National Conference
Library Information Science &
Information Technology for Education
(NCITE - 2015)
Organizing Committee:
Anil Kumar Jharotia
Vaibhav Bansal
Rahul Mittal
Dr. Ashima Bhatnagar Bhatia
J -147, 2nd Floor, Vikas Puri, New Delhi – 110018
Helpline : +91-9868147997
http://www.rtmonline.in
First Impression: 2015
© Modern Rohini Education Society(Regd.),
National Conference on Library Information Science & Information Technology for
Education (NCITE2015)
ISBN: 1-63102-455-8
No part of this publication may be reproduced or transmitted in any form by any means,
electronic or mechanical, including photocopy, recording, or any information storage and
retrieval system, without permission in writing from the copyright owners.
DISCLAIMER
The authors are solely responsible for the contents of the papers compiled in this volume.
The publishers or editors do not take any responsibility for the same in any manner.
Errors, if any, are purely unintentional and readers are requested to communicate such
errors to the editors or publishers to avoid discrepancies in future.
Published by
MODERN ROHINI EDUCATION SOCIETY
J-147, Second Floor, Vikas Puri, New Delhi-110018
E-mail: brand@rtmonline.in, http://www.rtmonline.in
Typeset by
Modern Rohini Education Society, New Delhi-110018
Preface
Change is the most inevitable environment for Learning. With the use of new technologies education
and researches are evolving, strategic shifts have become imperative for organisations. “Digital India”
is a large umbrella program which will re-structure and re-focus several existing schemes to bring in a
transformative impact. This initiative will ensure that all government services and information are
available anywhere, anytime, on any device that is easy-to-use, seamless, highly-available and
secured. It aims everywhere mobile connectivity, broadband highways, public internet access
program, e-governance, e-kranti (which aims to give electronic delivery of services), information to
all, electronics manufacturing and jobs for IT. Strategic shifts such as new products and services,
market expansion, evolving growth strategies, innovative technology, new leadership, or mergers and
acquisitions and its management to achieve high impact, sustainable business results has become
challenging, complicated, and necessary for organisations.
In today's environment, a large amount of information needs to be processed to make a viable
conclusion in a library or in any community. This information, referred as big data, is collected from
various sources like social, geospatial, internet, etc and can even be directly provided by a human.
The main aims is to bring together the Researchers, Scientists, Engineers and Scholar students in all
area of Library Science, Computer Science, Information Technology, Engineering, Management,
Engineering and provides an forum for the dissemination of original research results, new ideas and
practical development experiences which concentrate on both theory and practices through web
conferencing. Professionals and experts from all India have been participated in National Conference
on Library Information Science & Information Technology for Education (NCITE’15). Besides at the
end of the conference Research Awards announced in three categories namely:
1. Manohar Research Award.
2. Mitra Best Research Paper Award.
3. Kailash Best Research and Knowledge Sharing Award.
Transforming organizations into proactive entities reduces costs eliminates duplication and non-valueadded processes, which is key to improving the bottom line and improving product and/or service
delivery at the same time.
For efforts like these to succeed, Institutions need increasingly realistic and secure environments that
they themselves manage. With emergence of virtual world, marketers will need to figure out how
users can interact with brands in these compelling environments. Interestingly, virtual worlds’ greatest
potential for business, may be not as an entertainment medium but as the next-generation means of
communicating and collaborating when people can’t be physically in the same place.
The objective of this National Conference on Library Information Science & Information
Technology for Education (NCITE'15) is to provide a platform for academicians and practitioners
who are involved in research in the field of Library Science, Computer Science, Information
Technology, Engineering, Management and Librarians have been contributed research papers for
Education. The Conference provides a leading forum for sharing the original research contributions
and practical development experiences among researchers and application developers understanding
on the role of ICT, Management Science and LIS Professionals in Knowledge Innovation and
Knowledge Management. Debate and develop strategies to manage information systems and libraries
in web environment. Identify and share ‘Best Practices’ developed and adopted by various
information systems and libraries, and Increase the expertise and provide the best possible platform
by educating students and attracting new researchers.
On behalf of Modern Rohini Education Society (Regd.) in general and on our personal behalf, we
would like to acknowledge the contributions from various authors. We are thankful to our Hon’ble
President Dr. (Mrs.) Archana Bansal for motivating us for various academic endeavours. We are also
thankful to Mr. Anil Kumar Jharotia, Mr. Rahul Mittal for their support and Thanks to Mr. Vaibhav
Bansal for technology support in making the NCITE’15 a successful conference, People across most
of the states participated; and we are able to published 87 papers successfully.
We also thank our publisher (www.rtmonline.in) for bringing the online version of NCITE’15
Proceeding and Proceeding in form of a Book in such a fine form.
27th August 2015
Editorial Committee
Contents
S. No.
Paper Name
Pg. No.
1
Libraries Services, Users Requirements and Social Media: Building Relationships
via Social Networks
Ruju Gadad, Rushanasab R. Gurikar
1
2
A Bibliometric Study on Research Trends in the Journal of Scientific and Industrial
Research
Dr. Anand Bandi, Amrit Kaur
6
3
Uses of Electronic Information Resources by Faculty Members in MIT College
Library, Moradabad: A Survey
Ravindra Mohan, Amit Gupta
14
4
RFID Technology for Identification, Security And Document Handling in Library
Satish Kumar, Anil Kumar Mishra
18
5
Core and Behavioural Competencies for Library Professionals in Panjab University
Chandigarh: A Survey
Dr. Rupak Chakravarty, Jyoti Sharma
22
6
Use of Digital Library Software to Develop Institutional Repository in IITS
Libraries: An Analysis
Dr. Manoj Kumar Verma
27
7
Greenstone: Open Source Software for Digital Library Development
Anil Kumar Jharotia, Shikha Verma, Jyoti
32
8
Right of Entry in Electronic Resources: Flows and GRIT in Institutional Libraries
K.Nazeer Badhusha, R. Natarajan
39
9
Collection and Preservation of Newspapers: A Case Study
Dr. Jawahar Lal
44
10
The Role of Computer and Internet in Education
Rahul Mittal, Vipul Partap
52
11
Mobile Technology and Applications for Libraries
Rajeev Kumar
61
12
Institutional Repositories and Digital Preservation in Libraries
Parvathamma K S
68
13
The Changing Nature of the Public Libraries with Expanding Learning Frontiers
with E- Learning
Dr. D. K. Shrivastava
72
14
Use of Social Networking Sites in Library and Information Centres
Aslam Ansari, Mehfoozul Hasan
84
15
Usage of E-Resources in Engineering Colleges of Greater Noida, G. B. Nagar, Uttar
Pradesh: A Comparative Study
Deepmala, Ashok Kumar Upadhyay
90
16
The Declining Traditional Print Books Reading Behaviour of the Public Libraries
Readers with Switch to Jump with ibooks And ebooks Reading: User Experience
Dr. D. K. Shrivastava, Shashi Jain, Pritima Vyas, Sunita Kumari, Manisha Mudagal,
Yogendra Singh Tanwar
97
17
Knowledge Management in KendriyaVidyalaya Libraries
Parna Ghosh
111
18
Social Networking and Library Consortia
Pratibha Gautam
118
19
Present Status of Convergence Web 2.0 Technology in Technical Libraries Web
Page: A Study of IIT Libraries in India
Sur Chandra Singha, Sumit Paul, Pradip Kumar Singha
125
20
Big Data: Introduction to Applications in Libraries
Purnima Joshi
131
21
Plagiarism and Research Misconduct: A Study
Sanjay Kumar Jha, Pratibha Pritam
135
22
DSPACE: A Dais For Digital Resources
Sudha Kaushik, Dr. Somvir
141
23
Analyzing of Cluster, Grid & Cloud Computing
Shweta Agrawal, Dr. P. C. Agrawal
147
24
Information Literacy in India: Enhancing Services to the Research Community in
the Digital Environment
Rajeev Mishra, Dr. Ashok Kumar Upadhyay
156
25
Information Literacy Knowledge Management
Bhupender Kumar, Anil Kumar Singh
161
26
Accessing Knowledge through the Attributes and Popularity of Search Engines
Uma Pandey, Dr. (Ms.) Shiva Kanaujia Sukula
166
27
Reinventing library as Green Library: Beginning of Great Transformation
Dr. (Mrs) KusumLata Malik
177
28
Cloud Computing and its Applicationa in Library Services
Rajpal Singh Rajpurohit
184
29
Role of E- Resource Management in Academic Libraries
Dr. Pankaj Kumar
189
30
Total Quality Management is not A Quick Fix for Libraries
Dr. Mange Ram
193
31
Digitization process in Library and Information Center: Problematic Approach
Kasifa Khatoon, Aslam Ansari
198
32
Library Reach to User through Social Media: Prospects and Problems a Practical
Approach to LPU
Jitu Mani Das
203
33
RFID Technology: A Gatekeeper to Library Security
Dr. Raj Bala Gaur
209
34
Cloud Computing: An Innovative Tool for Library Services
Rekhraj Sahu
213
35
Mobile Technology: Use in Library
Sonali Malhotra, Harpreet Kaur
218
36
An Perspective on ICT Implementation at Karnataka Judical System
Meera B.J
221
37
A Study on Determining the User Awareness to Evaluate the Effectiveness of Digital
Reference Services Provided by Academic Library of Engineering and Technology
Institutions in Tamilnadu
K. Chandraprabha, Dr.K.Chinnasamy, Dr.S.Janakiraman
227
38
The Impact of Information Communication Technology Act in Communication
Studies
Richa Chandi, Rana khan
235
39
Use of SNS by Library Professionals and Users: An Overview
Atika Khursheed, Aslam Ansari
238
40
Role of Mobile Communication in Rural Development: A Study of Karala Village
Nidhi Chaudhry, Dr. Nisha Singh
244
41
A Comparative Study on Total Quality Management of Library Services in Tamil
Nadu University Libraries
Dr. I. Ravi Kumar Kennedy
250
42
A Paradigm of Knowledge Management in Academic Library: Some Innovative
Experiments
R. R. Kuralkar
255
43
Academic Libraries with RFID
Anil K. Mishra, Jyoti Verma
259
44
Emotional Intelligence of Teachers in Work Performance
S.Jerslin, Dr .N. Devaki
262
45
Library Automation: What, Why and How?
Pankaj K. Bhardwaj
266
46
A Literature Survey of Signature Recognition and Verification System
Vaibhav Bansal
271
47
Developing of Digital Library through GSDL: An Experience at GITAM
Pushplata
276
48
Review on WSN Applications with some Issues
Prachi Arora
282
49
Potentiality of Cloud Computing in Library Storage, Access and Retrieval: A
Critical Analysis
Medha Ray, Souvik Koner
287
50
Use of Library Management Software by Selected University Libraries of Delhi: A
Study
Jitendra Kumar, Tanuja Kumari
296
51
Cloud Computing in College Libraries
Ram Nath (Maurya), Jai Prakash
303
52
Web Based Customized Information System: A Model Concept
Shyamanta Boro
307
53
PKP and its Open Journal System: An Initiative in Open Access Scholarly
Environment
Satish Kumar, Anil K. Mishra
312
54
Surfacing a New Platform in MLIS: A Pathway of Gen-Next Library System
Dr. Dharmendra Harit, Nasim Ali, Lalita Rani
318
55
Models of Information Seeking Behavior
Sarita Mohan, Dr. C. K. Sharma
323
56
Elements of Collection Development: A Perspective
Madhuri Gangal, Dr. S. P. Singh
327
57
Exchange of Meta data: A Concept towards Future
Bikramaditya Barman
331
58
Total Quality Management in Academic Library
Kanupriya, Khurshid Anwar, Dalip Singh
338
59
Radio Frequency Identification (RFID)
Shyam Bihari Gupta, Gunjan Gupta
343
60
Information Technology for Education Role in Modern Educational Practices
Suman Singh
347
61
E-Resource Management in Digital Library
Shalini
354
62
Bibliographic Information Service using Zotero
Dr. Jyoti Bhabal
357
63
Influence of Internet and Digital Media on Library Service
Jyoti Verma
362
64
Mobile Phone based Library Services
Dr. Anil Kumar Dhiman
365
65
Title: Challenges in setting up the Web based Online Public Access Catalogue (Web
OPAC) at Library cum Documentation Centre of ICHR: A Case Study
Ramesh Yernagula
370
66
Application of Radio Frequency Identification Technology (RFID) in LIS Media
Centre
Vijay Singh, Vijay Singh Chauhan, Devendra Mani Pandey
374
67
Library Security Rethinking: A Study
Dr .M. Ananda Murugan
381
68
Open Access Journals in the field of Library Science and Information Technology :
An Analysis
Dr. Anil Agrawal
385
69
Knowledge Management in Academic Libraries
Dr. Rakhi Tyagi
390
70
Cloud Computing and Libraries
Anshu Bansal
396
71
Integrating ICT in Education is a Catalyst to Promote Universal Design for Learning
for Students with Special Needs: Need, Challenges, and Possible
Ratan Sarkar
402
72
Digitisation of Library Material in Academic Library: Challenges and Issues
Sushma R. Mawande
413
73
E-Learning Initiatives in India: An Overview
Urmila Devi
418
74
Effective Teaching using Blended Learning Models
Dr. N. Devaki, M. Deivam
422
75
LIS Services in E & M Learning Technology
Dr. Durga Prasad, Deepak Shukla
427
76
Relevance of Ict in Teacher Education
R. Kington, Dr. N.Devaki
435
77
Awareness of Open Source Software for the Library Professionals
N. Chidambaranathan, G. Elanjiyam
441
78
Management of Institutional Repositories in Academic Libraries by using D-SPACE
Tribeni Devi, Lavita Deka
448
79
Awareness of ‘Big Data’ Among the Library Professionals in the Research Libraries
of Odisha
Dr. Sanghamitra Dalbehera
451
80
Mobile Applications and Information Resources for Library Users
Jatinder Kumar, Dr. Suman Sumi
456
81
Gender Equation: Role of ICT’s in Women Empowerment
Dr. Anjani Kumar Jha
462
82
Role of Information Literacy in Curriculum
Mohd. Hanif
468
83
Open Access Repositories (OARS) in India: An Evaluative Study
Dr. Rajesh Kumar Singh
472
84
Digital Library and its Advantages
S. D. Singh, Shrikrishan Thapliyal
478
85
Powering Education with Mobile Technology through M- Learning
Vijay Laxmi, Anil K Jharotia
482
86
Web 2.0 Applications in Library Services: Special Focus on Library and Information
Science Blogs
B. VijayLakshmi, Dr. A. Thirumagal
487
87
Application and Uses of Information Communication Technology (ICT) in Academic
Library, SHIATS, Allahabad: A Study
Monisha Grey
492
LIBRARIES SERVICES, USERS REQUIREMENTS AND
SOCIAL MEDIA: BUILDING RELATIONSHIPS VIA SOCIAL
NETWORKS
Ruju Gadad | Research Scholar | DLIS | Rani Channamma University | Vidya Sangam- Belagavi |
Email: rigadad@gmail.com
Rushanasab R. Gurikar | Assistant Professor (ad hoc) | DLIS | Guru Ghasidas Vishwavidyalay,
Bilaspur | Email: rrgurikar@gmail.com
Abstract: In this paper is intended to describe the possible implication of social networking
technologies in the field of library and information services. Social Networking sites are one of
the new technologies offering libraries the opportunity to reach out to its patrons. An attempt
made in this paper how libraries and information centers can disseminate the information to its
user community and what are the possibilities roles these social networks will play. The social
media hype has gradually crept into the library profession with social sites such as Facebook,
Twitter, LinkedIn, Google+, MySpace, and YouTube etc.
Keywords: Social Networking Sites, Library Service, Service Delivery, Social Library, Library 2.0, ICT, Web
2.0 Tools
INTRODUCTION
Social networks are playing vital role in connecting with people. These are integral part of the life. Social
networks brought tremendous changes in exchange of information, ideas thoughts, messages, news and alike.
With the help of these networks anyone knows how to interact with the others who are scattered across world.
One can share their opinions, ideas and feelings etc., due to the convergence of ICT with library and information
professionals should take implement of these social networks to make library’s routine activities as much as
easy. Professionals can make library services as an attractive in a social library context. Social networks are
obtainable help to the librarians as dissemination of the information. Users are moving outward from libraries to
get required information because of fast growth in information and communication technology. One who can
get an authentic, reliable and update information on their fingertips. Thus users are allured from induce internet.
USE OF SOCIAL NETWORKS
Michael Haenlein defines social media as "a group of Internet-based applications that build on the ideological
and technological foundations of Web 2.0 and that allow the creation and exchange of user-generated content”.
Social network sites as web-based services that allow individuals to (1) construct a public or semi-public profile
within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view
and traverse their list of connections and those made by others within the system (Boyd, 2007).
Social networks sites are web enabled services that allow people to connect with others and they can share and
exchange the information, ideas, images and videos etc. A social network allows individual to join and create a
personal profile, then formally connect with other users of the systems as social friend. It can be expressed as
social connecting sites among the social user in web 2.0 domain. Social networking can be relevant to
information seeking and sharing on information retrieval perspective by providing speed and quick information
to the information community by connecting and collecting digital information required by the user. Social
networking sites like Facebook, LinkedIn represent a new and powerful service through web 2.0.
Some of the popular social networks as follows: -, Facebook, Myspace, LinkedIn, Hi5, twitter, Netlog, LIS
Link, Orkut and Myzamana etc.
ISBN 1-63102-455-8
1
Libraries Services, Users Requirements And Social Media: Building Relationships Via Social Networks
Fig-1: Social Networks Connections
POPULAR SOCIAL NETWORKS
The popularity of social networking sites on the Internet introduces the use of mediated-Communication into the
relationship development process. Facebook as the most visited site among the social networking sites. Most of
the people visiting social networking sites for Connect with friends, Chart with friends, Make new friends,
leisure and many other reasons. The Popularity of social networks is using widely which we can see from the
below table as fig-1 as:
Most Popular Social Networking Websites
Rank No
Social Networking sites
Estimated Unique Monthly
Visitors (as on 3/1/2013)
1
Facebook
750,000,000
2
Twitter
250,000,000
3
LinkedIn
110,000,000
4
Pinterest
85,500,000
5
MySpace
70,500,000
6
Google Plus+
65,000,000
7
DeviantArt
25,500,000
8
LiveJournal
20,500,000
9
Tagged
19,500,000
10
Orkut
17,500,000
Table-1: Popular of Social Networks
SOCIAL NETWORKS AND LIBRARY SERVICES
We are here in the paperless society, most of the people aware about information and communication
technology. The library and information centers also not far from this technology, library has been got fabulous
changes in its routine activities. Thus in the dissemination of information, librarians have using different library
softwares, network computers, mailing, fax, scanners etc. Such technologies are going to help the library
professionals in making non-users as users and users as regular users, through that professionals can provide
right information to the right person at a right time in a right manner.
The growing population of patrons and librarians that make use of social networking is an indication that it is an
ideal vehicle for marketing the services of libraries to patrons. The use of social networking tools enable
2
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
librarians to identify library patrons on the social cyberspace and pro-actively provide the type of information
that would normally result from reference service. Social networking tools are not only being used as a vehicle
for promoting services, programs and new resources but they are also used for reference service. (Steiner, 2009,
p. 4) Students are using tools like Ask a Librarian, Meebo and Twitter to ask questions in “real time”(Steiner,
2009, p. 5) Social networking presents some important opportunities to libraries which include marketing of
library services and reference services.
PRE-REQUISITES TO IMPLEMENT OF SOCIAL NETWORKS IN LIBRARY SERVICES
1.
2.
3.
4.
5.
6.
Librarian must be having hardware and software skills, which are necessary for work with social networks.
Need of internet facility
User must be able to create and maintain own profile in social network.
Both parties’ librarian and user should have account in same social network.
User must be able to check the notifications every day.
Digitized information is much needed.
USE OF SOCIAL NETWORKS IN LIBRARY
Now day’s almost educated people are aware about social networks and the students are very familiar with the
social networks. Like Facebook, Myzamana, Google+, Hi5 etc., in present time, such social networks providing
following facilities to the people almost free of the cost.
1. Library can Create Own profile:
This is first step and for most facility of the social networks, that is almost free of the cost. This profile is
going to help the library to introduce to across its user community. In the profile librarian can locate name,
address, contact number and present status etc., if required such kind of information they can change time to
time. This is going to help the librarian to inform new services in the library to its user community.
2. To identify its User Community:
It is one of the great opportunities to meet its users who are scattered across the world through social
networks. E.g. in Facebook there is an option to find new friends, such option gives information by simply
typing their name in user interface. At the same time which is going to help the librarian to know who are
our library users?
3. To make Profile Attractive:
Most of the social networks allow its users to make attractive profile. Such type of facility helps to others, to
know their area of the interest. E.g. if an user has interest in playing cricket means we can see the famous
cricket player photos in profile, if an user have love and affection with his family means the profile will
covers family photos. This is going to help the library professionals to know the area of interest of the
particular users and also helps to render the necessary information to users.
4. Live Chat with Users:
Social networks are facilitated users to share their feelings, information, and ideas in the form of graphics,
images and videos or else in text format. When the users are available online they can chat for the required
information. In library circumstance such facility is great help to inform update information to users.
5. To Reduce the Consuming Time:
Social networks are the helpful in speed posting. These of networks will help the professionals to send the
same information to all the user community by simply clicking on the post option. According to Dr.
S.R.Ranganathan, time is very important; librarian has to save the user time as much as possible. As
S.R.Ranganathan fourth law of library science recommend that “save the time of users”. In this regard social
networks defiantly help in reduce the consuming time as well.
6. Cost Effective:
ISBN 1-63102-455-8
3
Libraries Services, Users Requirements And Social Media: Building Relationships Via Social Networks
In this paperless society most of the people making use social networks because of most of the social
networks are available free of the cost. Thus in library framework which is going to help the librarians to
avoid unnecessary expenditures.
7. Data Security:
It is an appreciable facility providing by the social networks. If there is no security for user’s personal
information, it creates a immense predicament, and no one can show interest to create their personnel
profiles in the social networks. But today’s available networks are providing full of protection to its
customer’s profile.
ROLE OF SOCIAL NETWORKS IN LIBRARY
Library is store house of the information. In changing environment is obtaining new shape, because of
inspiration of the ICT. Now library has to adopt or implement these social networks which are going to help the
librarian to incarceration with users and make available the library services as much as attractive. It’s all
possible through only proper utilization of freely available social networks. The social networks can act as
mediator between the librarians and uses to get required information. Librarians can also provide library
services with the help of social networks these are as follows
Fig 2: Library Services through Social networks
4
1.
New Arrival Service:
Displaying newly arrived documents in library it is way to provide marketing to the library acquires.
Librarian can make available this kind of library through social networks, it help the users to get
information about new documents from any corner of the world. E.g. scan the cover page and content
page of the document and upload on the face book or other networks or share available e-page (link) of
the document in internet
2.
Reference Service:
The use of social networking tools enable librarians to identify library patrons on the social cyberspace
and pro-actively provide the type of information that would normally result from reference service.
Ezeani (2010) observed that for librarians to effectively deploy these social media for reference
purposes they must be versatile and knowledgeable in different subject fields to be able to match
patrons with desired information.
3.
Recall:
Recall is kind of library activity to reminder users about returning the library documents. This is very
easy to send message by using social networks through posting the message on user profile. If librarian
sent the message well in advance users will be aware in returning issued books to the library.
4.
Extension Activities:
Through social networks this is possible to display the library products by scanning cover page of the
document and uploading to the profile. Library week celebration, on the occasion of great personality’s
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
birthday, librarian can post the related information. These kinds of activities going to help the users to
know about the different sorts of library collection, as well as to librarian also can make marketing to
the library products. E.g. on the eve of Mahatma Gandhi’s birth day, youth day, republic day,
independence day, etc.
5.
Referral Service:
Referral service is nothing but get guidance from library. These service offers enquire about materials
which are not available in their library. The referral service provides only source to information and no
more. Librarian can offer such kind of service to users by providing hyperlinks on social networks.
6.
Current Awareness Service:
These days’ library and information centers are acquiring e resource in its collection including
databases, journals, magazine and newspapers. These e resources are accessible certain IP address only,
if the user is using the social network sites under same IP, professionals can share IP address link of enewspapers, e-magazines and databases e-journal to know recent development and trends in different
fields to its user.
CONCLUSION
The tendency of social networking stipulates a new set of applications, processes, and potentially, library to
enable social media as an abuser service. New modules and mechanisms for tracking what is trend on social
networks must be put in place in order for libraries to effectively use social media for user service. The
contemporary technologies used in contact centers are adequate for delivering healthier client service and
improved user fulfillment. However, libraries need to continuously evolve their policies to keep up with patron
expectations. Encompass a social media user approach will no longer be a choice in the future. There are
millions of user interactions taking place every day on social media sites such as Facebook, Twitter, Google+,
and YouTube, as well as a vast number of user support forums and online communities like LIS links, LIS
Xpress, Library Soup etc. This is projected to grow exponentially over in the prospect years as the usage and
number of active users of social media sites and forums continue to cultivate.
This technology provides the enabling platform that goes beyond the traditional service delivery by allowing
patrons to interact in real time with librarians in the comfort of their hall of residence or homes. Librarians must
acquire the necessary skills in information technology to meet the challenging demands of social networking
sites.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
Kaplan, Andreas M., Haenlein Michael, (2010), Users of the world, unite! The challenges and opportunities of social
media, Business Horizons, Vol. 53, Issue 1 pp. 61
Most Popular Social Networking Websites: Available at: http://www.ebizmba.com/articles/social-networkingwebsites [Accessed on 03-03-2013]
Boyd, d. m., & Ellison, N. B. Social network sites: Definition, history, and scholarship. Journal of ComputerMediated Communication, 2007, 13 (1), 1. http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html. [Accessed on 0303-2013]
Ayiah, Efua Mansa and Kumah, Cynthia Henewaa, (2011), Social Networking: a tool to use for effective service
delivery to clients by African Libraries, IFLA Meeting 2011 pp. 1-14
Mishra C. S. (2008) Social Networking Technologies (SITs) in Digital Environment: Its Possible Implications
on Libraries. pp. 1-19 Available at: http://eprints.rclis.org/16844/1/Social%20networking%20in%20Library.pdf
[Accessed on 03-03-2013]
Ezeani, Chinwe Nwogo and Igwesi, Uzoamaka, (2012), "Using Social Media for Dynamic Library Service Delivery:
The Nigeria Experience" Library Philosophy and Practice (e-journal). Paper 814.
Steiner, H. (2009). Reference utility of social networking sites: Options and functionality. Library High Tech
News, 26 (5/6), 4-6. Retrieved from: www.emeraldinsight.com/10.1108/07419050910985246. [Accessed on 03-032013]
Ezeani, C.N. (2010). Network literacy skills of academic librarians for effective services delivery: The case of the
University of Nigeria, Library Systems. In the Proceedings of Second Professional Summit on Information Science
and Technology (PSIST). Nsukka: Nnamdi Azikiwe Library U.N.N 56-66.
ISBN 1-63102-455-8
5
A BIBLIOMETRIC STUDY ON RESEARCH TRENDS IN THE
JOURNAL OF SCIENTIFIC AND INDUSTRIAL RESEARCH
Dr. Anand Bandi |Head Resource Centre | NIFT | NIFT Capmus | Plot No. 15, Sector 4, Kharghar |
Navi Mumbai-410210 | anb321in@yahoo.co.in
Mrs. Amrit Kaur | Assistant Librarian | NIFT | National Resource Centre | Head Office, Hauz Khas,
Delhi| kauramrit24@yahoo.com
Abstract: The paper deals with the analysis of the 542 contributions of the journal entitled 'Journal of
Intellectual Property Right' published during 2011-2015. A total number of 542 articles crediting 12,687
journal citations during the period2011 to 2015. Examines year wise, state wise distribution of contributions,
Authorship pattern, citation analysis, length of the contributions etc. The study shows that most of the articles
are published by author and state wise distribution indicates that, most of the articles are contributed from New
Delhi. Citations include finding out average number in contributions of this journal.
Keywords: Intellectual Property Right, Citation Analysis, Bibliometric Analysis.
INTRODUCTION
The Journal of Scientific and Industrial Research is published bi-monthly by the esteemed National Institute of
Science Communication and Information Resources (NISCAIR), New Delhi, India. JISR is indexed in Social
Science Citation Index, Social SciSearch, and Journal Citation Reports. This journal has endeavored to enrich
the contents of each issue through balanced overseas contributions. Therefore, a bibliometric study of this
journal is of vital significance. It primarily intends to enhance the communication between policy makers,
organizational agents, academics, and managers on the critical understanding and research on Scientific and
Industrial Research.
The word ‘Bibliometrics’ is derived from Latin word ‘biblio’ and the Greek word ‘metrics’ etymologically it
means the application of mathematics to the study of bibliography.
Derek de Solla Price (1970) argued that scholars in the hard sciences are likely to give citations in their papers
and these citations are more recently published works. The study concluded indicating that the time lag between
publication and citation was shorter in the hard sciences than it is in other disciplines. He further stated that
citations represent a measure of utility rather than of quality. The concept of citation analysis was enunciated by
Eugene Garfield (1972). He is also known as father of citation analysis studies, who has conducted enormous
studies and published views based on analytical studies and out of his hundreds of studies which covers almost
every branch of the natural and social science, indicated the better use of citation studies.
Pritchard (1969), first introduced the term “Bibliometrics" in 1969 to mean ‘the application of mathematics and
statistical methods to books and other media of communications’.
Bibliometrics is a technique for identifying the research trends in a different area, obsolescence, core
periodicals, studying the productivity, characteristics of subject literature including structure of knowledge,
historical and sociological aspect of science and helpful in formation of need based collection development
policy, weeding and stacking policy and many others. The bibliometric laws such as Lotka’s Law (Lotka 1926),
Bradford Law (Bradford 1934), and Price Law (Price 1963) are some of the prominent measure which have
been used by different library and information scientists to test their implication on different literature as well as
subject. According to Sengupta et al, the bibliometric is the organization of classification and quantitative
evaluation of publication patterns of all macro and micro communications along with their authorship by
mathematical and statistical applications and calculations’.
The present study is related to analysis of contributions of “Journal of Scientific and Industrial Research” from
2011-2015.
6
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
1.
OBJECTIVES
To examine authorship pattern, year-wise and state-wise contributions, distribution of contributions of
the journal.
2.
To reveal the distribution of contributing authors by country.
3.
To examine the average length of articles.
4.
To examine average number of citations per article in the journal.
PURPOSE OF THE STUDY:
The main purposes of the present study are:
● To create awareness about the pattern of research in the field of law in India.
● To know the research output in the field of law in India.
METHODOLOGY:
For the purpose of the study, the Journal of Scientific and Industrial Research (JISR) has been selected as the
source material and information about each contribution such as author, author’s affiliation, length of
contributions, citations, etc. was scanned, checked and examined carefully. The study analyses the scholarly
communication of Journal of Intellectual Property Rights from 2011 to 2015. A total Number of 12,687 journal
citations form 542 articles published during the period were collected from the archives of the open access
sources journal. The data thus collected were fed into MS Excel worksheet to process the gathered data for
subsequent analysis.
LITERATURE REVIEW
Bibliometric analysis involves qualitative studies of research activities using statistical methods for measuring
and analyzing the subject. In fact, the researchers are used various bibliometric methods in various field to
explore the impact of their field, the impact of a set of researchers or the impact of a particular research paper.
Mote and Deshmuck (1996) conducted a bibliometric study on Annual of Library Science and Documentation
and Found that journals are the most cited forms of communication amongst the library and information
scientists.
Kamal lochen Jena (2006) conducted a study on citation analysis of 507 references cited in the articles
published in the ‘Indian Journal of Fiber & textile Research’ the year (1996-2004). The articles have an average
length of 6.45 pages, Journal constitutes 73.92%, books constitute 11.60% only and both constitute 85.53% of
total citations. Proceeding constitutes 5.14%, patent 3.99%, standards 1.61%, theses 1.54%, reports and media
both 0.64% and others have 0.90%.
Hazarika, Goswami and Das (2003) made a bibliometric analysis of the 1402 research papers published in ‘The
Indian Forester’ from 1991 to 2000. The state-wise distribution indicated that the Uttar Pradesh contributed
maximum number of papers with 35.16%. Nagaland and Sikkim counted the lowest number of contribution with
0.14%. Multiple authorship papers were dominant in the field of Indian Forestry with 64.55%, while single
authored papers were 35.45%.
Bharvi et al. (2007) analyzed 1,317 papers published in the first fifty volumes from 1978 to 2001 of the
international journal Scientometrics and found that the US share of the papers is constantly on the decline while
that of the Netherlands, India, France and Japan is on the rise and that the scientometric output is dominated by
the single-authored papers.
Hussian and Fatima (2011) evaluated the characteristics of the Chinese Librarianship: an International
Electronics Journal form 2006 to 2010 through a bibliometric analysis.
ISBN 1-63102-455-8
7
A Bibliometric Study On Research Trends In The Journal Of Scientific And Industrial Research
Kunwar Singh et al (2011) made a bibliometric study of research trends in the field of research papers patterns
in DESIDOC Bulletin of Information Technology by library and information professionals during the period
1992-2002. The study revealed that 60 issues of the journal published 145 articles. Out of the 145 publications,
97 (66.90percent) articles were published by single author. The study also identified that 128 articles were from
(88.28percent) India and the rest 17 (11.72percent) were contributed from rest of the countries.
Neeraj Verma et al. (2007), of ‘Annuals of Library and Information Studies’ concluded that majority of citations
i.e. 64% were single authored during 1999-2005. They examined year wise, institution wise, state wise
distribution of contributions, authorship pattern, citation analysis, length of contributions etc. The study revealed
that the journals were the most cited publication amongst the library and information scientists. They found out
that the source journal was the most cited journal.
Surendra Kumar and Kumar (2008) analyzed 8093 citations given in the Journal of oil seeds research (JOR)
published during 1993 to 2004. Out of 8093 citations, 5642 were given in main articles and 2551 in short
communications of JOR. They covered the analysis of citation pattern of along with calculation of collaboration
coefficient. They concluded that 20 core periodicals cover more than 50% references and also indicated that
collaborative research prevailed in oil seed research.
Sudhier (2010) reviewed the application of Bradford’s Law of scattering. In addition to the theoretical aspects of
the Law, the review covered papers dealing with the application of the law in the various subject fields. A study
on five year data of journals (2004-2008) cited by the Physicists at the Indian institute of Science.
Singh and Dominic (2006) carried out an analytical study of citation pattern of ‘Allopathy Journal’. A team
research had been quite substantial in the field as multiple authors contributed more than 60% of the total
citations. The study also revealed that nearly 90% of total citations were from journals, followed by theses with
6.11% and conference papers with 3.79%.
Swain (2011) conducted a bibliometircs study of Library Philosophy and practice from 2004 to 2009 and
revealed the partial compliance of authorship productivity pattern of LPP with Lotka’s Law at a slightly greater
n Value
Rana (2004) carried out a bibliometric study of mammal research in India. This study concluded that the
contribution of highly productive authors was more than 20% of the total literature in Indian mammal research.
Further, the overall length of period of contribution of highly productive authors was approximately inversely
proportionate to the productivity of contribution.
Zainab et al. (2009), in their bibliometric study of Malaysian Journal of Computer Science, reported their
findings regarding the article productivity, authorship collaboration, and journal impact factor of MJCS.
ANALYSIS AND FINDINGS
Yearwise distribution of articles
Year
Vol.
No. of
Issues
No. of
Contribution
% Age
2011
70
1 - 12
152
28.0442804
2012
71
1 - 12
111
20.4797048
2013
72
1 - 12
105
19.37269373
2014
73
1 - 12
126
23.24723247
2015
74
1 - 12
48
8.856088561
Total
542
100
Table-1 Yearwise distribution of articles
8
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
A total of 542 conrtibutions have been published in five years (2011-2015), which consists of full, review
artciles and short communications.
Table 1 give details regarding the distribution of 542 contributions published from 2011-2015. Maximum
number of artciles i.e., 152 (28.05%) was published in 2011 and minimum number of contributions i.e. 48
(8.85%) in 2015.
