MDMLG News

Volume 32, Number 1
September 2005

 

 

Juliet Mullenmeister , Editor
Valerie Reid, Webmaster


Table of Contents

President's Corner
New Member Profiles: Jill Turner
EndNote Notes
Future Echoes: User Authentication
MDMLG Webpage User's Guide
General Business Meeting
Camp MHSLA
Michigan Go Local
Announcements


THE TRUTH ABOUT THE PRESIDENT-ELECT……

the office, that is, and not the current holder of this title!   Now that I have your attention, let me give you the unvarnished truth about a year as President-Elect at MDMLG. Have you taken your turn? In my many years in this organization, it was the running joke that every member would eventually take a turn as President-Elect. Some have even completed more than their share and have a separate indexed section in our archives at the Reuther Library.

I remember vividly sitting at a summer luncheon table blending in with the crowd and listening to my friend and colleague, Audrey Bondar, reveal that the office was not that intimidating. It was something that anyone could accomplish because we were all fellow members wishing each other to succeed.

Audrey was exactly right. The year as President-Elect is one of planning. The MDMLG Board, recognizing the time and energy constraints of our officers and members, has reduced the number of meetings. Board meetings number four and the general business meetings are held in September, December, Spring, and Summer Luncheon.

The President-Elect, with a cadre of Programming Committee members plans and executes the knowledge component after each meeting and the optional ‘brown bag' informal seminar before the meetings.

The CE offerings during the year are the mandate of the Professional Development Committee.

During my tenure, I had many members volunteer their sites for meetings. I had my committee suggesting and arranging our programming and supporting the registration activities before each business meeting.

Everyone I asked helped me. You are never alone in this office.

At the Summer Luncheon, the President-Elect assists the President during the meeting, receives the official gavel, makes a short speech, and moves on.

The President's year is one of presiding over the Board and General Business meetings and liberal use of the gavel will allow you to sail through this. MDMLG has a set agenda and you simply follow it.

If you are considering…step forward. We are all wishing our officers the best. There are many to help you and few to criticize. That's the truth!!!

Diana Balint
President, MDMLG

Back to top


New Member Profile: Get To Know Jill Turner, Recipient of the First MDMLG Scholarship

In May 2005, MDMLG, in conjunction with Wayne State University's Library and Information Science Program, awarded its first-ever scholarship to an LISP student interested in the health sciences. This year the honor went to Jill Turner. Although a student, Jill is no stranger to the medical field. She received her undergraduate degree in Nursing from the University of Pittsburgh and practiced nursing for 10 years spending much of that time as a critical care nurse.  After leaving the nursing field for a few years to raise her family, Jill decided it was time to make a career change, however, she had no idea what she wanted to do. A fateful business trip taken by her husband finally led Jill on the path to librarianship. While on a return flight home, Jill's husband struck up a conversation with a librarian seated next to him. When the librarian heard about Jill's career dilemma, she suggested a future in librarianship stating that a background in nursing would be a great fit for a medical librarian. Because Jill still enjoyed the medical field, she also thought it was a great idea and began taking MLIS courses at Drexel University in Philadelphia.

A family relocation brought Jill to Wayne State University where she will complete her MLIS degree in December 2005. Between classes, Jill works on her practicum at Botsford General Hospital and serves as a student intern for the Go Local project underway at the Shiffman Medical Library. This project partners Shiffman Library with NLM in developing Michigan Go Local , a resource designed to help Michigan residents find health services in their community. Upon graduating, Jill hopes to join a productive medical library staff and expresses a special interest in the challenge of clinical librarianship.            

Receiving the MDMLG scholarship has benefited Jill in a number of ways. While the monetary award was applied to her college tuition, the membership to the organization has afforded her the opportunity to learn about and participate in continuing education classes, the chance to learn about the real workings of a library, and a place to meet other Detroit-area medical librarians.   Furthermore, Jill's name is displayed on a plaque in the Wayne State LISP department commemorating MDMLG's commitment to the education of future health science librarians.    

JoAnn Krzeminski
Henry Ford Hospital  

      Back to Top


What can EndNote do for you?

EndNote is a bibliographic file management system that can be useful to you when submitting manuscripts to scholarly journals.   EndNote allows you to create what is called an EndNote library in which you house various types of references.   These references could be manually created, such as a reference to a particular conference proceeding or electronic source, or one can import citations from various bibliographic databases such as PubMed MEDLINE or ISI Web of Science with ease.

