Wednesday, November 28, 2007

Combat Action Badge Orders Example

retention - the policy and the libraries

Michael Bracey

Press reactions Austria:
Supreme Court judges are sounding the alarm - Salzburger Nachrichten
Big Brother surfs the Internet - Kleine Zeitung
more clarity in data storage - Wiener Zeitung

reactions to the topic in Germany:
retention for the Press freedom catastrophic
stock data: the largest constitutional complaint ever

Directive on data retention has already decided on 14.12.2005 in the European Parliament with a clear majority. Many today do not have been there, have agreed. From Austria, all Member for excluding the Green Party, a pro voice was, among other things, the current Justice Minister Maria Berger. Closed hand, was seen only in Europe, the European Left Party.

What governs the policy specifically

It's just a question said that in future all the connection data of modern means of communication internet, e-mail, telephony and SMS within the European Union preventive be captured and stored, and in case of suspicion are disclose an offense to the investigating authorities.

responsible for storing the "Provider" or the telecommunications provider, details of which can of course swap obligations in compliance with data protection and other provisions, but are liable for the proper collection and provision.

How would you describe the

Imagine you are sitting, with twenty people in a lecture hall, most will have a cell phone plugged in when hopefully to "silent" switch.

Nevertheless a bearing at any time, which means you can put the assembled people in a relationship with each other. Whether this was a random encounter or a conspiratorial meeting, is of secondary importance. The fact that so was A mobile phone in close proximity to mobile phone B will now be saved, even if no communication has taken place between the devices.

ie basically that one should be careful in the future, from whom you for example to set in a guest house - if they are terrorists, criminals or other business (maybe later) act suspects, must you may be months after that to understand why they were in contact with these people.

It also traces all the actual phone connections, so all calls, but also the attempted calls, sending and receiving text messages or other comparable services. And multimedia applications fall under the memory requirement. Anyone who watches TV via mobile phone, send pictures, play lottery, pay a parking ticket or, as now even possible to buy a ticket at the Federal Railroad is registered.

The reference to Internet use is given at this stage, every telephone call that is routed via the network, must be saved in libraries, free Grant access to the WWW. In particular, the boundary between "normal" use and "communication" to practically pull too hard and do not control.

Each case of Internet use should be clearly traceable to the long-term-use person, regardless of what the reason for the use was, there are no exceptions for scientific research, education or the like.

This call data were recorded, of course, also in advance for a certain time when it comes to paying services, was to ensure proper enforcement of the regulations and a reasonable warranty period for the customer.

then data had to be deleted but the time limits for this were previously in favor (Europe) is completely mixed.

The implementation of the Directive in Austria

Directive - here in Full Text - bears the name:
"Directive 2006/24/EC of the European Parliament and the Council of 15 Enforced March 2006 on the retention of data related with the provision of publicly available electronic communications services or of public communications networks or processed. "

have now different colloquial names for mainly just the concept of data retention directive, but also as a spy Directive, it is known.

is worth noting that the policy is actually divided into two parts, in telephone and Internet sectors. The former should already be in place for the second still remains a certain amount of time to accept is that by the end of next year, ie 2008, both will gain at the national level, the force of law. At European level this is already the case.

The background for this (apparently) excessive measures is partly due to the increase in acts that are committed using the Internet and on the other hand, the fact that by the expanded investigative powers hopes to prevent acts of terrorism and serious crime in the future or easier to explain.

One of the final spark for the policy were, including the serious attacks on public transport in London in 2005.
planned but it was already much longer.

The Member States had in the interpretation at the national level maneuver, such as the duration of data storage concerns and for which (potential) actions one released to the investigating authorities is mandatory. In Austria, after the date this bill, all telephone data of six months must be saved. This These permits are the lower limit of the policy.

first show the next few years, the impact on individuals and public bodies and companies will also occur in practice. The fact is however, already clear that Internet use will never be the same as one would imagine today. Because in reality it has never been anonymous use anyway, even though many people still believe.

too many "shared responsibility" that were included in the development of the directive was, in advance, so when a bill was present in Austria, surprised by the problems encountered and resistance.

one hand diving to technical and organizational issues, but above all is an even more difficult to estimate costs to the institutions concerned Avalanche, would shift the logically everyone.

