you to verify your information because they suspect you may be a victim of identity theft.
  • An email that references a current event, such as a major data breach, with a malicious link to setup your “free credit reporting.”
  • An email claiming to be from a state lottery commission requests your banking information to deposit the “winnings” into your account.
  • An email with a link asking you to provide your login credentials to a website from which you receive legitimate services, such as a bank, credit card company, or even your employer.
  • A text message that asks you to call a number to confirm a “suspicious purchase” on your credit card. When you call, the operator will know your name and account information and ask you to confirm your ATM PIN. (This is a form of SMSishing – What should you do?)

Recommendations

  • Be suspicious of unsolicited emails, text messages, and phone callers. Use discretion when providing information to unsolicited phone callers, and never provide sensitive personal information via email.
  • If you want to verify a suspicious email, contact the organization directly with a known phone number. Do not call the number provided in the email. Or, have the company send you something through the US mail (which scammers won’t do).
  • Only open an email attachment if you are expecting it and know what it contains. Be cautious about container files, such as .zip files, as malicious content could be packed inside.
  • Visit websites by typing the address into the address bar. Do not follow links embedded in an unsolicited email.
  • Use discretion when posting personal information on social media. This information is a treasure-trove to spear phishers who will use it to feign trustworthiness.
  • Keep all of your software patched and up-to-date. Home users should have the auto update feature enabled.
  • Keep your antivirus software up-to-date to detect and disable malicious programs, such as spyware or backdoor Trojans, which may be included in phishing emails.

For More Information

The information provided in the Monthly Security Tips Newsletter is intended to increase the security awareness of an organization’s end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization’s overall cyber security posture. This is especially critical if employees access their work network from their home computer. Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non-commercial purposes.

Disclaimer: These links are provided because they have information that may be useful. The Center for Internet Security (CIS) does not warrant the accuracy of any information contained in the links and neither endorses nor intends to promote the advertising of the resources listed herein. The opinions and statements contained in such resources are those of the author(s) and do not necessarily represent the opinions of CIS.

Center For Internet Security

Northeast Headquarters | 31 Tech Valley Drive | East Greenbush, NY 12061 | Phone: 518-266-3460

Mid-Atlantic Headquarters | 1700 North Moore Street | Suite 2100 | Arlington, VA 22209 | Phone: 703-600-1935

Posted in Current Events, Web/TechComments Off on Phishing Emails and You — Monthly Cyber Security Tips Newsletter

Follow Us On:

Categories

Blog Archives