One component that is extremely useful is the Manuscript Templates feature that consists of pre-developed templates for specific journals.   For example, if you were submitting a manuscript to the Journal of Cell Biology (JCB), you may want to simply use the template that has been created for JCB (by EndNote in co-operation with the JCB editors) which incorporates various sections or components that are necessary when submitting a manuscript to this particular journal.   There is a vast amount of information contained in the actual template which will save you time and will ensure that you have your manuscript organized to the best of your ability.  

EndNote also allows you to change the output style for all your references in your EndNote library with a couple of quick steps.   Output styles have been created based on certain journal titles or style manuals.   One could prepare their references in the output style for the Journal of the American Medical Association (JAMA) and then decide to change that output style to Vancouver in just a couple of quick steps.

When it comes to preparing manuscripts for publication, EndNote is definitely a tool that I would recommend using, as it is a real timesaver and a positive addition to the abundant information tools and resources available to authors.

Nandita Mani
Wayne State University / Shiffman Medical Library

Back to Top


Future Echoes*: the Near and Far of User Authentication

As we all know there are many more people, all round the world, going online.   There was a fear, not so long ago, that all the IP's in the world would be assigned, and there would be no more left. How could expansion at the rate of demand continue?   New ways of identifying computers and networks are going to come to us very soon.   “ ICANN, the organization overseeing the Internet's naming and numbering scheme, has launched the Internet Protocol Version 6 (IPv6) on its root servers. The new protocol will make it possible for every device and every person to have an IP address. The demand for addresses on the current protocol, IPv4, has been threatening to reach the system's limit of 4.3 billion; about two-thirds are already taken. On IPv6, the number of addresses will be more than 10 to the 38th power. 1     This however, is likely to increase the rates of spam, phishing, spoofing, and viruses with which we all must deal. As the numbers of users and computers grow exponentially, so do the problems of security and validation for corporate, educational, and commercial network administrators.   As those poor people have the arduous task of making sure that people who are supposed to be able to use network resources actually can do so, while keeping non-authorized personnel out, they really would like easier and more efficient ways of actually doing their jobs.  

There have been many changes to the way many of us access our computer networks, both at work and at home.   Changes occur for many of us in a seamless fashion, but for some, there are actual hardware changes taking place.   There are now fingerprint scanners on laptops or portable readers attached to laptops.   There are, in a few cases, retinal scanners to access parts of very secure facilities.   Some of the more seamless changes may have occurred in the way your individual computers access their respective computing networks.  

The research-only backbone, Internet2, had the advantage of learning from the original's haphazard form.   Some of the, well, let's call it the “regular' Internet's security risks have multiplied at a rate faster than hangers in a dark closet.   Internet2's Doug Van Houweling believes that changes in the authentication process will help reduce the incidence of those problems. 2

One such solution is to have software guarding the gates. This type of software, called Middleware, acts like a buffer between the user and network and the rest of the Internet at large.   One of the better-known middleware products is called Shibboleth , which is in use on Internet2 and at universities such as Penn State. "This kind of software will mean that people spend most of their Internet time in a community that's trusted, and since attacks come from outside, there will be ways through authentication to tell where they came from.”   By controlling the users into authenticated groups, any attempted outsider intrusions are recognized as alien to the network and simply rejected as a category.   It also allows the administrator a more direct path to discover the origin of the problems-both inside the network and outside of it.   It's one of the ways that illegal peer-to-peer music downloading was tracked and authorized to specific users in some of the Napster and Kazaa vs. RIAA cases.  

This kind of security problem is a constant headache for healthcare organizations.   Not only are they on guard against the usual foes of spam and the like to keep their networks running optimally, but also they have to keep secure patient information to a degree classified by HIPAA.   All of us have seen multi-layered password controlled networks, and extreme lock-down areas for records and other areas within the hospital.   At the same time, most of us have to remember multiple passwords, or carry multiple ID tags just to conduct our daily business.   It just seems as if it will never end.  

We are familiar with the concept of a VPN (virtual private network).   It's how most of our remote users at the healthcare facilities are able to access patients notes or to submit electronic documents from outside the physical hospital sites.   Users have to apply for authorization in order to do these activities, and are usually placed on a list and given a password in order to participate on the network from remote sites, such as physician's office.  

Physicians constantly complain that they have to remember so many layers of constantly changing passwords and authorization codes; they have to write them down (bad security risk #1117) in order to operate.   There are some new technologies that can help integrate needed security and identification measures and that don't have to rely on an overworked person's memory.  

