StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information and Librarians in the Digitial Age - Personal Statement Example

Comments (0) Cite this document
Summary
My family moved from Fiji Islands to America in pursuit of the American dream when I was 8 years old. My parents then wanted my brother and I to have a good education. In school, two struggles I can remember were the inability to speak English and being teased by kids…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Information and Librarians in the Digitial Age
Read TextPreview

Extract of sample "Information and Librarians in the Digitial Age"

Download file to see previous pages I have always had faith in myself and in God to do what is best for me throughout my life.
I had worked for the library during my high school and college years, starting as a page. My interest in libraries began here that while I was shelving books and skimming through the pages, I discovered the love for books and reading. My longevity with one organization has taught me to work as a team player, to communicate constructively, exhibit flexibility, handle problems and show commitment. Some strength I possess is that I am an energetic, highly motivated person which I think can make me survive the rigors of graduate work. I am a self-starter, who is able to take on new challenges. In order to achieve common goals, I am able to work well with others.
My short-term goal is providing the best care for my son, Nasir. My family is very supportive of my going to graduate school, especially since I will be the first female from either side to attain a master's degree. My long-term dream has been to pursue a Master's degree in the Library field. My goal has been to learn a lot from my supervisors and co-workers on how libraries work throughout the years. I have always felt I would be a good leader and teacher.
I have worked in the library field for eights years. I have loved libraries since I was a little girl, always looking up information. This love continued in college, where I worked as a page at DeKalb County Public Library, Decatur, Georgia. I wanted to be around books as much as possible. I enjoy library work because I have access to all the information in the world at my fingertips, in both print and electronic form. I learn something new every day, and Iinteract with people of all ages and from all walks of life. I use my interviewing and teaching skills, and I have learned indispensable computer skills as a bonus. Librarianship has been a good fit for me.
What I like best about being a librarian is helping people use the library resources. I try to be outgoing by establishing eye contact with patrons and asking them if they need assistance. There is so much to teach the public about libraries, and there are so many resources available. From finding a book on the shelf to using the Internet, people need help, but they often don't ask for it. The librarian has to be outgoing.
As I am a graduate of Bachelor of Science Degree in Computer Information Systems, I discovered that working in a library is a lot of fun. My job gives me an opportunity to use my information seeking skills as well as to indulge my web publishing and instruction interests. I feel now is the right time to pursue my degree. I want to develop my educational background and continue working in the library field. In order to move ahead in my career, I would need to obtain a degree to reflect my skill in working in this field. If in order, the program at UNT will provide me with the comprehension I need to become a librarian. If admitted into the UNT program, I would like to pursue administration.
The librarian of today is not like the librarian of yesterday due to the impact of technology that has transformed the profession. Where before there were just printed materials in the library, now information highways through the use largely of the Internet is largely what the student has to deal with.
Public libraries are busy, vibrant community centers that are open days, nights, weekends and even some holidays. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information and Librarians in the Digitial Age Personal Statement”, n.d.)
Information and Librarians in the Digitial Age Personal Statement. Retrieved from https://studentshare.org/miscellaneous/1530209-information-and-librarians-in-the-digitial-age
(Information and Librarians in the Digitial Age Personal Statement)
Information and Librarians in the Digitial Age Personal Statement. https://studentshare.org/miscellaneous/1530209-information-and-librarians-in-the-digitial-age.
“Information and Librarians in the Digitial Age Personal Statement”, n.d. https://studentshare.org/miscellaneous/1530209-information-and-librarians-in-the-digitial-age.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information and Librarians in the Digitial Age

Data Visualization: Stories for the Information Age

...? Data Visualization: Stories for the Information Age Identify the effects poor information might have on a data visualization project. Data visualization makes the understanding of complex data easier, with the aid of art and algorithms, by representing it in the form of images. In order to draw the right conclusions it is necessary to have the correct data, not only that but if the information is false in any way it can make the whole representation useless. For example while generating a firewall log to analyze anomalies, it is not always necessary to envisage the whole file, the cluster of information which represents the properties that are considered relevant can be used. So in order to illustrate which machines are communicating...
4 Pages(1000 words)Case Study

Data Visualization: Stories for the Information Age

... Identify the effects poor information might have on a data visualization project. Poor information can put the whole idea of a data visualisationproject at risk. The main idea behind data visualisation is to make sense of complex data and understand the story behind it. But when information itself is poor, data visualisation will end up being a tool that dresses up information in a more “eye candy” way and distracts from lack of context and bad statistics. The effectiveness of the data visualisation project is compromised when the information available is poor. If information is poor, then no matter how good the design is it becomes impossible to draw reasonable and sensible conclusions or end drawing wrong conclusions. For example...
4 Pages(1000 words)Case Study