The telecommunications companies and providers hope to pass on any additional burdens on "the state", the difference for the people should pay to be limited, the public, either through higher prices for the use of communications or the tax burden .

Estimates of the amount of the charges are very different and hardly serious to quantify, but Europe certainly astronomical. The Association of German Internet Industry estimates eco her alone for Germany to 205 million euros. are given according to eco-going costs for depreciation and operating the monitoring systems of at least 50 million € per year, for example, to see the Heise News Ticker from 09/18/2007

addition, there are many unanswered questions that show now that long-term give more tightening "must" if the whole thing should make sense. It is unclear, among other things:
- as it should be possible to efficiently make these vast amounts of data to identify a potential offender
- how to deal with prepaid phones
- what with anonymous to Internet access concretely happen
- but above all, why take preventive effect all citizens of the European Union monitors, but as a user of a mobile phone which is registered in Oman and is sitting in Paris at a cafe, completely unmolested by a second could call the person standing in Trafalgar Square and uses a cell phone registered in Mexico.

also has already repeatedly shown that the "best" monitor is useless if the staff or the know-how "it does not exist, the data collected to evaluate, which runs from 09-11 up to many from the other media outlets Did.

is clear but of course, that the Internet and all other forms of modern communication heavily by organized crime and terrorist fanatics are used and infiltrated and follow the police and other investigating authorities here in order not entirely to fall into the background.

It must not be a Illuminat and certainly not a friend of the Bush Administration or the hard line of the German Interior Minister Wolfgang Schäuble, to see that in the context of the Internet much brewing. And although many sites:
- you see people such as the intelligence director of the energy departments of the U.S. government Rolf Mowatt-Larssen, acts and speaks constantly he just came back from the holding of an exorcism and the devil is no longer painted on the wall must, because he has certainly seen and noted in its report bluntly how much is "the Internet" infiltrated

- we consider just a little bit the incredible manipulation that happens daily in the WWW and in fact creates a new past

- or if you witness how openly many of the great "player" in the Internet pursue obscure interests, we may even hope that to find ways to one day as much as possible to explain all of what today consciously or unconsciously masked, altered and will be destroyed!
The monitoring, like that happened here so far very much a gray area, even now, it was always such as child pornography, on prohibited political activities or in the case of organized crime - even after a long time - perpetrators of online investigations auszuforschen.

It is therefore somewhat different from these things now only to the legalization of already existing instruments already in use.

One of the big open questions is certainly the right may be used for which specific planned or already completed these deeds collected evidence. Only if a crime with a certain penalty amount is calculated, should there be a mandatory restitution. This height is in Europe reattached completely different. Generally we speak of it but that should exist for minor offenses no way to "stock data" access.

This interpretation is however much room, also raise existing data is always greed. Furthermore there is the danger that they actually met in passing on something that will then be recycled but, above all, is an abuse to fear, for the control of access is, as shown by similar cases, are very difficult and complex. And trade data is a very lucrative business.
come to innovations such as the European arrest warrant, "which means that, even on actions that are measured in the different Member States of the European Union completely different, can lead to deliveries, and an increasing shift of some crimes from civil to criminal law , the latter is especially the case for copyright and related areas.
examples could be time, eg the IPRED 2 directive in which a shift of intellectual property rights is the civil into criminal law being considered. More on this in Heise .
Many of the large interest organizations for the protection of collective rights to do accordingly, of course, be possible that especially for their requests to access the content, data, should do so in Austria such as the Austro Mechana and the anti-piracy association. They impose even a worsening over the previously scheduled practice. What then come the second time the libraries into play as any other and is so often infringe copyright, as in the library and the entire education sector.

It should be noted that no definite statement can be made, will come when the two specific laws in force in Austria, such as the implementation is to run exactly what and who is specifically for organizational, legal and other responsible actions, but you should start to think about it massively to see who the retention of the thousands will take over data produced every day such as a university library. Even universities such as providers, as some large companies, and thus liable for complying with such laws.

Actual impact in libraries

in libraries and anywhere else where people will access the Internet enables, in particular, measures should be considered to ensure that within the set time scales at all times, even retroactive, clear Identifying a "recipient" is possible.
It should therefore be to establish who actually considered that when things on the Internet, searched or downloaded has. Where (still) anonymous surfing is apparently possible, it is long term come to an identification requirement, in Italy you have already required under the anti-terror law that (theoretically) even the smallest Internet cafes for 2 years to archive all visitor data needs.