One of these is a “Personal Authentication Infrastructure (PAI) that offers healthcare organizations a means of achieving the ready access to information and the strong security that have long been at odds. PAI is a software platform that allows you to manage your existing authentication systems more efficiently and migrate to more advanced forms, such as biometrics, tokens and smart cards to meet the ever changing needs of your organization. With a PAI, you authenticate people, not just machines; protect confidential patient information; deliver fast, convenient access to clinical data; and provide the platform to support your policies and procedures.” 3

PAI's use a combination of technologies to optimize security and reduce user complication.   One of these technologies is Biometry whose myriad flavors recognize unique human characteristics.   

Fingerprint identification is the oldest biometric technology and one of the few currently used within university campuses and in some commercial organizations (or by “Bad Guys” on ABC's Alias), It is easy for a student to grasp the concept--place a finger on a pad and wait for recognition.

The technology takes and stores templates of thumbprints or prints of forefingers, capturing the unique placement and proximity of each print's ridges and furrows. Some fingerprint recognition readers also record the width and length between key points.

Hand recognition technology, which also is called hand geometry, captures and records the shape of each user's hand. A combination of features, including the length of each finger and the width of the hand, are used for identification. To date, hand recognition is the only other biometric technology known to be used on campuses.

Facial recognition technologies measure distinct characteristics, such as the length of the nose, the distance between the eyes, and the angle of the jaw and use digital cameras to photograph people and match the images to stored data.

Retinal and iris recognition technologies are based on characteristics found in the eye. Retinal scans read the layer of blood vessels at the back of the eye with a small green light. Iris scans look for the unique features in the colored tissue that rings the pupil. In all there are more than 200 iris points to compare, including freckles and furrows.

Voice recognition systems are used to identify the distinct tones and timbre of the human voice, while speech recognition systems can translate the spoken word into a digital access or account number that confirms identity. 4

There is no suggestion that biometrics alone can provide as secure an environment as possible, but it can help reduce the volume of information that users need to remember in order to conduct business.   “Although biometric authentication is more secure than other authentication methods, some forms of biometric technology have high failure rates, so biometric authentication is often used as one component of two-factor authentication, which requires a second method of authentication such as a password or PIN to ensure accuracy.” 5

As none of these technologies are alone totally secure (think of Sidney Bristow's missions on ABC's Alias -an extreme example, of course), combinations of these technologies create as secure an environment as possible at the moment, and also reduce the password overload most of us experience.

There are problems with total reliance on Biometry for identification.   Here are some examples taken from an interview of Iames L Grossman, San Jose State.

“It never, ever, occurred to me that people can have polydactylism: one fellow had two right thumbs. I have a friend who has a hard time with facial recognition systems: he is very light-skinned, with very light hair but mostly bald. Against a light background, the computer couldn't find the outline of his face, and it said: "There's nobody here." Another guy I knew didn't have a round pupil because he had damaged his eye. You couldn't use iris recognition on that one eye. And then there are people with one glass eye. Or take privacy advocate Simon Davies, whose irises move constantly. He can't be successfully iris-scanned.

But surely fingerprints work?

Everybody learns from reading Mark Twain's Pudd'nhead Wilson that fingerprints are unchanged from cradle to grave and that everybody has unique fingerprints. But despite this, there remains a tremendous controversy over the admissibility of fingerprints as evidence. I've been an expert witness on this. Fingerprinting is very defendable, but the government has used some of the most stupid, crazy, spurious and non-scientific scientific arguments to try to defend it. We do lack the scientific basis, and that's what we're trying to make up for now.

What about DNA samples?

DNA is not biometrics, it's not automatic unless you touch a machine and it takes a sample, like in the movie, Gattica . But there are a couple of problems. First, you are invading my privacy by asking me to touch a machine and by removing something from my body. I find that disgusting. Secondly, there may be information in that DNA analysis that tells you something about me as a person. Other biometrics don't give any information about a person at all. You may argue that they can be used to link records, such as health records, but it's much easier to use a social security number.

How is face recognition doing?