Authorship Pattern
No. of authors
One
Two
Three
Four
Five
More than five
Total
Total no. of
Percent
contributions
14
2.58302583
175
32.2878288
134
24.72324723
125
23.06273063
49
9.040590406
45
8.302583026
542
100
Table-2 Authorship Pattern
Table 2 gives the details about the authorship pattern. The distribution of 542 contributions published from
2011-2015. The 14 (2.58%) have been contributed by single author, 175 (32.28%) contributions by two authors
and 134 (24.72%) contributions by three authors and 125 (23.06%) contributions by four authors, and 49
(9.04%) contributions by five authors and 45 (8.30%) contributions by more than five authors.
Authorship pattern of contributions (Volume wise)
Table-3 Authorship pattern of contributions (Volume wise)
Table 3 gives authorship pattern of contributions volumewise. It indicates that out of the 14 contributions of
single author, volume 70 and 73 have the highest number i.e. 05 (35.72%) and Vol. 71 and 72 has the lowest
number i.e., 01 (7.14%) contributions. Out of the 175 conrtibutions by two authors, Vol. 73 has the highest i.e.,
50 (28.57%) and Vol. 74 has the lowest number i.e, 13 (7.42%) conrtibutions. Out of 134 contributions by three
authors, Vol. 70 has the highest i.e., 39 (29.10%) and Vol. 74 has the lowest number i.e. 15 (11.19%)
conrtibutions. Out of 125 contributions by four authors, Vol. 71 has the highest i.e., 34 (27.2%) and Vol. 74 has
the lowest number i.e. 9 (7.2%) conrtibutions. Out of 49 conrtibutions by five authors, Vol. 70 has the highest
i.e., 17 (34.69%) and Vol. 74 has the lowest number i.e. 3 (6.2%) contributions. Out of 45 conrtibutions by more
ISBN 1-63102-455-8
9
A Bibliometric Study On Research Trends In The Journal Of Scientific And Industrial Research
than five authors, Vol. 70 has the highest i.e., 18 (40%) and Vol. 72 has the lowest number i.e. 2 (4.44%)
contributions.
Statewise distribution of contributions
10
Contributed by
No. of
contributions
Percentage
Agartala
2
0.36900369
Aligarh
3
0.553505535
Allahabad
4
0.73800738
Andhra Pradesh
3
0.553505535
Assam
3
0.553505535
Bangalore
10
1.84501845
Bangladesh
1
0.184501845
Bhopal
2
0.36900369
Bihar
1
0.184501845
Bulandshaher
1
0.184501845
Chandigarh
7
1.291512915
Chennai
35
6.457564576
Coimbatore
26
4.79704797
Darjeeling
2
0.36900369
Dehradun
4
0.73800738
Faridabad
1
0.184501845
Gandhinagar
5
0.922509225
Goa
3
0.553505535
Gujarat
3
0.553505535
Gurgaon
2
0.36900369
Guwahati
3
0.553505535
Gwalior
7
1.291512915
Haryana
1
0.184501845
Hisar
2
0.36900369
Hyderabad
9
1.660516605
Jaipur
3
0.553505535
Jalandhar
1
0.184501845
Jodhpur
1
0.184501845
Kanchipuram
1
0.184501845
Karnal
1
0.184501845
Karnataka
3
0.553505535
Kerala
17
3.136531365
Kharagpur
1
0.184501845
Kolkata
2
0.36900369
Krishi Nagar
1
0.184501845
Kurukshetra
1
0.184501845
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Lucknow
4
0.73800738
Ludhiana
1
0.184501845
Madhya Pradesh
2
0.36900369
Madurai
10
1.84501845
Manipal
1
0.184501845
Meerut
3
0.553505535
Mohanpur
1
0.184501845
Mumbai
3
0.553505535
Mysore
7
1.291512915
Nagpur
2
0.36900369
Navi Mumbai
2
0.36900369
New Delhi
43
7.933579336
Noida
2
0.36900369
Odisha
4
0.73800738
Pakistan
5
0.922509225
Pantnagar
2
0.36900369
Patiala
2
0.36900369
Pune
10
1.84501845
Punjab
2
0.36900369
Rajasthan
3
0.553505535
Rajkot
3
0.553505535
Ranchi
2
0.36900369
Roorkee
2
0.36900369
Sikkim
3
0.553505535
Solan
5
0.922509225
Surat
4
0.73800738
Tamil nadu
47
8.671586716
Thanjavur
1
0.184501845
Thirchengodu
2
0.36900369
Tripura
7
1.291512915
Triuchhirappali
2
0.36900369
Trivandrum
6
1.10701107
Udaipur
2
0.36900369
Uttra Pradesh
2
0.36900369
Uttrakhand
1
0.184501845
Varanasi
4
0.73800738
Vidyanagar
1
0.184501845
Visakhapatnam
7
1.291512915
Other states
160
29.5202952
542
Table-4 Statewise distribution of contributions
ISBN 1-63102-455-8
11
A Bibliometric Study On Research Trends In The Journal Of Scientific And Industrial Research
Figure 4 shows that the statewise distribution of contributed in the five volumes of the journal. Out of 542
contributions, the highest number i.e., 160 (29.52%) has been contributions by authors in other states and lowest
number i.e. 1 (0.18%) has been contributed by authors from Bangladesh, Bihar, Bulandasher, Faridabad,
Haryana, Jalandhar, Jodhpur, Kanchipuram, Karnal, Kharagpur, Krishi Nagar, Kurukshetra, Ludihana, Manipal,
Mohanpur, Mohanpur, Thanjavur, Uttrakhand and Vidyanagar. Out 542 contributions only 95 contributions are
from foreign countries.
Length Of Articles:
No. of Pages
2011
2012
2013
2014
2015
Total
% age
1-5.
58
39
42
71
31
241
44.4649446
6-10.
89
67
60
54
16
286
52.7675277
11-15.
5
4
2
1
1
13
2.39852399
16-20.
0
1
1
0
0
2
0.36900369
21-25.
0
0
0
0
0
0
0
152
111
105
126
48
542
100
Table-5 Length of articles
Table 5 indicates the details about the page length contributions. Out of 542 contributions, 241 (44.46%) have
pages length of 1-5 page, 286 (52.76%) contributions have length of 6-10 pages, 13 (2.39%) contributions have
length of 11-15 pages, 2 (0.36%) contributions have length of 16-20 pages.
Study Of Citation:
No.
of
Citations
1-10
11-20
21-30
31-40
41-50
51-60
61-70
71-80
81-90
91-100
100-110
More
than 110
Total
2011
2012
2013
2014
2015
Total
% age
13
61
40
19
9
0
2
2
1
1
2
10
43
34
13
5
3
1
0
0
1
1
6
42
38
14
4
1
0
0
0
0
0
15
63
40
6
1
0
0
0
1
0
0
9
23
10
4
1
1
0
0
0
0
0
53
232
162
56
20
5
3
2
2
2
3
9.778597786
42.80442804
29.88929889
10.33210332
3.6900369
0.922509225
0.553505535
0.36900369
0.36900369
0.36900369
0.553505535
2
0
0
0
0
2
0.36900369
48
542
100
152
111
105
126
Table-6 Study of Citations
Table 6 reveals the details of number of citations appearing at the end of contributions during 2011-2015. Out of
542 contributions published. The highest number of contributions with citation between 11-20 is 232 (42.80%)
and lowest number of contributions with citation between 71-80, 81-90, 91-100 and more than 110 are 2
(0.36%).
12
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Distributions Of Citation:
Vol.
70
71
72
73
74
5 Vol.
Year
2011
2012
2013
2014
2015
5 Years
Issue No.
No. Citations
1-12
4114
1-12
2828
1-12
2420
1-12
2425
1-12
900
30 Issues
12687
Table-7 Distributions of citations
%age
32.42689
22.29053
19.07464
19.11405
7.093876
100
Tables 7 indicate that the 65 volumes have 12687 citations appended to the 542 articles. Out of 12687 citations,
vol. 70 has the highest number i.e., 4114 (32.42%) and Vol. 74 has the lowest number i.e. 900 (7.09%).
CONCLUSION
Journal of Scientific and Industrial Research has successfully completed 20 year of its publication. Analysis of
contributions of 5 volumes of the journal shows that it covers contributions related to nearly all aspects of
Scientific and Industrial Research. The journal is highly cited title among Indian researchers in the area of
Scientific and Industrial Research. It has an world-wide recognition and is steadily growing to be a very
promosing journal in the area of intellectual property rights by attracting scholoary articles from around the
world.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
Pritchard A, Statistical bibliography or bibliometrics, journal of Documentations, 25 (4) (1969) 348-349.
Lotka, A.J. “The frequency distribution of scientific productivity”, Journal of the Washington Academy of
Sciences, Vol.16, p. 323, 1926.
Bradford, S.C. “Sources of Information on specific subjects”, Engineering, Vol.137, pp.85-86, 1934.
Sengupta I. N, Ghosh B.N & sengupta K. N, Role of bibliometric in journal selection and management, IASLIC
Bulletin, 25 (2) (1980) 87-92.
Mote, M.V., & Deshmuck, P.P (1996). Ciattion analysis of Annals of Library Science and Documentation. Annal
of Library Science and Documentation, 43(1), 11-25
JENA (K.L). A bibliometric analysis of the journal ‘Indian journal of fiber and Textile Research, 1996-2004’.
Annual of Library and Information studies Vol. 53, March 2006, pp. 22-30.
Hazarika, Tilak, Goswami, Kusuma and Das, Pritimoni (1995). Bibliometric analysis of Indian Forester: 19912000, IASLIC Bulletins, 48(4), 213-223.
Bharvi, D.; Garg, K.C;. & Bali, A. (2007). Scientometrics of the international journal Scientometrics.
Scientometrics, 36(1), 81-93.
Hussian, A; & Fatima, N. (2011). A Bibliometric analysis of the “Chinese Librarianship: an International
Electronic Journal (2006-2010)’. Chinese Librarianship: an International Electronic Journal, 31. Retrieved 15
September 2011.
Kunwar P Singh et al (2011), “DESIDOC bulletin of information Technology: a bibliometric study”. SRELS
Journal of Information Management: 48(1) 57-68.
Neeraj Verma et al. (2007), “Analysis of Contributions in Annals of Library and Information Studies”, Annals of
Library and Information studies, 54: 106-111
Surendra Kumar and Kumar, S. (2008), Citation analysis of journal oil seeds research 1993-2004, Annals of
Library and Information studies 55: 35-44.
Sudhier, K.G. (2010), “Application of Bradford’s Law of Scattering to the Physical Literature: A study of Doctoral
Theses Citations at the Indian Institute of Science”, DESIDOC Journal of Library & Information Technology:
30(2) 3-14.
Singh (N) and Dominic (J). An analysis of citation pattern of Allopathy journal: a case study. IASLIC Bulletin;
51(1); 2006; p37-41.
Swain (2011). Library Philosophy and Practice: 2004-2009: A scientometric appraisal Library Philosophy and
Practice. Retrieved 15 September 2011 from: http://www.webpages.uidaho.edu/~moblin/dillipswain-LPP.pdf.
Rana (M S). Research collaboration in Wildlife Science: a study of mammals’ research in India. International
Workshop on webometrics, infometrics and scientometrics (IIT, Roorkee); 2-5 march, 2004; p291-304.
Zainab, A.N.; Ani, K.W.U.; & Anur, N.B. 92009). A single journal study: Malayasian Journal of Computyer
Science. Malayasian Journal of Computer Science, 22(1), 1-18.
ISBN 1-63102-455-8
13
USES OF ELECTRONIC INFORMATION RESOURCES BY
FACULTY MEMBERS IN MIT COLLEGE LIBRARY,
MORADABAD: A SURVEY
Ravindra Mohan | Library Assistant | INMANTEC Institution | Ghaziabad
Amit Gupta | Assistant Librarian | INMANTEC Institution | Ghaziabad
Abstract: This article aim is to show the uses of electronic resources in library of MIT College
Moradabad. Library uses by the faculty members for their research, teaching, project purpose etc.
In this article I examine the interest of the faculty members of using the internet, online database,
electronic article, CD/DVD,s and services which provide by the library . In this article I also
discuss that how much time faculty members are spend in the library.
Keywords: Electronic Resources, Information, Library Services, User Study, MIT Moradabad
INTRODUCTION
The main function of the library is to provide the current information service to their users. Now these days
internet is the life line for every people. Millions of people depend on the internet. Internet is the world largest
network to get the information. In the Hi-Tech environment of library is unlimited collection of current
information, electronic journals, electronic Books, printed and non printed materials. Users of electronic
resources users have been increasing day by day.
A. About MIT
MIT is among the first degree engineering colleges established in U.P. under the Self Financing Scheme of
Govt. of India, established in 1996. In early days the Institute had three B. Tech. Programmes. Presently the
Institute runs nine B. Tech. Programmes, namely Computer Science & Engineering, Electronics &
Communication, Information Technology, Electronics & Instrumentation Engineering, Mechanical Engineering,
Electrical Engineering, Chemical Engineering, Civil Engineering & Electronics & Electrical Engineering Besides
B.Tech. Programmes the Institute is running M.Tech. program in Mechanical Engineering and Electronics &
Communication Engineering and M.B.A.
B. Area & Infrastructure of MIT
The Infrastructure of MIT College is a new standard of excellence for teaching, social and residential facilities.
Set in a contemporary, cutting-edge and environmentally-friendly building of large built up area of 38495 Sq
Meters consisting of seven large academic buildings Eighth academic building is under construction. The
College features floors of teaching space, including classrooms, laboratories, and a state-of-the-art library.
Institute has a Guest House of 567 Sq Meters It has five spacious, air conditioned guest rooms with all modern
facilities These rooms are also available for parents of students coming from outside.
C. MIT Library
The central library is well equipped with all modern facilities and resources in the form of CD-ROM, Online
database, audio video cassettes, books, journals, standards, specifications, theses, and reports etc. It has a rich
collection of more than 74,000 documents which include books and bound volumes of periodicals. The
collection is mainly strong in science & technology. The library currently involved in utilizing the networked
information resources for providing recent and most comprehensive access to e- journals, e-books, e-patents and
other e-reference resources to the faculty, student, staff, industries, and alumnus under intranet and internet
environments.
14
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
OBJECTIVES OF THE STUDY
To know the usages of e-resources by the faculty members of MIT college Moradabad.
To find out e-resource collection in the library.
To find out how many hours faculty spend in the library for using e-resource
METHODOLOGY
The data for this study is based on questionnaires, interview, observation, opinions and comments by faculty
members of MIT colleges of Moradabad. Total 50 questionnaires are distributed to the faculty members of MIT
college Moradabad. Questionnaires’ containing both open-ended and closed questions was prepared and send to
the faculty members of MIT College. Detailed questionnaire having information about infrastructure collection
and services in the library were prepared and distributed to the users and collected.
ANALYSIS AND INTERPRETATION OF DATA
1. Uses of Library by Faculty members in a week
10% 0% 0%
Less
than 10
hours
30%
Oct-20
60%
Table 1: Use of library in week
Fig. 1 Use of library in a week
It is analyzed from the table that the mostly (36%) faculty members visit the library daily and (20%) faculty
members visit the library twice a week , whereas (26%) faculty members are respondent that they visit the
library three times a week. Few (18%) faculty members are visit to library four times a week
2. Hours spend for the electronic sources in per week in searching web recourses
Daily
18%
36%
26%
20%
Table 2. Hours spend in library
Twice a
week
Three times
a week
Four times a
week
Fig. 2 Spending hours in a week
It is analyzed from the table that majority (60%) of faculty members spend time in the library for searching web
resources in 0-10 hours in a week and (30%) faculty members spend time 10-20 hours in a week. Few (10%) faculty
members visit library 20-30 hours in week.
ISBN 1-63102-455-8
15
Uses of Electronic Information Resources by Faculty Members in MIT College Library, Moradabad: A Survey
3. Information service that faculty expected to find
Table 3. Service expect to find
Fig. 3 Faculty expect to find the service
From the table it analyzed that majority (30%) faculty members visit to library for news paper clipping and
(24%) faculty members visit to library for use the reprography section for the periodicals articles. Whereas
(12%) faculty members are stay in the library for use the current awareness service , (12%) faculty members
expect to find notification about conference /seminars/workshop and (12%) faculty members use the interlibrary
loan service. But few (10%) faculty members visit the library for searching the literature for their research and
for their article.
4. Uses of internet by faculty members
Yes
No
Percentage
M.I.T.
50
0
100%
Total
50
0
100%
100%
Use of
Internet
0%
MIT
Table 4: Use of Internet
Fig. 4 Using of internet
On the basis of above data collected from the colleges it is analyzed that all the faculty members of MIT
colleges understudy use the internet. From the analysis all the (100%) faculty members of MIT College, are
normally use the internet for get the information.
5. Purpose of using internet
Research
40%
Entertainment
20%
Education
Health
0%
Faculty
Table 5.Purpose of use internet by faculty members
16
Sports
Fig. 5 Purpose use of internet
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
The table shows that (38%) faculty members use the internet in library for growth his education and (32%)
majority of faculty members use the internet for research, whereas (30%) faculty members use internet for
entertainment /communication. Few (20%) faculty members use the internet for health and (20%) faculty
members for sports.
6. Need of tools by faculty members to get access the documents
Library
Catalogue
40%
Indexing
Journals
30%
20%
Abstracting
Journals
10%
0%
Faculty
Table 6. Use of tools to get access the documents
Reference
Books
Fig. 6 Use of tools to get access documents
The table shows that mostly (32%) faculty members use the abstract journals to the access documents and (30%)
faculty members use the reference books for gain the knowledge and (28%) faculty members visit the library to
use the library catalogue. Few (10%) faculty members use the indexing journals to see the latest articles.
CONCLUSION
1.
All the faculty members are visiting the library to get access the online database.
2.
Faculty members visit in the library daily and using the internet.
3.
All the faculty members are satisfied that e-resource is the most powerful communication technology
in the Hi-Tech environment
4.
Faculty members visit the library to study for research, articles, newspaper, journals, books case study
etc.
[1]
Maurya, Ram Nath , “Use of Electronic Resources in KGEC Kanpur: A Survey” Year 2012, Vol. 3, Issue: 2 ,
Print ISSN : 2229-4023. Online ISSN : 2249-3182
http://www.mitmoradabad.edu.in
Research Methodology by C.R. Kothari on chapter 6 from page 89
Eqbal Monawwer & Khan Azhar Shah, Use of Electronic Journals by the Research Scholars of Faculty of
Science and Faculty of Engineering, In:NACLIN 2007, p309-319.
Naqvi Shehbaz Husain, Use of Electronic Resources at Jamia Millia Islamia (A Central University): A Case
Study, In: NACLIN 2007, p320-324.
REFERENCE
[2]
[3]
[4]
[5]
ISBN 1-63102-455-8
17
RFID TECHNOLOGY FOR IDENTIFICATION, SECURITY
AND DOCUMENT HANDLING IN LIBRARY
Satish Kumar | Information Scientist, ARIES | Nainital, UK | sklisc@gmail.com
Anil Kumar Mishra | Senior Technical Assistant ‘B’ | CVRDE, DRDO | Avadi, Chennai, Tamil Nadu |
anilmlis@gmail.com
Abstract: Radio Frequency IDentification (RFID) is a wireless non-contact system that uses
radio-frequency waves to transfer data from a tag attached to an object, for the automatic
identification and tracking. It is a technology that uses the radio waves for transferring data
from an electronic tag called as RFID tag. Library RFID systems are composed of tags,
readers and middleware software. The systems rely heavily on the Integrated Library
Management System (ILMS). Tags are placed inside library documents. The readers are placed at
staff workstations and self-check machines and built into security gates. The readers read the
information on the tag and pass the information to the ILMS. RFID is a powerful technology that
can change how libraries deal with physical as well as digital technologies to offer new services.
Keywords: RFID; Library; RFID Frequency; RFID Tags
RFID - INTRODUCTION
A Radio Frequency Identification tag, or RFID tag, is a small tag placed on objects like shipping pallets or
product packages. RFID tag contains a unique serial number, as opposed to a generic product identifier. In other
words, it doesn't just identify that a pallet contains some Model123 computers. It identifies the pallet as being a
specific, unique set of Model123 computers.
When an RFID reader sends out a signal, the RFID tag responds by sending information back. It's possible to
have many tags respond to one query if they are all with range of the reader. This makes accounting of lots of
items easy. Even when items are stacked on top of one another or behind a wall, as long as signals can penetrate,
it will be possible to get a response. RFID tags remove the need to manually or inventory each item and allow a
census to be taken much more rapidly.
Most RFID tags used outside of very high value applications are known as passive. This means that the tags do
not have an embedded battery. The radio waves from a reader create a magnetic field that is used to provide just
enough power to allow a tag to send out the information embedded within it.
While RFID technology has been around for a long time, costs were unaffordable for most applications. Today a
passive tag costs just a few rupees and prices continue to drop.
HISTORY OF RFID
RFID technology came into fame when the first Auto-ID lab at MIT (Massachusetts Institute of Technology)
was started. The Auto-ID lab, was started by a consortium of businesses (including large retailers, packaged
consumers good manufacturers and others), the US DoD (Department of Defence) and academics, who wanted
to solve a very global and big problem – how to track shipment in the global supply chain. At that time,
problems of pilferage, counterfeiting and lost shipments were in the range of billions of dollars (as they are even
today). The Auto-ID centre was to find a solution, using automatic identification technology, to minimize these
losses.
Later on, the Auto-ID centre at MIT expanded to include a global chain of six labs at universities, including
Cambridge (UK) and the University of Adelaide (Australia) among others. The technology, which MIT had
developed upon that point, was licensed to an organization known as EPCglobal, who is then carrying it
forward to develop standards, protocols and allot Electronic Product Codes (EPCs).
The ultimate vision is to network all physical objects (including consumer items, containers etc.) into a globally
pervasive "Internet of Things"2.
18
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
BASIC PRINCIPLES OF RFID
The three key or the main components of an RFID system are tag, middleware and reader.
1.
2.
3.
RFID tags: also known as transponders or labels which are attached to the objects. Tags could
be of active, passive or semi-passive. There are tags with memory that are available to store
information in the form of bits.
Reader: also known as transceiver (transmitter/receiver) made up of a Radio Frequency Interface
(RFI) module and control unit. The readers are classified based on the frequency (LF,HF,UHF,
etc.,) and also in terms of portability ( Fixed & Handheld).Their main function is to activate the tags,
structure the communication sequence with the tag and transfer data between the application
software and tags Middleware.
RFID middleware: It is a computer program that controls one or more RFID Interrogators and allows
the data captured by those devices to be routed to another system. RFID middleware solutions
provide messaging, routing, and connectivity features required to integrate RFID data into
existing library management system4. The library management system connects data coming in from
tags on library items such as Middleware provides a coherent and stable interface between RFID
hardware operations and flow of data elements such as membership number, catalogue number,
etc. into the library database3.
RFID Tags: RFID tags are the objects containing the Radio Frequency circuits which are affixed to the
items which need to be identified. We can think them as "Smart labels" or "Smart bar codes". Each RFID
tag consists of a data storage device (like an electronic chip) and an antenna to communicate.
To read RFID tags, one need RFID reader, just like one need to have a bar code reader to read bar codes.
RFID tags and RFID readers communicate with each other using radio waves. The RFID tag may also have
other components, based on its type. RFID tags can store enormous amounts of data, compared to bar
codes.
RFID Working System:A basic RFID system, at its minimum, requires and RFID tag and an RFID reader.
If the tag is passive, then the radio waves coming from the RFID reader to the tag also supply it with power.
The reader is said to 'interrogate' the tag. The tag replies and gives out the data stored in it. This data also
travels through the air in the form of radio waves and is 'read' by the RFID reader. The RFID reader is then
connected to a standalone PC or a network, which collects the data from the reader and transmits it to a
higher level system. Many such tags communicate with one or more readers and many such readers are
connected to a central computing system (e.g. EPR system or a Warehouse Management System or a
similar database).
In libraries, passive tags are used, these tags remain inactive. The readers will be always propagating radio
waves. When a tag comes in the range (radio wave area) the tags harvests power get activated.
Types of RFID tags: There are several types of RFID tags and they can be classified in many ways. One of
the ways is by classifying them on the basis of their power source.
Active tags – RFID tags that have their own onboard power supply, like a battery.
Passive tags – Those RFID tags that do not have their own power supply. These tags derive their
power from the RFID reader, when it communicates with them.
Semi-passive tags – These RFID tags have a smaller onboard battery, which is enough to retain only
its onboard data. It cannot use this data for communication.
Another way to classify RFID tag is by specifying whether the RFID tag is Read-Only tag or a Read/Write tag.
Read-Only RFID tags – Those tags that have the data fields written to it when it is manufactured and
cannot be changed afterwards. These tags are also called Write once read many.
Read/Write RFID tags – Those tags that have the data fields written to it many times over, by the
users. Users can use RFID readers to write the data apart from reading. So, in this case the RFID reader
is called RFID reader cum writer. These tags are also called Write many and read many.
ISBN 1-63102-455-8
19
RFID Technology for Identification, Security and Document handling in Library
Tags are divided on the size of the tag - Tag memory with 1K, Tag with memory 2K. In libraries passive tags
with 1 K or 2 K memory and frequency 13.56 MHz. are used.
4.
RFID Frequencies: RFID tags can be conceptually similar to small radio transmitters, which beam out
information about themselves to RFID readers. Just like our domestic radios, RFID tags and readers operate
at different frequencies in different bands, depending on the application. The RFID tags used in smart cards
for toll passes operate at different frequency, than for tags that are used to track shipping containers in a
truck yard. The typical frequency bands for RFID tags are divided into –
Low Frequency (LF) around 125 KHz.
High Frequency (HF) around 13.56 MHz
Ultra High Frequency (UHF) around 902- 928 MHz
Microwave around 2.45 GHz
So, different types of RFID tags used different frequency bands, for different types of applications. Thus, RFID
tags used in smart labels on books in a library are used in a different frequency band than the RFID tag used to
track containers in shipping yards.
In fact, though both use radio communication, their method of communication with their readers are also
different. For example: some types of tags use a method known as "load modulation", while others use
"backscatter" and so on.
RFID Tags
Low Frequency (LF)
High Frequency (HF)
Ultra High Frequency (UHF)
Frequency
125kHz
13.56 MHz
100 MHz to 1 GHz
Operating
Distance
30 cm to 1 m
10 cm to 1 m
Passive: up to 25 m
Active: up to 100 m
Characteristics
Short read range.
Read range is easier to
control.
Handle metal and water
better than UHF.
Can be affected by
industrial noise.
Slower data transfer
rate. Cannot always
communicate
with
multiple tags.
Applications
Short read range (especially
NFC tags).
Long read range.
Fast reading of multiple tags.
Read range easier to control
than UHF.
Not as effective as LF in
presence of metal and water,
but better than UHF.
Unaffected by industrial noise.
Can
communicate
with
multiple tags simultaneously
Library materials management
and security, access control,
banking cards, contactless
payment
systems,
goods
control, security.
Less tag memory than HF.
Poor
performance
liquids and metals.
Operate
in
frequency.
a
around
crowded
Asset tracking, supply chain,
logistics, toll booths, real-time
locating systems, container
security,
library
material
management
and
security
(limited)
Table 1- Types of RFID tags (Source: Library Technology Report, Vol. 48, No.5, July 2012)
5.
20
Benefits of Library RFID system: The benefits of adopting RFID technology in library are –
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
6.
Reduction of staff manual processes, error and repetitive motion.
Enhanced customer experience through fact and private self check-outs.
Reduction of staff and patron time spent on finding items.
Integrated security functionality.
RFID Standards : Standards are established and agreed protocols that enable people, as well as devices to
work and communicate. For example: English language. Similarly, there are established standards for RFID
tags and the communication protocols used. These standards specify the frequency of communication, form
of the data that is being transferred and many other aspects, which make it easier for tags and readers, often
made by different vendors to communicate clearly and work harmoniously together. Many of these
standards have been set by International organizations like ISO and are widely accepted. For instance ISO:
15693 & ISO: 18000 Part 2 Mode 3 etc.
Standards act as a warranty on library's investment in RFID. Without standards, RFID is more risky
investment for libraries. Standards eliminate vendor lock-in and allow for interoperability across different
vendors' solutions. With vendors' interoperability, libraries can buy their RFID components from any
vendor with the expectation that everything will work together.
Standards lead to library and ILMS interoperability as well. With library interoperability, libraries can read
each other's RFID tags, making resource sharing and inter library loan (ILL) transactions more secure and
simple. Integrated Library Management Solution (ILMS) interoperability will allow libraries to switch from
one ILMS to another without having to worry that their RFID components will stop working4.
7.
RFID tags as an Anti-theft solution
In Libraries, one bit chip in-built in the RFID tag, gets de-activated at the time of issuing and activated at the
time of returning. If a book issued properly is moving through the walk through antenna (as the one bit chip is
inactive) will not produce any beep sound. But when a book not properly issued and is moving through the
walkthrough antenna, it will produce a beep sound thus alerts the counter Assistant. Similarly, it can be used in
departmental stores.
CONCLUSION
RFID tags have been used in libraries since 1999, when the National Library of Singapore installed the first
system. RFID tags, like barcodes, are used to uniquely identify library documents. It can be used for weeding,
stock verification, ILL, materials handling, and possible even for providing enhanced content to patrons using
RFID enabled Smartphone. But in order to develop these new library applications, Librarians need to be able to
interface in more ways with the ILMS. It is also time to think creatively about what else libraries can do with
RFID tags. This will require new protocols for communicating with the ILMS and development of new
functions.
REFERENCES
[1] Renold, A. Pravin; rani R., Joshi. An Internet based RFID Library management System. Proceedings of 2013 IEEE
Conference on Information and Communication Technologies (ICT 2013); 932-936p.
[2] Xiaolin Jia; Quanyuan Feng; Taihua Fan; Quanshui Lei; , "RFID technology and its applications in Internet of
Things (IoT)," Consumer Electronics, Communications and Networks (CECNet), 2012, pp.1282-1285.
[3] K. Varma, M. Imtiaz Ahmed “RFID applications in libraries” 4th International Convention CALIBER-2006,
Gulbarga, 2-4 February, 2006.
[4] Ayre, Lori Bowen. "RFID in Libraries: A Step toward interoperability". Library Technology Reports. Vol. 48, No.
5, July 2012, pp. 1-35.
ISBN 1-63102-455-8
21
CORE AND BEHAVIOURAL COMPETENCIES FOR
LIBRARY PROFESSIONALS IN PANJAB UNIVERSITY
CHANDIGARH: A SURVEY
Dr. Rupak Chakravarty | Assistant Professor | DLIS | Punjab University | Chandigarh | India | rupak@pu.ac.in
Jyoti Sharma | Research Scholar | DLIS | Punjab University | Chandigarh | India | jyotisharma@pu.ac.in.
Abstract: Professional competence includes professional knowledge, attitude, and skills required
in a particular profession. It is crucial in case of LIS professionals also. These competencies are
based on the values of the organization and not only sharpen the ability of the professional but
also contributes to organizational success in the long run. The purpose of this paper is to review
the perception, expectations, preferences and current status of two competencies (core and
behavioural) that are required by the library professionals. Core competencies are based on the
values of the organization. Behavioural competencies (also referred to as personal competencies)
encompass knowledge, skills, attitudes, and actions that distinguish excellent performers. This
paper is an attempt to map these competencies level among Library Professionals of Panjab
University, Chandigarh. The study is based upon the response received by the LIS professionals
(library assistants and assistant librarians) for which a structured questionnaire was prepared.
Keywords: - Competencies, Continuous professional development, CPD, Library
Librarians, Library Assistants, Panjab University, Chandigarh
Professionals, Assistant
INTRODUCTION
Competence is the ability of an individual to do a job properly. A competency is a set of defined behaviors that
provide a structured guide enabling the identification, evaluation and development of the behaviors in individual
employees.To enhance professional progress and define goals and objectives of an organisation a Competency
profiles plays a vital role. Competencies are the characteristics employers look for in their employees. A lot of
competency studies have been done to analysis need of necessary competencies to achieve fixed targets and to
make the organization successful. These competencies are based on the values of the organization and not only
sharpen the ability of the professional but also contributes to organizational success in the long run. Core and
Behavioural competencies are categories of competencies. Core competencies are based on the values of the
organization Behavioural competencies encompass knowledge, skills, attitudes, and actions that distinguish
excellent performers.
OBJECTIVES OF THE STUDY
1.
2.
3.
To understand the status and trends regarding Core and Behavioural competencies of LIS
professionals
To identify the minor and major competencies being preferred by the LIS professionals.
To do the comparative analysis amongst the Core and Behavioural competencies.
SCOPE OF THE STUDY & METHODOLOGY
This paper is an attempt to map these competencies level among Library Professionals of Panjab University,
Chandigarh which include 17 (Seventeen) Assistant Librarians and 26 (Twenty Five) Library Assistants
working on permanent basis. To obtain the necessary primary data, a structured questionnaire was prepared. The
questionnaire comprised of 22 (Twenty Two) questions out of which, Core Competencies (Part A) has 8 (Eight)
questions and Behavioural Competencies (Part B) has 14 (Fourteen) questions. For calculating scores assigned
by respondents multiples of 10 was taken as base. The total population for survey was 43. The authors were able
to obtain data from all the (43) respondents thus making the response rate 100%.
22
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
DATA ANALYSIS & INTERPRETATION
Core Competencies
A core competency is a specific factor that a business sees as central to the way the company or its employees
work. It fulfils three key criteria including it is not easy for competitors to imitate, it can be reused widely for
many products and markets and it must contribute to the end consumer's experienced benefits and the value of
the product or service to its customers. Core competencies are particular strengths relative to other organizations
in the industry, which provide the fundamental basis for the provision of added value. Core competencies reflect
the collective learning of an organization and involve coordinating diverse production skills and integrating
multiple streams of technologies. It includes communication, involvement and a deep commitment to working
across organizational boundaries. The following table enlists the main core competencies relevant to the library
professionals and libraries:
Table 1: Core Competencies
Figure 1: Core Competencies
ISBN 1-63102-455-8
23
Collection and Preservation of Newspapers: A Case Study
Figure 1 indicates that highest priority has been assigned to the aspect of Team Work (mean score = 325)
followed by Result Oriented (mean score = 313) and Innovation & creativity (mean score = 305). The
component further study is having least mean score i.e. 250. It can be interpreted from the above figure that all
of the components were give importance and none of the aspect has been highly ignored.
Behavioural Competencies
Behavioural competencies encompass knowledge, skills, attitudes, and actions that distinguish excellent
performers. In order to achieve consistency of understanding across the University and to enhance discussions
about work behaviours, the following definitions are provided. Select the statements that best fit the work being
reviewed and discuss them with the employee when giving feedback and setting expectations.
Table 2: Behavioural Competencies
Figure 2: Behavioural Competencies
24
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Figure 2 above depicts that amongst the many behavioural competencies, “Committed to lifelong learning and
personal career planning” as well as “Effective communication skills” received maximum preference (mean
score = 320 each). They were closely followed by the competencies like “Creative Skills” and “Recognize the
value of professional networking” a having mean score of
317 and 315 respectively. The component
attend/presented Paper in Conferences/ Seminars at regional/national/international levels got least mean score of
252.
CATEGORY WISE EVALUATION
Category
Competencies
Mean Scores (total)
A
Core Competencies
1751.25
B
Behavioural Competencies
1795.71
Table 3: Category wise analysis
Comparative Analysis
Behavioural
Competencies
51%
Core
Competencies
49%
Figure 3: Category Wise Analyses
Table and figure 3 above reveal that library professionals have given prime significance to the category i.e.
Behavioural Competencies (51%). Category B i.e., Core Competencies (49%) has been given less emphasis by
library professional as compare to behavioural competences
ISBN 1-63102-455-8
25
Collection and Preservation of Newspapers: A Case Study
CONCLUSION
By analysis the competencies preferences of the library professionals it can be concluded that there is strong
need to facilitate all domains of competencies with greater emphasis on core competencies. Highest priority has
been assigned to the aspect of Team Work and Committed to lifelong learning and personal career planning in
Core & Behavioural Competencies respectively. The component further study is having least mean score i.e.