To clarify once again but a duty to implement the Directive "only" the data connection - to save, say User A calls the web page X to clock 11.22 and stayed there for eight minutes to write - but not the content e-mail through Hotmail invites, software download etc. XY

is generally required to be a more sensitive approach to the Internet, everyone should be clear:
• that it should never let someone else work with his ID because he otherwise for any , maybe accidental or unconsciously damages could be held responsible
• that nothing stays on the Internet, but each activity can be traced long later (and is!)
• that apart from civil and / or criminal consequences things, the award is one more day without thinking about it over the Internet, and later - for example, choosing a career - could have a massive impact
• that an improper storage and logical storage of data represents a violation of law, the service, administrative and far beyond, have extensive implications.

means for network administrators, this development that the responsibilities to be clarified in their jurisdictions and to make sure that all liability issues must be clarified that should be available by the users of far-reaching commitments that include the approval for the transfer of data - and in a way that makes it unmistakably clear "we monitor here!
Already in the run should be determined within an organization, who is under what circumstances, for the storage, the "maintenance", the monitoring of the monitoring and publication of the data (to whom?) Responsible.

to fear is that in this question - as in similar matters - ignorance and naivety in the ministerial environment prevails and prevents that now - at the right time - missing requirements and necessary resources that would be needed even just organizationally to enable implementation of this Directive.

Therefore, in the worst case, once again much at the individual departments get caught, and the possibility that even a totally innocent administrator "caught" when the data is later than "important" are gone, is great.
of completeness may be noted that of course has been virtually every Internet activity could be traced, by way of digression here of the clear serene case of the Dutch royal family is mentioned, it was not satisfied with an entry in Wikipedia, and from a "Palace Address tried to correct this several times, see an article in Online Standard
Particularly alarming
all these "new" opportunities "legal espionage" but of course there where so far absolute secrecy was even required by law, as in contact with lawyers or in journalism.
can also, of course, even without any store, to own a website calling conclusions, such as when to do research about a disease or is looking for political information.

The privacy advocates are certainly now the big losers and it is feared that in the long run that way. In particular, because the awareness of the effects hardly of people's minds and the more prevalent view of "who has nothing to hide, nothing to fear."

be drawn but the recent experiences, such as in connection with the "bugging" approach, it is found that in half the cases of innocent people simply were monitored. Depending on this ratio can be interpreted as a success or massive encroachment on the fundamental rights to the Austrian law enforcement officer Gottfried Strasser: "Since the launch at the end of the 90s, there were nearly a dozen major eavesdropping. The "success rate" is 50 percent: success I rate meaning that in these cases, indictments and final sentences has come, and partly to many years of imprisonment "Please refer to the Article in the News Networld.

other words, the means, however, that half of those affected for free from the authority" were taken off, "because this could describe something exaggerated the future of Internet use, a permanent strip in front of strangers.
And that the need for most measures "court order" is to be regarded with caution, is as "cross-written" very good in the press Kurt to consider Scholz. Here is the text in the Press Online.

to say but of course it is clear here again that it is now finally better (and legal) tools to fight cyber crime are available.
may be, if indeed it even thousands of lives are saved because in future attacks, not only enlightened, but even beforehand prevented will be the voice of the "protesters" and the people who criticize the task of long-won rights, certainly quieter and hardly be heard. Weighing what matters more is (rightly) but keep on a recurring theme.

Whether it will remain possible in the future, in the states of Europe with their democratic constitutions and their Bürgerrechtscodices, libraries made simple anonymous "read" books
- if it has not been previously searched in the online catalog
- has not ordered through the Internet
- and not just online there
is the question . Little food for thought: the dream of all "E-fans" that virtually all electronic on-line should be readable, most lasting under a URL out now as a side effect to the fact that virtually everyone will know peace still interested years later, what who when has read. Metternich would be amazed at what asset libraries as assistants.)
leaves only, target only the to accept works in hand, the ink is drawn up - provided the shelves are mounted between no surveillance cameras. Every totalitarian regime knows

that libraries dangerous breeding grounds of the mind and thus are of criticism and resistance, and the first steps of such regimes are more evictions and cleansing of libraries.