Face recognition still seems to be the Holy Grail. Perhaps it's more acceptable to people than being fingerprinted or iris-scanned. And often if we have any information at all on terrorists, the face may be the only thing we have. But there are many problems. Take the London mayor, Ken Livingstone, and his idea that you can point a camera at a car and do facial recognition of the occupants. We did that at a Mexico border crossing in Otay Mesa. The immigration service tried to automate the crossing by installing facial recognition cameras in a system called SENTRI, but the driver had to stop and look into the camera. That was highly problematic because the height of the cars varied, and window frames obscured the faces. The state of this technology is we are still trying to teach the cameras that the two people in each scene are the same person.” 6

There is another way to scan for Biometric information that may prove more accurate than existing technology-Ultrasound.     “In the same way the ultrasound goes through skin and blood to capture the image of a fetus, it goes through any residue on the finger to produce a true fingerprint image, he says. By contrast, traditional fingerprint readers, which were optical, took a digital picture of the finger, ‘so they also took a picture of any dirt, grease, or grime on the finger, which gave them poor accuracy,' Even the nicotine residue on a smoker's finger - though not visible to the naked eye - or the ink from a newspaper the person read that morning interferes with the accuracy of an optical reader.   Ultrasound is effective with all demographics - young, old, dirty, or clean - whether the database is 2,000 employees, or 200,000 patients. It's accurate even for Asian females, he notes, whose tendency to have very fine ridges on their fingers has been a problem for optical scanners.” 7

I believe that it is an easy thing to see us all in the future having to scan ourselves to be able to long on to do our jobs-however, I would look forward to not having to remember so many passwords, and I'm sure that clinicians would also.   I also appreciate the need for very defined rules about managing that sort of information within our institutions.  

*With many thanks to Rob Grant and Doug Naylor of the BBC television series Red Dwarf for the title.

References:

  1. The Net's Next 10 Years (from PC Magazine accessed August 18 th , 2005)
  2. The Net's Next 10 Years (from PC Magazine accessed August 18 th , 2005)
  3. Walker, Trevor. One, Two, Three…Authenticate Me . Health Management Technology, Dec 2000 21(12): 16
  4. Villano, Matt and Jean Marie Angelo (contrib.) Biosecurity comes of age: retina, hand, and fingerprint scanners are emerging as new solutions to access and authentication concerns. University Business, 7(8): 53-58
  5. Reynolds, Phil. The keys to identity: as healthcare organizations strive for greater security, some are using a very personal approach in the form of biometrics .   Health Management Technology, 2004 25(2): 2-6
  6. Grossman, Wendy M.   How do I know who you are? New Scientist, 2003 78(2400): 48-52
  7. Ultrasound Technology behind fingerprint scans . Hospital Access Management, June 1, 2005

Juliet Mullenmeister 
St. Joseph Mercy of Macomb

Back to Top


MDMLG Web Site Overview and User's Guide

The MDMLG web site was initially created more than eight years ago.   There are currently more than 650 web pages on the site, and it averages 421 hits per day.   You might be surprised at what you can find there:

-- MDMLG News (Members-Only Section) - The newsletter issues date back to September 1999.   In addition, a comprehensive index of the News from 1989 through 2003 was developed by Aimee Haley and is completely searchable to help you track down the article you are searching for.  
http://www.mdmlg.org/members/news.htm  

-- MDMLG Directory Newsletter (Members-Only Section) - Do you need to know the most up-to-date email address or phone number of a fellow MDMLG member? The MDMLG Directory is the place to go. It is grouped by Personal and Institutional Members.   It would be helpful if you bookmarked this site.  http://www.mdmlg.org/members/directory.htm  

-- Meeting Announcements – This web page contains information about the MDMLG General Business Meetings, along with maps and directions to the meeting locations.    The Online Meeting Evaluation Forms are also located on this page.   Dates of other meetings are also included (SLA, MHSLA, Midwest Chapter, and Michigan Library Association).
http://www.mdmlg.org/meeting.htm   

-- MDMLG Job Bank lists jobs in the metropolitan Detroit area. http://www.mdmlg.org/jobs.htm  

-- Information on subscribing / unsubscribing to the MDMLG listservs –   This web page also includes information on other relevant listservs.
http://www.mdmlg.org/listserv.htm  

-- Background information on MDMLG -
http://www.mdmlg.org/about.htm   and http://www.mdmlg.org/FAQs.htm  

-- Treasurer's Reports - June 1999 to the present. http://www.mdmlg.org/members/treasurer.htm  

-- Meeting Minutes - Executive Board and General Membership Meeting Minutes from August 1999 to the present.
http://www.mdmlg.org/members/minutes.htm  

-- Executive Board Roster – Includes a list of all Executive Board members, Committee Chairs and the Committee Roster.
http://www.mdmlg.org/executive-board.htm  

-- MDMLG Goals and Objectives – The goals and objectives of all Executive Board positions and Committee Chairs are included.
http://www.mdmlg.org/goals-objectives-2005-2006.htm