250 in Core Competencies
The component attend/presented Paper in Conferences/ Seminars at
regional/national/international levels got least mean score of 252 in Behavioural Competencies. For this, a more
holistic approach has to be implemented to have more skilled staff with greater job satisfaction because a skill
and satisfied library professional can understand and meet the user needs in a better way.
REFERENCES
[1]
[2]
Bryant, Josephine and Poustie, Kay (2001). “Competencies Needed by Public Library Staff”.
Behavioral Competencies. (n.d.). Retrieved September 29, 2013, from http://www.hr.msu.edu/performance/
supportstaff/competencies.htm
[3] Competence (human resources). (2015, May 26). In Wikipedia, The Free Encyclopedia. Retrieved 08:02, June 12,
2015, fromhttp://en.wikipedia.org/w/index.php?title=Competence_(human_resources)&oldid=664048971
[4] What are Competencies? | WikiJob. (n.d.). Retrieved September 29, 2013, from http://www.wikijob.co.uk/wiki/
what-are-competencies
26
ISBN 1-63102-455-8
USE OF DIGITAL LIBRARY SOFTWARE TO DEVELOP
INSTITUTIONAL REPOSITORY IN IITS LIBRARIES: AN
ANALYSIS
Dr. Manoj Kumar Verma | Assistant Professor | Deptt. of Library & Information Science | Mizoram
University | Aizawl | manojdlisbhu@gmail.com
Abstract: In the present digital era, where users demand exact, secure and update information in
any time, any were, any way, mode. Library cannot provide such type of information services with
the traditional concept of library and its working style. To satisfy the demand of the present digital
era users, Libraries have to change the traditional techniques and adopt the ICT based new
techniques and technology. With the help of these techniques and technology library can share
their research output globally by access and disseminate research information in digital form. The
Institutional Repository (IR) is digital libraries which manages and maintain by an institution/
organization and hosted their research output in public domain for accessing preserving and
sharing. The spirit of IR is to make global visibility of research publications of an organization.
To develop an IR, digital library software is required and the success of IR is depending upon this
software. The aim of this paper is to analyze the use and application of digital library software to
develop IR in IITs.
Keywords: Institutional Repository (IR); Digital Library (DL); Digital Content; Open Access; Library software,
Open Source Software; Digital Library Software etc
INTRODUCTION
The ICT makes tremendous impact on library and s completely changed the old concept, meaning and services
of traditional library. Due to emergence of digital resources in last two decades and observed its popularity and
research impact among the academic community. Now many libraries has started to move towards digital
library to satisfied their users demand in this digital era. The Institutional Repository (IR) is digital libraries
which manages and maintain by institutions/organizations and hosted their research output in public domain for
accessing preserving and sharing.
Institutional repository is a collection of digital works which includes the published and the unpublished works
of the scholars or even anything a contributor deposits. The information can be accessed from a remote area
with the help of internet at anytime. The open access concept has come up with the solutions for the problems
like storing, arranging and disseminating the primary source to their end users. The establishing of Institutional
Repositories is a step ahead for open and free access. IR helps in communicating the scholarly literature with the
researchers and the students who are unable to reach the information because of the problem of the access of
these resources.
Indian Institute of Technology
Indian Institutes of Technology are apex institutions for engineering education and research. These are a group
of autonomous engineering and management institutes of India. At present, there are sixteen Indian Institutes of
Technology (IITs) located at Bombay, Delhi, Kanpur, Kharagpur, Madras, Guwahati, Roorkee, Hyderabad,
Patna, Bhubaneshwar, Ropar, Jodhpur, Gandhinagar, Indore, Mandi and Varanasi. All IITs are governed by the
Institutes of Technology Act, 1961 which has declared them as "Institutions of National Importance", and lays
down their powers, duties, framework for governance and are linked to each others through a common IIT
council. The main objective of IITs is to impart world class education in engineering and technology to conduct
research in the relevant fields, and to further advancement of learning and dissemination of knowledge. These
Institutes are also contributing significantly to education and research in basic sciences and humanities. 25
Institutional Repositories (IR)
ISBN 1-63102-455-8
27
Use of Digital Library software to Develop Institutional Repository in IITs Libraries: An Analysis
All the new trends and developments of technologies have come up with new strategies to accelerate to changes
in scholarly communication. IR is an electronic mechanism for providing access to digital information to the
faculties and the students of an institution. In the present digital world it is very necessary to built up an
Institutional Repository for all the organizations because of the increase in publishing the scholarly research
materials to preserve it as well as in accessing the knowledge from any part of the world at anytime. Institutional
repositories emerged in the year 2002 with the launch of DSpace at MIT and it was coined by SPARC
(Scholarly Publishing and Academic Resources Coalition). The different authors have tried to explain the term
Institutional Repositories (IR) to make it understand;
Shearer19 defined IR as “an institutional repository (IR) is a digital archive of an institution’s intellectual output.
They collect and make accessible a range of research material and also part of a larger global system of
repositories”.
Clifford A. Lynch11 defines as “a university based institutional repository is a set of services that a university
offers to the members of its community for the management and dissemination of digital materials created by
the institution and its community members. It is most essentially an organizational commitment to the
stewardship of these digital materials, including long-term preservation where appropriate as well as
organization and access or distribution”.
Purpose of Institutional Repository
The main purpose of IR is to preserve and making available of research output of an institutions/organization on
public domain. Other objectives to having IR in an institution are:
To create global visibility and wider access for an institutions’ academic research output
To serve the research community by putting their research papers at a single location and check the
duplicity of work.
To providing open access to institutional research output be self archiving
To store and preserve other unpublished (gray literature) like thesis and research reports, technical
reports etc.
To bring prestige to the author as well as to the organization for their contribution
To get recognition from peers by getting citation of their work.
Benefits of IR
The Institutional repositories also have many benefits such as;
The Institutional Repository minimizes the access barriers and maximizes the rate of dissemination of
scholarly communication.
IR helps in publicizing the research and the teaching programmes of their staff and students.
IR brings out the research outputs of an institution to the world.
IR helps in getting all the materials published by the scholars in the university at one place.
It manages the academic and the research activities.
It helps in avoiding the duplication of research works.
It also enables us for the interdisciplinary approach for the research.
The students easily get accessible to the university’s publication via institutional portal through internet
or intranet.
Works of art and photographs and video recordings, etc.
IR Software
Software is an important part in building up a successful Institutional Repository in an institutions or an
organization. There are many open source software packages available in the market for IR. The commonly
used IR software is mentioned below:
28
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
A) DSpace6: DSpace was developed by MIT (Massachusetts Institute of Technology) libraries and
Hewlett- Packard labs. It is open source software for academic, non-profit and commercial
organizations for building up open digital repositories. It preserves and enables access to all types of
digital content including text, images, moving images, mpegs and data set.
B) EPrints22: GNU EPrints is open source software which was developed by the University of
Southampton. It is open access repository software that is compliant with the Open Archives Initiative
Protocol for Metadata Harvesting. This software accommodates a wider variety of digital objects to
consolidate a wide range of services and applications in serving the needs of the whole institution.
C) CDSware8: CDSware is developed by CERN (Conseil Européen pour la Recherche Nucléaire) in
Geneva. It is designed to run on the website and become OAI compatible.
D) Fedora7: Fedora (Flexible Extensible Digital Object Repository Architecture) was developed by the
researchers at Cornell University as an architecture for storing, managing, and accessing digital content
in the form of digital objects.
E) Greenstone14: This software is for building and distributing digital library collections. It was produced
by the New Zealand Digital Library Project at the University of Waikato, and developed and
distributed in cooperation with UNESCO and the Human Info NGO. It has been issued under the terms
of the GNU General Public License.
OBJECTIVE AND SCOPE OF THE STUDY
The objectives of the study is to determine the IITs libraries which having the institutional repository and to
know which software they are using for their IR. The scope of study was confined to all 16 IITs (as listed in
MHRD website, http://mhrd.gov.in/technical-education-2).
METHODOLOGY
The survey method was used as research methodology in this study. The questionnaire was used as a tool to
collect the primary data. A structured online questionnaire was prepared and distributed to all 16 Librarians of
Indian Institute of Technology. The collected data was tabulated and graph has been prepared by using excel
spreadsheet for analysis and draw the conclusion based on selected parameters.
DATA ANALYSIS
Sl. No.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
ISBN 1-63102-455-8
Name of the
Institute
State/Union Territories
Whether the Institute
has Institutional
Repository or not
IIT Kharagpur
West Bengal
Yes
IIT Bombay
Maharashtra
Yes
IIT Kanpur
Uttar Pradesh
Yes
IIT Madras
Tamil Nadu
Yes
IIT Delhi
Delhi
Yes
IIT Guwahati
Assam
NA
IIT Roorkee
Uttarakhand
Yes
IIT Bhubaneswar
Odisha
NA
IIT Gandhinagar
Gujarat
Yes
IIT Hyderabad
Telangana
Yes
IIT Jodhpur
Rajasthan
NA
IIT Patna
Bihar
NA
IIT Ropar
Punjab
Yes
IIT Indore
Madhya Pradesh
NA
IIT Mandi
Himachal Pradesh
NA
IIT BHU Varanasi
Uttar Pradesh
NA
Table-1: Uses of Institutional Repository by IITs’ Library
29
Use of Digital Library software to Develop Institutional Repository in IITs Libraries: An Analysis
IR in IITs
44%
Yes
56%
No
Figure 1: IITs having Institutional Repository
There are sixteen IITs in India, out of which only 9 (56%) IITs having Institutional Repository and 44% IITs do
not have IR. But IIT Guwahati and IIT Bhubaneswar have mentioned that they are in the process of
implementing IR in their respective institutes in future very soon.
IR Software
No. of IITs using
Percentage
DSpace
9
90
EPrints
1
10
Table-2: Digital Library Software used for IR
10%
Dspace
EPrints
90%
Figure 2: Digital Library Software using by the IITs.
All the IITs, having IR are using two types digital library software- Dspace and EPrints. The majority of IITs
(90%) are using DSpace software for IR, whereas only 10% IITs are using EPrints software for their IR. The IIT
Hyderabad is using both DSpace and EPrints software for his IR.
FINDINGS
On the basis of data analysis, the findings of study are as:
1 Out of the 16 IITs in India, only 9 (56%) IITs (IIT Kharagpur, IIT Bombay, IIT Kanpur, IIT Madras, IIT
Delhi, IIT Roorkee, IIT Gandhinagar, IIT Hyderabad, and IIT Ropar) are having IR and 7(44%) IITs don’t’
have IR right now. Although, 2 IITs (IIT Guwahati and IIT Bhubaneswar) have reported that they are in the
process of implementing IR in their institute.
2. Dspcae digital library software commonly used as digital library software to develop IR because almost all
the IITs having IR are using the DSpace software, whereas, IIT Hyderabad is using both DSpace and e-Prints
software for their institute for IR
30
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
CONCLUSION
The Institutional Repository (IR) movement in India was started in 2004 when MS Swaminathan Foundation
and Indian National Science Academy had signed the Berlin Declaration and same year Indian Institute of
Science developed their IR. After that many institutions and organizations including IITs has started to develop
their IR and it can be probably viewed as one of the most significant happenings in the information world
because through IR they are going to put their academic output on public domain. Now, the librarians and
scholars made tremendous efforts to utilize it various content to improve the scholarly out put of institutions.
The initiative of “institutional repositories” definitely included many opportunities and challenges to libraries as
well as Librarians but it facilitate a lot to users as well as contributor. Academic libraries and librarians have to
play a most important role in developing successful repositories for their institutions and change the landscape
of scholarly communication at global level. The IR software will also play an important role in success of IR
because the success of digital library is depending upon the quality of software.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
Budapest Open Access Initiative. 14 February 2002. 24 September 2014 <http://www.budapesto
penaccessinitiative.org/read>.
Chand, Prem, et al. "Institutional Repositories, Open Access Movement and OAI- PMH Complaint Software." 2nd
Convention PLANNER. Imphal: INFLIBNET Centre, 2004. 52-64.
Crow, Raym. The Case For Institutional Repositories: A SPARC Position Paper. ARL Bimonthly Report.
Washington, DC: SPARC, 2002.
Deka, Dipen. "The Role Of Open Source Software In Building Institutional Repository." 4th Convention
PLANNER. Aizawl: INFLIBNET Centre, 2006. 121-127.
Devi, Thiyam Satyabati. "Edifice of Institutional Repositories in UNISWA Library: A Challenge." 6th
Conventional PLANNER. Nagaland: INFLIBNET Centre, 2008. 70-75.
DURASPACE. DSPACE. 15 October 2014 <http://www.dspace.org/>.
Fedora. 15 October 2014 <http://www.fedora-commons.org/>.
Invenio. CDSware. 15 October 2014 <http://cdsware.cern.ch/>.
Kamila, Kanchan. "Institutional Repository Projects in India." 7th International CALIBER. Puducherry:
INFLIBNET Centre, 2009. 128-132.
Lalremsiami. "Institutional Repository With Special Reference to Initiative of Mizoram University." 8th
Convention PLANNER. Gangtok: INFLIBNET Centre, 2012. 252-258.
Lynch, Clifford A. Institutional Repositories: Essential Infrastructure For Scholarship In The Digital Age. A
Bimonthly Report. Washington, DC: Association of Research Libraries, 2003.
Mahemei, Lohrii Kaini and Muttayya Koganuramath. "Institutional Repository of Jawaharlal Nehru University
Library, New Delhi." 4th Convention PLANNER. Mizoram: INFLIBNET Centre, 2006. 64-70.
Nahak, Brundaban and Sanjukta Nahak. "Institutional Repositories: The Prospects and Challenges in Indian
Digital Library Environment." 8th Convention PLANNER. Gangtok: INFLIBNET Centre, 2012. 233-244.
New Zealand Digital Library Project. Greenstone Digital Library Software. 2005. 16 October 2014
<http://www.greenstone.org/>.
Passah, Pansngiat. "Institutional Repositories of India: A Comparative Study of North-Eastern Hill University with
Other Universities." 8th Convention PLANNER. Gangtok: INFLIBNET Centre, 2012. 245-251.
Roy, Bijan Kumar, Parthasarathi Mukhopadhyay and Subal Chandra Biswas. "An Analytical Study of Institutional
Digital Repositories in India." Library Philosophy and Practice (2012): 1-7.
Satarkar, S P, R G Dharmapurikar and R D Kale. "Pilot Study of Institutional Repository For Swami Ramanand
Teerth Marathwada University, Nanded." 6th Convention PLANNER. Nagaland: INFLIBNET Centre, 2008. 320330.
Sharma, Ajay Kumar, Nimai Chand Saha and Kevinino Mechieo. "Institutional Repositories and Skills
Requirements, A New Horizon to Preserve the Intellectual Output: An Indian Perspective." 6th Convention
PLANNER. Nagaland: INFLIBNET, 2008. 336-353.
Shearer, Kathleen. "Institutional Repositories: Towards Identification of Critical Success Factors." Canadian
Journal of Information and Library Science (2003): 250-263.
SPARC. Open Access. 2007. 16 October 2014 <http://www.sparc.arl.org/issues/open-access>.
Suleta, Thoudam and Keisham Sangeeta. "Institutional Repositories: A Gateway For Knowledge Revolution." 4th
Convention PLANNER. Aizawl: INFLIBNET Centre, 2006. 161-165.
University of Southampton, UK. eprints. 2011. 15 October 2014 <http://www.eprints.org/>.
Wikipedia.
Wikipedia
The
Free
Encyclopedia.
16
October
2014
<http://en.wikipedia.
org/wiki/Indian_Institutes_of_Technology>.
http://mhrd.gov.in/technical-education-2
Verma, Mk and Devi, Ksh. Krishna. “Creation and Use of Open Access Initiatives in Indian Institute of
Technology (IITs) through Institutional Repository: A Survey”. KNOWLEDGE ORGANISATION IN
ACADEMIC LIBRARIES New Delhi, Library Professionals association (LPA), Pp70-79. ISBN-978-93-5196852-2.
ISBN 1-63102-455-8
31
GREENSTONE: OPEN SOURCE SOFTWARE FOR DIGITAL
LIBRARY DEVELOPMENT
Anil Kumar Jharotia | Librarian | Tecnia Institute of Advanced Studies | GGSIP University | Delhi
Shikha Verma | Asst. Librarian | Tecnia Institute of Advanced Studies | GGSIP University | Delhi
Jyoti | Library Assistant | Tecnia Institute of Advanced Studies | GGSIP University | Delhi
Abstract: Now a day’s computerization became very important for the smooth running of
Library. Library is a storehouse of knowledge. It is also called the heart of the institution. It
help user for learning, research programme etc. Computerization and Automation in libraries
increase the effectiveness and efficiency of library service. So the role of computer and
automation in library is very crucial. Automation in Libraries helps to give better services to
the user. Many open source library software now available on the internet. Greenstone is a
suite of software tools for building and developing of digital library
Keywords: GSDL, Free Software, OSS, Library Automation
INTRODUCTION
Open Source Software: Which software are free available on internet that is called Open Source Software as
well as free software. Open source software appeared in the mid – 1990s with the creation of the GNU (or
GNU’s NOT UNIX) project, aimed at developing a freely available UNIX – like operating system. The GNU
website provides the following definition of “free software” which is key to the philosophy of the open source
software: “Free software” is a matter of liberty, not price. To understand the concept, you should think of “free
speech “not as in “free beer”. Free software is a matter of the users’ freedom to run, copy, distribute, study,
change and improve the software. Many open source library software now available in the market. Open Source
Software is computer software that is available in source code form for which the source code and certain other
rights normally reserved for copy right holders are provided under a software license that permits users to study,
change, and improve the software. Some open source licenses meet the requirements of the Open Source
Definition. Some open source software is available within the public domain. The Open Source Initiative (OSI)
was formed in February 1998 by Raymond and Perens and in August 1998 greenstone.org website has been
established. With about 20 years of evidence from case histories of closed and open development already
provided by the Internet, the OSI continued to present the 'open source' case to commercial businesses. They
sought to bring a higher profile to the practical benefits of freely available source code, and wanted to bring
major software businesses and other high-tech industries into open source. More precisely it refers to four kinds
of freedom for the users of the software:
The freedom to run the program, for any purpose
The freedom to study how the program works, and adapt it to your needs. Access to the source code is
a precondition for this.
The freedom to redistribute copies so you can help your neighbor
The freedom to improve the program, and release your improvements to the public, so that the whole
community benefits. Access to the source code is a precondition for this.
A Program is free software if users have all of these freedoms. Thus, you should be free to redistribute copies,
either with or without modification, either gratis or charging a fee for distribution, to anyone anywhere being
free to do these things means ( among other things ) that you do not have to ask or pay for permission.
(www.gnu.org)
An indication of the worldwide applicability of open source software is provided by the number of languages in
which homepage of the GNU website exists.: Albanian, Chinese, Dutch, English, Korean, Italian, Japnese,
32
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Spanish, Thai, Polish, Romanian,. A Special license, known as the GNU Licence, is often used for the
distribution of open source software. A directory of open source software is available form the Free Software
Foundation on the GNU website. The directory was started in 1999 and since 2003 Unesco has been involved in
its development. “Standard” open source software includes:
Apache – an HTTp – compliant web server
Linux – an operating system
My SQL – a relational database management system that support the query language SQL
o (Structured Query Language)
Perl – a general, high – level scripting language
Open source software is of great benefit in many countries. In using such software it must be realized that a
certain amount of expertise is required to enable any particular software to meet the needs of the particular
digital library system being developed. Staff with such expertise is likely to be in demand, and many not stay in
the institution for a long time. In such cases it will be necessary to ensure that appropriate documentation has
been produced so that use of the software and its “customization” to meet local needs can be understood by
successive members of staff. Some LMS suppliers are beginning to be aware of open source software
developments: innovative, for instance supports Linux.
In a special issue of Information Technology and Libraries on open source software, Morgan (2002) outlines its
possibilities for the development of digital library collections and services. Through funding from the DLI,
Morgan was one of the developers of the personalization software My Library @ NCState at North Carolina
State University (referred to in Chapter Two) and which is now distributed as open source software using the
GNU public license. In his paper Morgan Emphasizes that open source software is both a Philosophy and a
process. The Philosophy is described in the quote given above and the original developers is assisted by others
who are attempting to solve similar problems in a two heads are better that one approach. A list of open source
software for libraries is maintained (www.oss4lib.org)
DEFINITION
The Open Source Definition is used by the Open Source Initiative to determine whether a software license can
be considered open source. The definition was based on the Debian Free Software Guidelines, written and
adapted primarily by Bruce Perens. Perens did not base his writing on the "four freedoms" of Free Software
from the Free Software Foundation,
which were only widely available later.
Greenstone: The Greenstone is opensource software, issued under the terms
of the GNU General Public License.
The aim of the software is to empower
users, particularly in universities,
libraries, and other public service
institutions, to build their own digital
libraries.
Greenstone digital library software is an
open-source system for the construction
and presentation of information
collections. Collections built with
Greenstone offer effective full-text
searching and metadata-based browsing
Fig. 1: Greenstone Digital Library Software
facilities that are attractive and easy to
use. Moreover, they are easily maintainable and can be augmented and rebuilt entirely automatically. The
system is extensible: software “plugins” accommodate different document and metadata types. Greenstone
incorporates an interface that makes it easy for people to create their own library collections. Collections may be
ISBN 1-63102-455-8
33
Social Networking and Library Consortia
built and served locally from the user’s own Web server, or (given appropriate permissions) remotely on a
shared digital library host. End users can easily build new collections styled after existing ones from material on
the Web or from their local files (or both), and collections can be updated and new ones brought online at any
time.
Greenstone began in 1995, with a small group of people who wanted to make online technical reports more
accessible to the research community by presenting them over the Web in a uniform and fully searchable way.
Combining skills from several areas, and using existing public-domain compression and indexing software, a
tool was devised that compiled an index from the full text of a large set of computer science technical reports
gathered from many international FTP sites. Users could search for documents using any combination of words,
and receive an ordered list of documents whose full text included those words, along with hyperlinks back to the
original documents. The result was striking: it frequently drew attention to many extremely pertinent but
previously unknown documents (such as obscure PhD theses), without the need to invest any effort in manual
metadata production.
Greenstone is a suite of software
tools for building and developing
of digital library collections on the
Internet or CD-ROM. Greenstone
is
open-source,
multilingual
software, issued under the terms
of the General Public License
GNU. Greenstone is produced by
the New Zealand Digital Library
Fig. 2: Greenstone Librarian Interface
Project at the University of
Waikato, and has been developed
and distributed in cooperation
with UNESCO and the Human
Fig. 2: Greenstone Librarian Interface
Info
NGO
in
Belgium
(http;//www.greenstone.org)
Greenstone has been implemented with interfaces in a number of languages and in addition, the full
documentation is a available in a number
of languages including English, French,
Kazak, Russian, and Spanish. In Chapter
Six there are examples of the Greenstone
interface in Arabic and in Czech. The
aim of the software is to empower users,
particularly in universities, libraries, and
other public service institutions, to build
their own digital libraries.
The development and distribution of
Greenstone is being carried out by
NZDL in conjunction with Unesco and
the Human Info NGO ( Non
Govermental Organization ). The
dissemination of educational, scientific
and
cultural information throughout the
Fig. 3: Greenstone Web Download Setting
world, and particularly its availability in
developing countries,is central to Unesco goals as pursued within its intergovernmental Information for All
Programe, and appropriate, accessiable ICTs such as Greenston, are seen as important tools in this context. The
34
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Human Info NGOs documentation is based Antwerp, Belgium and works with UN agencies and NGOs
involved in digitizing document of interest to human development and making it widely available, free of charge
to developing nations,and on a cost – recovery basis to others.
Archives of Indian Labour (http:// www.indialabourarchives.org)
Bibliotheca Digital porla Identidad /Human Rights in Argentina
(http;//conadi.jus.org.ar/gsdl/cgi-bin/library)
Digitale bibliotheca Information und Medien at the University of Applied Sciences in Stuttgart,
Germany (http;//Diana.iuk.hdm-stuttgart.de/digbib/gsdl/cgi-bin/library)
Mirabilie Vicomercate-local history collections in a public library in Italy
(http;//www.mirabilliavicomercati.org./sezioni/606/index.html)
FEATURES OF OPEN SOURCE SOFTWARE
Open source doesn’t just mean access to the source code. The distribution terms of OSS must comply with the
following criteria:
Derived works
Distribution of license
Free redistribution
Integrity of the author’s source code
No discrimination against persons or groups
No discrimination against fields of Endeavour
License must not be specific to a product.
License must not restrict other software
Source code
SYSTEM REQUIREMENTS FOR GSDL
Operating Systems required for Greenstone software installation, Windows 2OOO, Windows XP, Windows
Vista, Windows 7, Windows 8 and Java Runtime
Digital Library Architecture
The software used for developing digital libraries, then, can come from a variety of organizations or from an
open source collection. Much of the software is based on international ( developed and developing ) standards
that enale functions such as reference linking ( that is the ability to click on a reference to an item and then be
presented with the item itself on the screen ) between many diverse systems and services, as described by
Caplan.
The interoperable building blocks that can linked together to develop an application such as a digital library are
generally known as “Web Services” Tennat states that “these can be thought of as a suite of protocols that define
now requests and responses between software applications should be encoded and transferred ( for example over
the web via http or e-mail ) and how such services should be described and registered for research discovery and
use Hickey provides an introduction to the concepts of web services with examples taken from the digital library
world. In the very first issue of D – Lib Magazine, Arms outlined the key concept in the architecture of digital
library systems which include
Standards in Digital Libraries
Archiving and Preservation Standard.
Digital Collection Development Standard
Metadata Standards for Cataloguing Contents and Indexing Standards.
Electronic Publishing and Retrieval Standards for Books, Journals and other Objects such as OAI-PMH
and Z39.50.
ISBN 1-63102-455-8
35
Social Networking and Library Consortia
Metadata in Digital Libraries:
Metadata can be classified into 3 broad categories
Descriptive Metadata;
Structural Metadata; and
Administrative Metadata
Metadata Standards:
Dubline Core (DC) – set of 17 metadata elements.
Learning Object Metadata (LOM).
Metadata Encoding and Transmission Standards (METS).
Metadata Object Description Scheme (MODS).
MPEG multimedia metadata
The Encoded Archival Description (EAD).
Visual Objects.
Software does not depend on specific hardware or operating system platform in order to function.
Since source code is available, one can customize the software as per the end users requirements.
It is possible to incorporate the software into another program to perform new function.
With OSS, people can have any number of copies of programs on their machine, at home or at work.
36
BENEFITS OF USING OPEN SOURCE SOFTWARE
ADVANTAGES OF OSS
Ability to incorporate tools for personal health, such as personal health records
No cost or a lower cost for licensing "open source" solutions
Flexibility to adapt the software for particular health care solutions
Continuing software enhancements available through the open source community
"Mission" rather than "market" objectives focused on patient-centered, population-based health
improvement
Open architecture allows for greater opportunities for health information exchange
Many pre-existing tools for interface and reporting already developed
Tools make it easier to build generic rather than custom interfaces
Centralized hosting using the health center-controlled network model affords economies of scale
DISADVANTAGES OF OSS
Difficult for smaller organizations to afford the resources individually
Often no single source to support all aspects of the application; multiple sources of technical and
clinical support may be required
Must understand business logic to adjust configuration or make code adjustments to meet unique work
flow and clinical needs
Difficult to engage support of vendors with practical experience in supporting the application; often
they have retired or left the agency
May require sophisticated professional guidance on licensing issues and the preparation of contracts
The open source solution may not be CCHIT certified by the originating agency and this may provide
challenges, especially if the user is seeking grant funding that requires, as a condition of funding, that
the software to be acquired is CCHIT certified.
Often have to adapt and develop training materials appropriate for the particular application of the open
source solution
Must guard against information overload and alert fatigue
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
SOFTWARE NEED FOR AUTOMATION
Before be look into the needs of software let us see what are the activities in a library that can be automated. The
libraries also need to interact with other libraries to share resources. So the third type of activity would be
resource sharing with other libraries. Each of these three kinds of activities is mostly still done manually in the
traditional libraries.
Housekeeping Activities: The Housekeeping activities are essential for the day-to-day functioning of
the library. These include: use of software in library.
Acquisitions: Tracking purchase of the materials through ordering, claiming, receiving, invoicing and
processing.
Cataloging: Creating cataloging records.
Serials: Automating ordering, receipt routing and renewals of all serial subscriptions.
Reminders: For library patrons as well as venders of books and periodicals
Services to Users:
Online public Access Catalogue(OPAC): An electronic record of holding, bibliographic and item
information.
Circulation: Allowing libraries to check materials in and out, place renewals or holds, and enter
payment.
Cooperative Cataloguing: For sharing the cataloguing work among a group of libraries.
Reference services: To the users and others communities.
Resource sharing: For sharing resources.
Union Catalogue: To enable easy identifications’ of a resource in the holdings of a group of libraries.
DIFFICULTIES IN USING OPEN SOURCE SOFTWARE IN INDIA
There are some problems of using OSS in libraries in India, some of them are:
Copyright /IPR Issue
Lack of proper Information & Communication Technology (ICT) infrastructure.
Lack of proper Planning and Integration of Information Resources
Rigidity in the publishers policies
Lack of ICT strategies and policies
Management Support
CONCLUSION
Greenstone is a suite of software tools for developing of digital libraries and using this GSDL open source
software in the library, money that otherwise would be spent on software solutions can be used for other
important resources, such that as purchasing, additional media resource (books, journals etc.), or can be used to
hire educated, technical support that provides patrons with the know how to better use already existing
resources. In addition, this free software is constantly being updated changed, and customized to meet the
library’s needs. Open Source Movement and Free Software Movement given lot’s of thing to society. The OSS
has natural strengths which benefit individual users. Above and beyond this, the widespread use of OSS holds
advantages open standards and open data. The implementation of above software is not possible without support
of management and motivations.
REFERENCES
[1]
[2]
[3]
Arora, Jagadish (2006). Building Digital Libraries: an overview. DESIDOC Bulletin of Information
Bainbridge, David, McKay, Dana and Witten, Ian H. (2004). Greenstone digital library developers guide,
Newzealand, Dept. of Computer Science, University of Waikato.
Choosing and Using Free and Open Source Software: A primer for nonprofits. Retrieved from
http:/ /www.nosi.net/choosing-and-usingfree-and-open-source-software- primernonprofits/chapter-3
ISBN 1-63102-455-8
37
Social Networking and Library Consortia
[4]
Courant, P. N., & Griffiths, R. J. (2006). Software and collaboration in higher education: A study of open source
software.
Ithaca,
NY:
Organization
for
Open
Source
Software
Study.
Retrieved
from
http://www.ithaka.org/strategicservices/ oss/OOSS_Report_FINAL.pdf.
[5] C. Lagoze and H. Van de Sompel. The Open Archives Initiative: Building a low-barrier interoperability framework.
In Proceedings of the Joint Conference on Digital Libraries (JCDL ’01), 2001.
[6] Greenstone Digital Library Software. Retrieved from http://www.greenstone.org/
[7] Greenstone Overview. 2012. Retrieved from
http://www.greenstone.org/manuals/gsdl2/en/html/Chapter_overview_of_greenstone.htm
[8] Greenstone Developers Guide. (n.d.). Retrieved from http://www.greenstone.org/developer-guide
[9] Information resource management using IT: a training programme, November 6 – 11, 2006, Centre for Media &
Rural Documentation, National Institute of Rural Development, Hyderabad.
[10] Jharotia, Anil Kumar (2013). Development of Digital Libraries through Open Source Software Conference
proceedings of RKGIT College held on 16 March 2013. (pp.78-90). Ghaziabad: RKGIT
[11] New Zealand Digital Library project Retrieved from http://www.nzdl.org
[12] Rama Reddy, E (2005). Open Source systems in the library and on the Net International workshop on
Democratization
of
Information:
Focus
on
Libraries,
Retrieved
from
http://www.nigd.org/libraries/mumbai/reports/article-3.pdf
[13] Weber, S. (2004). The success of open source. Cambridge, MA: Harvard University. Retrieved from
http://www.amazon.com/Success-Open-Source-Steven- Weber/dp/0674018583
WEBSITES
Greenstone software information retrieved from
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
38
http://www.cdeep.iitb.ac.in/Live_edu/mode1.html
http://moodle.iitb.ac.in
Free software. http://en.wikipedia.org/wiki/free_software
http://www.library.iitb.ac.in
http://www.fujitsu.com/img/PR/2010/20101109-01a.jpg
http://open-tube.com/wp-content/uploads/2010/06/image20.png
http://www.emeraldinsight.com/content_images/fig/2640250501002.png
http://www.verussolutions.biz/
OSS http://en.wikipedia.org/wiki/Open-source_software#Definitions
http://en.wikipedia.org/wiki/Greenstone_%28software%29
http://www.dlib.org/dlib/october01/witten/10witten.html
http://en.kioskea.net/download/download-20177-greenstone
ISBN 1-63102-455-8
RIGHT OF ENTRY IN ELECTRONIC RESOURCES: FLOWS
AND GRIT IN INSTITUTIONAL LIBRARIES
K.Nazeer Badhusha | Chief Librarian | Hindustan Institute of Engineering Technology (HIET) | Chennai,
Tamilnadu | India | nazeer30@rediffmail.com
R. Natarajan | Asst. Prof. | Library & Information Science Wing | Directorate of Distance Education |
Annamalai University | Annamalai Nagar | Tamilnadu | India | cdmnatraj@yahoo.co.in
Abstract: In late 20th and early 21st centuries, library automation and the Internet revolutionized
information access and library procedure in and around the world. The effect on academic
institutions has been profound. It facilitates users to access library resources from sites in
hundreds or thousands of miles away. Libraries in academic institutions can now provide
information access to off-campus faculty and students wherever they are located. To meet up the
ever increasing stress for information availability, academic libraries must now subscribe to
electronic resources such as e-books, full-text e-journals and online bibliographic databases in
addition to the printed formats. While the availability of these electronic resources enables remote
access to needed information, concomitantly they present issues and challenges.
Keywords: E-resources,
Academic Libraries
E-resources
Management,
E-resources
access,
Library
automation,
INTRODUCTION
By the turn of the 21st century, library automation and the Internet had revolutionized information access and
library operations around the world. The effect of this revolution has been profound, especially on academic
institutions. Libraries in such institutions can now provide information access to off-campus faculty and students
wherever they are located – even to sites hundreds and thousands of miles away.
To meet the ever-increasing demands from users for remote access to information, academic libraries now
subscribe to electronic resources such as e-books, full-text e-journals and online bibliographic databases, in
addition to housing these resources in their printed formats. While the availability of these electronic resources
enables remote access to needed information, they concomitantly present issues and challenges.
Among these challenging issues facing librarians dealing with these electronic resources are:
Access Control
Workload and Personnel
Volatility in Coverage of Journal Titles by Resource Providers
Overlapping Coverage of Same Journal Titles by Resource Providers
ACCESS CONTROL
With traditional printed journal subscriptions, libraries own the printed issues, which they can bind and archive,
and any library users can come to the library building to use them. The library has total control of these printed
materials and users’ access poses no significant problem, except for the requirement to post copyright notices
adjacent to photocopiers in public areas.
With electronic journals, however, users’ access becomes somewhat problematic, for the following reasons:
Users increasingly do not want to come to the library and expect access to library materials from remote
sites, sometimes even from other countries. This is borne out by majority drop in usage of current issues
of print journals at academic libraries.
ISBN 1-63102-455-8
39
Collection and Preservation of Newspapers: A Case Study
Since electronic materials are no longer physically located in the library, control of access to them is no
longer under the purview of the library but under the dictate of providers, who are the publishers,
vendors, and aggregators.
Library users expect to access all articles seamlessly and readily from all remote sites.
Providers use varying methods and technologies to control access to their products in different ways.
The expectation of library users for seamless access to all articles, and the providers’ non-uniformity of access
delivery is a critical issue many libraries are facing today. This issue is especially compelling for large academic
libraries in India.
Through ID Login and Password.
Through IP authentication.
Through licensing policies.
All three methods pose inherent problems.
ALL THE WAY THROUGH ID LOGIN AND PASSWORD
IDs/Passwords have to be issued to individuals, which may not be feasible in large university settings,
especially for popular resources.