In Austria, libraries always came back even more recently in the tension between legitimate protection of secrets and police investigations, such as time, referred to as "letter bomber Franz Fuchs suggestions for its chaotic effusions of borrowed books.

Small Internet breviary

- extreme caution when using the Internet. Search naïve can jeopardize your future.
- "nothing" to believe what is available on the network without turning on the common sense and always "against" to research before you hold something to be true
- The storage of data is not "invented" the state or the EU, if you have searched on Google for three years, something that will long be comprehensible. For reasons entirely opaque to store there all inquiries to 2038! After protests from privacy advocates and other organizations, especially in the United States should in future, but only 18 months are stored, who wanted to know what and when. Google can now safely be called the greatest storage of personal data in the history of mankind. And it is totally unclear what happened to it.
- Much of what we today might still seems like science fiction seeps rapidly into everyday life, see, eg, in America how to implement RFID chips under the skin of staff and staff in enterprises. To find the meantime many reports in the network eg in a Heise ,
a reliable source - also in the development of "improved employee" is working: With the help of infrared rays, the free intellectual Capacity in the brain found to give it to electromagnetic signs of relaxation more work. This is a short review: computer optimizes staff in the Wiener Zeitung
- Data retention is only a beginning, further measures are imminent to mention include the so-called federal Trojans, the smuggling of monitoring software by investigating authorities, without the relevant user noticing it, or the web censorship, which was known previously only from countries such as China and which is now challenged even more in Europe.

The connection may not be obvious is that now the restriction of freedom there works best where it has yet suggested a few years at least, almost everything happened directly or indirectly through "the Network".
has remained so well-noted as one of the greatest freedoms that have yet to imagine, easy to read books printed. And even if many still not clear: it is harder to fake an old printed book (as we have seen so many times), as a digitized.

leaves only to let the Internet do not spoil, but with the flight into parallel worlds is not really possible, because just Second Life and Co are now strictly monitored and even virtual crimes it should be traceable. If so invades your avatar in Second Life, a bank, it could be you insinuate criminal activity and are being seriously discussed whether virtual sex with a furry (for not-so Internet Studded, which are usually furry creatures that wander around on the net) falls under the sodomy laws. Learn more about this: a good overview of the law in two previous worlds rights issues in and around Second Life

have never been spied at the same time as many people as preventive measures now. Intelligence and dictatorships until recently had to use more cumbersome means, today we provide all the information from even very democratic willingly.

Some comments on data retention policy is proposed to the police now, they should but the cost of storage through facilities such as a personal reminder service recoup in which they are paid everything at your disposal, which we already forgotten again haben.So a service could help as what local you've eaten five months ago as well and with whom you actually there was ....

Finally, a pessimistic quote from the director George A. Romero, who thinks the situation of the Internet 2008: "I was always against media critical set, especially because of the danger posed by manipulation. Now prepared to work around it I'm deeply troubled when I see how my children to the Internet, it is very easy to lie and it is very easy for someone with a mistaken idea, suddenly millions of people behind them "
interview. George A. Romero: "We ourselves are the zombies!"

About the author:
Michael Bracey was for many years head librarian, is unchanged librarian and loving, an expert in the information and document procurement from all knowledge of business, researcher, provenance research, professional in economic and legal investigations, books, Hunter, a specialist in the development and all applications of the Internet, lecturer and consultant.
Michael Bracey librarian / information broker / Books hunter
mailto: bracsevits@net-traininigs.at and mailto: bracsevits@mail.com

Saturday, October 20, 2007

Relative Bradicardia In Typhoid

" It is said that libraries and librarians are boring and ...

World Library and Information Congress : 73rd IFLA General Conference and Council
"Libraries for the Future: Progress, Development and Partnerships"
19 to 23 August 2007, Durban, South Africa


Thus begins Judge Albie Sachs (Photo:. with Gen. Adam Welz), one of the most impressive People of the new South Africa and one of the great civil rights leader of the 20th Century, his speech at the opening of the conference on 19 WLIC August 2007 at the Great Hall of the venue, the conference center, ICC Durban.

He talks about his access to books and on how the library helped him to stay mentally healthy, as it because of the "90 day law" was without charges, without trial, without access to lawyers or anyone else for months in solitary confinement.

