Weekly Wrap-U.P.! July 21, 2023


System Spotlight

By Christopher Dressler


Tech Day+ August 25th, 2023

Tech Day+ is almost here. If you are interested in attending this event, please RSVP here.


Future Dates & Training Opportunities

August 2, 2023 10:00 am – Niche Academy “Understanding Intellectual Freedom and Censorship”, Registration Link

September 8, 2023, 10:00 am – RNR & Budget Hearing, Full Board Meeting,

Sept 20 – 23, 2023 – ARSL Conference/Wichita, Hotel Booking/Conference Registration

Nov 1 – 3, 2023 – KLA Conference/Wichita


Consulting

By Richard Brookman


Image provided by Pixabay.com Contributor Peggy_Marco

Next Meeting September 8

The next SWKLS Board Meeting will be on September 8, 2023. It will be held at the Dodge City Public Library. We will start the day at 10:00 am CT with the RNR Hearing, then move into the Budget Hearing, and finally the regular System Meeting.

The RNR Hearing does take a bit of time since we have to do a roll call vote. We will send out registration the first of August.

Understanding Intellectual Freedom and Censorship through Niche Academy

Here in the System we have had a few other libraries become involved in the book banning discussion. So this topic might hit your library eventually. Niche Academy is providing a webinar entitled “Understanding Intellectual Freedom and Censorship” will be held on August 2, 2023 at 10:00 pm CT.

“Join Emily Knox for this webinar on intellectual freedom and censorship. Emily will provide an overview of one of the core values of librarianship, intellectual freedom, including the history of the right to access information, the right to freedom of expression, and how censorship intersects with these values.”

If you are interested in this webinar you can register through this link.


Cataloging, Collection Development, and ILL

By Sara Wilson


Collection Development Inspiration


Adult Fiction

Children’s & YA Fiction



In Literary News


AI Used by Fan to ‘Finish’ Game of Thrones Book Series

Fans of George RR Martin and the Game of Thrones book series have long lamented the author’s struggle with writer’s block. Tired of waiting, one fan took matters into his own hands by soliciting the help of a robot. How did ChatGPT do? Find out here.


Recent Book Challenge Issues Making the News

Libraries are feeling the impact of book challenges across the country. Here are some recent news reports involving censorship, book challenges, and bans across the United States. (Special thanks to Sara Koehn, Director of Haskell Township Public Library and Sean Bird, Interim Dean of University Libraries at Washburn University for their contributions to this list!)

Barack Obama Releases Summer Reading List in Support of Anti-Book Ban Effort

Children’s Author Becomes a ‘Loudmouth’ for Banned Books

How Book Banning Campaigns Have Changed the Lives and Education of Librarians

ALA OIF Blog 07.21.23: https://www.oif.ala.org/intellectual-freedom-news-07-21-2023/

First Amendment Coalition: https://firstamendmentcoalition.org/news-opinion/first-amendment-news/

Empowered by Reading (Unitedagainstbookbans): https://uniteagainstbookbans.org/wp-content/uploads/2022/09/Empowered-by-Reading-final.pdf


Technology

by Christopher Dressler


Spyware

Spyware is a type of malicious software that is designed to covertly gather information from a computer or device without the user’s knowledge or consent. It can infiltrate your system through various means, such as infected email attachments, malicious websites, or bundled with other software downloads. Once installed, spyware can monitor your activities, collect sensitive data, and transmit it to third parties, often for malicious purposes like identity theft, financial fraud, or unauthorized surveillance.

To protect yourself from spyware, it’s important to follow these preventive measures:

  1. Use reliable security software: Install a reputable antivirus and anti-malware software on your devices. Keep it updated to ensure it can detect and remove the latest spyware threats.
  2. Update your operating system and software: Regularly update your operating system, web browsers, and other software applications to patch security vulnerabilities that spyware may exploit.
  3. Exercise caution with downloads and email attachments: Be cautious when downloading files or opening email attachments from unknown sources. Verify the authenticity and safety of the source before proceeding.
  4. Be mindful of suspicious links and websites: Avoid clicking on suspicious links, especially in emails, pop-up ads, or social media posts. Be cautious while visiting unfamiliar websites, as they may contain hidden spyware.
  5. Enable a reliable firewall: Activate and configure a firewall on your computer or router to monitor incoming and outgoing network traffic. This can help block unauthorized access and prevent spyware from connecting to its command-and-control servers.
  6. Practice safe browsing habits: Be cautious when visiting websites and avoid clicking on suspicious ads or banners. Stick to reputable and trusted websites, and consider using a browser extension that blocks known malicious sites.
  7. Be selective with software installations: Carefully read and review the permissions and privacy policies before installing any software. Avoid installing software from untrusted sources or those that require excessive access to your personal information.
  8. Regularly backup your data: Maintain regular backups of your important files and data. In the event of a spyware infection or other cyber threats, having backups ensures that you can restore your data without succumbing to extortion or data loss.
  9. Educate yourself about phishing scams: Be aware of phishing attempts that try to trick you into divulging personal information. Learn to identify signs of phishing emails, such as suspicious links, grammatical errors, and requests for sensitive information.
  10. Monitor your devices and network: Regularly monitor your devices for any unusual behavior, such as sudden slowdowns, unexpected pop-ups, or unfamiliar processes running in the background. Keep an eye on your network activity to detect any suspicious connections.

By following these precautions and maintaining a security-conscious mindset, you can significantly reduce the risk of falling victim to spyware and protect your personal information and privacy.

Always feel free to contact me for training requests, library cards, or technology issues at cdressler@swkls.org or (620)225-1231. – Christopher Dressler – 7/17/2023