Issued IDs/Passwords can be easily re-distributed by legitimate users to unauthorized users.
Users have to deal with many passwords for a wide variety of titles or systems.
Timeliness of access may be compromised while waiting to get needed IDs/Passwords.
ALL THE WAY THROUGH IP AUTHENTICATION
IP authentication is less intrusive and the preferred mode for most of the libraries because there is no need to
give out passwords to users, there are no passwords for them to remember, and furthermore, libraries do not
have to manage changing passwords mandated by providers. Despite these advantages, access through IP
authentication remains a concern for large academic libraries for the following reasons:
IP addresses are not contiguous in academic institutions with off-site campuses and centers
Some academic institutions provide dial-in through a institutions modem pool where IP filtering may bar
access to remote users
Students and faculty who live and work off-campus increasingly have Ethernet connections instead of
modems, and do not have IP addresses within the IP ranges of the institutions. Instead, they use addresses
provided to them by non-institutions-affiliated Internet Service Providers (ISPs). For them, special
arrangements such as the use of proxy servers that recognize legitimate library users on other
authentication schemes must be put into place.
Many academic institutions are now implementing the systems by which users are not given permanent
IP addresses. These systems dynamically generate and assign IP addresses for the use of one session.
Though these systems of assigning IP addresses represent economies for the communications and
computing centers for the academic institutions, they make tracking of problems by IP addresses
problematic for libraries.
Computers that are locked behind “firewalls” by companies, agencies, or other controlling ISPs cannot be
authenticated by any means and so is barred access to electronic resources of the library.
ALL THE WAY THROUGH LICENSING POLICIES
Some licensing policies tend to be overly restrictive and do not reflect “real world” settings and needs. Some
licensing policies restrict by the sites, which can be defined as on-campus or as narrowly as the library building
itself. Restriction by the site poses problems as more courses and degree programs are being offered off-campus
students and faculty increase in numbers. These off-campus students and faculty are regarded, and rightly so, by
their parent institutions as full-fledged members of their communities. Despite potentially varying distant
locations, these off-campus students and faculty should have exactly the same access privileges and capabilities
as their on-campus counterparts. However, with restriction by the site they could be denied the same privileges
40
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
and capabilities their on-campus counterparts have with regard to information access. A few licensing policies
go as far as restricting by patron types.
HUMAN RESOURCES AND WORKLOAD
With the advent of e-journals, an assumption is often made that providers take over the work previously done by
staff, and that less work from staff is required since “everything is online,” but in reality work is not reduced but
shifted to new activities and responsibilities. Since e-journal collections are located on servers of the resource
providers, library staff have to find new ways to track inventories. Journals have become elusive because they
no longer are physical entities that can be held in the hand and placed in physical locations in library buildings.
They are now tracked in locally maintained spreadsheet, or via online administrative modules made available by
vendors, e.g. Elsevier’s Science Direct, or serials management services such as Serials Solutions.
With literally thousands of e-journals available in large academic libraries, this role involves substantial
investment in time and effort in:
establishing a gateway to providers’ servers
maintaining active and accurate links to journal titles
adding new journal titles
deleting ceased and cancelled titles
tracking titles that provide electronic access with print subscriptions
ensuring coverage changes and title changes are up-to-date
updating URL changes
Since information of this nature is rarely forthcoming from the providers themselves, library staff are at their
own devices to track down the information. Many libraries have allocated at least one full-time position to
overseeing electronic access. As the role of library staff has changed with the advent of e-journals, so has the
role of public service librarians. Some of their new roles include:
Teaching users some core competencies in information access since users are often overwhelmed by all
the materials that libraries make available electronically.
Serving as intermediaries between the library users and the staff who can “fix” access problems
Educating users about what is and is not free access, whether a title is part of a consortia purchase, and if
proxy access is permitted.
Devising easy access for journal articles that become free after some fixed interval of time following their
publication.
INSTABILITY IN COVERAGE OF JOURNAL TITTLES BY RESOURCE CONTRIBUTORS
All libraries providing electronic full-text journals service are well aware of the issue of volatility in journal
coverage and have experienced the frustration involved in coverage maintenance. Coverage volatility often
results from:
Providers dropping, adding, or modifying coverage without notifying their subscribers, and their title lists do not
indicate what has been changed from one update to the next.
Titles changing in an instant, and all traces of former titles disappearing, prompt frequent complaints from users
regarding misleading coverage information. A sterling example is Pro Quest’s is available one day and gone the
next, with everything deleted, current as well as back files. Another example is Elsevier’s Science Direct whose
inclusion of the Supplement of spotty at best.
Coverage lost due to a change in publisher of the journal. For example, Journal of Evolutionary Biology which
was by Elsevier from 1997-1998 switched to Blackwell in 1999. Thus, from 1999 it is no longer available
through Elsevier’s Science Direct but through Blackwell’s Synergy service, without the rights to access being
transferred from Science Direct to Synergy.
ISBN 1-63102-455-8
41
Collection and Preservation of Newspapers: A Case Study
Resource providers’ non-cognizance of libraries’ established rules regarding serial title changes, resulting in
former titles continuing to be listed as current issues on providers’ lists or absorbed into the date range for a new
title.
EXTENT BEYOND THE COVERAGE OF SAME TITLES BY RESOURCES CONTRIBUTORS
Libraries facing shrinking budgets are trying to acquire quality information in the most efficient and effective
means possible. To achieve this, many are joining state, regional, and national consortia for better group
subscription discounts.
Some consortia in India are:
a)
INDEST-AICTE Consortium
b)
UGC-INFONET Consortium
c)
National Knowledge Resource Consortium E-Journals
d)
FORSA
Consortium
(Astronomy
(http://www.iiap.res.in/library/forsa.html)
e)
DAE Library Consortium (http://www.tifr.res.in/~libws/)
f)
CSIR Library Consortium
g)
ISRO Library Consortium
h)
IIM Library Consortium
i)
HELINET
(Rajiv
Gandhi
University
(http://www.rguhs.ac.in/hn/newhell.htm)
j)
ICICI Knowledge Park (http://www.iciciknowledgepark.com/)
k)
ICMR Library Consortium
and
of
Astrophysics
Health
Sciences,
Libraries)
Karnataka)
Even though the price per journal is lower when libraries subscribe to electronic journals through package deals
for consortia from different providers. Besides negating lower prices, overlapping coverage by different
providers create confusion among library users because of their different user interfaces. This in turn creates
challenges for reference and bibliographic instruction for public service librarians.
To alleviate the confusion for users, Academic institutions libraries use an article linking software program to
list multiple resource providers for the same title in order of the most preferred. For example, the High wire
link for a journal could be listed before the Pro Quest link.
CONCLUSION
Throughout the 20th century, librarians have faced and surmounted the challenges posed by new formats of
materials, from print to microforms, audio-visual materials, CD-ROM, computer software, and machinereadable data files. Beginning in the mid-1990s, electronic journal access through the internet has made
librarianship more challenging.
Even though the major issues inherent in electronic access management have been raised, not all have been
resolved. Librarians are continuing to seek ways to make access for users as easy as possible. While they are
confronted with the challenging aspect of hunting for creative solutions, they are rewarded in seeing the surprise
and amazement of users when told that they can access needed journal articles and other library resources with
their computers from their office.
Like colleagues before them, librarians of the 21st century will succeed in surmounting the challenges posed by
electronic access of library resources. Part of their eventual success is because librarians consider challenges not
impediments, but opportunities to improve the accessibility of their clienteles to their libraries’ resources. The
other contributing factor to success is their innate disposition in injecting an element of all their undertakings.
Fun is an essential ingredient in any profession but especially in librarianship. So as long as librarians continue
42
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
to have fun in resolving problems, challenges currently posed by electronic access of information will be
successfully met.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Bookbinder,
D.
and
others.
(n.d.)
Monique
Hypertext
Docuverse.
Available
from:
http://cnsvax.albany.edu/~hfiction/index.html. [ed 1st September 1997. No longer available, 26th December 2002]
Herther, N. (April 2011). The Sizzling E-book Marketplace. Searcher, Vol. 19, Issue 3, pp. 14-23. Herther, N.
(June 2011). From CD-ROMs to E-books. Searcher, Vol. 19, Issue 5, pp. 12-46. International Digital Publishing
Forum. Retrieved from http://idpf.org/
Lynch C. A. The Changing Role in a Networked Information Environment. Library Hi Tech 1997;15:30-38.
Machovec G. Management and Technical Considerations for Acquiring and Accessing Electronic Serials. In Bluh
PM. ed. Managing Electronic Serials. Chicago: American Library Association, 2001. 67-85.
Nisonger TE. Collection Management Issues for Electronic Journals. IFLA Journal 1996;22::233-9.
Orenstein R. The Fullness of Full Text. Database Searcher 1989;5:21Saminather, N. (March 25, 2011). Apple begins global sales of new iPad 2 tablet as competition intensifies".
Bloomberg. Retrieved from http://www.bloomberg.com/news/2011-03-25/apple-begins-global-sales-of-new-ipad2-tablet-as-competition-increases.html
Tonkery, Dan (October 2010). The iPad and its Possible Impact on Publishers and Libraries. Searcher, Vol. 18,
Issue 8, pp. 39-43.
The Electronic Visual Arts Journal (1995) Available from: http://www.uwo.ca/ visarts/eva.html. [ed 1st September
1997. No longer available, 26th December 2002].
ISBN 1-63102-455-8
43
COLLECTION AND PRESERVATION OF NEWSPAPERS: A
CASE STUDY
Dr. Jawahar Lal | Assistant Librarian | Sayaji Rao Gaekwad Library | Central Library | Bararas Hindu
University | Varanasi | jlal0512@gmail.com
Abstract: Newspapers provide a rich sense of detailed history by recording events on a day-byday basis down the years. However, newspapers have presented special challenges for libraries,
such as storage and preservation due to fragility and size. Traditionally therefore, newspapers,
unless microfilmed, have not been afforded a high profile in library holdings. Digital technology
and changes to library collection development policies driven by user demand has emphasized
libraries to reconsider them on incorporating newspapers into their digital collections. This
article presents the nature, feature, importance, factors for damage, care during handling and
preservation aspects of newspapers. The various methods of preservation are discussed in this. It
also represents the short account of newspapers collection and preservation of Banaras Hindu
University Library.
Keywords: Newspapres, Preservation, Conservation, Clippings, Microfilming, Digitisation, Deacidification,
Online Newspaper, Electronic Newspaper, e-Paper, Digital Library, etc.
INTRODUCTION
A newspaper acts an important medium to control corruption and scams. Newspapers are called ‘the mirrors of
the world’. They reflect and report the trends and happening from all parts of the world. The chief topics of
general interest in newspaper include politics, sports, economy, movies, and share market. The substantial
portion of the content of newspaper is devoted to local and international news stories, advertisements,
announcements, opinion, cartoons, sports news and television channel listings and editorial opinion of the
important occurrence. A wide coverage of information is obtained at low cost through newspaper. It also
influences the habit of thinking in men. It has also seen that illiterate adults are taking up education to read
newspaper.
Newspaper is a publication produced on newsprint papers. The frequency of newspaper publication may be
daily, weekly and some fortnightly. Newspaper is the important medium to let the people know about
everything that are happening in their local areas and around the world.
According to Ugah (Ugah, 2009) a newspaper is a written publication containing news, information and
advertising, usually printed on low-cost paper called newsprint. General interest newspapers often contain
feature articles on political events, crime, business, arts, entertainment, society and sports. Besides the
aforementioned news and opinions, the newspapers also include weather forecasts, criticism and reviews of the
arts (including literature, film, television, theater, fine arts, and architecture) and of local services such as
restaurants, obituaries, entertainment features such as crosswords, horoscopes, editorial cartoons, gag cartoons,
and comic strips; advice, food, and other columns. Most traditional newspapers feature an editorial page
containing columns which express the personal or corporate opinion of the writers or publishers. The
supplementary sections of the newspaper contain advertising, comics, coupons and other printed media.
The students and scholars who want to be acquainted in their social and academic interest always look for and
make use of newspaper which is an integral part of today’s information source for them. These are irreplaceable
documents which provide interesting account of local places, events and people.
Banaras Hindu University is an internationally reputed temple of learning, situated in the holy city of Varanasi.
This Creative and innovative university was founded by the great nationalist leader, Pandit Madan Mohan
Malviya, in 1916 with cooperation of great personalities like Dr Annie Besant. It played an important role in the
44
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
independence movement and has developed into the greatest center of learning in India. It has produced many
great freedom fighters and builders of modern India and has immensely contributed to the progress of the nation
through a large number of renowned scholars, artists, scientists and technologists who have graced this
university.
The area of the main campus of this premiere Central University is 1300 acres, having well maintained roads,
extensive greenery, a temple, an air strip and buildings which are an architectural delight. The university
comprises 3 Institutes, 14 Faculties 140 Departments, 4 Inter disciplinary Centers, a constituent college for
women's and 3 Constituents Schools, spanning a vast range of subjects pertaining to all branches of humanities,
social science, technology, medicine ,science, fine arts and performing arts. It has 6 centres of Advanced
Studies, 10 Departments under Special Assistance Programme and a large number of specialized Research
Centers. Four Degree Colleges of the city are affiliated to this University.
The University family consists of about 15000 students, about 1700 teachers, and nearly 8000 non-teaching
staff. A large number of students from foreign countries like the U.S.A, the countries of Europe, Asia, Middle
East, Africa etc., come to study here. The university has taken a leadership role in promoting new ideas, the
spirit of integration of the world, and cultivation of intellect and culture.
The Banaras Hindu University Library system is the largest University Library System in the country. Presently
the Banaras Hindu University Library System consists of Central Library at apex and 3 Institute Libraries, 8
Faculty Libraries, 25 Departmental Libraries, with a total collection of over 13 lakh volumes to serve the
students, faculty members, researchers, technical staff of fourteen faculties consisting of 126 subject
departments of the university.
This study is confined to Banaras Hindu University Library.
HISTORICAL BACKGROUND OF NEWSPAPERS
In 1605 first newspaper ‘Relation aller Furnemmen und gedenckwurdigen Historien’ was published in German
language. In 1780 first Indian newspaper ‘The Bengal Gazette’ was published by James Augustus Hickey. The
Indian Gazette, The Calcutta Gazette, The Madras Courier, The Bombay Herald were other newspapers
published in India in 18th century. The Bombay Herald was followed by the Bombay Courier, which later on
amalgamated with the Times of India in 1861 (Dhiman, 2014).
During 1950s, 214 daily newspapers were published in the India. In 1993 number of newspaper reached to
35595 with 3805 dailies. Hindustan Times, Indian Express, The Pioneer, The Hindu and Times of India are
some of prominent English newspapers of the India while Amar Ujala, Dainik Jagaran, Hindustan, Jansatta, etc
are some of the Hindi newspapers of the country. Besides, there are so many regional newspapers serving
throughout the country. Some regional language newspapers are Aamader Malda (Bengali), Aankhodekhi News
(Gujarati), Anakapalli News (Tamil), Anweshanam (Malayalam), Aurangabadtimes Urdu Daily (Urdu),
Badlapur Vikas (Marathi), Costatimes Telugu News Online (Telugu), Dharitri (Oriya), etc (Dhiman, 2014).
FEATURES OF NEWSPAPERS
The newspapers are important source of information because they contain latest information in the form of
news. The information published in newspapers covers every aspect of society, technology, economic and
cultural scenario prevalent in particular country and around the world. The contents of newspapers are
reasonably accessible to the public, published at regular interval, up to date and cover a range of topics.
The newspapers have achieved a great deal of important in the transmission of government policies, priority
changes and even interest changes. They are recognized as regular source of primary and up to date information.
There is high demand for newspaper by students, scholars, administrators and literate people through selfacquisition, exchange, borrowing from friends, relatives and from libraries (Dhiman, 2014).
IMPORTANCE OF NEWSPAPERS
Newspapers have become an essential part of modern life. The modern man starts his day by reading over the
news with a cup of tea. Equally it is unimaginable for some people in the morning without the daily newspaper
ISBN 1-63102-455-8
45
Collection and Preservation of Newspapers: A Case Study
because reading of newspapers is in habit and is seen everywhere in the world. They are printed and published
in each and every language known to man all over the world. Usually they cover national, international, local,
social, political, cultural, etc. aspects of life. They are designed in a complete picture of our day-to-day life, this
is the reason that all powerful personalities begin their day by reading the newspapers.
Newspapers are the guardians of democracy. They keep the general peoples well-informed to the world about
the goings on. Well-informed public is essential for the success of a democracy. Newspapers perform the duty
of making people aware of everything. They form the public opinion and turn the people for or against the
moves of the rulers. They visualise every aspect including jokes, matrimonial, huddles, scientific facts, and
cinemas, etc.
The newspapers also add to the knowledge of the readers by informing them about the new discoveries,
inventions and products. The magazine sections of newspapers provide a colorful bouquet of information and
entertainment. The advertisement published in the newspapers also serves a great purpose. Matrimonial
advertisements help people to find suitable life partners. Newspapers also help people to buy and sell property.
Newspapers help the job seekers to find suitable jobs through the ‘wanted’ columns. Advertisements help a
great deal boosting up sales of the consumer products and others. Business houses also make great use of the
newspapers to advertise their products and to reach out to their customers. Newspaper also helps people in
investing the money wisely in the stock-market. They play a vital role in life of human beings. Newspapers have
a large part to play in providing us with the latest on the national and the international front. During the period
of a war newspaper gives an hour to hour report of the war front.
Newspapers are a mirror of public opinion too. Through their columns, the public can present their views on
subjects of national and international issues. Letters to the Editor is one very important part of a newspaper.
Newspaper provides us with information collected from around the globe. It also helps to develops new ideas,
and at times guides the common man how to think and discuss.
We may say that today we are living in a newspaper culture. Whether in English or other regional languages,
almost every man gets benefited from newspaper. The dignity and reputation of a newspaper rests on the degree
of their fidelity to truth and fearless reporting. It is our cheapest and most powerful weapon in the last analysis.
The whole earth has become like a global village.
Newspapers promote commerce and trade. They have become a very powerful means of publicity and
advertisement. A businessman can advertise his goods and services in a newspaper. Newspapers serve the cause
of education and make us fit to move in a cultured society. The reading of newspapers will keep us in touch with
the modern world and its affairs. In them there are articles on various subjects. There are special columns for
science and arts. Newspapers are found very useful for competitive examinations. The Sunday issue of the
newspaper is very informative and important. In it we find good articles and interesting stories written by great
writers.
FACTORS FOR DAMAGE OF NEWSPAPERS
The most important and the most frequent damaging factors for newspapers are:
1.
2.
3.
4.
5.
wear and tear,
self-destruction due to the acidity in machine made paper,
large size item on low quality paper printed with poor quality ink,
poor storage conditions, and
air conditions, pollution, etc.
PRESERVATION OF NEWSPAPERS
The librarianship revolves in four steps which are collection of documents appropriate to library, organization of
collected documents, preservation of those documents and dissemination of information in the document and
documents as such.
46
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Preservation is one of the most important functions of every library and information centre to ensure the
protection of information sources of enduring value for access by present and future generations. There are
different ways of preservation of newspapers.
Proper Storage of Newspapers/Hard Copy Preservation
Earlier there was only one process of physical preservation of printed newspapers. Newspaper preservation is a
challenge because newsprint is an inherently unstable paper. Formulated to be inexpensive and expendable,
newsprint is manufactured with large percentages of unpurified wood pulp which contains impurities that
remain in the paper after processing. These impurities, when exposed to light, high humidity and atmospheric
pollutants, promote discoloration and acidic reactions in the paper. Acidity causes the paper fibers to weaken
and break, and is the major culprit in causing the paper to become brittle.
The Ideal condition for preservation of hard copy of newspapers is 60-70 degree Fahrenheit temperature, 40-50
% relatve humidity, protection from light and storage in non damaging materials.
Most of the newspapers do not trust on binding and keeping of old newspapers but some still keep the printed
records. Binding has been a frequently used method for organising and storing newspaper files for many
decades, but it is not recommended. Apart from the expense, binding of newspapers is often damaging to the
text; creates unwieldy volumes that are difficult to handle properly.
Space is the main problem for storing bound volume of newspapers. If retrospective files of newspapers used
fairly frequently, the recommended method is to store the papers flat in boxes. While buffered custom boxes
made to fit each newspaper file would be ideal. Prior to boxing, the newspapers should be stacked neatly,
organised in chronological sequence and a finding aid should be prepared that lists the titles and issues held, to
prevent excessive handling of the issues themselves. The box label should contain the title(s) and range of dates
contained in the box, with a list of missing issues attached to the inside of the box lid for easy reference. The
boxes will provide overall support and will protect the newspapers from light, dust, and insects while allowing
easy access (Dhiman, 2014).
For hard copy preservation of newspapers one side of each paper should be spayed with de-acidification spray.
Good storage is especially critical to the preservation of acidic papers.
The requirements for proper storage of newspapers are1.
2.
3.
4.
5.
A place of cool (room temperature or below), relatively dry (about 35% relative humidity), clean, and
with stable environment.
Minimal exposure to all kinds of light; no exposure to direct or intense light
Distance from radiators and vents,
Supportive protective enclosures of thin sheets of alkaline buffered tissue, and
Flat storage protected within a rigid box or folder.
News Clippings
Another way to preserve information of newspapers is to keep news clippings for future reference. Different
newspaper archives keep the news clippings in an organised way so that it can answer the queries of the users.
Clear polyester sleeves can be useful for clippings and papers that have been deacidified by a conservator. This
is known that polyester sleeves carry a static charge that can damage brittle newspapers, do not have an alkaline
buffer, which provides a desirable neutralizing effect on acids in paper, and add considerable weight and bulk to
storage.
Ideal environment for the preservation of newspapers is dark, stable environment of 60-70 ºF and 40-50%
relative humidity. Newspaper can also be protected by polyester film encapsulation or plastic sleeves.
Encapsulation was developed by the Library of Congress to protect fragile and brittle newspapers. The process
involves placing the sheet of newsprint between two clear sheets of polyester film. The film is sealed around the
edge with a double stick tape or by machines designed to bond the film. The papers which are encapsulated or
ISBN 1-63102-455-8
47
Collection and Preservation of Newspapers: A Case Study
placed in plastic sleeves generate acidic gases and will deteriorate the paper. Chemical stabilization of acids in
paper called deacidification. This process is designed to neutralize the papers acidity and leave an alkaline salt
behind to absorb acids. This chemical treatment does not stop deterioration but it will slow the rate of
deterioration. Deacidification is recommended for all papers that are encapsulated or placed in plastic sleeves
(Das, 2009).
Press Clippings
Press clipping is another form of preservation. It is the most important service in the newspaper library. The
process involves cutting and pasting of important articles and their organization in such a manner that one can
easily get access to the desired article. Good databases of press clippings may be able to answer any query.
Different newspapers follow different procedure for organizing newspaper clippings. For example, The Times
of India (TOI) follows the Dewey Decimal Classification (DDC) classification system while numbering article
for the press clipping database. Earlier press clipping used to be organized in different files and placed in the
library shelves (Das, 2009).
Microfilming
Microfilming is the most important thing in newspaper preservation. Voluminous newspapers can be stored in a
little microfilm roll and this remain intact for next 500 years. It is also called microphotography which is done
by reducing the images by 25 times. Usually 35 mm 100 ft Microfilm roll is used for newspaper microfilming.
Microfilming is one of the most extensively used and common practices in modern reprographic science (Das,
2009).
The first newspaper to be microfilmed was the London Evening News, filmed in 1853 to demonstrate the
viability of microfilming techniques. Nowadays standardized microfilm base is long lasting. Life expectancy of
polyester-based microfilm is approximately 500 years. Microfilm has now become an economical and reliable
means of preserving newspapers (Pai and Pujari).
There are various institutions that have standardized the microfilm production and preservation. There are
number of advantages which made microfilm archivist’s first choice for preservation of newspapers. There is no
issue with hardware or software obsolescence and the microfilm reader is a simple mechanical device with a
light source and magnification. Storage cost is very low and it is difficult to manipulate the content of
microfilm. Film offers excellent compaction and it is lossless. Microfilming is a well researched area so
standards for microfilming are available (Das, 2009).
There are different bases of microfilms used for last several decades. Cellulose-based acetate microfilms were
used for library applications from the 1920s to the 1970s but their life expectancy was not so good. These films
were highly susceptible to chemical deterioration. Preservation of acetate films is done by duplication onto
polyester-base film and treated with polysulfide solution. Silver lock treatment is prescribed by International
Permanence Institute (IPI) as most effective polysulfide treatment. This treatment is a special chemical bath that
makes silver film resistant to the effects of atmospheric pollutants by converting most of the metallic silver that
makes up the image to silver sulfide. Metallic silver is very susceptible to oxidation. It makes film chemically
resistant to damaging atmospheric agents, without altering important film characteristics (Das, 2009).
Silver lock treatment is used for restoration of the microfilm. Another important film base is Diazo. This film is
used mainly for reference purposes, as it can sustain heavy use without scratching. This is usually used for
duplication of microfilm. Diazo film is polyester-based film coated with an emulsion of diazonium salts. Storage
requirements are somewhat less demanding than those of silver-halide film; normally stored in a filing cabinet
in a climate-controlled office environment (Das, 2009).
Acid-free containers are required for microfilm roll preservation. One roll per container is acceptable for
archival purpose. Containers are stored in metal cabinets. Separate archive master, print master, service copy
should be kept so that master copy cannot be used as service copy. For preservation purpose, microfilm shows
very low risk if proper film base, processing, and physical environment is maintained.
48
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
But some challenges are also there. Rework is expensive because it is not just a copy and paste factor. Brittle
newsprint is a major concern for microfilming old newspapers. Oversised pages often create problem for taking
exposure of the film, and illustrations and colour images filming requires proper density of the images.
Microfilms are susceptible to environmental conditions so films should be stored in a cool place. Temperature
and relative humidity should be 68 ºF/ 20 ºC and 40-50% respectively (Das, 2009).
While microfilming remains the most reliable means of preserving the intellectual content of newspapers, many
institutions need to service and store newsprint for long periods of time prior to filming and, in some cases, may
wish to store original copies on a permanent basis.
Digitization of Newspapers
In the age of Internet and information revolution everybody wants information in finger tips. Easy access and
quick search is the prime focus for any researcher. Microfilm neither gives easy access nor provides modern
search facilities so digital preservation is the way to provide quick and easy access. Different newspapers have
started microfilm digitization projects and e-paper archives. Now time has changed and press clippings are
being digitised in different database management systems so that one can search these databases even from
remote location. Most of the newspapers are nowadays opting for digital press clipping service and maintaining
in-house database management systems for keeping records. Important articles are selected, classified, scanned,
indexed and then stored in a safe server.
Times of India (TOI) have two archival systems namely, Times Archival System (TAS), and DATASCAN. The
TAS, an oracle based in-house database which contains digital news clippings of TOI, The Economic Times
(ET) and Delhi Times (DT) since 1997 to 2004. This database follows a client server-based architecture model.
Data are safe as stored in two different servers located in Delhi and Mumbai. TOI started DATASCAN database
management system in 1993. This is a C++ based application. Important news articles of 11 competitive papers
like The Hindustan Times (HT), Indian Express etc. are being preserved. The database has vast collection of 10
lakhs news clippings available in the server. Two servers are being devoted for this database and stored in a cool
place. Computer professionals take regular backup and look after issues related to protection of digital data
(Das, 2009).
For digitisation purpose microfilm is scanned. Scanned images are then converted into digital TIFF format. The
newspaper is segmented into logical components before XML file is then created for each article or
advertisement, and finally index of entire collection is made to make the output searchable. The finished product
presents every edition of publication in its original format. Most of the modern newspaper houses are now
considering the digitisation of microfilms.
Besides the digitisation of old microfilms modern newspapers have come up with e-paper for Internet and for
easy archival. Epaper gives access to the publication in its original format, anywhere, anytime, 24X7 with just a
Web browser and no client software to download. It offers hybrid print and electronic subscriptions to maximise
the value to audience and engage the audiences in multiple formats. It helps in reduction of production and
distribution costs for digital subscribers. Users can easily search, print, and email articles and advertisements.
E-paper facilitates access to the interactive advertisements and editorials and an online/offline subscription that
suits customer’s needs. E-papers have become very popular and most of the newspapers make them available on
their websites. TOI has opted Olive software for production and archival of its e-paper. TOI’s e-archive gives
total freedom of search and one can access it from remote places also. Digital storage may have low to high risk
as format and preservation metadata determines the risk (Kesavan, 2010).
COLLECTION AND PRESERVATION IN BANARAS HINDU UNIVERSITY LIBRARY
The prime source of information of major population in India is newspaper. Procurement of newspapers in the
Banaras Hindu University library is done through local hawker. This library procures 17 newspapers in which
09 are in Hindi and 08 in English. The list of newspapers being procured by this library is given below:
1.
ज
2.
जा ा
ISBN 1-63102-455-8
49
Collection and Preservation of Newspapers: A Case Study
3.
का्प्ट
4.
दनिक जाग
5.
नि्द् ाि
6.
ि््ट
7.
जिसंद टा ्स
8.
जिसता
9.
ार सिा ा
10.
Business Line
11.
Economic Times
12.
Hindustan Times
13.
Indian Express
14.
Pioneer
15.
The Hindu
16.
The Statesman
17.
The Times of India
Library is procuring one more copy of each newspaper to be preserved. From 1980 a policy was framed to
preserve newspapers and four newspapers are being preserved. These papers are Aaj, Times of India, Economic
Times and Navbharat Times. From 2007 only three newspapers are getting bound which are Aaj, Economic
Times and Times of India because the publication of ि ा टा ्स ceased from March 2005.
The bound records of newspapers are as given below:
ज
1.
2.
3.
4.
5.
July 1980 to December 2014
ि ा टा ्स
Times of India (Hindi)
Economic Times
Times of India
July 1980 to February 2005
March 2004 to January 2005
February 1981 to December 2014
July 1980 to September 2007 (New Delhi)
October 2007 to December 2014 (Lucknow)
The information sought by information seekers is given from the preserved records.
PRECAUTION DURING USE OF NEWSPAPERS
One should take proper care when handling newspapers by:
Having clean hands and a clean, large work table on which to use the newspaper,
Keeping the newspaper flat and fully supported on the table during use,
Keeping food and drink away,
Never folding the paper back on itself,
Refolding the paper using the original center fold and with the edges neatly aligned, and
Not using paper clips, "dog ear" folding, acidic inserts, rubber bands, self-adhesive tape,
and/or glue on newspapers and clippings.
CONCLUSION
The newspapers provide current, retrospective and supplementary information. The researchers, historians,
genealogists and others continue to use older newspapers because of immense amount of information is stored
in them. To help the scholars the preservation of newspaper is necessary. The preservation methods of
newspapers are hard copy preservation, newspaper clippings, press clippings, microfilming and digitisation. The
digitization of newspaper presents a wonderful opportunity before the scholars to make available online a rich
source of social history of our country, a memory of our culture. The contribution of newspapers to teaching,
learning and research in providing information is also important.
The Banaras Hindu University Library preserves only few newspapers in bound form which is very useful to
scholars in their teaching, learning and research. Although bound form of preservation of newspaper is cheap
but by seeing it utility the library must think to digitize it.
50
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
REFERENCES
[1]
[2]
[3]
[4]
[5]
Das, Somnath (2009). Preservation of newspapers. DESIDOC Journal of Library & Information Technology, Vol.
29, No. 1, January 2009, p. 72-75.
Dhiman, Anil Kumar (2014). Importance of newspapers in libraries and newspaper preservation: Must for
preserving history. Indian Journal of Information, Library & Society, 27(3-4), July-December 2014, p.175-188.
Kesavan, R. Venkata, et. al. (2010). Digital preservation and access to print Media resources: experiences at the
times archives and knowledge centre, india In Digital Preservation and Access to News and Views: IFLA
International Newspaper Conference 2010 held at IFLA Newspaper Section, Indira Gandhi National Centre for
Arts, New Delhi from 25-28 February 2010, p. 101-114.
Pai, Priya and Pujar, Anita. Newspaper archives – a knowledge asset. Available at
file:///I:/Downloaded%20Articles/04.07.2015/Newspaper_Archives_ICIM_2005.pdf (accessed on 14.07.2015).
Ugah, Akobundu Dike (2009). Strategies for preservation and increased access to newspapers in Nigerian
University
libraries.
Library
Philosophy
and
Practice,
June
2009.
Available
at:
http://digitalcommons.unl.edu/libphilprac/270.
ISBN 1-63102-455-8
51
THE ROLE OF COMPUTER AND INTERNET IN
EDUCATION
Rahul Mittal | Associate Professor | Tecnia Institute of Advanced Studies | Rohini | Delhi |
rahul.rahlmus@gmail.com
Vipul Partap | Assistant Professor | Maharaja Agresen Institute of Management Studies | Rohini | Delhi |
vipulpartap@rediffmail.com
Abstract : Computer and Internet play a significant role in education sector. The role of
Information communication technology (ICT) in education at present is influencing every aspect
of human life. The technology is playing its important role in work places, business, education,
and entertainment. ICT is being recognized by the people as catalysts for change; change in
working conditions, handling and exchanging information, teaching methods, learning
approaches, scientific research, and in accessing information.
Therefore, this paper discusses the roles of ICT, the promises, limitations and key challenges of
integration to education systems. The paper tells us about the benefits of ICT in education; the
existing promises of ICT use in education systems of some developing countries and the
limitations and key challenges of ICTs integration to education systems. But regardless of all the
limitations, ICT benefits education systems to provide quality education in alignment with
constructivism, is a contemporary paradigm of learning.
Key words: Computer, Internet, Information, Communication, Technology, Teaching Methods, Education.
INTRODUCTION
ICTs are making dynamic changes in society. They are influencing all aspects of life. The influences are felt
more and more at schools. Because ICTs provide both students and teachers with more opportunities in adapting
learning and teaching to individual needs, society is, forcing schools aptly respond to this technical innovation.
ICTs greatly facilitate the acquisition and absorption of knowledge, offering developing countries
unprecedented opportunities to enhance educational systems, improve policy formulation and execution, and
widen the range of opportunities for business and the poor. One of the greatest hardships endured by the poor,
and by many others, who live in the poorest countries, in their sense of isolation, and ICTs can open access to
knowledge in ways unimaginable not long ago.
In Watson’s (2001) description, ICTs have revolutionized the way people work today and are now transforming
education systems. As a result, if schools train children in yesterday’s skills and technologies they may not be
effective and fit in tomorrow’s world. This is a sufficient reason for ICTs to win global recognition and
attention. For instance, ICTs are dependable tools in facilitating the attainment of one of the Millennium
Development Goals (MDGs), which is achievement of universal primary education by the year 2015. Kofi
Anan, the former United Nations Secretary General, points out that in order to attain the goal of Universal
Primary Education by the year 2015; we must ensure that information and communication technologies (ICTs)
unlock the door of education systems. This indicates the growing demand and increasingly important place that
(ICTs) could receive in education. Since ICTs provide greater opportunity for students and teachers to adjust
learning and teaching to individual needs, society is, forcing schools to give appropriate response to this
technical innovation.
Even though ICT play significant roles in representing equalization strategy for developing countries, the reality
of the digital divide- the gap between those who have access to, and control technology and those who do not,
make a huge difference in the use of ICT. This means, that the introduction and integration of ICTs at different
levels and various types of education is the most challenging undertaking. Failure to meet the challenges would
52
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
mean a further widening of the knowledge gap and deepening of existing economic and social inequalities
among the developed and the developing countries.
The purpose of this article is to discuss the benefits of ICT use in education, in the enhancement of student
learning and experiences of some countries in order to encourage policy makers, school administrators, and
teachers pay the required attention to integrate this technology in their education systems. It highlights the
benefits of ICT in education, existing promises, and the limitations and challenges of integration to education
systems.
Operational definition of terms Information Communication Technologies (ICT) refers to the computer
and internet connections used to handle and communicate information for learning purpose.
E learning: - is a learning program that makes use of an information network- such as the internet, an intranet
(LAN) or extranet (WAN) whether wholly or in part, for course delivery, interaction and/or facilitation. Webbased learning is a subset of e learning and refers to learning using an internet browser such as the moodle,
blackboard or internet explorer (Tinio, 2002).