The isolation is so bad because there are no external clues more, to which the person may bring into equation: reality, personality and identity are lost. The Reizdeprivation leads to disorientation, one's memory is the only place of refuge.

Albie Sachs began to recite the alphabet, to sing songs that began with the letters of the alphabet: A Always ..., B Because ... so difficult with the X, so he was "Deep in the Heart of Texas". He created the romantic song by Irving Berlin "Always" is a song with which he fought the loneliness of a South African prison cell, and sings it again on:
"I'll be living here, always / Year after year, always / In this little cell that I know so well / I'll be living swell, always, always. / I'll be staying in, always / Keeping my chin up, always / Not for but an hour / not for but a week / not for 90 days, but always. "

And it began only with the 90-day-law, the next time was it is the 180-day-law and really wanted to keep unwanted people forever in solitary confinement and isolation torture.
Albie Sachs, saying the 5000 participants large audience in the huge hall was so quiet you could hear a needle can.

He spoke of how he tried to reconstruct and remember, catalog, he of the world outside had in mind from trying to construct the world in the spirit. The only book that he was allowed was the Bible. He read it again and again, not too fast so he will not soon again at the end was. He has devised lists of books wanted to read it and came one day it really so much that he was allowed to get books in his cell. His guards worried, whatever they wanted it or what it was possible to obtain, in a small public library, not far from the prison. He describes the rescue, he is done through books, such as the sheet anchor, the one is thrown when one has fallen out of the boat. And then he thanked the unknown librarian - in his mind there was always a librarian - who then supplied him with the essential reading material, perhaps knowing what this meant for him.

He compares the safe swimming around the boat with the safe working within the library traditions of daily work and training, and to venture a little further from the boat away - to where it is to find the really interesting things - with the conference in South Africa, where you get to see things never seen and experienced.
In Africa, for example, some libraries two legs - the lost treasure of her knowledge comes from tradition and experience with them, if you do not find ways to save it.

In the days of apartheid passed the actual story mainly orally, written, it was always trace back on the author - on the one hand, and on the other hand you could not trust the word spread in the media.

The storage and memory is essential, and libraries are places of refuge and freedom of spirit. It's about books and other written, but also increasingly to the Internet - the invisible virtual library in the world.

Albie Sachs, the lawyer and judge who was in the construction of the South African legal system is heavily involved, of course, especially the largest law library in the southern hemisphere: the library of the Constitutional Court in Johannesburg.

to repressive systems in the best people from outside nothing about their rights, they get lies and propaganda, but they should not have access to the written word. The lawyers Sachs and Mandela know best from their experience of apartheid, how easy it is to twist the law to distort and make them disappear. The guardians of the law have a kind of secret knowledge and no one can know exactly what it is based. Therefore, the importance of this great law library as a building that represents the struggle and liberation.
The physical building is important and that its facilities accessible to all - in the library lead ramps that you can ride in a wheelchair to open shelves, in which the books, files, leaves the laws of all African countries classified by an understandable system, stand available. You can move freely, to travel freely associate, ... within the library.

The library is an essential part of the Constitutional Court, the building stands on the site of the old prison, Fort Prison, and it is built of material of the former prison. But it is something completely new in its architecture and embodies the spirit of freedom and appreciates the struggle for its liberation. There is a part of the stones and bars of the prison and that means going to the sufferings of the prisoners never lost, but it's like a phoenix from the ashes of something quite new and different now. Next space, light and air, its clarity and beauty items and crushed the buildings are still not the old prison wings, which still surround it and which are preserved as a museum.

South Africa has had to build a new legal system and Mandela and his government officials gathered information from around the world, laws are compared from anywhere and in frequent exchanges with judges and legal researchers from around the world.

Also Dr. Alex Byrne, IFLA President-elect speaks about Gandhi's struggle for human rights that began in South Africa - when he invited friends of business his father to come as a consultant in a legal case from India to Pretoria, South Africa, - with a first-class ticket on the train in Pietermaritzburg had to change the place, 3 in the Class of the train, the people of color has been assigned. Because he refused, he was thrown off the train. His fight, which took its start here in South Africa influenced the other civil rights movements, played by Martin Luther King or Nelson Mandela.

central base and target these liberties and civil rights movements with struggles for truth and justice by means of violence is the freedom of speech and expression, freedom of access to information for all.