-- Annual Reports – The reports for all Executive Board and Committees for 2004-2005.
http://www.mdmlg.org/annual-reports/annual-reports-2004-2005.htm

-- MDMLG Scholarship – Each year, MDMLG grants a scholarship to a student enrolled in the Wayne State University students in the Library and Information Science Program (LISP).  
http://www.mdmlg.org/award-application.htm

-- MDMLG Photo Album (Members-Only Section) – This site collects photographs of MDMLG-related functions.
http://www.mdmlg.org/members/photo-album.htm

-- Consumer Health Links – Hundreds of links to internet sites are categorized and included on these web pages.
http://www.mdmlg.org/consumer-health.htm

-- MDMLG Mailing Labels – You can request mailing labels or print your own on labels.
http://www.mdmlg.org/members/mailing-labels.htm

-- MDMLG Constitution and Bylaws (Members-Only Section) - http://www.mdmlg.org/members/constitution.htm  

-- MDMLG Procedural Document (Members-Only Section) - Includes information for each Executive Board Member and Committee.
http://www.mdmlg.org/members/procedural-document.htm  

-- MDMLG Forms (Members-Only Section)   - Change of Address Form, Membership Renewal, MDMLG Stationery, MDMLG Logo, MDMLG Expense Report Form and Reimbursement Forms.
http://www.mdmlg.org/members/forms.htm  

-- MDMLG Site Index - This is the best way of locating a web page on the MDMLG web site.   It is a complete alphabetical index of all of the web pages.
http://www.mdmlg.org/site-index.htm

Remember that a portion of the MDMLG web site has been designated as "Members Only", and can be accessed via a password. The password is available to all MDMLG members, and can be obtained by contacting the MDMLG webmaster (Valerie Reid, vreid1@sladen.hfhs.org   or 313 / 916-2550).

Please let me know if you have any suggestions, comments, or questions about the MDMLG web site.

Valerie Reid, MDMLG Webmaster
Henry Ford Hospital

Back to Top


Michigan Go Local 

The Vera P. Shiffman Medical Library at Wayne State University has partnered with the National Library of Medicine (NLM) to develop Michigan Go Local, the first comprehensive database of health services in the state of Michigan. Each health service will be indexed by geographic area, type of service and relevant health topics. Thus, consumers, librarians, and other health information and referral providers will be able to locate relevant health services across the state.

The Shiffman Medical Library has assumed responsibility for much of the development of Michigan Go Local. Two staff members, Annette Healy and Linda Draper co-direct the project. We have elected to use the database hosted by the National Library of Medicine to facilitate data entry and maintenance. A new Health Sciences Librarianship Internship program has been created for library and information science students; three students, including MDMLG members Joann Chateau and Jill Turner, have recently joined the project and have begun identifying and entering programs and services.

A comprehensive database of health services in Michigan will be of great benefit to all health science librarians in the state. To ensure that the database is comprehensive, accurate, and up-to-date, we encourage the participation of librarians from across the state. Michigan Go Local also provides an excellent opportunity for librarians to increase the visibility of the programs and services offered by their own hospitals and health systems.

Annette Healy will be presenting a contributed paper describing Michigan Go Local at the upcoming 2005 MHSLA Fall Conference. Annette Healy and Linda Draper will also be available at the conference to provide more information and discuss opportunities for participation. Levels of involvement include volunteers to serve on an advisory board, participants interested in entering information about their own hospitals, participants interested in focusing on a particular health topic or geographic area, and participants interested in reviewing existing records for accuracy. 

To learn more about the Michigan Go Local project, contact Annette Healy at amhealy@wayne.edu or 313-577-9816. More information about Michigan Go Local is also available at our web site: http://www.lib.wayne.edu/shiffman/migolocal .

Back to Top


Next General Business Meeting September 8, 2005

 

DATE:

Thursday, September 8, 2005

LOCATION: 

Rehabilitation Institute of Michigan
Auditorium / Basement
261 Mack Boulevard

TIME:

12:30-1:00 pm -  Registration
1:00-1:45 pm - Business Meeting
1:45-2:15 pm - Break and Dessert Refreshments
2:15-4:00 pm - Program

TOPIC:

Making Libraries Accessible for ALL

SPEAKERS:

Daria Drobny
Cathy McAdam
Ghassan Souri


MHSLA Fall Conference

Pack your bags and head North for " Camp MHSLA: E-Ventures in Learning ", the Michigan Health Sciences Libraries Association Fall Conference. The 2005 Conference will be held at the beautiful Crystal Mountain Resort in Thompsonville Michigan, thirty miles southwest of Traverse City, Michigan.