Blended Learning: - refers to learning models that combines the face-to-face classroom practice with elearning solutions. For example, a teacher may facilitate student learning in class contact and uses the moodle
(modular object oriented dynamic learning environment) to facilitate out of class learning.
Constructivism: - is a paradigm of learning that assumes learning as a process individuals ‘’construct’’
meaning or new knowledge based on their prior knowledge and experience (Johassen, 1991). Educators also call
it the emerging pedagogy in contrast to the long existing behaviorism view of learning.
Learner-centered learning environment: - is a learning environment that pays attention to knowledge, skills,
attitudes, and beliefs that learners bring with them to the learning process where its impetus is derived from a
paradigm of learning called constructivism. It means students personal engagement to the learning task using the
computer and or the internet connection.
THE BENEFITS OF ICT IN EDUCATION
The uses of ICT is making major differences in the learning of students and teaching approaches. Schools in the
Western World invested a lot for ICT infrastructures over the last 20 years, and students use computers more
often and for a much larger range of applications (Volman, 2005). Several studies reveal that students using ICT
facilities mostly show higher learning gains than those who do not use. For instance, Kulik’s (1994) finding
across 75 studies in the United States showed the following.
Students who used computer tutorials in mathematics, natural science, and social science score significantly
higher on tests in these subjects. Students who used simulation software in science also scored higher. The
findings also indicated that primary school students who used tutorial software in reading scored significantly
higher on reading scores. Very young students who used computers to write their own stories scored
significantly higher on measures of reading skill. Moreover, students who used word processors or otherwise
used the computer for writing scored higher on measures of writing skill. Furthermore, the use of ICTs in
education also shifts the learning approaches. As put by (Bransford, Brown, and Cocking, 1999) cited in
Volman (2005), there is a common belief that the use of ICTs in education contributes to a more constructivist
learning and an increase in activity and greater responsibility of students. This limits the role of the teacher to
supporting, advising, and coaching students rather than merely transmitting knowledge. The gradual progress in
using computers changes from learning about computers, to learning computers, and finally to learning with
computers (Volman, 2005).With respect to introducing ICT technologies in schools, Olson (2000) advises to
explore the following questions as bases for in service teacher education. These are
How can the theoretical ideas tested in practice?
What does practice say back to these theoretical ideas?
How is useful negative feedbacks obtained?
ISBN 1-63102-455-8
53
The Role of Computer and Internet in Education
What might be substantive talking points about the new processes? What is practical from a classroom
perspective?
What does talking about the new say about the nature of existing technology? Is it adequate?
What scaffold needs for the next stage?
On the other hand, teachers’ reluctance to adopt innovations need to be seen in the context of existing
technology and commitments. Fullen (1989) cited in Watson (2001) states that change or improvement can
happen at schools if teachers understand themselves and understood by others. For instance, many teachers are
currently not in a position to make informed judgments on ICTs to support their teaching goals. Clearly a variety
of factors still do make using ICT in the curriculum problematic (Watson, 2001). Because of this, the influence
of ICT did not bring revolutionary changes at schools. For instance, the National ICT survey in the Netherlands
shows that most primary-school students use computers less than once a week and there are still many
secondary school teachers who do not use ICT at all (Volman, 2005). Most often, they use computers for drilland-practice and word processing.
In recent years however, there has been a growing interest to know how computers and internet can best utilized
to improve effectiveness and efficiency of education at all levels and in both formal and non formal settings. As
there is a shift of theories explaining learning processes, ICTs become handmaiden for learning activities.
Voogt’s (2003) description on the major roles, distinguished ICTs as an object for study, an aspect of a
discipline or a profession, and a medium of instruction. As a medium of instruction, ICTs fit to realize and
implement the emerging pedagogy of constructivism (Davis, 1997; Office of Technology Assessment, 1995;
Panel on Educational Technology, 1997; Watson, 1996) in Voogt (2003). Moreover, Voogt (2003) differentiated
between traditional learning setting and constructivist approaches. The former considers learning as
transmission of knowledge to students, which is the sole responsibility of the teacher. On the other hand, the
constructivist approach considers learning as authentic and learner centered. ICT, the computer for example is a
great help in the constructivist approach, where one can design simulated and individualized learning
environments to students.
Tinio (2002) describes each of the pedagogic aspects in the table above in terms of implication for ICT use as
follows.
Active learning: - ICT-enhanced learning mobilizes tools for examination, calculation and analysis of
information in order to provide a platform for student inquiry, analysis and construction of new information.
The learners therefore, learn as they do and, whenever appropriate work on real-life problems in-depth.
Moreover, ICT makes the learning less abstract and more relevant to their life situations. In contrast to
memorization-based or rote learning, that is the feature of traditional pedagogy; ICT-enhanced learning
promotes increased learner engagement. ICT-enhanced learning can also be ‘just-in-time’ learning that the
learners choose what to learn when they need.
Collaborative learning: - ICT-supported learning encourages interaction and cooperation among students,
teachers, and experts regardless of where they are. Apart from modeling real world interactions, ICT-supported
learning provides opportunity to work with students from different cultures, thereby helping to enhance learners
teaming and communication skills as well as their global awareness. It models learning done throughout the
learner’s lifetime by expanding the learning pace to include not just peers but also mentors and experts from
different fields.
Creative learning: - ICT-supported learning promotes the manipulation of existing information and the creation
of real-world products rather than the duplication of received information.
Integrative learning: - ICT-enhanced learning promotes a thematic integrative approach to teaching and
learning. This approach eliminates the artificial separation between the different disciplines and between theory
and practice, which characterizes the traditional approach.
54
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Evaluative learning: - ICT-enhanced learning is student-directed and diagnostic. Unlike static, text or printbased education, ICT-enhanced learning recognizes the presence of different learning pathways to explore and
discover rather than merely listen and remember.
The discussion above clearly elaborates the role of ICTs in facilitating the pedagogy of schools in the
information society. As put by (Davis, 1997; Office of Technology Assessment, 1995; panel of Education
Technology, 1997; Watson, 1996) in Voogt (2003), ICT is becoming more fitting to realize and implement the
emerging pedagogy of constructivism. Nevertheless, an International study by Pelgrum and Anderson (1999) in
Voogt (2003) shows a major obstacle for ICT integration in education and that is the difficulty of integrating
computers and internet into classroom practices. Teachers’ lack of competence and enthusiasm to use computers
in the instructional processes also contribute for the difficulty. However, in order to improve, and make optimal
use of ICTs, changes in the pedagogic approaches and classroom strategies as well as integrating ICT in teacher
training and staff development practices accompanied by teacher motivation schemes are imperative. Generally,
Voogt (2003) describes the following functions of ICT in education.
ICT as object. It refers to learning about ICT. Mostly organized in a specific course. What is being learned
depends on the type of education and the level of the students? Education prepares students for the use of
ICT in education, future occupation, and social life.
ICT as an ‘assisting tool’. ICT is used as a tool, for example while making assignments, collecting data and
documentation, communicating, and conducting research. Typically, ICT is used independently from the
subject matter.
ICT as a medium for teaching and learning. This refers to ICT as a tool for teaching and learning itself, the
medium through which teachers can teach and learners can learn. It appears in many different forms, such
as drill and practice exercises, in simulations and educational networks.
ICT as a tool for organization and management in schools.
EXAMPLES OF ICT USE IN EDUCATION SYSTEMS OF DEVELOPED COUNTRIES
Most of the developed countries have applied ICTs in the 1980s to the level of K- 12 education for a variety of
reasons, which are still valid. Some of the reasons as discussed by Pedro and et.al (2004), are as follows:
A new society requires new skills - ICTs increasingly pervade every aspect of life (work, learning, leisure,
and health). Because ICTs are excellent tools for information processing, the new generation needs to
become competent in their use, should acquire the necessary skills, and therefore must have access to
computers and networks while at school (Kok, 2007). Schools are information and knowledge holding
institutions. Therefore, ICT should be fundamental information management tool at all levels of an
educational system, from classroom to ministries.
A Quest for Quality learning - Schools should profoundly revise present teaching practices and resources
to create effective learning environments and improve life-long learning skills and habits in their students.
ICTs are versatile, and powerful tools that can help in this purpose and should therefore present in every
classroom, library and teacher room.
Developed nations are using ICT in their education systems. For instance, in the United Kingdom, ‘rising of
standards’ of teaching and learning has become intertwined with the use of ICTs (Watson, 2001). Using
digital technology for improving the delivery of education has enormous potential to raise standards and
increase employability.
77% of Swiss students reported using a computer several times a week to prepare their courses and
assignments. Only 3% reported never using a computer for course preparation. As indicated in the OECD
(2002) document, the average number of students per computer is an indicator of students’ accesses to new
technologies. As some data from OECD (2002) shows, the percentage of students with access to computer
varies from 25% in Italy to 90% or more in Canada, Finland, and New Zealand. Computer use also varies
between students of primary and secondary schools; where the later generally having greater access.
Implications of ICT-Enhanced Education for Policy and Planning:- There is a common belief that ICTs
ISBN 1-63102-455-8
55
The Role of Computer and Internet in Education
have significant contributions to changes in teaching practices, school change and innovations, and
community services. Thus, policy makers and project leaders should think in terms of input factors that can
work together to observe the right impact of ICT in education. Matching the introduction of computers with
national policies and programs related to changes in curriculum, pedagogy, assessment, and teacher training
is more likely to result in greater learning of students and other out comes (Kozma, 2005). OECD’s
international survey (2002) of upper secondary schools in 17 countries reveals computer availability for
students; use of ICTs by teachers; ICTs activities as a part of student assignment; the role of ICTs in
teaching and learning; staff development; co-operation with other sch1ools and organizations; and obstacle
to using ICTs in schools and found great variations among the countries with respect to the mentioned
variables.
PROMISES OF ICTS USE IN DEVELOPING COUNTRIES
The World Links program The World Links program is a good initiation in the form of a project, originally
managed by the World Bank to place internet-connected computers in secondary schools and train teachers in
Africa, Latin America, the Middle East, and South and Southeast Asia. The goal of the program is to improve
educational outcomes, economic opportunities, and global understanding for youth using information
technology and new approaches to learning. Services provided by the program include:
Feasibility studies and consultation on connectivity solutions and telecenter management.
Internet connectivity for secondary schools in developing countries.
School-to-school partnerships, as well as regional and global partnerships with public, private, and
non-governmental organizations.
Teacher professional development on issues of technology in the context of innovative pedagogy.
Workshops for policy makers on coordination of policies and implementation strategies.
With the help of the World Links program, many countries are now using ICTs as ways of providing teachers
with new skills and introducing innovative pedagogies in the classroom. For example, teachers in Chile acquired
familiarity with computers for professional (eg. student marks, parent reports) and out-of-classroom tasks (e.g.
searching for educational content on the web and lesson-planning activities). The program also provides 200
hours of teacher training that include an introduction to ICT, use of the internet for teaching and learning, use of
tele-collaborative learning projects, integration of ICTs into the curriculum and teaching, and innovative
pedagogical approaches. Because of this, majority of teachers and school principals report that teachers trained
with computer and teaching skills gained positive attitudes about technology and about teaching.
Moreover, some Asian countries such as India, Thailand, and Indonesia realized the importance of ICT
integration to their education policies. They are also investing in ICT infrastructure for schools and creating
network links of education institutions. On the other hand, developed countries are now making online
education, smart schools, and virtual universities more of a norm. Developing countries are also fast catching.
For instance, the Government of India, announced an ambitious program titled ‘Vidya vahini’ that is to create
computer laboratories with facilities like internet access, an online library, academic services and web-casting
across 60 thousand schools in the country in 2003. Vietnam has also invested to develop a computer based
information network system for education called Education Network (EdNet) and improve computer facilities at
educational institutions. EdNet is the country’s first step towards developing a computer based information
network system for education. Thailand also launched School Net, which has connected 4758 schools
throughout the country. School Net Thailand is using the internet to improve the overall standard of education in
the country by reducing the gap in quality of education between schools in urban and rural areas. Pakistan
invested 5.18 million US dollar to provide connectivity across universities, secondary and primary schools in
2003. ICTs make curriculum implementation learner-centred with a self-learning environment that enables the
student customize his/her own learning experiences. In this respect, Malaysia initiated the concept of smart
school, a learning institution with objectives to foster self-assessed, self-paced, and self-directed learning
through the application of ICTs. The Sri Lankan Government also runs several key initiatives connecting 92
education centres across provinces, regions and sectors to the ministry, and developing computer-training
centres at 8 hundred selected schools. In Namibia, integrating ICT into education and training systems, issues of
56
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
access to the local and global knowledge and information found to be important. For this, the education and
training sector created the ICT policy for education to enhance the use and development of ICT for education
and training. Hence the five distinct development areas for the use of ICT mentioned in the policy are:
(1) Investigation and development of appropriate ICT solutions
(2) Deployment of ICT
(3) Maintenance and support of ICT
(4) ICT literacy
(5) ICT integration.
The policy document also describes the provision and advantages of ICT as follows:
ICT provides a great deal of advantage in the delivery of equitable quality education thereby providing an
opportunity to improve the lives of our people. The need to use new technologies to raise the quality and
efficiency of education cannot be overemphasized. It is imperative that we expose our children, parents, and
teachers to ICT to improve the quality of education and technical proficiency of our human resources, thus
leading to increased productivity and accelerated development. We must also prepare our citizens to adapt to the
global economy and participate in electronic commerce. In addition, we must provide our children with a greater
understanding of other peoples and cultures, thus defending our renewed legacy of peace and tolerance.
Moreover, few of ICTs benefits to the classroom and the education process mentioned in the document are that
ICTs:
Offer the opportunity for more student-centered teaching.
Provide greater opportunity for teacher-to-teacher and student-to-student communication and collaboration.
Give greater exposure to vocational and workforce skills for students.
Provide opportunities for multiple technologies delivered by teachers.
Create greater enthusiasm for learning amongst students.
Provide teachers with new sources of information and knowledge.
Prepare learners for the real world.
Provide distance learners country-wide with online educational materials.
Provide learners with additional resources to assist resource-based learning.
Furthermore, the document states ICTs to cover all the technologies used for holding and communicating
information and their use specifically in education with overall policy goals of:
Producing ICT literate citizens.
Producing people capable of working and participating in the new economies and societies arising from
ICTs and related developments.
Leveraging ICT to assist and facilitate learning for the benefit of all learners and teachers across the
curriculum.
Improving the efficiency of educational administration and management at every level from the classroom,
school library, through the school and on to the sector as a whole.
Broadening access to quality educational services for learners at all levels of the education system.
Set specific criteria and targets to help classify and categorize the different development levels of using ICT
in education.
LIMITATIONS OF ICT USE IN EDUCATION
ICT as a modern technology that simplifies and facilitates human activities is not only advantageous in many
respects, but also has many limitations. Many people from inside and outside the education system, think of ICT
as “Panacea” or the most important solution to school problems and improvements. However, many conditions
can be considered as limitations of ICT use in education. The limitations can be categorized as teacher related,
student related, and technology related. All of them potentially limit the benefits of ICT to education.
ISBN 1-63102-455-8
57
The Role of Computer and Internet in Education
Teachers’ attitude plays an important role in the teaching-learning process that utilizes computers and internet
connections. Although teachers’ attitude towards use of these technologies is vital, many observations reveal
that teachers do not have clarity about how far technology can be beneficial for the facilitation and enhancement
of learning. Of course, some teachers may have positive attitudes to the technology, but refrain from using it in
teaching due to low self-efficacy, tendency to consider themselves not qualified to teach with technology. In this
respect, Bandura (1986) describes self-efficacy as “individual’s opinion of capabilities to organize and perform
courses of actions to achieve particular types of performances.” Moreover, as identified by Brosnan (2001),
attitude, motivation, computer anxiety, and computer self-efficacy are factors affecting teachers’ use of
computers in their lessons. Teacher resistance and lack of enthusiasm to use ICT in education may also be
another limitation.
Furthermore, many teachers may not have the required IT skills and feel uncomfortable, nor do they have
trainings needed to use the technology in their teaching. Unless teachers develop some basic skills and
willingness to experiment with students, ICT use in education is in a disadvantage (Brosnan, 2001).
On the other hand, the limitation of ICT use in education is related to student behaviour. Appropriate use of
computer and the internet by students have significant positive effects on students’ attitude and their
achievement. Students tend to misuse the technology for leisure time activities and have less time to learn and
study. Yousef and Dahmani (2008) described online gaming, use of face book, chat rooms, and other
communication channels as perceived drawbacks of ICT use in education, because, students easily switch to
these sites at the expense of their study. Internet access at home, for instance, may be a distraction because of
chat rooms and online games, reducing the time spent in doing assignments and learning (Kulik, 1994).
Therefore, the impact of availability of ICT on student learning strongly depends on its specific uses.
If ICT is not properly used, the disadvantage will overweight the advantage. For example, while students use the
internet, it may confuse them by the multiplicity of information to choose from. As a result, the teacher spends
much time to control students from websites unrelated to the learning content. The various literature in the area,
identify the following limitations of ICT use in education as related to student behaviour.
Computers limit students’ imaginations.
Over-reliance on ICT limits student’s critical thinking and analytical skills.
Students often have only a superficial understanding of the information they download.
Computer-based learning has negative physical side-effects such as vision problem.
Students may be easily distracted from their learning and may visit unwanted sites.
Students tend to neglect learning resources other than the computer and internet.
Students tend to focus on superficial presentations and copying from the internet.
Students may have less opportunity to use oral skills and hand writing.
Use of ICT may be difficult for weaker students, because they may have problems with working
independently and may need more support from the teacher.
The other limitation of ICT use in education is technology related. The high cost of the technology and
maintenance of the facilities, high cost of spare parts, virus attack of software and the computer, interruptions of
internet connections, and poor supply of electric power are among the technology related limitations of ICT use
in education.
THE KEY CHALLENGES OF ICTS INTEGRATION IN EDUCATION
The integration of ICTs in education systems may face various challenges with respect to policy, planning,
infrastructure, learning content and language, capacity building and financing. ICT-enhanced education requires
clearly stated objectives, mobilization of resources and political commitment of the concerned bodies. Tinio
(2002) discusses issues such as analysis of current practices and arrangements, identification of potential drives
and barriers, curriculum and pedagogy, infrastructure and capacity building to be considered in the formulation
of policy and planning. In addition, it is wise to specify educational goals at different education and training
levels as well as the different modalities of ICT use that can facilitate in the pursuit of the goals. Policy makers
58
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
then, need to know the potentials of ICTs in applying different contexts for different purposes. Other
challenging points at the level of policy and planning are identification of stakeholders and harmonization of
efforts across different interest groups, the piloting of the chosen ICT-based model, and specification of existing
sources of financing and the development of strategies for generating financial resources to support ICT use
over the long term.
The infrastructure challenges that may exist are absence of appropriate buildings and rooms to house the
technology, shortage of electric supply and telephone lines, and lack of the different types of ICTs. Because of
this, one need to deal with infrastructure related challenges before the planning of ICTs integration to education
systems.
With respect to challenges of capacity building, we have to develop competencies of teachers and school
administrators for the successful integration of ICT in the education system. In fact, one impeding factor of ICTs
integration in education systems is the skill gap of people implementing it (Tinio, 2002). For instance, teachers
need professional development to gain skills with particular applications of ICT, integration into existing
curricula, curricular changes related to its use, changes in teacher role, and on underpinning educational theories
such as constructivism/or student-centered learning. Because of this, any attempt of ICT integration in education
should parallel with teachers professional development. The school leadership also plays a key role in the
integration of ICT in education. Lack of support from the school administration is also a big challenge. Thus, for
the effectiveness of ICT integration, administrators must be competent and have a broad understanding of the
technical, curricular, administrative, financial, and social dimensions of ICT use in education.
Furthermore, learning content and language also challenge the integration of ICT in education. Content
development is a critical area that educators overlook. In integrating ICT in education, we have to care for the
relevance of the learning content to the target groups. With respect to language, English is the dominant
language in many of educational software, while English language proficiency is not high in many of the
developing countries, and this is one barrier in the integration of ICT to education. Another great challenge is
the financing. ICTs in education programs require large capital investment and developing countries need to
predict the benefit of ICT use to balance the cost relative to the existing alternatives. Potential sources of money
and resources for ICT use programs suggested are grants, public subsidies, fund-raising events, in kind support
from volunteers, community support, revenues earned from core business, and revenues earned from ancillary
activities (Tinio, 2002). Overcoming the mentioned challenges may help education systems benefit the most
from this technology.
SUMMARY AND THE WAY FORWARD
Information communication technologies are influencing all aspects of life including education. They are
promoting changes in working conditions, handling and exchanging of information, teaching-learning
approaches and so on. One area in which the impacts of ICT is significant, is education. ICTs are making major
differences in the teaching approaches and the ways students are learning. ICT-enhanced learning environment
facilitates active, collaborative, creative, integrative, and evaluative learning as an advantage over the traditional
method. In other words, ICT is becoming more appropriate in the realization and implementation of the
emerging pedagogy of constructivism that gives greater responsibility of learning for students. Several surveys
are showing that ICT use in education systems of developed nations has comparatively advanced than ICT use
in education systems of developing nations. In addition, the major promises of ICTs use in education systems of
developing countries focus on training teachers in new skills and introducing innovative pedagogies into the
classrooms, investing on ICT infrastructure for schools and creating networks among educational institutes,
improving overall standard of education by reducing the gap in quality of education between schools in urban
and rural areas, initiation of smart school with objectives to foster self-paced, self-assessed, and self-directed
learning through the applications of ICTs, and developing ICT policy for education and training. The major
limitations of ICT use in education are teacher related, student related, and technology related. In addition, the
key challenges of ICTs integration into education systems discussed relate to policy, planning, infrastructure,
learning content and language, capacity building and financing.
ISBN 1-63102-455-8
59
The Role of Computer and Internet in Education
ICTs, despite their known limitations, are believed to be beneficial in this regard. The computer and the internet
are especially useful to enhance student engagement in learning and positively impact student performance and
achievement. Moreover, their usefulness is more apparent in the 21st century, where the time is an era of
information rich that the conventional modes of teaching learning could hardly handle it. This article strongly
recommends the mainstreaming of ICT utilization (particularly the computer and internet) in education systems
at levels, for they benefit curriculum implementation and enhanced student learning. Therefore, education policy
makers, educators and all concerned should evaluate and recognize the roles of ICT in education in order to
work for the effective functioning of this technology in their education systems.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
60
Bandura, A. (1986). Social foundations of thought and action: A Social-Cognitive View. Englewood cliffs, NJ:
Prentice-Hall.
Brosnan, T. (2001). Teaching Using ICT. University of London: Institute of Education.
Carnoy, M. (2002). ICT in Education: Possibilities and Challenges. (Downloaded from: http://www. uoc.edu, 04
March 2011).
Hare, H. (2007). Survey of ICT and Education in Africa: Ethiopia Country Report (ICT in Education in Ethiopia).
www.infodev.org downloaded February 28.
Jonassen, D.H. (1991). Objectivism versus constructivism: Do we need a new philosophical paradigm?
Educational Technology Research and development, 39(3), 5-14.
Kok, A. (2007). ICT Integration into Classrooms: Unpublished literature review.
Kozma, R.B, (2005).National policies that connect ICT-based education reform to economic and social
development. An interdisciplinary journal of humans in ICT environment 1(2) 117-156.
Kulik, J.A. (1994).Meta-analytic studies of findings on computer-based instruction. In J.E.L.Baker &H.F.O’Neil
(Ed.), Technology Assessment in Education and Training. Hillsdale, NJ: Lawrence Erlbaum.
OECD. (2002). ICT: Policy Challenges for Education. Planning Meeting, Agenda and Issue Paper. (Retrieved
from https://www.oecd.org/LongAbstract on December 2009).
Olson, J. (2000). Trojan horse or Teacher’s Pet? Computer and the Culture of the School. Journal of Curriculum
Studies, 32 (1), 1-8.
Pedro et.al. (2004). Technology in Schools: Education, ICT and the Knowledge Society. (Retrieved from
http://www.worldbank.org/education/pdf/ic t_report_oct04.pdf on December 2009).
Tinio, V.L. (2002). ICT in Education: UN Development Programme. (Retrieved from http:www.eprmers.org on
December 2009).
UNDP. (2004). Promoting ICT for Human Development. A Pioneering Regional Human Development Report in
Asia in 2004: Realizing the Millennium Development Goals (Retrieved from http://www.apdip.net/projects/rhdr
/resources/PDF on December 2009.
Volman M. (2005). Variety of roles for a new type of teacher. Educational technology and the teacher profession.
Teacher and Teacher Education, 21, 15-31.
Voogt, J. (2003). Consequences of ICT for aims, contents, processes, and environments of learning. In J. van den
Akker, W. Kuiper & U. Hameyer (Eds.), Curriculum landscapes and trends (pp 217 – 236). Dordrecht: Kluwer
Academic Publishers.
Watson, D.M. (2001). Pedagogy before Technology: Re-thinking the Relationship between ICT and Teaching.
Education and Information Technologies, 6, 4, 251-266.
Yousef, A. B. and Dahamini, M. (2008). The Economics of E- Learning: The Impact of ICT on Student
Performance in Higher Education: Direct Effects, Indirect Effects and Organizational Change (http://rusc.uoc.edu,
downloaded March 4, 2011).
Fisseha Mikre, (July, 2011), Ethiop. J. Educ. & Sc. Vol. 6 No 2; The Roles of Information Communication,
Technologies in Education, Review Article with Emphasis to the Computer and Internet.
ISBN 1-63102-455-8
MOBILE TECHNOLOGY AND APPLICATIONS FOR
LIBRARIES
Rajeev Kumar | Assistant Librarian | Apeejay School of Management | Dwarka | Delhi | rajapj16@yahoo.in
Abstract: This paper highlights an introductory view about library and information services on
mobile devices. It attempts to identify key issues including factors affecting implementation of
mobile technologies. Mobile technology will bring about a paradigm shift from the traditional
methods of information delivery and integrate ICT as an essential component in every days lives.
This study may be helpful in identifying and generating Mobile based service for libraries.
Keywords: ICT, Mobile Technology, Mobile Applications, Library Services and M-Learning.
INTRODUCTION
The mobile applications and technology has changed the way one connects and interacts with the world and
mobile library services can meet people's needs for information in a fast-paced society. The paper defines what
the Mobile Technology is, how the traditional library services are now moving to mobile library information
services. A library may reach the remote users effectively by adopting of mobile technology in its services.
Now users expecting, or preferring, to do things online that would previously have required a visit to the library
in person.
Mobile technology is a wireless technology that work with radio waves and can be carried about and used
anywhere. The wireless technology and mobile phones are becoming an integral part of everyday life and are
changing the way one connects and interacts with the world.
Mobile phones have operating systems to run applications, access the internet, allow downloads, support
multiple e-mail accounts, create and edit documents, create playlists and even provide location/direction via
GPS. Mobile phones capable of accessing the internet to current day ‘super phones’ with capabilities equivalent
to minicomputers and laptops. (Wikipedia 2011).
We consider mobile technologies; the first device that comes to mind has to be the cell phone or the smart
phone. Beginning to the mobile technology in the library can want to have a mobile-based website or a mobile
application ‘app’ that reads well on small screens. These sites or apps do not need too much web design
knowledge because well-designed mobile sites do not have complicated code or scripting languages and can be
designed in-house.
Fig.1: Mobile Video Communication
Mobile technologies have made communication and information access very convenient and timely to users
from the comfort of their own homes and offices, and from wherever they are while on the move with their
cellular phone units or PDAs (personal digital assistants). The new ways of working afforded by mobile
technologies are often characterized in terms of access to information and people anytime, anywhere.
ISBN 1-63102-455-8
61
Mobile Technology And Applications For Libraries
With advancements in technology and the rise in mobile phone use, people are taking advantage of being
connected to data wherever they are. Mobile phones aren’t just phones anymore: they can access e-mail, search
the Web, video chat, and play games. Even mobile devices like iPad and iPod touch can bring social media,
productivity tools, and entertainment literally into the palm of your hand.
Therefore, libraries should be exploring mobile devices as a way to connect with patrons. Creating a library
application (“app”) or mobile Web site that allows patrons to access library hours, view their library account or
even search databases is easier than most people think.
Mobile technologies are becoming an increasingly important and popular in how we search, access, and interact
with information. Libraries around the world are meeting this change head on by adapting our services and
collections to the proliferation of mobile devices. Mobile technologies being used in libraries for Library
resources that are mobile access to library collections such as e-books, e-journals, and special collections, that
are supporting or extending traditional library services like reference enquiries and circulation, using mobile
technologies.
Mobile technology has changed everyone’s workflows, with many researchers and students now expecting, or
preferring, to do things online that would previously have required a visit to the library in person. These
activities could include:
Accessing their library account
Finding and saving references for reading or citing, now or at a later date
Reading the full digital content, such as journal articles or eBooks, that they would normally read on
their desktop
Reading abstracts
Searching OPACs for resources
Library professionals provide library services or other assistance via mobile devices through e-mail, chat, instant
messaging, or SMS text. Instant messaging, chat, and text lend themselves to mobile access because they are
designed for the relatively short exchange that people typically use when communicating with a handheld
device. Offering reference services using SMS text and chat in particular are relatively easy for libraries to
employ because there are many free services to support them.
WHY LIBRARIES GO WITH MOBILE TECHNOLOGY?
It is easier to access
It provides content ubiquitous
It makes able to access new services
It enables patron to connect via new medium
It three times more capable than personal computer
OBJECTIVE
The objective of this paper is to shows the major library and information services provided by using mobile
technology to satisfy the information needs of variant users and discusses important mobile devices in library
and information services.
MOBILE DEVICES IN LIBRARY AND INFORMATION SERVICES
Electronic textbooks: E-readers and tablets have new features that allow students to highlight and add
annotations to the text, just as they would with paper texts. They give students the capability to link to additional
information.
E-readers: Due to the popularity of Amazon’s Kindle and Barnes & Noble’s Nook. The latest generation takes
content delivery to new levels, allowing for wireless browsing, purchasing, and delivery of content through
these devices.
62
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Mobile Phones: The mobile phones are not only a phone portal to mobile outreach. Library and information
professionals who used more traditional cell phones can consider text reference for their mobile outreach
programs. With Google Voice and library-based options such as MyInfoQuest and Mosio’s Text a Library and
information professionals can set up a text reference service that can help in handle ready reference questions or
even more complicated questions quickly and easily.
MP3 players: An iPod, iPhone or other MP3 player mobile devices can use in library for audio and/or video
tours. With an iPod or MP3 player, users can explore the library at their convenience, concentrating on the parts
of the collection most relevant to their needs.
Tablets: Tablets or Tablet PCs can be used in various activities for example searching databases, downloading
articles, and perusing the catalog either through apps or tablet-formatted websites. The overall utility of tablets
also makes them an ideal device for accessing a variety of documents, including e-books, e-journals and edatabases etc.
LIBRARY AND INFORMATION SERVICES THROUGH MOBILE TECHNOLOGY
A large collection of audio books both free-and subscription based services are available for download
and also transferable to mobile devices.
Ability to access information from anywhere at any time will be of great help for users who cannot visit
library in person and provides a constant link to required information resources.
Academic libraries can support distance learning, formal education, and research activities through
mobile devices
Mobile communication enables libraries to offer location-based services/content through global
positioning system (GPS) capabilities. Libraries can guide the users to the location of specific document
or service through maps and navigational tools
Mobile phones make ILL/document delivery services faster and cut-down the time to request/visit
different libraries and complement the geographically remote users.
Mobile Optimized Library WebPages
Mobile users are using the facilities on mobile phones like SMS, instant messaging, web browsing, email effortlessly to communicate. Most of the features are pre-installed on mobile devices or option for
data plan packages.
Libraries can enrich OPAC by allowing users to incorporate user created content like notes or images
uploaded by users.
Limitless access all online resources accessible on their desktop also become accessible through mobiles.
The mobile devices can further appreciate the service with instant answers like definitions, meanings and
other information from digital libraries and web.
Libraries can make use of multimedia messaging service (MMS) on mobile devices to share photos,
videos, and audio.
One can get today’s news on their mobiles either by accessing the web portals or SMS text messaging on
their mobile phones.
Library tours, instruction/induction/orientation programs have been quite significant in bringing the
nonusers to libraries and also help the remotely located or users located in different geographical
locations.
Library users, who don’t have time or inclination to attend an on-site workshop, can get access to library
tours on their mobile devices. Online Library Catalogs on Mobile Phones.
User-friendly aid familiarity with their own devices and technology helps the users in accessing
information quickly and does not require orientation and training.
LIBRARY AND INFORMATION SERVICES ON MOBILE DEVICES
Library mobile services included access to new titles, e-resources updates, catalogue searching, booking rooms
and PCs, contacts, events and databases optimized for mobile use, enables users to search for library materials,
see the cover image, read a summary, obtain item availability information, find out which bookshelf the item is
ISBN 1-63102-455-8
63
Mobile Technology And Applications For Libraries
on using floor maps, provide feedback on the item and save the item information for future reference. The
Library's opening hours, news, floor plans and subject guides are also easily accessible on mobile phones. SMS
service libraries became more interested in using this service when it became possible to send SMS to an email
service. This service expected by library users, their SMS reference service was predominantly managed by the
library with little or no involvement from their IT department. The use of iPods, iPhones, Tablets, TabletsPc
and MP3 players to provide an audio tour. In academic libraries, the commonly demanded services on mobile
devices include: catalogue searching, SMS/text a librarian, locating spaces, booking computers and rooms,
location based services, payments, mobile emails, instant messaging and videos. Mobile devices are fast
becoming users’ first choice of access. (Gartner 2011).
The libraries have been quick to concentrate library services through use of mobile devices as SMS service,
service lending out eBook readers, the resources to develop its own apps unique to their users, catalogue
searching, providing patron account and basic library information, to allowing users to scan a book anywhere,
check for availability at their home library and then put a hold on the item.
LIBRARIES CAN PROVIDE THE SERVICES ON MOBILE DEVICES
Academic affairs administration: provides the latest news and notices from a university. Users can
select a menu and see results that are designed specifically for mobile viewing email notices of new
books and journal articles, set up preferences for catalogue searching, etc.
e-Contents: offers access to a variety of databases and digital resources such as e-Books, e-Journals,Web
databases, dissertations, and article databases. Users can get fast relevant answers whenever needed with
e-Contents Search, search designed just for mobile user.
Library guide: gives users the best of library guide information such as library use guide, question
answering service, and library statistics delivering rich content in a way that works best for users. If users
have questions and want to contact the library professionals for help, they can get a fast response from the
library via the mobile device and find the appropriate information needed.
Mobile-based Library Lending Service: Libraries can formulate regulations for using mobiles for
circulation of reading materials and maintenance of users account. Mobile phones make ILL/document
delivery services faster and cut-down the time to request/visit different libraries and complement the
geographically remote users. Provides the following services such as lending extension/inquiry, return
information/inquiry, interlibrary loan requests,
SDI service application, email service of
academic journals, database use education
application, etc. The library is a personal library
space where users can find information and
resources of their choosing. Users can read
alerts, check records, renew resources, request
items, track interlibrary loans and document
delivery requests, set up future application and
work in mobile library services.
64
News and Events:
Information on job
openings, varieties of scholarly competition,
library events such as orientations program,
stock verification, book recall, lectures on
Fig.2: Mobile based Services
special topic, news in relation to scholarly work,
awards and so on can be given using mobile
devices in order to update the user’s knowledge short messages regarding the library events and news can
be sent to the users personally.
Notice: provide the latest news, notices and reach users wherever they might be via SMS and MMS from
libraries. Users can get notified instantly with notice alerts: alerts on overdue books, outstanding fines,
reminders to return library items, library event information, etc.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
In-house search: accesses a variety of library-owned resources and databases. Users can just enter search
terms and see results that are designed specifically for mobile viewing. This service includes OPAC
(online public access catalogue), integrated search, and original document search.
SMS Alert Service: Existing e-mail alert services like bringing new books to the notice of users for
suggestion, intimation of arrival of indented documents by users, informing availability of reserved
documents for collection, appraising about which/when books are overdue, library circulars, e-journals
subscribed, change in timings, information about important events, etc., can be upgraded by sending
through SMS alert services.