The IFLA is aware of the responsibility and solidarity with our colleagues across the globe through. The organization supports them in their daily struggle for development, information, provide the competence to conserve appropriation of information and developing structures that allow libraries to knowledge and cultural heritage and places of social development to be.
Everywhere the IFLA advocates the freedom of expression, the access to information and knowledge - and Alex Byrne makes clear in places where these rights are threatened and persecuted, like in Cuba in June to the libraries and librarians retention and share of colleagues and the organization to convey.

At this conference in Durban emphasizes the aspects of development, the future of global partnerships and the fact that participants from African countries accounted for half of the time the delegates and speakers, welcomed with great joy.

solidarity within the IFLA found expression in support of Australian colleagues who mustered up the money to enable African colleagues participating in the Congress - and thus to allow them the opportunity for meetings with colleagues, exchange, and perhaps resulting partnerships.

Pallo Jordan , South Africa Minister for Arts and Culture, also one of the old generation fighter, talks about the development of an information society that is free, fair and equitable for all and also that the responsibility lies mainly in the libraries. Books are eye-openers, companion, raconteur. Ideas for a better future are the only thing that is for the time being there - to put it into reality, means work - and that libraries need support, solidarity, partnership, encouragement and empowerment.
He described his access to books, the life-saving effect of libraries which he learned he basis of the "90 day law" was without charges, without trial, without access to lawyers or anyone else for months in solitary confinement. (Photo Source: www.passia.org ) is

Gcina Mhlope , the "Mother of Books" in South Africa, well known as a freedom fighter, activist, actress, storyteller, author - and they performed the ceremony! It is an extraordinary experience, this charismatic personality to experience in their element: telling stories and reading, animating, and to feel the love and enthusiasm, with which it fills the last corner of the vast hall, and the hearts of viewers and listeners.

"May the heart beat of Africa echo in your soul ..." she says, one thing is certain: Africa will never disappear from our soul.


Photo: Sally Blackman

Football Helmetback Plates

information and behavior change

World Library and Information Congress : 73rd IFLA General Conference and Council
"Libraries for the future: Progress, Development and Partnerships "
19 to 23 August 2007, Durban, South Africa

FAIFE (Free Access to Information and Freedom of Expression) und AIDS / HIV

Bibliotheken überbrücken soziale Unterschiede, Informations-Zugangs-Hindernisse, transformieren Information, um soziales Verhalten zu ändern
Social inclusion: how can public libraries embrace the challenge of reaching out to serve all people in their community?Bridging the information gap - digital inclusion

WLIC 2007 - Konferenzbeiträge
Overview and information issues concerning the HIV/AIDS situation in Africa KINGO MCHOMBU and CHIKU MCHOMBU (University of Namibia, Windhoek, Namibia)
HIV/AIDS Information Seeking and Healthcare Communications in Sub-Saharan Africa KENDRA ALBRIGHT (University of Sheffield, Sheffield, UK)
Information Literacy in Practice: engaging public library workers in rural South Africa KARIN DE JAGER and MARY NASSIMBENI (Centre for Information Literacy, Department of LIS, Cape Town, South Africa)
Braving Rapids, winding timber-tracks: towards equitable access to information for libraries in Sarawak RASHIDAH BINTY BOLHASSAN (Sarawak State Library, Malaysia)
What is Community Centre, Gallerup? LONE HEDELUND(Arhus Public Library, Denmark)
Serving Patrons in Their Language, Not Just Ours PAUL S. ULRICH (Berlin Central and Regional Library, Germany) and SUSAN McGlamery (Cooperative Services, OCLC)
Changing information behavior: education, research and relationships JUDITH BROADLY-PRESTON (University of Wales, Aberystwyth, UK)

HIV / AIDS is one of the biggest problems of the entire African continent. Apart from access to health care and antiretroviral drugs, which is difficult enough and usually too expensive is it here, above all, to the social behavior that one of the factors for infection and spread of the pandemic of HIV / AIDS in Africa, is. Meanwhile, there is
addition to questions of how information is to be treated and what role can libraries play in theories also "learn", ie ways to take effect by providing information on changes in social behavior.