Ethical Issues in an Age of Information and Communication Technology

There have been found some gap in implementation status. For the purpose Brooks (2010) suggested having some ethical relationship development and higher education institutions, in particular, to take responsibility.
Societal Ethical Changes Caused by Information Technology:
Declining moral values has accelerated in pace due to information technology. This notion has been supported by the fact that growing information technology allows misconduct and deceits as compared to the situation in the past (Brooks, 2008). This is being done repeatedly and due to the lack of a proper framework for stopping these activities the overall concern and thoughts regarding the ethical impact of such activities have reduced (Gleason, 1999)....
8 Pages(2000 words)Term Paper

The Value of Digital Privacy in an Information Technology Age

...? The Value of Digital Privacy in an Information Technology Age & Introduction Technology has brought many conveniences to society. Unlike years ago, people can now communicate with each other in less than a second. Paper documents have been greatly reduced because everything is stored electronically in databases. As such, access to information is readily available to anyone with a click of a mouse. This ease of acquiring data, however, has come with a price. Hand-in-hand with the applause for the convenience of getting information is the clamor for stricter privacy laws. Netizens, a term coined for active users of the Internet (Netizen), are complaining about how websites make private information such as their names, phone numbers...
6 Pages(1500 words)Research Paper

Ethics in an Information Age

... Ethics in an Information Age The alibi device works through GPS (Global Positioning System) and captures the location of the device holder. The GPS tracking system holds some ethical and legal issues. From the framework that is designed for ethical issues, four major concerns came out. These are known as the “four ethical issues of the information age”. These four most common and important issues are: PAPA issues, which are Privacy, Accuracy, Property and Accessibility. (Mcnamee) The privacy issue is totally concerned with one’s private information. The tracked data of person is used in critical situations. Here, accuracy means that who is responsible for the collected data. The authorized person should handle the critical information...
6 Pages(1500 words)Admission/Application Essay

Revised: Implementing an Information Literacy Programme for Librarians

...Implementing an Information Literacy Programme for Librarians Introduction Information literacy (IL) is a combination of knowledge and skill that enables us “to find, evaluate, and use the information we need, as well as to filter out the information we don’t need” (Eisenberg, 2008). That is, it is concerned with the handling of information; sifting through to what is needed or relevant and making the best use of it. This is a very important skill to have in the present Information Age, especially given that many people are now faced with a situation of ‘information overload’, although information literacy concepts “predate and are largely independent of the new information environment (Grafstein, 2007). Indeed, it affects every single...
4 Pages(1000 words)Essay

Librarians serving people, not collections

Librarians Serving People, not Collections Bibliographic Data Intner S 2009 Building Collections, Building Constituencies.Intner, S. (2009). Building Collections, Building Constituencies. Technicalites, 29(6), 1-11.
Summary
The article begins by recognizing the diverse interests of the different users of the library services. Because of the different demands by the numerous users of the library, the need to employ collection specialists becomes indispensable. Further, the importance of determining the material to purchase for library users has been mandated by the fact that the resources available are insufficient to buy all that is demanded by the many library users unlike in the prior period when financial allocation was...
2 Pages(500 words)Essay

Privacy and surveillance in the Information Age

...Privacy and Surveillance in the Information Age Introduction Technology has been at the heart of development and civilization. While technology has been there since prehistoric times, today the term technology is used to refer to ICT. Communication technology has also a long history beginning with inscriptions on the walls of caves to the modern computers and digital networks. In a modern world, the use of technology has managed to increase communication among human beings, but at the expense of personal privacy. The issue of surveillance is one that has received the most heated debate in the American public (Petersen, 2012). According to Nissenbaum (1998, p.4), information technology has not only affected communication, but has actually...
12 Pages(3000 words)Essay

Executive Dilemmas in the Information Age

...Executive Dilemmas in the Information Age Executive Dilemmas in the Information Age Reasons why it is important for CEOs need tounderstand technology especially the areas of security and ethics CEOs are pivotal to security systems of organizations that help secure customers’ information and company’s secrets from unauthorized access. In order to ensure utmost security and confidentiality CEOs need to understand the technology used in an organization’s security system and how it can be breached (Tsai, 2003). Such an understanding would help in making decisions of enhancing the system and initiating counteractions in times of a breach. A CEO’s understanding of technology would also help in maintaining his or her executive authority...
2 Pages(500 words)Assignment

The Widespread Use of Information Communication Technology

An increasing number of frauds is an example of an alarming situation. All these have a far-reaching impact on the employees, on businesses and on people. 

On the work front, the advantages of ICT cannot be overlooked in maintaining and implementing successful quality programs. Customer-driven standards, customer-supplier links, the prevention of error, quality at the source, and continuous improvement are some of the principles that are put into practice (Laudon & Laudon, 2000 cited by Iles & Healy, 2004). IC T facilitates the production process, helps meet benchmarking standards, make constant upgradation based on customer demands. The internet has revolutionized not just the selling of goods and services...
9 Pages(2250 words)Essay

Information Systems Development Process

When a project has an obvious objective to be attained and the effort is very small, common sense and attention to what the client wants can be a suitable alternative to more complicated and formal methods. However, when the software system becomes more complex, the objectives are multiplied and start to depend on different configurations and circumstances, it becomes imperative to structure the development effort to avoid software development that does not answer the clients need, or does not have the requisite level of quality, or becomes impossible to forecast in terms of time and budget – or a combination of any of the preceding.