Suggest a purchase: Library professionals can receive the suggestions from the users sent via mobile
phones. In such cases users need not to visit the libraries and write the requirements in a register.
Location of the library: Users might be provided with virtual tours of the library sections and their
services.
Audio Tour: Libraries even can provide audio tour of a library.
New Title Preview: Mobile gadgets can be used to disseminate the information about newly acquired
documents which are of irrespective of forms.
Image Services: The Image Services in a library might offer a number of high quality, fee based
photographic and document imaging services including digitized photographs, diagrams, maps, photos of
places of national importance.
Research consultation and instruction: It is a kind of customer care service. Research scholars may
have an interaction with the library staff to get the consultation and get suggestions via mobile phones.
Catalogue search: Libraries can provide their catalogue on the mobile devices.
Journal finder: Library Journal Finder provides access to full text journal, magazine, and newspaper
content as well as links to titles held in print.
Reference service: Library users can ask library professionals anything through the live chat and texting
with mobiles. The reference services can be provided with the help of sending and receiving SMS.
Immediate feedback is also possible from the user’s side.
Wi-fi - Internet Access: Mobile phones are available with 3G facility. Libraries can offer wi-fi facility
to access electronic information sources..
MOBILE LIBRARY WEB SITES
Adelphi University Libraries Mobile (AU2GO). Offers library hours, library staff contact information,
a link to the library’s blog “biBLIOGraphy,” and more. Access: http://m.adelphi.edu/library/.
Albertsons Library, Boise State University. Simple text navigation offers various ways to find the
library and its contents. An interesting feature is the inclusion of a “Find in Our Building” category,
which lists call number locations and popular locations such as study rooms and computers, each linked
to an animated floor map. Access: http://library.boisestate.edu/m.
North Carolina State University (NCSU) Libraries. Elegant interface with icons representing
categories such as room reservations, group finder, and Webcams. Another interesting feature is the
ability
to
view
the
number
of
available
library
computers.
Access:
http://www.lib.ncsu.edu/m/home/?browse=iphone.
PENNLibraries, University of Pennsylvania. A multitude of information at your fingertips, such as
mobile versions of databases, image search, library video clips, and more. Access:
http://www.library.upenn.edu/m/.
Library Weblog (Library Dot Com). It is library professional’s weblog; users can access it through
mobile. http://librarydotcom.webs.com
It has directory of LIS professionals all over the world. Access: http://www.librarydotcom.webs.com
University of California Riverside Libraries. Glossy icons designate many useful categories, including
research guides, library workshops, and links to the library’s social media profiles. Access:
http://m.library.ucr.edu.
Virginia Tech University Libraries. A simple but effective layout offers important information, such as
library hours, contact information, catalog search, and library maps. Access: http://m.lib.vt.edu/.
ISSUES
ISBN 1-63102-455-8
65
Mobile Technology And Applications For Libraries
There are still limitations, such as monochrome screens, difficulty with various file formats, and restrictive
content licensing. One area of digital content that academic libraries have already had a major presence in has
been electronic reserves. The primary challenge that exists in this area is that unless the electronic reserve
content is in a layout that can easily be converted to an e-reader format, it can be difficult to make it clearly
readable.
The greater challenge is to provide access to e-journals through mobile phones as the libraries and publishers
prefer authentication limited to campus wide IP address. Libraries must convince the publishers to provide user
id and password mode in addition to IP address based authentication to access e-journals on mobiles.
However one cannot neglect the policies and standards of information security of the organization. Since, the
feature like ‘always on’ and continuous connectivity makes new devices more vulnerable to security threats, the
same need to be addressed cautiously before setting up the library services for mobile devices.
SUGGESTIONS
When library services provide through mobile devices, the set up should be such a type so that a systems
administrator or IT expert can be help in navigation of chat and text services. For instance, when a text
message arrives during a time when no one is monitoring the service, a voicemail message automatically
appears in library’s e-mail account. Library professionals can find an enormous amount of advice on the
web about how to begin offering mobile-friendly reference, how to expand the virtual reference services
and how to choose among free and fee-based services for their library’s budget and needs.
In the libraries currently provide mobile access to resources, the library catalog is most commonly offered
and databases and assistance from library professionals are next most frequently provided services. A few
more interesting services as a library locker reservations, a virtual suggestion box, alerts about database
trials, an app that lists new books, and using iPads, iphones, smartphones, tablets, tablet pcs or other
mobile devices may be include for roving reference. Using the latest mobile technology in libraries will
help to provide access to library materials for mobile users.
Audio/ virtual library tours can be produced fairly quickly, inexpensively, and could reduce the amount
of staff time spent helping new users to orient themselves in the library and explaining the facilities
available. It can easily be provided both as downloads from the library website and on mobile devices.
Libraries can formulate regulations for using mobiles for circulation of reading materials and
maintenance of users account. This wireless solution enables staff to assist patrons in the stacks, checkout
materials while off site, such as at community or campus events, and update inventory items while
walking around the library.
FUTURE POTENTIALS OF MOBILE APPLICATION IN THE LIBRARIES
More and more changes are expected within four to five years in the field of mobile technology and its
application to the libraries, the day is not far when we will use phone to read barcodes or RFIDs in the library
and OPACs will develop GIS sensitivity and be able to communicate with users through their mobiles for holds,
fines, late notices, alerts, etc.
CONCLUSION
Libraries are moving forward in providing access to digital collections via mobile devices. In the near future,
more and more people will be able to experience digital collections in the palm of their hand through a mobile
phone. Already mobile phones are no longer a luxury, but a necessity not only for simple voice or text
communication, but also for accessing the internet. Such connectivity seems to be the wave of the future.
Mobile technology has become boon to the libraries. A library may reach the remote users effectively by
adopting of mobile technology in its services. Mobile phones are inevitable tools for information
communication. Human beings in a society use mobile phone to communicate thoughts, facts, conversations, in
general, information. The dissemination of processed information is a common factor in a civilized society.
Mobile technology is fast becoming the preferred method for connecting to the Internet, especially for people on
the go. Library professionals must keep pace with this trend and integrate themselves into the mobile realm if
they wish to deliver enhanced user services.
66
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
REFERENCES
[1] Adarsh Bala . (2010).Use of Mo bile Technology in Enhancing Library Services. International Journal of Library
Science, (J10), 56-63. Retrieved from http://www.ceser.com/cpjour/index.php?journal=ijls=article&op=view
&path%5B%5D=18.
[2] Barile, Lori. (2011). Mobile technologies for libraries: A list of mobile applications and resources for development.
College & Research Libraries News, 72 (4), 222-228. Retrieved from http://crln.acrl.org/content/72/4/222.full.
[3] Choi, Wontae. (2007). Current status of mobile library service. Industrial information programs in Korea: an
overview. Inter lending & Document Supply, 35(2): 60 – 65. Retrieved from www.researchgate.net/.../235318748_
Industrial_information_programs_in.
[4] Choi, Wontae. (2009). Development and Application of Mobile Technology in South Korean Libraries . Libri, 59,
14 –22.
[5] Dresselhaus, Angela & Shrode, Flora. (2012 ). Mobile Technologies & Academics: Do Students Use Mobile
Technologies in Their Academic Lives and are Librarians Ready to Meet this Challenge? Information Technology
and Libraries, 31, ( 2 ). Retrieved from http://ejournals.bc.edu/ojs/index.php/ital/article/view/2166/pdf_1#.
[6] Jharotia, Anil Kumar (2012). “M-Learning is the future of e-learning: A new dimension in library services”
Conference proceeding of National conference on beyond librarianship: Search for new frontier held at G.B.U on 2122 Sept. 2012. Vol-1 pp.203-210.
[7] Johnson, L. et.al (2011). The New Media Consortium: The 2011 Horizon Report. http://net.educause.edu
/ir/library/pdf/HR2011.pdf.
[8] Kumar, B.T. Sampath, Kumar, Vinay D. & Prithviraj KR. (2013). Application of Mobile technology in Library
services. Retrieved from www.inflibnet.ac.in/caliber2013/ppt/1_7.pptx.
[9] Kosturski, Kate & Skornia, Frank. (2011) Using Mobile Technologies in the Academic Library: All the Knowledge
of the World in My Hand: Mobile Technologies Mobile phones. Computers in Libraries. Retrieved from
http://www.infotoday.com/cilmag/jul11/Kosturski_Skornia.shtml.
[10] Malathy S. and Kantha P. (2013). Application of Mobile Technologies to Libraries. DESIDOC Journal of Library &
Information
Technology,
33,
(5),
361-366.
Retrieved
from
http://publications.drdo.gov.in/ojs
/index.php/djlit/article/view/5098/2935.
[11] Murphy, Joe. (2012)Mobile Technologies In Libraries. Retrieved from http://www.slaagc2012.org/
index.php/workshops/mobile-technologies-in-libraries.
[12] Spectrum Mobile Learning, Libraries and Technology. (2011). M-Libraries: Library Success: A Best Practices Wiki.
http:// www.libsuccess.org/index.php?title=M-Libraries.
[13] The Library In Your Pocket: Practical: Applications of Mobile Technologies. Retrieved from http:/
/librarylinknj.org/content/library-your-pocket-practical-applications-mobile-technologies.
ISBN 1-63102-455-8
67
INSTITUTIONAL REPOSITORIES AND DIGITAL
PRESERVATION IN LIBRARIES
Parvathamma K S | Senior Librarian | Garden City College of Science and Management Studies | Old Madras
Road | Bangalore | parvathimlisc@rediffmail.com
Abstract: These days Institutional Repositories are increasing because it is essential component
for all academic institutions and Research libraries. Institutional Repositories are digital
collections that capture and preserve the intellectual output of a single or multi University
community. Institutional repositories are very useful in educational institutions or in academic
community to archive the long term digital preservation of objects placed within the repository
and it is useful for effective preservation. Repositories involve change in the way research is
disseminated, preserved, and published. This change requires faculty to deposit their research
results, data sets, and other materials in the repository — a new step in the research process. In
corporations, management may require staff to deposit items, such as strategic plans, marketing
plans, and working papers. An institutional repository (IR) is an online archive for collecting,
preserving, and disseminating digital copies of the intellectual output of an institution,
particularly a research institution.
The article discuss about the role of Institutional Repositories and Digital preservation in
libraries. Institutional repository is most essentially an organizational commitment to the
stewardship of these digital materials, including long-term preservation where appropriate, as
well as organization and access or distribution.
Keywords:
Institutional Repository, Library, Information Explosion, Research, Technology, Digital
Preservation.
INTRODUCTION
An Institutional Repository is an online locus for collecting, preserving, and disseminating of the intellectual
output of an institution. Enhancing the accessibility and visibility of the articles published by the faculty
members and research scholar of the Institute. Institutional repositories (IRs) are a development in managing
digital objects for effective utilization. IR establishment is a challenge as well as an opportunity for information
professionals. It may include a variety of research output of any organization. An IR is a means to ensure that
the published work of scholars is available to the academic community even after increases in subscription fees
or budget cuts within libraries (Bhardwaj, 2014& Boufarss 2011). The majority of research scholars do not
provide free access to their research output to their colleagues in an organization (Ahmed and Al-Baridi 2012).
IRs provides scholars with a common platform so that everyone in the institution can contribute scholarly
material to promote cross-campus interdisciplinary research.
INSTITUTIONAL REPOSITORIES
Institutional repositories are digital collections of the outputs created within a university or research institution.
An institutional repository can be viewed as an "a set of services that a university offers to members of its
community for the management and dissemination of digital materials created by the institution and its
community members." For example, University includes materials such as monographs, eprints of academic
journal articles undergoing peer review- as well as Electronic Theses and Dissertations (ETDs).
An institutional repository might also include other digital assets generated by academics, such as administrative
documents, course notes, learning objects, or conference proceedings. Deposit of material in an institutional
repository is sometimes mandated by that institution. Repositories adhere to an internationally-agreed set of
technical standards that means that they expose the metadata (the bibliographic details such as author names,
institutional affiliation, and date, titles of the article, abstract and so forth) of each item in their contents on the
Web in the same basic way. In other words, they are ‘interoperable’. This common protocol to which they all
adhere is called the open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). The contents of all
68
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
repositories are then indexed by Web search engines such as Google and Google Scholar, creating online Open
Access databases of freely-available global research. As the level of self-archiving (the process by which
authors deposit their work in repositories) grows the Open Access corpus will represent an increasingly large
proportion of the scholarly literature.
The rationale for universities and colleges implementing institutional repositories rests on two interrelated
propositions—one that supports a broad, pan-institutional effort and another that offers direct and immediate
benefits to each institution that implements a repository.
OBJECTIVES OF INSTITUTIONAL REPOSITORIES
Some of the main objectives for having an institutional repository are to provide
Open access to institutional research output by self-archiving it
To create global visibility for an institution's scholarly research
To store and preserve other institutional digital assets, including unpublished or otherwise easily lost
("grey") literature such as theses or technical reports.
Manages and measures research and teaching activities
Facilitates the development and sharing of digital teaching materials and aids
Supports students endeavors, providing access to theses and dissertations and a location for the
development of e-portals
Enables and encourages interdisciplinary approaches to research
NEED FOR DIGITAL PRESERVATION
According to Jones and Beagrie (2002) Digital preservation refers to the series of managed activities necessary
to ensure continued access to digital material for as long as necessary.
The challenge for digital preservation is not just the volume of data. The hardware and software is used to store
and access digital information are constantly upgraded and superseded. The speed of changes in technology
means that the timeframe during which preservation action must be taken is very much shorter then for paper.
Institutional repositories as a means to mange and preserve effectively in institution knowledge base and
intellectual assets results in the contents of institutional repositories expanding beyond e-print to include
research data, e-learning materials and other forms of intellectual outputs, which are generally not published and
preserved elsewhere.
FUNCTIONS OF DIGITAL PRESERVATION
Digital preservation requires new workflows, new skills and cooperation across different professions ranging
from traditional preservation management skills and Computer Science. In order to understand the process
necessary to archive the long term digital preservation of objects placed within a repository, it is useful to
understand the effective preservation. Wheatly (2004) summarized its key functions as follows;
Data is maintained in the repository without being damaged or lost altered
This function is a fundamental requirement that must be addressed by any digital repository.
Data can be found, extracted and served to a user
Repositories needs to support searching and retrieval to improve access to information. This is an area
which has received much attention in the last few years and has been greatly facilitated by standards
such as Open Archive Initiative Protocol for Metadata Harvesting (OAIPMH), allowing service
providers to create discovery services across repositories by recurrent metadata harvesting.
Data can be interpreted and understand by the user and can be achieved in the long term.
It will give information like what digital preservation needs to achieve and users can access the
content that has been ingested into the repository in the past and make sense of its intellectual
property, despite hardware and software changes over time.
ISBN 1-63102-455-8
69
Institutional Repositories and Digital Preservation in libraries
Depositing intellectual assets into institutional repositories requires that all are able to trust the ability of the
repository to secure the information over the long term. Repositories will form a permanent and critically
important part of the scholarly communication process. The first role is to provide the open access literature.
Additionally services may be added to repositories to provide extra functionality. For example a usage reporting
service gives author and the institution information on how the content of repository is being used. A search
service may help users find specific items more easily.
INSTITUTIONAL REPOSITORY AND DIGITAL PRESERVATION IN LIBRARIES
The institutional library needs a presence on the Web – a place to describe its print and web-based services, and
to bring together the content it makes available to its users. It needs to present its catalogue but also its other
finding aids – to its collections of e-journals, its collections of digitized materials from its treasures, and other
lists which are most usefully presented separately, such as electronic reserve texts or past exam papers.
Institutional libraries also are growing the range of services they can offer via their website. Examples of these
include interlibrary loan request – sometimes by electronic full-text delivery; requests to retrieve store items;
book loan renewals and electronic reference support. In addition, library services need to be distributed out to
other useful environments, such as student virtual learning environments and university portal sites.
A repository established for the use of a particular academic department or laboratory is properly called a
departmental repository, though the term institutional repository is also used. An example is e-Prints for
the School of Electronics and Computer Science, University of Southampton, UK. A repository can also be
intended for a particular type of material, such as theses.
With digital content increasing exponentially in the current Information Age, libraries have come to realize the
importance of digital preservation. Paul Wheatley states that "careful consideration must be given to the
preservation needs of materials to be archived within an institutional repository". According to Nancy Y.
McGovern and Aprille C. McKay “several significant opportunities for digital preservation offered by IRs in
their article published in 2008, including digital content management, opportunities for content to creators to
learn about their role in digital preservation, and faculty legacy preservation. With IR software gradually
integrating support for preservation, there seems to be more hope for IR managers in implementing digital
preservation for IRs. However, it is not sufficient to rely only on software since various facets have to be
considered when preserving digital content.
The most important roles that IRs is to collect, manage, and disseminate the digital scholarship that their
communities produce. Collecting content is the first step to building an IR, and since their inception this is what
IR managers have primarily focused their efforts on. Digital scholarship can be collected in different ways, and
how it is collected may affect its quality as well as the ability to preserve it. It is worth investigating how content
is collected and how quality is ensured since different levels of preservation effort will be made depending on
both the initial quality of the content and its format. Software is a key element in the construction of an
institutional repository.
There are a number of open-source software packages for running a repository including:
DSpace
EPrints
Fedora
Invenio
SobekCM
Greenstone
There are also hosted (proprietary) software services, including:
70
Digital Commons, a full-service commercial platform from the Berkeley Electronic Press
SimpleDL
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Repository 66 is a mashup which indicates the worldwide locations of open access digital repositories. It is
based on data provided by ROAR and the OpenDOAR service developed by SHERPA.
The Confederation of Open Access Repositories (COAR) states in its manifesto that "Each individual repository
is of limited value for research: the real power of Open Access lies in the possibility of connecting and tying
together repositories, which is why we need interoperability. In order to create a seamless layer of content
through connected repositories from around the world, open access relies on interoperability, the ability for
systems to communicate with each other and pass information back and forth in a usable format. Interoperability
allows us to exploit today's computational power so that we can aggregate, data mine, create new tools and
services, and generate new knowledge from repository content. Interoperability is achieved in the world of
institutional repositories using protocols to which repositories should conform, such as OAI-PMH. This allows
search engines and open access aggregators, such as BASE and CORE, to index repository metadata and content
and provide value-added services on top of this content.
CONCLUSION
Digital preservation is a complex process and there are many unsolved organizational, managerial and technical
issues that make digital preservation a challenging task for those managing institutional repositories. Digital
repositories have been established to support the open-access movement, to provide open access to the
institutions’ output. These days increasing the number of research libraries have started to move digital
preservation programs ahead by developing preservation policies. Totally while building a successful
institutional repository for academic institutions require careful planning from the institution community.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
Charles W. Bailey Jr, (2005) "The role of reference librarians in institutional repositories", Reference Services
Review, Vol. 33 Iss: 3, pp.259 - 267
Sheau‐Hwang Chang, (2003) "Institutional repositories: the library’s new role", OCLC Systems & Services:
International digital library perspectives, Vol. 19 Iss: 3, pp.77 – 79
Tedd, Lucy, (2006). Institutional Repositories, Emarald Group Publishing Limited: PP. 232-243.
(2005). Reference Librarians and Institutional Repositories, Emarald Group Publishing Limited: PP. 283-290
Jones, Richard E, Andrew, Theo and MacColl, John. (2006). The Institutional Repository , Elsevier: PP. 50-75
Johnson, Richard K, (2002). Institutional Repositories, D-Lib Magazine, Vol. 08 Iss: 12. PP.
Li, Yuan and Banach, Meghan, (2011). “Institutional Repositories and Digital Preservation: Assessing Current
Practices at Research Libraries”, D-Lib Magazine, University of Massachusetts, Vol/ 17 Iss; 5/6, PP.
Manjunatha, K and Thandva Moorthy, K. (2011). “Researchers’ Attitudes to Depositing Institutional Repositories of
Engineering Colleges in Karnataka state: A Study, PEARL - A Journal of Library and Information Science, Vol. 05,
Iss. 02: pp. 50-54.
Krishna Murthy, A, Ramesh, L.S.R.C.V and Nagaraju, A.V.S.S. (2010). “Enhancement of Scholarly
Communication through Institutional Repositories – A Critical Analysis”, PEARL - A Journal of Library and
Information Science, Vol. 04, Iss. 02: pp. 104-108.
Hirwade, Anil W. (2006). Institutional Repositories: Challenge and Opportunity for LIS Professionals in Digital Age,
Library Herald, Vol. 44, Iss. 02: pp. 146-151.
Hockx-yu, Helen. (2006). Digital Preservation in the context of Institutional Repositories, Electronic Library and
Information system. Vol. 40, No.03: pp. 232-243.
ISBN 1-63102-455-8
71
THE CHANGING NATURE OF THE PUBLIC LIBRARIES
WITH EXPANDING LEARNING FRONTIERS WITH ELEARNING
Dr. D. K. Shrivastava | Divisional Librarian (I/C) | Govt. Divisional Public Library, Kota, Rajasthan | India |
deepakshri1974@yahoo.co.in
Abstract: The new wave of e–learning has challenged the status queue of Public libraries and
information professionals to learn new skills and follow new ways of creating, developing,
managing and disseminating services to learners and instructors. Besides the course contents /
material, a wide range of information and communication technologies such as e–mail, video
conferencing, discussion forums, instant messaging, chat rooms, etc. Used to connect learners
with each other and with teachers or trainers. With this view, the present Research Paper is an
attempt to explore how the libraries can play an instrumental role in the promotion of e–learning.
This article describes about the evolution of e- learning and the role of Public library and
information professionals in the creation, development and management of e-learning resources.
With the emergence of ICT, the role of Public libraries and library services has undergone a sea
change. It offers an opportunity to Public librarians to institute new environment of learning and
develop a mechanism to deliver new services. All traditional practices and services have been
replaced with the paperless course contents; disseminate information and documents on the
Internet. Delivery of course contents can be accomplished in any electronic medium such as CDROMs, DVDs, intranet and World Wide Web.
Keywords: E–Learning, E-Libraries, E- Resources, Information Literacy, Metadata, Portal Technology,
Networking, virtual learning environment (VLE), information and communication technology (ICT), CDROMs, DVDs, World Wide Web
INTRODUCTION
No doubt, Books are the vehicles of the Knowledge and Libraries are the repositories. It is the role of the
libraries to collect, store, and organized availability of books to the readers. Library service thus constitutes an
important social and educational service which needs supports from society and governments, state and central
on a regular basis and Public Library is a social institution and the service that it renders is a social service. It is
today regarded as an agency for the communication of ideas. It is an agency for universal and perpetual selfeducation. by universal education ,it means that a library is open to all classes of people ,of all ages without
distinction of castle ,creed or sex; it stands for perpetual education because like any institution of formal
education – university ,college, school, etc. – it is not restricted to prescribe years of education; it provides for
self-education because there is no schooling and no teacher and no class-room type of education involved in it ,
anyone goes to the library has to learn by himself. Of course a librarian will be a guide and a communicator of
information contained in a number of documents available in a library. (Kaula, 1985) but Public Library in
Current Century having Urgent Need to involve e-learning to satisfy the intense thurst of More demanding
Readers.
E- Learning Simply Clarify that Learn on your own time and at your own pace with our online classes or Online
Public Library or, prepare for a test with in the following areas and more: civil service, fire fighting, nursing,
U.S. citizenship, high school skills improvement, GED, SAT, college entrance exams and graduate school
exams. There many different term which are used interchangeably for e -Learning; Technology-based Learning,
Technology-based Training, Computer-based Training, Computer-based Instruction, Computer-based
Education, Web-based Training, Internet-based Training, Intranet-based Training, Distance education, distance
learning, distance training. (Throne, K.2002)
The term “e-learning” has only been in existence since 1999, when the word was first utilized at a CBT systems
seminar. Other words also began to spring up in search of an accurate description such as “online learning” and
72
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
“virtual learning”. However, the principles behind e-learning have been well documented throughout history,
and there is even evidence which suggests that early forms of e-learning existed as far back as the 19th century.
The rapid proliferation of information and communication technology (ICT) and digital technologies in the last
two decades has reshaped the communication, Teaching and learning techniques, and perceptions of learners
and instructors towards the access and use of learning objects. Inventions in the areas of printing and learning,
e.g., Johannes Gutenberg’s invention of movable type in Europe in 1452 to contemporary e-publishing and elearning, have challenge the existence of traditional education system.(allen,B.2002)
New ways of ICT offers an opportunity of e-learning besides the classroom learning. It has increased
competition in the global education market and forced the educational leaders and providers to ponder over the
future of higher, vocational and technical education in terms of quality, quantity, and utility in a most dynamic
world. E-learning has become popular among the learners. It has scattered its wings in almost all corners of the
world whether it is developed, underdeveloped and developing world. E-learning has gained prominent place in
the field of education and allied areas in general and tertiary education in particular. ‘E-learning refers to the use
of ICT to enhance and / or support learning in tertiary education. It is used in both teaching and learning
activities. Today learning organizations are engaged in the enrolment of students, providing, curriculum and
reading material to their students on- line, campus-based or other distance-based provision that is supported with
the ICT.(Kay,D.2005)
Figure: 1 E- Learning in Public Libraries
E- Learning is termed as on-line learning, virtual learning, distributed learning, network and Web-based
learning. It is becoming increasingly popular among the learners who are in the working capacity in public or
private enterprises and want to pursue degree education side by side. Allen Lomax comments on the changes in
education as a result of consumer- driven forces. He quotes “We live in a world or rapid and constant change.
Higher education, like the rest of our world will be a very different place ten years from now than what it is
today.
Figure: 2 E- Learning initiative in Govt. Divisional Public Library, Kota
ISBN 1-63102-455-8
73
The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning
The Internet, distance education, competency-based outcomes, learner – centred systems, and consumer –driven
education are by many accounts some of the more prominent forces driving change in the world of education.
“Distance education, distance learning, open learning, flexible learning, virtual learning, hybrid or blended
learning, and distributed learning are all terms referring to teaching and learning interactions that entail full or
partial physical separation between learner and instructor. In recent years, the term distance education has
become synonymous with on- line learning, or e-learning. These terms are used interchangeably with, and at
times in place of, many others: technology-mediated learning, computer-mediated conferencing, online
collaborative learning, computer-supported collaborative learning, tele-learning, virtual learning, Net-based
learning, and Web-based learning.
Figure: 3 Features of E- Learning Platforms
The Public Libraries , which were earlier serving the Knowledge in print form and now serving in mixed mode
or single, I.e.,. E-Books or Digital Books. It has opened up new avenues to disseminate Knowledge contents for
distance learning. Earlier Books were loaned or you can say sent to learners in print form but after the advent of
World Wide Web has made easy access of delivery of course contents. Delivery of course contents can be
accomplished in any electronic medium such as CD-ROMs, DVDs, intranets and World Wide Web. Besides the
course contents / material, a wide range of information and communication technologies such as e-mail, video
conferencing, discussion forums, instant messaging, chat rooms, etc. Are used to connect learners and
instructors with each other. It is very cost effective way of transferring knowledge among the learners.
In This Concern Govt. Divisional Public Library Kota are serving to their e –learners or e- Readers by their own
designed e- library situated in the Campus. E – Learning requires excellent access of information and
communications technology to support the needs of the learners and teachers. This demand can only be meeting
if the learners and organizations have adequate and latest infrastructure. Lack of ICT infrastructure, trained
manpower and financial constraints are some of the major hurdles that hinder in the deployment of e – learning
ventures.
Figure: 4 Dr D. K. Shrivastava giving training to operate the talking books to our Young Readers : an ELearning initiative in Govt. Divisional Public Library, Kota
74
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
It has emerged from the recent available statistics that e-learning market is growing quickly. Especially
in India, we all people are going towards maximum use of e- learning or online learning. Currant Central Govt.
is more focussing on the making India as Digital India. Further analysis highlights that 80% of United States
institutions impart e-learning courses. It is seen that now senior and religious leaders are becoming more
dependent on e- education or e-learning. Figure 5 showing the interest of learning amongst the Saints about elearning instrument like Talking Books. They are learning about use of our Holy Book “Shreemad Bhgawat
Geeta” which is in the Talking form. Figure also expresses the feelings of happiness by enjoying use of talking
books.
Figure: 5 Dr. D. K. Shrivastava Demonstrating about Use of Talking Books to the eminent reader of library,
Saint Shri Prabhakar, Chairperson, Kabir Parekh Sansthan and their Disciple are Learning Operation to read
through Talking Books: an E- Learning initiative in Govt. Divisional Public Library, Kota
DEVELOPMENTAL JOURNEY OF E-LEARNING
Long before the internet was launched, distance courses were being offered to provide students with education
on particular subjects or skills. In the 1840’s Isaac Pitman taught his pupils shorthand via correspondence. This
form of symbolic writing was designed to improve writing speed and was popular amongst secretaries,
journalists, and other individuals who did a great deal of note taking or writing. Pitman, who was a qualified
teacher, was sent completed assignments by his students via the mail system and he would then send them more
work to be finished. In 1924, the first testing machine was invented. This device allowed students to tests
themselves. Then, in 1954, BF Skinner, a Harvard Professor, invented the “teaching machine”, which enabled
schools to administer programmed instruction to their students. It wasn’t until 1960 however that the first
computer based training program was introduced to the world. This computer based training program (or CBT
program) was known as PLATO-Programmed Logic for Automated Teaching Operations. It was originally
designed for students attending the University of Illinois, but ended up being used in schools throughout the
area. With the introduction of the computer and internet in the late 20th century, e-learning tools and delivery
methods expanded. The first MAC in the 1980’s enabled individuals to have computers in their homes, making
it easier for them to learn about particular subjects and develop certain skill sets. Then, in the following decade,
virtual learning environments began to truly thrive, with people gaining access to a wealth of online information
and e-learning opportunities. (Jollifa,D,2003)
In the 2000’s, businesses began using e-learning to train their employees. New and experienced workers alike
now had the opportunity to improve upon their industry knowledge base and expand their skill sets. At home
individuals were granted access to programs that offered them the ability to earn online degrees and enrich their
lives through expanded knowledge. Today, e-learning is more popular than ever, with countless individuals
realizing the benefits that online learning can offer.
ADVANTAGES OF E-LEARNING
E-learning is convenient for Public Library Readers and learners to access resources “anytimeanyplace”.
E-learning course contents are cheap than printed material since it is economical in printing, postal
expenses and preservation.
In learning, resources can be recalled several times.
ISBN 1-63102-455-8
75
The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning
It reduces the travel time of learners and costs involved in print material.
It allows learners to select, retrieve and access their desired learning material.
It stimulates the learners to access variety of digital resources on the World Wide Web.
E- Learning Knowledge programmes are ate very helpful and useful to the employees of in-service
both corporate and public sector undertakings.
E- Learning assists learners to become IT and information literate.
E-learning offers opportunity to develop digital resource centre, knowledge management system and
depository of e-resources and encourage libraries to adopt the path of information technology.
If fosters interaction among instructors and learners and provides opportunity to understand the issues
of discussions.
More than one user can access resources simultaneously from different platforms and locations.
It is easy to update the resources on the Web and learners can get fast benefit of latest developments in
their field.
No doubt, there are certain constraints and limitations in the adoption of such programmes such as costly
infrastructure and maintenance costs, need IT literacy and training, bound to attend the programmes, feeling of
lack of face –to – face interaction, etc. But the emergence of network technologies and developments in ITC has
brought revolution in the information access, management and creation and development of teaching and
learning resources such as e-resources, e-teaching and e-learning.
ROLE OF PUBLIC LIBRARIES AND VALUE OF ONLINE INFORMATION RESOURCES
The role of public libraries in India is still misunderstood and hence they remain undeveloped. Libraries need to
think of as “Knowledge Centres” rather then mere store houses for Books. Earlier libraries were bound with the
responsibility of preserving the literature for future, but today with the gradual growth of published literature,
they are now endowed with rather more important functions
of acquiring, organizing, preserving, analyzing, interpreting,
filtering and communicating information in a meaningful
way to the clientele with a variety of needs. These public
libraries play a significant role in supporting research and
development by acquiring and maintaining the library
resources and by rendering effective and a wide range of
library and information services to their users. Their main
objective is to maximize their utility by expanding the size
of library collections and services through the use of ICT.
(Moore et.al.2004 )
Figure 6 shows the trends about willingness to pay amount
for e-learning. The value and importance of library and
organization is judged of its collection, services and the
productivity of the organization where researchers and their
valuable time and talent. The well – equipped and wellorganized library is the basis of modern research and
development of the organization. The strength of a research
system is largely dependent upon its capacity to create,
organize, and use information. The effectiveness of research
and development is dependent upon the information services
discharged by the public libraries. Both print and electronic
resources can play a significant role in the promotion,
development and productivity of the organization.Studies
relating to research productivity conducted by Canadian,
Figure: 6 Successive Developmental History
British and American universities witness that access to
of E- Learning
library resources are significantly related to research
productivity and institutions intended to increase research productivity are advised to pay attention towards their
76
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
library expenditures and new technology. Financial constraints, lack of professionally trained manpower, and
shrinking resources and space are also responsible factors for the demolition of productivity and reputation of
the organization. If organizations have to sustain all this they have to pay attention towards all those factors,
which can strengthen their research productivity.
Figure: 7 E-Book Willingness to Pay (N=295)
The figure 7 indicates about different type i-councelling modules that can be used to improve e-learning in
Public Libraries. The modern public libraries can participate in the promotion of e - learning programmes. They
can support the e-learners by digitizing their resources and providing access to their full text resources through
the network and web-based options. Moreover, they can extend
their support by providing access to documentation and full text
services through intranet and Internet. Content creation,
development and management are the heart of e-learning.
Learners and teachers can access and use right information on
the Web through e-contents, whether it could be of books,
articles, audio-video segment, images, etc. Libraries can play
their effective and efficient role in the selection, creation,
management of e-content and developing new services and
uploading or linking all the resources to the course
management system, i.e., portal or hub of e-learning and eteaching. Mclean and Sanders quote that “E-learning integration
Figure: 8 i- Counselling System
offers libraries a powerful medium for reaching faculty and
Modules
students directly as they engage in teaching, learning, research
and outreach. In turn, this integration provides enriched services for an academic community that has used
traditional library services and it offers a way to reach those faculty and students who have begun to ignore the
library and go directly to the Web for their information needs.”
CCM (CONTENTS CREATION AND MANAGEMENT)
Contents creation and management of resources is a professional activity that requires the expertise of
information professional and librarians.
Figure: 9 Content Management for E- Learning in Public Libraries
ISBN 1-63102-455-8
77
The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning
They are proficient to develop procedures for organizing digital
contents and services, which assist and instruct e-learners in most
efficient and effective way to identify locate access and use information
resources. Information professionals’ experience can play a central role
by contributing in the area of content creation, resource description,
metadata, classification of e-resources, etc, which can be a brilliant job
in the area of development, organization and management of eresources?
Figure: 10 Content Management Systems
ONLINE LIST OF UPCOMING AND NEW RELEASES, CATALOGUES AND SERVICES
The E-Learning requires searching of documents from the online databases. In order to meet the requirements of
learners, librarians should develop and strengthen the databases of e-documents to support e-learning. Access of
these databases must be user-friendly and hit good results without wasting much time of the reader. Public
Libraries and information centres must be equipped with online resources to offer access to online campus
learners and offline campus learners, Learners would like to read the resources, which are not available in their
library or home country, expect to procure the same from other library or other country. Library and information
professionals should develop a mechanism to create an environment that must be suitable and attractive for
online learners.
Figure: 11 Online Lists of Upcoming and New Releases by Amazon
Well equipped and well-maintained libraries can play an important role in attracting and retaining the students
in online courses. Library staff must engage themselves to generate and deliver proactive library services to
support learners and instructors needs in the Virtual learning Environment (VLE).
Collection Development and Develop Digital Repositories
Public Librarians can play an important role to provide support to
virtual learning environments by strengthening the collection of
electronic resources, joining consortium of libraries, digitizing their
products, and by providing access to electronic resources through
the intranet and the Internet. The emergence of ICT, CDROM/DVD technology and e-publishing has expanded the role of
librarians in selection, acquisition, processing, storage, retrieval and
Figure: 12 Virtual Learning
dissemination of learning objects to the learners’ community. It has
Environments
broadened the role of librarians and has given the responsibility to
the librarian to explore and identify the e-products, their utility and quality assurance.