Programming for the three day conference will include an opening keynote address by Jean Chabut, Chief Administrative Officer of the Michigan Department of Community Health and a closing keynote address by clinical psychologist, Vince Cornellier, Ph.D. entitled: Information as energy - from Dewey Decimal to Quantum: Is the Librarian the motherboard?

MLA continuing education courses are scheduled for Wednesday, September 21:

  1. Recreating services with New Technologies: Service strategies for the millennium (#2004, 8 contact hours), Stephen Abram, Dysart & Jones Associates, Toronto, ON
  2. Copyright and electronic licensing issues (#4021, 4 contact hours), Marilu Goodyear, Lawrence, KS
  3. Teaching evidence-based health care resources (#6611, 4 contact hours), Jan Glover

Other sessions include: Link Resolver, Technologies for Personal Information Management, Human Animal Bond, GMR Update and Contributed Posters and Papers.

In addition to networking, education and speakers, special events centered around the outdoor beauty of Fall in Northern Michigan will be part of the experience. Mark your calendars and plan to attend an exciting and stimulating conference. Registration materials will be mailed in early June.

For more information and registration packets, consult the MHSLA website ( http://www.mhsla.org ) or contact

Munson Medical Center
Department of Library Services
1105 Sixth Street, Traverse City, MI 49684
231-935-6170

Library-HealthSciences@mhc.net

Back to Top


Announcements and Accomplishments:

Are you Webmaster or Web manager for your library?  Are you information professional who uses the Internet and Web-based strategies in your role as librarian?  Then consider attending the Internet Librarian 2005 (url: http://www.infotoday.com/il2005 ) conference in sunny Monterey, CA.  Sponsored by Information Today, this conference features four keynote sessions, 100+ speakers in four tracks, two days of preconference workshops, a vendor exhibition and informal “Dine Arounds ” with fellow conference attendees.  Though not a strictly medical library oriented this conference still has much to offer to the health sciences librarian.  So, if you are looking for something different I urge you to consider the Internet Librarian 2005 conference.  Any questions about this event, please contact Alexia Estabrook

Feleta Wilson, Ph.D., College of Nursing, and Lynda M. Baker, Ph.D., Library & Information Science Program, received a Detroit Medical Center/Wayne State University Faculty Scholars Award ($15,000) to conduct a pilot study on the information needs, literacy, and vaccination communication/knowledge of mothers attending an urban, walk-in immunization clinic in Detroit.

Carla M. Caretto has taken a job at Rochester College as a Reference Librarian, making her adjunct Faculty at that institution.   .  

Carole M. Gilbert, Library Director of the Helen DeRoy Library of Providence Hospital in Southfield will presenting a poster in MC/MLA in Fargo entitled Code Yellow: Library 9-1-. The poster is about the DeRoy Library's collaboration with the Emergency Department to provide need information to identify and treat patients exposed to hazardous materials.  

Deborah Adams, Director of Library and Internet Services, Botsford General Hospital, Farmington Hills, MI will be speaking on the topic of electronic collections management and her experiences at her hospital library at MC/MLA in Fargo.   She will provide information on the selection and acquisition of electronic resources, licensing issues, methods of access and authentication, informing the user about electronic resources, the challenges of electronic resource management as well as the positive outcomes.

Audrey Bondar , Senior Information Resource Specialist, Sladen Library, Henry Ford Hospital will be presenting at MC/MLA in Fargo on marketing library electronic resources during the GMR Technology Forum on Electronic Collections Management. She will focus on how electronic resources have taken the patrons out of the physical library and into the electronic library, and the need to let our patrons know what resources are available to them and to let them know that we are still here to help them.

Barbara Platts, Manager, Library services, Munson Healthcare, will be presenting a poster at MHSLA called Collaboration and Cooperation: Northern Michigan Library Services .   It depicts the regional collaboration between Munson Healthcare, Traverse Area District Library, and the Northwestern Michigan College Library.   The poster outlines shared services and how the libraries use each other as referral centers.

Back to Top


Newsletter Committee 2005-2006

JoAnn Krzmenski jkrzemi1@sladen.hfhs.org
Nandita Mani nmani@med.wayne.edu 
Juliet Mullenmeister, Chair mullenmj@trinity-health.org 
Valerie Reid, Webmaster vreid1@sladen.hfhs.org

 

BACK TO THE TOP

 

Newsletter Home  |  MDMLG Home
Site Index