In the West, be considered in health campaigns now mainly psychological elements that cause it so that information is assumed to be true and may lead to subsequent changes in behavior - It would have to compare information campaigns and find out which elements to success.

libraries have this important role and are now developing theories and it can be reached as in social crisis situations or in crisis areas of the pure information transfer to actively influence the behavior.

be the basis of "Health Behavior Theories" should "Information Behavior Theories developed.
is certain is that experienced by the / d, which provides information about the inequality, you feel passively to authority, and therefore this situation is often rejected in principle as a whole.

Here's flexibility and imagination of the required information brokers. The information can also be packaged and indirectly in conversation often work better than the dry instructing top down. The most successful one will be if the material in many languages, especially the local native languages available, and if one is not limited to the written form of mediation, but radio programs, TV shows, such as soap operas, plays, songs, blogs, involving and recognized authorities wins - singer, actor, former child soldiers - are sometimes very popular ...

out by Wissensmanagemen explanatory information about certain desired actions.
-> see the book of the liberation theologians Paolo Freire: Pedagogy of the Oppressed

The neglect of the issues arranged such as knowledge, can be transformed and gives explains why the awareness about HIV / AIDS in Africa is big now, but this knowledge has little effect on the behavior of men.

information must therefore convert, to be effective in Africa and that has to happen very soon.
The theoretically known written knowledge should be translated into experience.
The tools for this are already there, they do not have to be invented.
There are various corner points in the knowledge that must be respected, as the questions: Who
know something?
Why and where did he know?
How much is worth the knowledge? How is
it to?

It should be possible to control the pandemic through information and possess information must lead to the fact that people are actors, rather than seeing themselves as passive victims gelled.

AIDS requires constant agitation, for it is a very quiet and silent disease, which gradually takes possession of their victims.

Best practices are practices that have been under a great amount of practices in use already proven by testing different parameters than the best.
eg libraries have extensive experience with best practices for collecting, cataloging, evaluating and deploying knowledge.
The U.S. government tends
under the Bush administration to AIDS / HIV projects, in their concepts, the terms "condom" or "abortion" appear not to support and demand as the only strategy against AIDS, sexual abstinence and marital fidelity.
That's the reality over and information that is conveyed with such unrealistic demands, can not be accepted.

knowledge management would have to democratic and politically independent as possible to go forward and take into account local needs, cultural traditions and above all the local languages. The extent of the economic and social dependence of women, their socio-economic inferiority - is hard to imagine in the West and is therefore also in Western theories hardly noticed.

The Health and Information Behavior Theories should include the following

-> Gender difference regarding the knowledge and skill base - as long as fees must be charged and the gender differences are socially so large, are girls less willingly sent to school and get less well educated
-> boundaries of behavior, to learn how - native languages are often not taken into account, the official and school languages are the languages of the former colonizers
-> integration and use of all factors, such as Education, communication techniques, Psycholgie, public health care

The western Representations Health Behavior Theories are
- explanatory
- Change emphasizes
- message-oriented
- faith emphasizes
- intervention orient
All together, unfortunately, applies not simply to the special problem of AIDS HIV in Africa .

this - especially in developed countries - developed and implemented theories a little consideration, namely that human behavior is not necessarily rational, and certainly not in the area of sexuality. There is - apart from the cultural, and psychological and ideological factors that are not be considered by the Information Behavior Theories.
The role of each culture needs to be much more involved, health campaigns are otherwise completely past their target groups.
In Africa, one has to deal with cultures that are not oriented to the individual, but mainly in communities: there are families, tribal cultures.

integration of journalism and libraries :

The information must be integrated early on in their education. Verhaltensmotivierung must take place. Apart from funds had the propaganda and the manipulation of / the librarian as a trusted intermediary, as a curator and animator, opportunities influence on behavior.
We librarians need to know that without the recognition and empowerment of people as agents and managers, information is not accepted and does not lead to behavior change.

work in Africa so far in the course of the AIDS education Peer to peer groups, youth clubs, the recovery of the traditional authorities that are trusted, the inclusion of musicians, singers and actors as role models.

librarians can make this experience their own and try to experiment on their part with it - the one to find out the kind of information the user is really looking for, and for the right track, Information to convey.

librarians and patrons are partners in the common way of discovering knowledge - the role of the librarian as the owner of knowledge and guardian of access, impose the questioning and the waiting reader his language and his understanding of culture, definitely a thing of the past.