78
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Librarians must share the responsibility to market the organization’s products, join the consortia of libraries,
select online and CD-ROM databases, develop digital objects and convert traditional learning objects in digital
form and copyright issues. Moreover, they are required to manage needs of their learners and instructors through
external sources such as on- line databases of journals, consortia of libraries and electronic document delivery.
Librarians must understand the need and utility of electronic resources, exploit the use of acquired and license
based databases and provide training to professional staff, learners and instructors to encourage and enhance its
use.
Figure: 13 Digital Repositories
Public Libraries can play an important role to support e-learning and e-teaching by digitizing their products;
strengthen the collection of e-resources and by providing their access through the intranet and the Internet. All
organizations have their published and unpublished works which deserve an important attention to digitize and
preserve for the future use. Librarians must make efforts to develop a mechanism to collect the electronic files
(digital documents) from academic community, researchers and project staff to strengthen the knowledge pool
of the organization and offer access to learners through the intranet and the internet.
ACCESS OF E-DOCUMENTS AND DISSEMINATION OF FULL TEXT RESOURCES
E-documents need expertise of information professionals to upload and link the documents on the WWW,
which are accessed by the learners and instructors. They need adequate infrastructure to store, access, retrieve
and get output. Latest servers like CD mirror stations and other tools play an important role to store; upload the
documents on the internet and WWW.
Figure: 14 e-Documents
All this requires the support of librarians and IT professionals, Moreover libraries can expand their role by
extending new services and dissemination of full text resources, which are prepared and released by the
publishers and vendors from time to time. These services can be extended to users through forwarding
attachments, links, e-contents of periodicals, bibliographic services, literature search, etc.
ISBN 1-63102-455-8
79
The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning
NETWORKING AND INTEGRATION OF IN-HOUSE AND ONLINE DATABASES
More emphasis must be laid on the networking and integration of databases to strengthen to access the Web
services. Dempsey says that in the new network environment, libraries need to identify services that go beyond a
single institution and remove redundancy, build capacity and allow for collective activity. Think about
preservation, storage, tools for analysis, reformatting, transformation, data curation-even a storage framework
and logistical network for physical collections.
Figure: 15 Having In- House Web Server
E – Learning requires all in-house and on-line databases available in the organization should be integrated into
learning management systems. These can best be browsed and exploited if the library integrates them on the
intranet and internet. Learners and instructors need that access of on-line databases should fulfil the course
content lf the programme. Links along with login and passwords of the databases should be provided on the
internet and Internet so that learners can go through the desired database. Such integration of databases and
services accommodate organizational learning objects successfully and it can be useful for both learners and
instructors.
TO DEVELOP THE STRATEGY OF DIGITAL REPOSITORIES OR METADATA
To develop the strategy of digital repositories, there must be strong alliances between the academic community
and librarians to work closely and strengthen the relationships. “These content management systems are capable
of incorporating multiple metadata schemas to handle various types of content. Librarians are well-suited to
populate these metadata schemas with the appropriate terminology. Their expertise in aggregating content
positions them to be active partners with the faculty in accessing content, in planning courses and in using
course management applications”. Digital assets need metadata to browse and access the digital documents on
the Internet. Several experts and organizations are engaged in the research and development of the application of
metadata strategies to organize the digital repositories. IT experts and faculty members are not so much familiar
with the creation and use of metadata. Public Librarians and information professionals have the skills to create
metadata and develop digital repositories for the use learners and instructors.
PORTAL TECHNOLOGY AND INFORMATION LITERACY
E-learning needs the portal
facilities to upload and store the
learning material on the Internet.
Universities engaged in e-learning
courses
have
created
and
developed their portals to place
the desired course material on the
Internet so that their learners and
instructors can get use of the
same. Portal facilities help the
readers to locate the desired
80
Figure: 16 Portal Technologies
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
material available in the portal of the organization. Information professionals can create and develop the portals
or help IT experts in the development if portals and classification of material on the portal. In addition,
customized portal facilities must be provided to learners and instructors to store their preferences.
E- Learning has challenged the learners and instructors to learn how to access, retrieve and use E-resources and
services. Higher education organizations that are engaged in e-learning programmes must pay attention to equip
the learners to face growing future challenges of information overload and use of complicated information
retrieval techniques. They should prepare their learners and instructors to develop a learning portfolio that can
be a good example of information literacy and online learning.
Students must learn to develop learning portfolio to capture and store the online information and further reuse
for other purposes. E-learning offers opportunities to store, acquire, and preserve e- resources and e-learning
objects in the portal technology. It offers opportunities to develop digital objects and convert the printed object
in digital formats to deliver and disseminate resources to wide community of learners. It has welcomed the
information and communications technology in the teaching and learning perspectives.
Librarians can assist the learners to develop the learning portfolio and other information literacy programmes.
Such information literacy programmes must be added in the curriculum to make aware the learners about the eresources. They should have liaison with IT experts, instructional designers and multi-media developers besides
the learners, instructors and academic community. There are instances in higher education institutions today,
where information literacy is included as part of the curriculum in some disciplines, and librarians are involved
in the teaching and assessment of the assignments related to this.
As Susan McKnight (2006) stated that “librarians will have to work with new teams of professionals, such as
instructional designers and multi-media developers, in addition to the academic staff whose subjects are to
include assessable information literacy activities, to create learning resources, learner-teacher interactions and
assessments that are appropriate in an online learning environment.” 11 These developments will foster the
culture of sharing of knowledge and would also benefit learners and instructors.
DEVELOP WEB-BASED MODULES TO SUPPORT E-LEARNING
E –learning requires Web-based modules for learners and instructors to exploit the learning objects effectively
and efficiently. Academic community and librarians with their close association develop the modules for the
benefit of learners and instructors. These modules will provide assistance to learners and instructors particularly
remote learners to seek their desired information from the read of information resources. In addition to learning
modules, there is a need of information literacy among learners and instructors to make effective and efficient
use of information resources. Librarians and information professionals must ponder over the prospects and
problems of the libraries, methods of acquiring, preserving, disseminating information to users, promotion of elearning and enrich the e-learning resources pool.
KEEP THE LEARNERS UPDATE
The learning offers a basket of opportunities to the librarians to expand their vision and provide number of
services to their readers. Traditional services offer by the libraries can be generated online and disseminated to
the readers beyond the wall of the organization. They can generate several online services by forwarding and
linking with online courses such as list of additions, list of journals subscribed e-contents of periodicals,
literature search facility, electronic delivery of documents, list of online databases, etc. Bibliographic tools and
services must be strengthened to provide easy searching and access. Libraries can expose their services and
important resources in the course management systems and other learning tools used by learners and instructors’
community and how these are fully explored and reused.
DEVELOPMENT OF KNOWLEDGE MANAGEMENT SYSTEM
Lytras Pouloudi, and Poulymenakou (2002) identified that there are three stakeholders in an organisational elearning framework that are: the employees or knowledge users, the knowledge providers in the organisation
(practitioners, mentors, and experts), and the provider of technology. An integrated knowledge transformation
framework for the structured diffusion of knowledge consists of six processes for evaluating,Acquiring
organizing, enabling, transferring, and using knowledge in organizations. In e-learning knowledge management
ISBN 1-63102-455-8
81
The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning
framework, knowledge management framework, knowledge providers acquire and organize knowledge from
diverse sources, which is them suitably formatted and maintained in repositories and databases and is
disseminated to users using formal knowledge- transfer mechanisms. Knowledge Management plays an
important role in the e-learning system. Libraries can capture the electronic resources available in the
organization digitize their print material and make available the same in knowledge pool of the organization.
Organizational knowledge in crucial resource for the generation of new knowledge and reuse of existing
knowledge.
PROACTIVE AND COOPERATIVE PARTNERSHIP WITH PUBLIC COMMUNITY AND KNOWLEDGE WORKERS
Increasing demands of academic staff, complexity in the access and use of resources and non-favourable attitude
and behaviour of library professionals have focused towards to expand and enhance the partnership between
libraries and academic staff. Such partnership can strengthen the culture of fostering research, sharing of tacit
and explicit notions and develop environment to create, generate and disseminate information and knowledge to
instructors and learners, which are relevant and useful to research and teaching.
CONCLUSION
If libraries are to remain centres for lifelong learning, then that learning must increasingly by e -learning.
But, where can librarians turn for the best ideas and inspiration on how to implement e -learning
programs? E-learning strategies need continuous improvement in the framework of learning management
systems. It is possible with the cooperation of libraries to digitize their print resources, create metadata and
content development. It has given a new path of learning to those who could not access higher education in
universities, Colleges, and business and technological institutes. E-learning presents reduced cost of course
production, large scope of expansion of potential market, quality improvement and several other benefits. It has
also given an opportunity to libraries to develop their e-resources, procure electronic resources in place of print
resources digitized available print resources and integrate the same in the learning management system.
Libraries and learning centres are creating and developing their portals to integrate e-learning resources.
Librarians can contribute their expertise by developing ‘info points’ to meet the readers’ queries and to literate
the readers. Future vision of the e-learning library or learning management system will be totally different from
the traditional library.This paper describes all about to implementing e learning in public libraries. You’ll
find proven, successful ways of introducing online credit-based information literacy instruction,
innovative methods for teaching critical thinking skills online, ways of using open source software in
interactive learning, step-by-step guidance for instructional screen casting, ways to work with faculty on
e-learning solutions through streaming video, and how a school library used e -learning to teach about
the Holocaust. These stellar models offer solutions and feature the aspects you and your staff need
because they recognize the problems you face. There’s plenty here for all libraries to grab on to and
implement to move learning from inside the library to where your users live and work
RECOMMENDATIONS
It is recommended that:
ICT infrastructure should be improved from time to time to reflect the increasing needs of e-learning
services
Public Libraries should enhance access of most library e-services on e-learning systems
Public libraries should setup strategies for increasing the level of usage of e-resources
Public libraries should incorporate a topic on “basics of e-learning” in IT courses taught to first year
students
For making e-learning efficient, subscription of more e-resources and bandwidth is inevitable
REFERENCES
Allan, B. (2002) E-learning and teaching in library and information services. Facet Publishing.
Conard, Dianne 2006. E-learning and Social change : An Apparent Contraiction. In : Michael Beaudion (Ed.),
Perspectives on Higher Education in the Digital Age,pp.21-33 New York: Nova Science Publishers, Inc,304
[3] Jolliffe A et al. (2000) The Online Learning Handbook: Developing and Using Web-based Learning. Taylor and
Francis Ltd.
[4] Kaula, P.N. (1985) “Library development and the National Policy on Library and Information Services for India”
Indian Libraries: Trends and Perspectives ed. By K.M. George: Hyderabad, Orient Longman, 1985 Pp.218.
[1]
[2]
82
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
Kay, D. (2003) E-learning: Drivers, Developments, and Decisions. Multimedia Information and Technology, 29
(1), 26-29.
Lomax, Allen. From the chair 2006 Academic Support Newsletter. 2:1, Fall 2000. Http://www.myacpa.org/
comm/academic /neswletter 2000.htm (retrived October3)
Lytras, M.D., Pouloudi, A. And Poulymenakou 2002, A. Knowledge management convergence: Expanding
learning frontiers. Journal of Knowledge Management, 6:1, 40-51.
McKnight, Susan 2006. The changing nature of academic libraries in the digital age. In: Michael Beaudoin (Ed.),
Perspectives on Higher Education in the Digital Age,pp.66-76. New York: Nova Science Publishers, Inc,304.
McLean and Sander, op.cit, 19p.
McLean, Neil and Sander,Heidi 2003. Libraries and the enhancement of e-learning. Ohio:OCLC,
19.http://www5.oclc.org/downloads/community/elearining .pdf (retrieved October3,2006)
Moore, K. and Aspen, L. (2004) Coping, adapting, evolving: the student experience of e-learning. Library and
Information Update, 3 (4), 22-24.
Naidu, Dianne 2006 E-learning: A guidebook of principles, Proceures and practices. 2 nd rew ed, New Delhi:
Commonwealth Educational Media Centre for Asia (CEMCA),88
Newton, R. (2003) Staff attitudes to the development and delivery of e-learning. New Library World, 104 (10),
412-425.
OECD 2005, E-learning in tertiary education: Where do we stand? Paris: Organisation for Economic Co-operation
and Development , 289p.
Porter , David 2006. Libraries and e-learning : Final report of the CARL e-learning Working Group. Ottawa:
Canadian
Association
of
Research
Libraries
(CARL),
2005.
23p.
http://www.carlabrc.ca/projects/e_learning/pdf/final-report.pdf(retrieved October3)
Sloan J. (n.d.) E-learning Needs Analysis. (http://www.n-email.net/trimax/elearning_needs_analysis.htm)
[Accessed 02/07/15 Time: 3:46]
Storey, Tom 2004. E-learning, e-content. OLCE Newsletter, no.256,july-September.
Storey, Tom 2006. Moving to the network level. Next Space, no.4, September 6-11.
Thakur, D.S.2006, Scientific and technical libraries. New Delhi:ESS ESS Publication.
Thorne, K. (2002) Blended Learning: How to Integrate Online and Traditional Learning. Kogan Page.
ISBN 1-63102-455-8
83
USE OF SOCIAL NETWORKING SITES IN LIBRARY AND
INFORMATION CENTRES
“If you’re not networking, you’re not working”
Denis Waitley
Aslam Ansari | Assit. Librarian | Library, Integral University | Lucknow | mdaslam.dlis@gmail.com
Mehfoozul Hasan | Library Assistant | Central Library | Integral University | Lucknow
Abstract: Social Networking (SN) just began from late 21st century and growing up rapidly up
to date. It verified as a medium of communication with one to another for sharing their
experiences and information regarding interest, and also helps to build up long-time
relationship between individuals and group. In the field of LIS services, it may be quietly help
to promote the services of LIC (Library and Information Centers) to develop the proficiency
about technology of professionals and other side like users.
Keyword: SNS (Social Networking Sites), LIS Professionals, Online community, Virtual reference, Mass
friending.
INTRODUCTION
Now a day’s Information Communication Technology is approach to transmitting the idea or thought or
information between one to another and understanding through the interaction, in other words it is the act of
sharing or exchanging information, ideas or feelings. There are various technique to communication that
establish through the network, web technologies are creating more friendly, social and fun environments for
retrieving and sharing information and one of such Social networking websites are a good example of
communication network and it is a social structure that lets the user interact and work collaboratively with other
users. Although people have been using the internet to connect with others since the early 1980s, it is only in the
last decade that social networking services have proliferated and their use has become a widespread practice –
particularly amongst young people and changing the ways in which people use and engage with the internet and
with each other. Young people particularly are quick to use the new technology in ways which increasingly blur
the boundaries between their online and offline activities. The uniqueness of this social networking is to share
information among users ranging from highly personal to academic interests of the participants and it has
become one of the largest platform in the world for sharing real time information and its possible uses for LIS
Professionals and to assess how much real transformation this technology can deliver, while deflating
reaffirmation and singling out the real assessment of these innovations.
DEFINITIONS
Social networking sites can be broadly defined as an internet or mobile-based social space where people can
connect, communicate, and create and share content with others. While we use the term "social network site" to
describe this occurrence, the term "social networking sites" also appears in public discourse, and the two terms
are often used interchangeably. We chose not to employ the term "networking" for two reasons: emphasis and
scope. "Networking" emphasizes relationship initiation, often between strangers. While networking is possible
on these sites, it is not the primary practice on many of them, nor is it what differentiates them from other forms
of computer‐mediated communication.
According to Computing Dictionary (2011), “Social networking site as any website designed to allow multiple
users to publish content of them. The information may be on any subject and may be for consumption by friends,
mates, employers, employees just to mention a few.”
Boyd and Ellison (2007) define “social networking sites as Web-based services that allow individuals to having
three common elements (1) construct a public or semi-public profile within a bounded system, (2) articulate a
list of other users with whom they share a connection, and (3) view and traverse their list of connections and
those made by others within the system. The nature and nomenclature of these connections may vary from site to
site”.
84
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Advantages of Social Networking: The significant advantage is:
1.
2.
3.
4.
5.
Worldwide Connectivity
Commonality of Interest
Real-Time Information Sharing
Free Advertising
Increased News Cycle Speed
Disadvantages of Online Social Communities: While up using SNS, there is some negativity is also like:
1.
2.
3.
4.
5.
6.
7.
Face to Face Connections are endangered
Cyber bullying and Crimes against Children
Risks of Fraud or Identity Theft
Time Waster
Corporate Invasion of Privacy
Negative Health Consequences
Diminishing Privacy
MAJOR CATEGORIES OF SOCIAL NETWORK
SNS can be categories as their content types, it is very extensible services, White, Mary Gormandy (2014)
describe the major categories like:
1. Social Connections: Keeping in touch with friends and family members is one of the greatest benefits of
social networking. Facebook, Twitter, Google + and MySpace are some of the most widely-used websites
for building social connections online.
2. Multimedia Sharing: Social networking platform makes it easy to share video and managing digital
photography content online. Some of the most popular sites for multimedia sharing are YouTube, Flickr and
Picasa etc.
3. Professional: Professional social networks are designed to provide opportunities for career-related growth.
These types of networks provide a general forum for professionals to connect, while others are focused on
specific occupations or interests. A few examples of professional social networks are LinkedIn, Classroom
2.0 and Nurse Connect. Online community designed to help individuals in the nursing profession connect
and communicate with each other.
4. Informational: Informational communities are made up of people seeking answers to everyday problems.
For example, when you are thinking about starting a home improvement project or want to learn how to go
green at home, you may perform a web search and discover countless blogs, websites, and forums filled
with people who are looking for the same kind of information. A few examples include:
Super Green Me : Online community where individuals interested in adopting green living practices
can interact.
HGTV Discussion Forums: Connect with individuals interested in home design improvement via the
HGTV message boards.
Do-It-Yourself Community: Social media resource to allow do-it-yourself enthusiasts to interact with
each other.
5. Educational : Educational networks are where many students go in order to collaborate with other students
on academic projects, to conduct research for school, or to interact with professors and teachers via blogs
and classroom forums. Educational social networks are becoming extremely popular within the educational
system today. Some examples of such educational social networks are The Student Room, The Math
Forum and ePALS School Blog etc.
6. Hobbies: One of the most popular reasons many people use the Internet is to conduct research on their
favorite projects or topics of interest related to personal hobbies. When people find a website based on their
favorite hobby, they discover a whole community of people from around the world who share the same
passion for those interests. This is what lies at the heart of what makes social networks work, and this is
why social networks that are focused on hobbies are some of the most popular. A few examples of hobbyfocused social networking sites include:
ISBN 1-63102-455-8
85
Use of Social Networking Sites in Library and Information Centres
7.
Oh My Bloom: Social media site specifically for gardening enthusiasts. It features groups, forums,
blogs, video content and more.
My Place at Scrapbook.com: Designed specifically for scrapbooking enthusiasts, users can create
profiles, share information, post updates and more.
Sport Shouting: An online destination for sports fans to voice their opinions and connect with other
enthusiasts.
Academic: Academic researchers who want to share their research and review results achieved by
colleagues may find academic-specific social networking to be quite valuable. A few of the most popular
online communities for academics are:
Academia.edu : Users of this academic social network can share their own research, as well as follow
research submitted by others
Connotea Collaborative Research: Online resource for scientists, researchers and clinical practitioners
to find, organize and share useful information.
There is another category, which define by Kaplan and Haenlein (2010), are describing the major categorization
of social network using by usera.
b.
c.
d.
e.
f.
g.
Collaborative Project (for example, Wikipedia),
Blogs and micro blogs (for example, Twitter),
Social news networking sites (for example, Digg and Leakernet),
Content communities (for example, YouTube and DailyMotion),
Social networking sites (for example, Facebook),
Virtual game-worlds (for example, World of Warcraft),
Virtual social worlds (for example, Second Life ).
In briefly all the SN has some specific features like:
a.
b.
c.
d.
e.
f.
Create profile themselves,
Connect with other user sending as “request” (may be accepted or denied),
Manage the list of friend and searching related links
Sending messages
Posting, tagging and sharing object with others and
Customize a range of aspects, from layout and design, to function and selective disclosures of
information to different user or audience.
TYPES OF SOCIAL NETWORKING SERVICES
A social networking service or social networking site is a platform to build social networks or social
relations among people who share interests, activities, backgrounds or real-life connections. It covers the two
main formats – sites that are primarily organised around users' profiles and those that are organised around
collections of content. However, it’s important to remember that services may be different and characterised by
more than one category. Educators setting up private groups in order to make use of collaborative space and
tools are a good example of this.
Profile-based SNS: Profile-based services are primarily organised around members' profile pages. Bebo,
Facebook and MySpace, are all good examples of this. Users often include third party content in order to
enhance their profiles, or as a way of including information from other web services and SNS.
Content-based SNS: In these services, the user's profile remains an important way of organising connections,
but plays a secondary role to the posting of content. Content-based communities include Flickr, Shelfari, and
YouTube.com for video-sharing and last.fm, where the content is created by software that monitors and
represents the music that users listen to.
White-label SNS: Most SNS offer some group-building functionality, which allows users to form their own
mini-communities within sites. Platforms such as Ning and PeopleAggregator broadbandmechanics.com. These
86
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
sites offer members the opportunity to create and join communities. This means that users can create their own
“mini-MySpace’s”10, small scale social networking sites which support specific interests, events or activities.
Multi-User Virtual Environments: Sites such as Second Life, an online virtual world, allow users to interact
with each other’s avatars – a virtual representation of the site member. Although the users have profile cards,
their functional profiles are the characters they customise or build and control. There are also hybrids of these
and social-networking sites, such as Habbo Hotel and Cyworld.
Mobile SNS: Many social network sites such as MySpace, MYUBO and Twitter offer mobile phone versions of
their services that allowing members to interact with their networks via their phones. Increasingly, too, there are
mobile–led and mobile-only based communities allows users to share and view video over mobile networks.
Micro-blogging/ Presence updates: Micro-blogging services such as Twitter and Jaiku allow you to publish
short (140 characters, including spaces) messages publicly or within contact groups. They are designed to work
as mobile services, but are popularly used and read online. Many services offer ‘status updates’ – short
messages that can be updated to let people know what mood you are in or what you are doing. These can be
checked within the site or exported to be read elsewhere. They engage users in constantly updated conversation
and contact with their online networks.
People Search: People search is another important web development. There are various kinds of social and
people search, but sites like Wink generate results by searching across the public profiles of multiple social
network sites allows search by name, interest, location and other information published in profiles and allowing
the creation of Web-based "dossiers" on individuals. This type of people search cuts across the traditional
boundaries of social network site membership, although the data that are retrieved should already be public.
Benefits of Social Networking Service Use
There are facts of a broad range of benefits to young people associated with the use of Social Networking
Service. Below we summarise these as Media Literacy, Formal Educational Outcomes, Informal Education and
Learning, Creativity, Individual Identity and Self-Expression, Strengthening Social Relationships, Belonging
and Collective Identity, Building and Strengthening Communities, Civic and Political Participation, SelfEfficacy and Wellbeing
UTILIZATION OF SOCIAL NETWORKING AND IT APPLICATION IN LIBRARY
User approach towards library is changing gradually; it wants most practical and speedily information in elearning age. But retrieve quick and easy information to user is a big challenge to library professional. Social
networking helps library professional to share information with patrons and students in the easiest way for
digital library environment. The possible implication of social networking can be successful by conducting
maximum research and experiment on social networking from different point of view on library. That social
networking tools were helpful in promoting library services was consistent with the finding that the two most
reported purposes for which libraries used social networking tools were promotion of library events such as
exhibitions, competitions, talks, seminars, workshops, tutorials, training courses and dissemination of news
events alert, library updates. Purposes for using social networking tools, which included the following: to offer
library resources including answer enquiries, catalogue search and information about new collections and lists,
to convey general library information, and to offer online resources. Ezeani, Chinwe Nwogo and Igwesi, U
Zoamaka. (2012) suggest, “…library should follow the public conversations, posts, updates, and events of these
key individuals, and pro-actively offer advice, resources, and help. He should act as an active participant of the
social space and be able to identify the needs of the members of the library communities and to proffer solutions
by offering information, links to the websites that are relevant to their information needs; and even direct offers
of help. There is an urgent need for libraries to adopt the new social networking tools in their services as a
strategy to embrace change while promoting a participatory role for library users in knowledge creation. The
growing use of social networking tools calls for librarians to develop 21 st century skills on digital technologies.
Libraries can connect their social networking sites with their library Websites to links to their catalog, chat
reference pages, research guides, calendar of events, news etc. Some of the roles of the social networking
ISBN 1-63102-455-8
87
Use of Social Networking Sites in Library and Information Centres
librarian include: understanding and articulating the nature of social networking sites, creating webpage and
content, establishing friendly user interface over the network, creating online database management, evaluating
and applying information, and assisting users with skill acquisition. Other skills for a social networking literate
librarian include: searching and navigating the web, creating social network space, teaching, and providing
quality online library services.”
Library professional can use in three broad activities in library and information services are Information sharing,
Knowledge distribution and knowledge organization.
Information sharing: Social networks are a great way to test your commitment to open communication. In this
process librarian can keep constant touch and effective interaction with staff, patrons and faculty in online
collaborative environment. The social networking tools that can be practiced by the library for the
aforementioned purposes are: MySpace, Facebook, Ning, Blog, Meebo, LinkedIn and Twitter etc.
Information Distribution: Information sharing is the major part and crucial area where professionals should
looks seriously while considering and designing library activities in digital age. Patron’s satisfaction should give
first and foremost priority by providing right information at the right time in a right way from anywhere. Library
professionals should rethink for implementing technologies in library services from early period. Virtual
Reference Desk (VRD) can be performed by Wikipedia that can planed, design and disseminate information to
patrons by KM Wiki, Podcast, YouTube, Blogger, SecondLife Flickr, TeacherTube, Wikipedia PBwiki,
Footnote, Community Walk, Slide Share, Digg StumbleUpon and Daft Doggy etc.
Knowledge Organization: Social networks tools
can helps the Library professionals in KO
environment for getting handy and Harvesting
information from individual users for improving
library services, academic research, etc. which
can be accessible with the social networking
technologies. The following tools can effectively
use in library and information centre for patrons
as: aNobii, Del.icio.us, Netvibes, Connotea,
LibraryThing and lib.rario.us etc.
User Risk to using SNS: The following
categories risks might be applicable to social
media and specifically to SNSs: Crime and
violence ; Recreation ;War, security and
terrorism; Political, social and financial;
Human disease/health ;Occupational and
Consumer products but knowing the user risk to
user SNS Haynes, David & Robinson, Lyn
(2015) find out a graphical representation:
There they suggested possible solution of risk to
using SNS, “...current regulatory activity is risk based, this approach could provide a means of evaluating
different regulatory approaches. For example, it might be possible to consider whether proposed changes in
legislation tend to increase or reduce each of the risk categories in terms of probability of occurrence and
severity of impact.”
CONCLUSION
Social networking sites proved a vast area for communication with others, which are online network. SNS in
library can be used productively but it has thread to user to using without circumspection. Libraries can
proliferate to these networks for reaching out strategy to new generation users at their own space and time but it
is also important that to provide quality services and interact with users efficiently. Khan, AM & Ansari, A
(2014) find in her study that, Remarkable point is Social networking tools may be used as an interactive
88
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
platform for LIS professionals to reaching out their various categories of user, young generation professionals
are more active and feel comfortable through their techno-savvy nature compare than traditional way of serving
services. The most of respondent feel this is easy way to communicate with their user group and also may be
using SN tools for find out the research contents.
The effectively use of SNS in library training and awareness program should be given to users and professionals
prospectively about applications, benefits and risks associated with social networking sites.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Khan, Abdul Mannan and Ansari, Aslam (2014) "Role of social networks in library and information services in India:
a case study of efficiency and effectiveness", Library Hi Tech News, Vol. 31 Iss: 5, pp.11 – 13.
Boyd, D. M., & Ellison, N. B. (2007). Social network sites: definition, history, and scholarship. Journal of computermediated communication, 13(1). Available at http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html.
Ezeani, Chinwe Nwogo and Igwesi, U zoamaka, "Using Social Media for Dynamic Library Service Delivery: The
Nigeria Experience"(2012). Library Philosophy and Practice ( e-journal). Paper 814.
Haynes, David & Robinson, Lyn (2015),"Defining user risk in social networking services", ASLIB Journal of
Information Management, Vol. 67 Iss 1 pp. 94 – 115.
Kaplan Andreas M., Haenlein Michael. (2010)"Users of the world, unite! The challenges and opportunities of social
media". Business Horizons 53 (1).p.67.
Social Network. (n.d.). The Free On-line Dictionary of Computing. Retrieved June 23, 2011, fromDictionary.com
website: http://dictionary.reference.com/browse/social network.
White, Mary Gormandy (2014). What Types of Social Networks Exist? Available on :
http://socialnetworking.lovetoknow.com/What_Types_of_Social_Networks_Exist (retrieved on : 14.02.2015)
Further Readings:
[1] Ayiah, Efua Mansa and Kumah, Cynthia Henewaa. (2011). Social Networking: a tool to use for service delivery to
clients by African Libraries. World library and information congress. San Juan : IFLA,13-18 August. (Revised on
2012).
[2] Charlotte N. Gunawardena , Mary Beth Hermans , Damien Sanchez , Carol Richmond , Maribeth Bohley & Rebekah
Tuttle (2009). A theoretical framework for building online communities of practice with social networking tools,
Educational Media International, 46(1), 3-16
[3] Charnigo, L. and P. Barnett-Ellis. (2007). Checking Out Facebook.com: The Impact of a Digital Trend on Academic
Libraries. Information Technology & Libraries. 26 (1):23-34.
[4] Chu , Melanie and Meulemans, Yvonne Nalani . (2008) “The Problems and Potential of MySpace and Facebook usage
in academic libraries”, Internet Reference Services Quarterly,Vol 13(1).pp:69-85.
[5] Chu, S.K.W. & Du, H. (2013). Social Networking Tools for Academic Libraries. Journal of Librarianship &
Information Science, 45(1), 64-75.
[6] Connell, R.S.(2009). Academic Libraries, Facebook and MySpace, and Student Outreach: A Survey of Student
Opinion. portal: Libraries & the Academy 9 (1):25-36.
[7] Kim, Yong-Mi (2010), "User's perceptions of university library websites: a unifying view", Library and Information
Science Research, 33(1): 63-72
[8] Madhusudan, M and Nagabhushanam, V.(2012). “Use of web-based library services in select university libraries in
India: a study”. International Journal of Library and Information Studies, 2(1):1-20.
[9] Naushia Parveen.(2011).”Use of social networking site (facebook) in making awareness among the library and
information science professionals of university libraries of U.P: a case study”.International Journal of Digital Library
Services.1(1),.available on www.ijodls.in
[10] Redmond, Fiona. (2010). Social Networking Sites: Evaluating and investigating their use in Academic Research.
Dissertation. Dublin Institute of Technology ,
[11] Suri, Samiksa.(2013). “Use of Social Networking Sites in higher education”. International Journal of
Engineering and Technical Research, 1(8), 7-13.
ISBN 1-63102-455-8
89
USAGE OF E-RESOURCES IN ENGINEERING COLLEGES
OF GREATER NOIDA, G.B. NAGAR, UTTAR PRADESH: A
COMPARATIVE STUDY
Deepmala | Research Scholar | School of Library and Information Science | Galgotias University | Greater
Noida, Gautam Budh Nagar (U.P.) | deepmala.mlis@gmail.com
Ashok Kumar Upadhyay | Assistant Librarian | | School of Library and Information Science | Galgotias
University | Greater Noida, Gautam Budh Nagar (U.P.) | ashoka143@gmail.com
Abstract: In the information explosion age e-resources play a vital role in all the disciplines and provide
current and relevant information to the users on wider range. The paper aims to examine usage of e-resources
by undergraduate and post graduates students of Engineering Colleges of Greater Noida, Uttar Pradesh.
Survey method was adopted for the study based on a structured questionnaire. It also discusses the purpose of
using e-resources, benefit, satisfaction; problems faced by users and perceived impact of e-resources. The study
revealed that B.Tech. and M.Tech. students are aware of the resources and using it for their study purpose.
There is need to provide high internet speed and subscription of more e-resources for the students.
Keywords: Electronic Resources, Engineering Colleges, Greater Noida, User Studies
INTRODUCTION
In the present digital age, there is a shift from traditional library resources to electronic resources. In the
traditional libraries users have to depend on library staff as well as have to spend more time in searching their
required information. Bit in the digital age, after using computer they are saving their precious time. Users are
using library resources in their colleges’ library. Now a day’s number of e-resources is available in every
discipline which covers a huge portion of library collection and day by day its utilization is increasing. These eresources are playing an important role in finding relevant information of the users in very easy and faster way.
Slowly and gradually e-resources are replacing the importance of print documents. Today a large amount of
scholarly literature is publishing in electronic medium. It has an impact on every part of academic activity.
Library users are not habituated to visit the library, even they prefer to use internet to search online databases
and browse electronic journals for their work. Therefore there is need to study the different aspects of eresources and issues relating to the utilization of e-resources by users.
Galgotia College of Engineering and Technology, Greater Noida, GB Nagar, Uttar Pradesh
Galgotia College of Engineering and Technology (GCET) is a co-educational private college in Greater Noida
(NCR) in the state of Uttar Pradesh, India. It was approved in 1999 by AICTE, Ministry of HRD, and
Government of India and affiliated to Gautam Budh Technical University, Lucknow.
GCET library caters adequately to the needs of B.Tech, M.Tech, MCA & MBA students, research students as
well as staff members. It provides access of E-journals, E-Books and conference proceedings etc.
Noida Institute of Engineering and Technology, Greater Noida, GB Nagar, Uttar Pradesh
Noida Institute of Engineering and Technology was established in 2001 by City Educational & Social Welfare
Society. It is situated in Greater Noida in the area of 13.90 acres and developing as the Centre of Excellence
imparting technical education.
The central library of NIET spreader over 14,000 square feet area and provide the facility to a vast repository of
resources, including huge collection of books and periodicals and many more to their students. Completely
automated library management system provides the services to the users at any time of the day or night, as well
as online facility too.
90
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
REVIEW OF LITERATURE
A large number of studies have been conducted on the utilization of e-resources. According to Adeniran (2013)
revealed in his study that use of e-resources has tremendous impact on the academic performances of the
students of Redeemer’s University. Kandpal et. al. (2013) found that students are aware of the e-resources and
feels that e-resources provided by the library to the great extent fulfill their requirements. Habiba &
Choudhary (2012) confirmed in their study that majority of the users of Dhaka University Library use eresources for their learning purpose and satisfied with these materials. Sakshi & Singh (2012) showed that all
the faculty members and research scholars were familiar with e-resources and even 100% faculty members use
e-resources for their research and education purpose. Natarajan et. al. (2010) revealed in the study that use of
e-resources found to be significant among the users but after having wide range of e-resources, frequency of
their use was low due to lack of time, subject coverage, awareness and slow downloading. Satpathy & Rout
(2010) found that faculty members are aware of the e-resources. The internet, email and e-resources are utilized
by various organizations in India.
OBJECTIVES OF THE STUDY
This survey was particularly conducted to assess the benefits of the e-resources over conventional sources of
information. Some of the major objectives are:
1. To know the different types of e-resources and services available in the libraries.
2. To know the awareness of e-resources among the users.
3. To study the purpose and frequency of using the e-resources available in the library.
4. To find out the impediments encountered by the users while accessing and using the e-resources.
5. To study the impact of e-resources on the academic performance of the users.
6. To provide suitable suggestions and recommendations to improve the e-resources and services for the
benefit of the users.
LIMITATIONS OF THE STUDY
The present study is to find the utilization of electronic resources in engineering colleges of Greater Noida, UP.
The investigator was able to identify some of the major limitations such as:
1. The present study consists of only the B-Tech and M-Tech students.
2. The geographical area is restricted in Galgotia College of Engineering and Technology and Noida Institute
of Engineering and Technology.