In situations of complexity in software development, structure methods seek to im...
13 Pages(3250 words)Assignment

Social Theory in a Globalizing Age

A comparison between the followers of social theories and the followers of natural sciences (physics and chemistry) revealed that unlike followers of natural sciences social theorists don’t use any techniques to show the exact knowledge or skill. Instead, they prove their work or idea by suggesting a possible way of explaining the facts or arguments usually called hypotheses (Lemert, 2004).
By hypotheses, social theorists cannot easily prove their argument at a time but they require time to prove it. Social theorists are normally criticized for using the hypotheses. Deconstructionists or postmodernists, rigidly critical theorists, disagree with the criticism by mentioning that any research methodology is not 100% pure a...
10 Pages(2500 words)Assignment

Management Information System

At the beginning of the twentieth century, the revolution began in knowledge and information then accelerated gradually thereafter. It became now the foundation for many new services and products wherein 1974 applications pushed the limits of human ability. As an information system, research advanced so did user expectations. And the question raised is how individuals, the organization can adjust in order to leverage the delivery of information technology.

The infrastructure of the information technology (IT) affords the base for an organization to construct its information system needed to complete the work and provide the employee with all the necessary information. However, management decisions regarding IT are very...
12 Pages(3000 words)Assignment

Info-Point: Marketing of New Touch Screen Information Technology

The development of the new Info-Point technology, a stand-alone information module designed to offer the public information on tourism, local shopping, weather, and transportation, has created the opportunity to successfully market these information technologies to different UK cities. The entire marketing concept is to establish self-service information centers that offer a wide variety of regional information, utilizing an easy-to-use touch screen methodology to cater to a broad mass market of consumers. 

Touch screen interface systems are becoming more and more common in the UK and abroad. During a pilot experiment using touch screen information technology, the automotive manufacturer Lexus piloted an informatio...
10 Pages(2500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

The Use of Rhetoric in the Electronic Age

The rubric of the rhetorical theory is an extremely contested discipline with classical rhetoric theory focusing on the concept of rhetoric as a form of persuasion or an ideological perspective that asserts “rhetoric’s role in upholding power and domination” over the “general public” as the underlying basis of societal communication (Stacks & Salwen, 2008, p.240). However, the boundaries of the classical rhetorical theory have been challenged by cultural change, context and the permeation of alternative perspectives. 

In particular, the impact of the digital revolution and the growth of numerous multimedia streams on cultural norms has challenged classical theory propounding the fu...
14 Pages(3500 words)Article

Business Information Systems

...Club IT - Part Three of Phoenix BIS 219 Introduction to Business Information Systems Club IT – Part Three _________ _________ DATE ________ Table of Contents Table of Contents 2 Abstract 3 Overview 3 Business background 4 Current Technology Structure of Club IT 5 Problem Assessment 5 Club IT Business Goal and Strategy 6 Assessment of Needs 7 IT Solutions for Club IT 8 Decision Support Systems/ DSS 8 Customer Information System 8 Data Mining for Business Performance 9 Enterprise Resource Planning 10 Supply Chain Management 11 Customer Relationship Management 11 Conclusion 11 Bibliography 12 Abstract Club IT is a nightclub that is currently operating with the traditional technology structure. Club IT nightclub is most popular club in its...
8 Pages(2000 words)Case Study

Global Employee Information and Consultation: Replicating the European Model

...Global Employee Information and Consultation: Replicating the European Model INTRODUCTION The only way for the employees and their representatives to reach the level of multinational corporations is to create an effective transnational mechanism that facilitates consultation and information disclosure. The European model (EWC) is an example of an institution that intends to provide employees voice in the transnational arena. The information dissemination and consultation arrangement enable employee representatives to participate in discussing issues that pertains to their employment. However, there is a need to analyze whether EU style of legislating a mechanism shall be effective if replicated globally. The answer in part depends...
9 Pages(2250 words)Coursework

Primacy of Reading in the Information Age

...Primacy of Reading in the Information Age The importance of attentive reading can never be undermined regardless of the times we lived in before or the times we are living in now. Critical reading helps students and professionals alike to grasp the essence of a subject thoroughly; form logical arguments and substantiate those arguments with adequate empirical or theoretical backing. Whichever way it may be looked at, reading skills and aptitudes reflect critical thinking capacities – a prerequisite for anybody willing to set a benchmark for excellence, be it in academic pursuits or professional fields. In today’s era of information boom, it is all the more pertinent to read in a discreet manner so as to glean only the required amount...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Personal Statement on topic Information and Librarians in the Digitial Age for FREE!

Contact Us