DATA COLLECTION PROCEDURE
This study is based on survey method and questionnaire tool. As part of the study a structured questionnaire was
designed to collect data from the students. Besides questionnaire method, observation and interview methods
were also adopted. The target population of this study was B.tech. and M.tech. Proportionate random sampling
technique was adopted for deriving sample population. Thus total 250 questionnaires 125 (each) in both
engineering colleges were distributed, of which, 215 filled questionnaires were received back from the students,
out of which only 200 questionnaires (100 (each) from both the engineering colleges) were usable for the
analysis and interpretation of data.
DATA ANALYSIS AND INTERPRETATION
The collected data was organized and tabulated by using tables and percentages.
Awareness
GCET
NIET
Yes
78 (78%)
82 (82%)
No
22 (22%)
18 (18%)
Table-1 Awareness of E-Resources
Galgotia College of Engineering and Technology (GCET), Noida Institute of Engineering and
Technology (NIET)
ISBN 1-63102-455-8
91
Usage of E-Resources in Engineering Colleges of Greater Noida, G.B. Nagar, Uttar Pradesh: A Comparative Study
Table 1 shows that 78% respondents in GCET and 82% respondents in NIET are aware about e-resources. Only
22% respondents in GCET and 18% respondents in NIET are now aware about e-resources.
Frequency
GCET
NIET
Daily
20 (20%)
26 (26%)
2/3 times in a week
57 (57%)
50 (50%)
2/3 times in a month
15 (15%)
15 (15%)
Occasionally
8 (8%)
9 (9%)
Table-2 Frequency of visit the Library
The above table shows that 57% users of GCET and 50% of NIET users visit the library 2/3 times in a week
followed by 20% respondents of GCET and 26% respondents of NIET visit the library daily where as 15%
respondents of GCET and NIET visit the library 2/3 times in a month.
Frequency of visit the library
50%
57%
26%
60%
40%
15%
20%
15%
20%
9%
NIET
8%
GCET
0%
Daily
2/3 times in a 2/3 times in a
week
month
GCET
Occasionally
NIET
Reasons
GCET
NIET
To update knowledge
65 (65%)
60 (60%)
For academic/study purpose
82 (82%)
80 (80%)
For competitive exams
25 (25%)
23 (23%)
To write papers
11 (11%)
13 (13%)
Table-3 Reasons of Using E-Resources
(Multiple answers were permitted)
Table 3 shows that 82% respondents of GCET and 80% respondents of NIET use e-resources “For
academic/study purpose” whereas 65% respondents of GCET and 60% respondents of NIET use e-resources
“To update knowledge”. 25% respondents of GCET and 23% respondents of NIET use e-resources “For
competitive exams” followed by 11% respondents of GCET and 13% respondents of NIET use e-resources “To
write papers”.
92
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Resources
GCET
NIET
E-Book
19 (19%)
15 (15%)
E-Journals
79 (79%)
75 (75%)
Online Databases
54 (54%)
59 (59%)
CD-ROM Databases
21 (21%)
19 (19%)
E-Newspapers/Magazines
13 (13%)
11 (11%)
Table-4 Types of E-Resources Accessed
(Multiple answers were permitted)
Table 4 describes that 79% respondents of GCET and 75% respondents of NIET accessed E-journals frequently
whereas 54% respondents of GCET and 59% respondents of NIET accessed Online databases. 21% respondents
of GCET and 19% respondents of NIET accessed CD-ROM databases followed by 19% respondents of GCET
and 15% respondents of NIET accessed E-Book.
GCET
NIET
ENEWSPAPERS/M
AGAZINES
CD-ROM
DATABASES
ONLINE
DATABASES
E-BOOK
E-JOURNALS
Types of E-Resources Accessed
80%
70%
60%
50%
40%
30%
20%
10%
0%
Criteria
GCET
NIET
Authenticity
19 (19%)
21 (21%)
Currency
51 (51%)
55 (55%)
Reliability
27 (27%)
23 (23%)
Usability
11 (11%)
10 (10%)
Table-5 Measures for Selecting & Using E-Resources
(Multiple answers were permitted)
Table 5 depicts that 51% of GCET respondents and 55% of NIET respondents depend on currency measures for
selecting and using e-resources followed by 27% of GCET respondents and 23% of NIET respondents depend
on reliability measure for selecting and using e-resources, 19% of GCET respondents and 21% of NIET
respondents choose authenticity measure for selecting and using e-resources whereas 11% of GCET respondents
and 10% of NIET respondents depend on usability measure for selecting and using e-resources.
Problems
GCET
NIET
Limited access terminals
17 (17%)
15 (15%)
ISBN 1-63102-455-8
93
Usage of E-Resources in Engineering Colleges of Greater Noida, G.B. Nagar, Uttar Pradesh: A Comparative Study
Difficulty in finding relevant information
63 (63%)
59 (59%)
Slow download speed
38 (38%)
43 (43%)
Lack of training
27 (27%)
25 (25%)
Unfamiliar with e-resources
33 (33%)
31 (31%)
Table-6 Problems in Accessing E-Resources
(Multiple answers were permitted)
Table 6 describes that 63% respondents of GCET and 59% respondents of NIET faced difficulty in finding
relevant information followed by 38% respondents of GCET and 43% respondents of NIET faced slow
download speed. 33% of GCET respondents and 31% of NIET respondents are unfamiliar with e-resources
followed by 27% of GCET respondents and 25% of NIET respondents faced lack of training whereas very few
i.e. 17% of GCET respondents and 15% of NIET respondents faced limited access terminals.
Problems in Accessing E-Resources
80%
60%
40%
20%
0%
NIET
GCET
Limited
access
terminals
Difficulty in
finding
relevant
information
Slow
downloa
speed
GCET
Lack of
training
Unfamiliar
with eresources
NIET
Training
GCET
NIET
Yes
74 (74%)
69 (69%)
No
26 (26%)
31 (31%)
Table-7 Need of user training
Table 7 shows that 74% of GCET respondents and 69% of NIET respondents need users training for proper
utilization of e-resources.
Satisfaction
GCET
NIET
Fully Satisfied
22 (22%)
26 (26%)
Partially Satisfied
58 (58%)
53 (53%)
Less Satisfied
19 (19%)
21 (21%)
Not Satisfied
1 (1%)
1 (1%)
Table-8 User Satisfaction with E-Resources
94
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Table 8 depicts that 58% respondents of GCET and 53% respondents of NIET are partially satisfied followed by
22% respondents of GCET and 26% respondents of NIET are fully satisfied whereas 19% respondents of GCET
and 21% respondents of NIET are less satisfied.
Ways
GCET
NIET
To make training programs
49 (49%)
33 (33%)
Through co-operation from staff
67 (67%)
72 (72%)
To improve speed
9 (9%)
11 (11%)
Table-9 Ways to make E-Resources Facility effective
(Multiple answers were permitted)
Table 9 depicts that 67% respondents of GCET and 72% respondents of NIET pointed “Through co-operation
from staff” to make e-resources facility effective whereas 49% respondents of GCET and 33% respondents of
NIET selected “To make training programs” for e-resources facility effective followed by 9% respondents of
GCET and 11% respondents of NIET pointed “To improve speed” to make e-resources facility effective.
Benefit
GCET
NIET
Access to current information
23 (23%)
29 (29%)
Easy accessibility
69 (69%)
63 (63%)
Faster access to information
43 (43%)
40 (40%)
Access to wider range
9 (9%)
7 (7%)
Table-10 Benefit of E-Resources
(Multiple answers were permitted)
Table 10 shows that 69% of GCET respondents and 63% of NIET respondents stated easy accessibility as the
main benefit of using e-resources followed by 43% of GCET respondents and 40% of NIET respondents pointed
faster access to information as a benefit of e-resources, whereas 23% of GCET respondents and 29% of NIET
respondents stated it access to current information as the another benefit of using e-resources.
Benefit of E-Resources
70%
60%
50%
40%
30%
20%
10%
0%
NIET
GCET
Access to current
information
Easy accessibility
Faster access to
information
GCET
ISBN 1-63102-455-8
Access to wider
range
NIET
95
Usage of E-Resources in Engineering Colleges of Greater Noida, G.B. Nagar, Uttar Pradesh: A Comparative Study
FINDINGS AND SUGGESTIONS
It is clear from the study that the students appreciate the e-resources facility and they are aware about it but at
the same time they expect more e-resources related to their discipline. Most of the students visited the library
2/3 times in a week. They found current, reliable and authentic information from e-resources for their
academic/study purposes to update their knowledge. E-journals and online databases fulfill their requirements to
great extent. In this study most popular type of e-resources is e-journals followed by online databases. The
students are mainly dependent on e-resources for their required information. They pointed the co-operation from
staff to make e-resources facility more effective as well as training program for them too.
Based on the findings of the study and to improve the quality of education, there is need for the following
recommendations:
a.
b.
c.
d.
Speed of internet and intranet connection should be increased for quick access to available e-resources.
Library staff have to create more awareness on e-resources.
The library has to arrange various user orientation and training programmes for the students to use the
availability of e-resources.
Latest and popular websites with their addresses should be displayed on the notice board in the library.
CONCLUSION
Changes in technology have totally moved the way for accession, storage and retrieval of information. Eresources are the best way of getting and up-to-date information. On the other hand libraries have to play a role
as gateway of e-resources and to provide support in retrieving the resources. The e-resources have a vast input
on the collections of the libraries, provide information access in cheaper to acquiring information resources,
saving in storage and maintenance etc. E-resources provide access to information beyond the geographical
boundaries and even most relevant e-resources are now available on the web. Usage of e-resources is increasing
day by day in academic libraries. E-resources did not take the place of print format but it has the potential to
transforming scholarly communication. In reality it affected every part of library related to each functions,
therefore for maximum utilization of e-resources, wide publicity and training programs should be organized.
REFERENCES
[1] Adeniran, Pauline (2013). Usage of Electronic Resources by undergraduates at the Redeemer’s University, Nigeria.
Academic Journals, 5(10), 319-324. Available at http://www.academicjournals.org/IJLIS
[2] Kandpal, K. N., Rawat, S. S. and Vithal, K. S. R. (2013). Use of E-resources by Undergraduate Students of NTR
College of Veterinary Science, Andhra Pradesh. DESIDOC Journal of Library & Information Technology, 33(5), 394398.
[3] Habiba, Umme and Chowdhury, Salma (2012). Use of Electronic Resources and its impact: A study of Dhaka
University Library users. The Eastern Librarian, 23 (1), 74-90. Available at http://www.banglajol.info/index.php/EL
[4] Sakshi and Singh, Joginder (2012). Use of E-Resources by Chemists and Physicists: A case study of Punjab University,
Chandigarh. Library Herald, 50(1), 23-31.
[5] Sadia, H. (2011). The use and impact of electronic resources at the University of Lagos. Library Philosophy and
Practice, 472. Available at http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article--1490&context=libphilprac
[6] Natarajan, K., Suresh, B., Sivaraman, P. and Sevukan, R. (2010). Use and user perception of electronic resources in
Annamalai University: A case study. Annals of Library and Information Studies, 57, 59-64.
[7] Satapathy, Sunil Kumar and Rout, Biswanath (2010). Use of e-resources by the faculty members with special reference
to CVRCE, Bhubaneswar. DESIDOC Journal of Library & Information Technology, 30(4), 11-16.
[8] Haridasan, S. and Khan, M. (2009). Impact and use of e-resources by Social Scientists in National Social Science
Documentation Centre (NASSDOC), India. The Electronic Library, 27(1), 117-33.
[9] Lohar, M.S. and Roopashree, T. N. (2006). Use of Electronic Resources by faculty members in B.I.E.T., Davanagree: A
survey. SRELS Journal of Information Management, 43, 101-112.
96
ISBN 1-63102-455-8
THE DECLINING TRADITIONAL PRINT BOOKS READING
BEHAVIOUR OF THE PUBLIC LIBRARIES READERS WITH
SWITCH TO JUMP WITH IBOOKS AND EBOOKS READING:
USER EXPERIENCE
Dr. D. K. Shrivastava | Divisional Librarian (I/C) | Govt. Divisional Public Library | Kota | Rajasthan | India |
deepakshri1974@yahoo.co.in
Shashi Jain | Assistant Librarian | Govt. Divisional Public Library | Kota(Raj.) | jainshashraj@gmail.com
Pritima Vyas | Ph.D. Scholar | Carrier Point University | Kota (Raj.) | pritimavyas@gmail.com
Sunita Kumari | Ph.D.Scholar | Carrier Point University, Kota (Raj.) | sunitathakur120976@gmail.com
Manisha Mudagal | Ph.D. Scholar | Carrier Point University, Kota (Raj.) | manishamudgal26@gmail.com
Yogendra Singh Tanwar | Master Scholar of Library Science | Kota (Raj.) | tyogendra01@gmail.com
Abstract: This paper is fully based on the Personal observation and interview made with user of
the Govt. Divisional Public Library Kota’s and Students of Chemical ITI Kota’s Readers. And we
found that almost young’s and seniors are using eBooks and ibooks for recreational and
Professional Use while women’s are taking help for professional Carrier development with help of
WhatsAap by Making Group like for RAS Preparation. But study also reveals that they all people
are not well aware with Technicalities of Reading ibooks and eBooks. Study also exhibits the
decline of Print Reading and Jump of ibooks and eBooks.
INTRODUCTION
Reading on your iPad: How to import books, articles and PDFs
When it comes to reading e-books on your iPad, there are tons of free apps out there, but the two most popular are
definitely Kindle and ibooks. With everything going digital and the new school year ramping up once again,
students are turning to their iPad to take notes, read textbooks, articles and PDFs, and peruse magazines in between
studying. In this article, I'll take you through how to use Kindle and ibooks to get and read books, articles and
anything else you might want to read on your iPad.
ISBN 1-63102-455-8
97
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
Purchasing and importing books on Kindle for iPad
The Kindle app is ideal if you prefer to buy your e-books through Amazon (where books are often cheaper). If you
are logged into Amazon.com, the system will automatically detect all the devices on which you have the Kindle app
installed. To purchase a book and transfer it to the Kindle app for iPad, all you have to do is choose the
corresponding option under the "Buy" button, as you can see in the image below:
Figure 1: Add to Wish list
Within seconds, the book is transferred automatically to the selected device. To view it, just open the Kindle app.
Export e-books, ePUBs and PDF files on iBooks for iPad using Dropbox
The iBooks e-book reader is installed by default on your iPad, so make sure you don't delete it! It's ideal for those
who already have books and magazines in PDF and ePUB format and want to organize them in a clear and intuitive
library. You can export PDF e-books to your iPad and drag them to a Dropbox folder on your PC or Mac so that it
synchronizes online. Then open up Dropbox on your iPad, open the book or magazine, (if it's an ePUB file, Dropbox
will warn you that you can't view it but disregard the warning) and select the command "Open in iBooks", as you
can see in the image below:
Figure 2: Content Strategy Mobile
You only have to wait a few seconds before iBooks imports the book or PDF to the library, where you can organize
it however you'd like. Kindle is also available for Android, and it's definitely the best option if you want to read
books on an Android tablet.
So, which is better: Kindle or iBooks?
98
ISBN 1-63102-455-8
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
If we compare Kindle and iBooks as e-book readers (i.e. not as e-stores, and ignoring the availability of
titles), Kindle is better than iBooks for serious readers (and students); while the customization options are virtually
identical in both apps, Kindle supports multiple formats (ePUB, PDF, DOC, DOCX, MOBI, TXT, HTML
documents and images), includes a dictionary, and has many useful tools to write notes, highlight phrases, and copy
quotes. It will even alert you to which phrases have been highlighted by other readers who bought the same book. It
offers a truly 'shared' reading experience that, until now, no other app has provided. iBooks, on the other hand, is
unbeatable in terms of the clarity of its interface, especially with regards to the library, where you can create your
own custom collections and organize your books however you want.
Figure 3: iBooks display
Reading articles offline using Instapaper
There's another really handy app for reading articles that you've collected online using sources like blogs and news
sites: Instapaper. Instapaper is the perfect app to organize these articles by topic, without displaying advertisements
or other distractions, and with the guarantee of always having them available, even without an internet connection.
To use Instapaper, just register for a free account and download the bookmarklet (a kind of additional button for the
browser) by dragging it onto the bookmarks bar. Then, every time you read an interesting article, click the button to
save it to Instapaper (note: you must be logged in on its web app). All you have to do is download the Instapaper app
for iPad to access it.
How to Read Library e Books
If you are interested to need to read the ibooks in library then you need an Adobe ID and Bluefire Reader to be able
to transfer and read library books on your iPad. It’s Procedure having Three Steps which is mentioned below like Step 1.Create a free Adobe account at Adobe's website if you don't already have one. You will need this
account to authorize the Bluefire App on the IPad with your Adobe ID.
Step 2.Download the free Bluefire Reader app from the app store. Open the app and it will prompt you to
enter your Adobe ID. If you miss this prompt, you can later authorize it under 'Info' on the Bluefire app.
Step 3. Navigate to an EBL eBook through the library catalogue. Click to download the eBook and you
will have the option to launch it in the Bluefire app. You can read the eBook on the iPad until the loan
expires. If you try to launch the book in Bluefire after it has expired you will see the message 'This item has
expired. It can no longer be accessed'.
The majority of eBooks available at many universities in abroad are on the EBL platform. These instructions are not
tested for other eBook platforms. http://www.bluefirereader.com/using-library-books.html
IMPORTANT READERS FOR EBOOKS AND IPAD READINGS
There is many more eBooks and IPad Readers are available in Market but few are very important and helpful for
healthy and stress free reading. Some of are listed below
ISBN 1-63102-455-8
99
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
1. Bluefire Reader
Bluefire Reader for Apple iOS and Android organizes eBooks from libraries, independent bookstores and national
retailers into a single reading environment on mobile devices.
Figure 4: Bluefire Reader
2. Instapaper
Read saved web pages on the go, even offline. Install a bookmark let in your browser on your computers and click to
save a whole article into Instapaper for later reading on your iPhone or iPad. Text-only view makes it easy to read
without scrolling right and left. Adjust the fonts to a size that works for you. Universal.
Figure 5: Instapaper Reader
3. GoodReader
Super-robust PDF reader with advanced reading, annotating, markup and highlighting capabilities, excellent file
manager, text file reader and editor, audio/video player, Safari-like viewer for MS Office and iWorks files. Syncs
with Google Docs, MobileMe, Drop box and more. Create your own hierarchy of folders to save your documents
into. Highly recommended for reading & annotating scholarly articles.
Figure 6: Instapaper Reader
4. Kindle
Access and read your Amazon Kindle books even if you don't have a Kindle. Automatically synchronizes your last
page read between devices. Delete a book when you're done and Amazon keeps your copy online for later retrieval.
Adjust the text size, add bookmarks, and more. Universal iOS app. Free. Android version available.
Figure 7: Kindle Reader
5. Papers
Organize, read, annotate, and share your collection of articles and PDFs on iPhone and iPad. Highlight or use sticky
notes to comment on text. Search within Papers to find articles, upload PDFs in iTunes, or import PDFs from email,
Drop box, or Mobile Me.
Figure 8: Papers
100
ISBN 1-63102-455-8
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
6. Reeder
Read Google Reader RSS feeds on a simple and attractive interface on the iPhone or iPad. Scroll through items oneby-one, or swipe items to skip. Star items for reading later.
Figure 9: Papers
7. Feedly
Similar to Reeder, Feedly is a fun, stylish way to read and share the content of your favorite websites, feeds, &
social networks. For iOS & Android.
Figure 10: Feedly
8. Flipboard
Read content from Face book, Google Reader, Twitter, and more in a magazine-style layout. View everyday content
in an alternative way that emphasizes linked content, videos, and photos. Get interested in content that you might
typically skip when browsing social media. For iPad & iPhone. Free.
Figure 11: Feedly
9. Pulse
Similar to Flipboard, Pulse is an elegant news reading application that incorporates colorful panning story bars and
fills them with content from popular sources. For iPad, iPhone, &Android.
Figure 12: Pulse
From 1997-2015, I spent 18 years trying to make beautiful printed books But I can tell you this: the excitement I
feel about the iPad as a content creator, designer and publisher — and the potential it brings — must be
acknowledged. Acknowledged bluntly and with perspective. With the iPad we finally have a platform for consuming
rich-content in digital form. What does that mean? To understand just why the iPad is so exciting we need to think
about how we got here. I want to look at where printed books stand in respect to digital publishing, why we
historically haven't read long-form text on screens and how the iPad is wedging itself in the middle of everything. In
doing so I think we can find the line in the sand to define when content should be printed or digitized. This is a
conversation for books-makers, web-heads, content-creators, authors and designers. For people who love beautifully
ISBN 1-63102-455-8
101
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
made things. And for the storytellers who are willing to take risks and want to consider the most appropriate shape
and media for their yarns. Act of printing something in and of itself has been placed on too high a pedestal. The true
value of an object lies in what it says, not its mere existence. And in the case of a book, that value is intrinsically
connected with content.et's divide content into two broad groups.
Content without well-defined form (Formless Content (Fig.13)
Content with well-defined form (Definite Content (Fig.14)
Formless Content can be reflowed into different formats and not lose any intrinsic meaning. Its
content divorced from layout. Most novels and works of non-fiction are Formless.
Figure: 13 Formless Content- Retaining meaning in any container
Definite Content — is almost totally the opposite of Formless Content. Most texts composed with images, charts,
graphs or poetry fall under this umbrella. It may be reflowable, but depending on how it’s reflowed,
inherent meaning and quality of the text may shift.
Figure: 14 Definite Content- meaning shifts with container
The start of each printed at opposite ends of the book.A designer may, of course, working in concert with the author,
imbue Formless Content with additional meaning in layout. The final combination of design and text becoming
Definite Content. For an extreme and ubiquitous contemporary example of Definite Content, see Tufte. Love him or
hate him, you have to admit he's a rare combination of author and designer, completely obsessed with final form,
meaning and perfection in layout. (Fig. 15)
In the context of the book as an object, the key difference between Formless and Definite Content is the interaction
between the content and the page. Formless Content doesn’t see the page or its boundaries. Whereas Definite
Content is not only aware of the page, but embraces it. It edits, shifts and resizes itself to fit the page. In a sense,
102
ISBN 1-63102-455-8
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
Definite Content approaches the page as a canvas — something with dimensions and limitations — and leverages
these attributes to both elevate the object and the content to a more complete whole.
Put very simply, Formless Content is unaware of the container. Definite Content embraces the container as a canvas.
Formless content is usually only text. Definite content usually has some visual elements along with text.
Figure: 15 TUFTE- embracing his canvas
Figure: 16 DESINING BOOKS- awareness of physicality
Much of what we consume happens to be Formless. The bulk of printed matter — novels and non-fiction — is
Formless. In the last two years, devices excelling at displaying Formless Content have multiplied — the Amazon
Kindle being most obvious. Less obvious are devices like the iPhone, whose extremely high resolution screen,
despite being small, makes longer texts much more comfortable to read than traditional digital displays. In other
words, it’s now easier and more comfortable than ever to consume Formless Content in a digital format.
Is it as comfortable as reading a printed book?
Maybe not. But we’re getting closer. When people lament the loss of the printed book, this — comfort — is usually
what they’re talking about. My eyes tire more easily, they say. The batteries run out, the screen is tough to read in
sunlight. It doesn’t like bath tubs. Important to note is that these aren’t complaints about the text losing meaning.
Books don’t become harder to understand, or confusing just because they’re digital. It’s mainly issues concerning
quality. One inevitable property of the quality argument is that technology is closing the gap (through advancements
in screens and batteries) and because of additional features (note taking, bookmarking, searching), will inevitably
surpass the comfort level of reading on paper. The convenience of digital text — on demand, lightweight (in file size
and physicality), searchable — already far trumps that of traditional printed matter.
The formula used to be simple:
Stop printing Formless Content; only print well-considered Definite Content. The iPad changes this. I P a d . I t i s
n o w o n d e r w e l o v e o u r p r i n t e d B o o k we physically cradle them close to our heart. Unlike computer
screens, the experience of reading on a Kindle or iPhone (or iPad, one can assume) mimics this familiar maternal
ISBN 1-63102-455-8
103
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
embrace. The text is closer to us, the orientation more comfortable. And the seemingly insignificant fact that we
touch the text actually plays a very key role in furthering the intimacy of the experience.
Figure: 17 DESINING BOOKS- awareness of physicality
The iPad changes the experience formula. (Fig. 17) It brings the excellent text readability of the iPhone/Kindle to a
larger canvas. It combines the intimacy and comfort of reading on those devices with a canvas both large enough
and versatile enough to allow for well considered layouts.
Figure:18 THE NEW EQUATION – retaining structural meaning in digital form
Figure: 19 DEFINITE CONTENT 1:1 iPAD – a First
What does this mean? Well, most obviously that a 1:1 digital adaptation of Definite Content (Fig. 18) books will now
be possible. However, I don’t think this is a solution we should blindly embrace. Definite Content in printed books
is laid out specifically for that canvas, that page size. While the iPad may be similar in physical scope to those
books, duplicating layouts would be a disservice to the new canvas and modes of interaction introduced by the iPad.
Take something as fundamental as pages, for example. The metaphor of flipping pages already feels boring and
forced on the iPhone. I suspect it will feel even more so on the iPad. The flow of content no longer has to be
104
ISBN 1-63102-455-8
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
chunked into ‘page’ sized bites. One simplistic reimagining of book layout would be to place chapters on the
horizontal plane with content on a fluid vertical plane. (Fig.19)
Figure: 20 VERTICAL CHAPTORS – Breaking Habits
In printed books, the two-page spread was our canvas. It's easy to think similarly about the iPad. Let's not. The
canvas of the iPad must be considered in a way that acknowledges the physical boundaries of the device, while also
embracing the effective limitlessness of space just beyond those edges.
Figure: 21 THE INFINITE CONTENT PLANE
This is an opportunity to redefine modes of conversation between reader and content. And that's one hell of an
opportunity if making content is your thing.
The Books We Make so: are printed Books Dead? Not Quite
The rules for iPad content are still ambiguous. None of us has had enough time with the device to confidently define
them. I have, however, spent six years thinking about materials, form, physicality and content and to the best of my
humble abilities producing printed books. So, for now, here's my take on the print side of things moving forward.
ask yourself, "Is your work disposable?" For me, in asking myself this, I only see one obvious rule set:
Formless Content goes digital.
Definite Content gets divided between the iPad and printing.
Of the books we do print — the books we make — they need rigor. They need to be books where the object is
embraced as a canvas by designer, publisher and writer. This is the only way these books as physical objects will
carry any meaning moving forward.
Figure: 22(a) NOT DISPOSABLE- From 1871
ISBN 1-63102-455-8
105
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
Figure: 22(b) NOT DISPOSABLE- From 1871
I propose the following to be considered whenever we think of printing a book:
The Books We Make embraces their physicality working in concert with the content to illuminate the
narrative.
The Books We Make is confident in form and usage of material.
The Books We Make exploits the advantages of print.
The Books We Make is built to last. (Fig. 22a, 22b) The result of this is:
The Books We Make will feel whole and solid in the hands.
The Books We Make will smell like now forgotten, far away libraries.
The Books We Make will be something of which even our children — who have fully embraced all things
digital — will understand the worth.
The Books We Make will always remind people that the printed book can be a sculpture for thoughts and
ideas.
DESIGNING BOOKS
Figure:23 LAYOUTS — considering page shape
BEAUTIFUL EVIDENCE
106
ISBN 1-63102-455-8
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
Figure:24 TUFTE — a well-considered spread
VAS: AN OPERA IN FLATLAND
AUTHOR + DESIGNER COLLAB.
VAS: AN OPERA IN FLATLAND
Figure:25
The items are displayed in a layout very similar to that of e-readers like iBooks or Kindle; there are no banners,
images or navigation bars, but there's the option of adding page numbers or changing the font size. The most
interesting feature of Instapaper, other than the fact that the articles are available offline, is that you can organize
them into thematic lists (folders), creating your own collection of articles that can be read all at once or referenced in
the future:
HOW THE IPAD HELPS SCIENTISTS DO THEIR JOBS
It wasn’t so long ago that Chris Grant would regularly take a whole laboratory’s worth of equipment with him into
the wilderness. These days, he just takes an iPad. “We navigate to some fairly remote locations that require hiking
in. A two-mile one-way hike is not unheard of,” says Grant, a laboratory coordinator for Juniata College in central
Pennsylvania. During the summer, he leads teams of students into the state’s wilds to catch fish in local creeks and
test them for mercury content.
Such hikes used to require a number of different tools: a topography map, a handheld GPS unit, a camera, a
rangefinder, even a notebook to write down data. Now? The iPad does all of that for Grant, who utilizes apps
like GPS Status, River Reader, and Smart Ruler to find his way around and take measurements in the field.“It’s
eliminated at least five different tools,” Grant says. “Just getting a camera out to take a picture while you’re
processing a fish, with one hand on a notebook and the other on a camera—well, it’s all right there, in one thing.”
ISBN 1-63102-455-8
107
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
Since its introduction just a couple of years ago, the iPad has entered and started to transform many professions,
finding a place in classrooms, dealerships, cockpits, and even construction sites. Now it’s starting to transform the
work of scientists, as well. Scientists we spoke to say they’ve found three main ways to use the iPad in their work.
Following protocols
Contrary to all of those old science-fiction films, laboratory research isn’t done by haphazardly mixing chemicals
together and seeing what happens. Detailed protocols guide every experiment, protocols that serve as a kind of
recipe for researchers. Until recently, that meant that research scientists often found themselves arm-deep in a
library of notebooks to guide them. Andrea Holme, a biologist at the University of Eastern Finland, has dispensed
with those notebooks, turning instead to LabGuru. She can enter her protocols at the service’s website, then tote her
iPad into the lab, open up the LabGuru app, and get to work. The app not only guides her experiments, it lets her
record results, and syncs the data back to the web application so she can later analyze information at her computer.
“It’s so much more efficient,” Holme says. “Everything is there. I’m not always the most organized person, but this
makes you organized by default because you’re putting everything in its proper place.”
Figure:26 Chris Grant and crew use an iPad to research fish populations.
The iPad can also guide scientists to locations where research must be done. Ben Horton, an associate professor in
the University of Pennsylvania’s Department of Earth and Environmental Science, is researching sea-level changes.
He uses the Google Earth app ( ) to find locations that need examination, and to begin to compare changes wrought
by climate change in North Carolina’s Outer Banks. “It enables us to see features of the landscape in three
dimensions you wouldn’t see on a map,” Horton says. “It makes things easier. Instead of having a guess of what the
environment looked like, we can look at photos from a satellite.”
Collecting data
Horton’s Penn colleague, biologist Paul Schmidt, has become a big fan of the iPad in a short time. He’s a prolific
user of the Numbers app ( ) to enter data as he researches evolutionary genetics. “The biggest thing we do, where
this has saved us a lot of time, is that we do all data entry on the iPads,” Schmidt says. “I would say 90 percent of
routine tasks are done with it. For somebody who spends four hours a day recording data, that probably saves them,
easily, at least an hour.” Grant, Holme, and Horton also like to use the iPad’s camera to document findings, both in
still and video formats. “If I have a gel or an X-ray film, something I can see, I can snap it while I’m looking at it,”
Holme says. “We wouldn’t publish with it—with an X-ray film, we’d still do a proper scan of it. But for simple
snapping” the iPad works.
Keeping up on reading
Ronelle Stevens, a doctor of pharmacology at Brigham and Women’s Hospital in Boston, is a fan of
the Pubget app—it lets her find and download scientific journal articles quickly, instead of waiting two or three days
for a research library to locate them. “I’d rather spend time reading the article than looking for the article,” she says,
adding, “I don’t have to carry stacks and stacks of papers. My shoulders are grateful.” Daniel Zurek, a professor of
108
ISBN 1-63102-455-8
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
cellular and molecular biology at Pittsburg State University in southeast Kansas, says that the ability to quickly
reference other scientists’ research has made him more efficient in the lab. “It helps me work smarter, and not go
down so many dead-end for things that won’t work,” says Zurek, who uses the NEB Tools app in the lab. “One
thing about biotech is that there’s always something new out there, and it’s usually created to solve a specific
problem. If it’s your specific problem, you’re in luck.”
Still new
Despite the advantages, iPad adoption appears to be going slowly among scientists. Nearly all of the researchers
surveyed by Macworld say they came to the tablet in just the last few months, and most say they are pioneers among
their colleagues. “I’m not really seeing iPads issued in my institute,” says Matthew Gorr, a graduate research
assistant at Ohio State’s Nationwide Research Hospital, in a statement echoed by the others. “It’s usually
somebody’s personal iPad.” Holme, however, is already evangelizing the iPad to her colleagues. “If you’re at a
conference and you’re talking to somebody new, you can call up the data (on the iPad) and show it to them,” she
says. “Scientists who have access to that will be able to be more competitive.” And others say researchers will be
forced to increasingly rely on the iPad—if only to make a connection with tech-savvy college students. “It makes the
science more inherently interesting to students if they can connect it back to technology,” Grant says. “We’re at the
learning stage with the iPad, and it’s already been very helpful. I hope it will continue to be more helpful with time.”
REFERENCES
[1] A personal, online virtual library, A book is not one thing 25 a new standard for DRM and content-encoding Ultraviolet
would allow users to amass where they can both share it with others, and view it on any device that supports the format. “A
movement toward reasonable DRM management? - Andy Ihnatko, Chicago Sun-Times, July 25, 2010
[2] Audience poll #1 Have you read at least one entire book (start to finish) on a mobile ereader? (not on a desktop or laptop) •
Yes • No For those who have read an entire book, how many books have you read this way? • 1 – 10 • 11 – 50 • over 50
eBooks
[3] Audience poll #2 What eBook devices do you own or have you owned in the past: (check all) • Amazon Kindle • Sony
Reader • Nook • iPad • iPhone • other Smartphone, such as Android • other 37
[4] Audience poll #3 what do you like most about your eBook reading experience? • Convenience of having so many books
with you in one small device (easy for travel, etc.) • free samples to help decide on purchases • ease of reading because of
features such as increased font size, screen color and brightness • immediate purchase & downloads of new books • other 40
[5] Audience poll #4 what do you like least about your eBooks reading experience? • the content I want is often not available •
lack of ability to lend books to my friends and family • not so easy to annotate, take notes, compare texts • the illustrations,
charts, diagrams, are not big enough or clear enough • other 41
[6] http://www.flickr.com/photos/facelesslibrarian/4294934843/ 31
[7] Not so great in current e-readers - detailed or color illustrations not always easy to view (except with iPad & some
Smartphone ) - hard to have a good feel for how far you are into the book, even with indicators or progress bar visible skipping around in the book may cancel out ability to synchronize where you left off between devices - fragmentation of
content between different vendors, i.e., much content only readable in one vendor’s software (DRM) 44
[8] Not so great in current e-readers - not every book you want is available - annotating is awkward - not easy to compare
multiple books side by side - limited by battery time - lending to friends almost impossible (limited exceptions) 43
[9] novels non-fiction reference books comics graphic novels essays short stories instruction how-to cookbooks art & design
books 26
[10] pondering thinking taking notes bookmarking copying quoting defining words underlining highlighting, comparing with
other text skipping around skimming looking at photos examining charts/graphs 14
[11] Reading on E-Book Devices: the User Experience Nicole Hennig, MIT Libraries 1
[12] Selected devices E-ink displays - Amazon Kindle and Kindle DX - Sony Reader - Barnes & Noble Nook (many other e-ink
based ereaders exist) Tablets & smartphones (LCD screens) - iPhone and other smartphones - iPad and other tablets 38
[13] Selected software - Amazon Kindle - Barnes & Noble - Stanza - Apple iBooks - GoodReader coming soon: - Blio - Copia
39
[14] The E-reader pilot at Princeton Fall semester, 2009 www.princeton.edu/ereaderpilot Their favorite features of the Kindle
DX were • The battery life, the wireless connection, and the portability of the Kindle. • The fact that all the course reading
was on one device • The ability to search for content • The legibility of the screen, and the fact it could be read in full
sunlight The areas in which they felt the Kindle could be best improved were: • The ability to highlight and annotate PDF
ISBN 1-63102-455-8
109
The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks
And Ebooks Reading: User Experience
files • Improving the annotation tools • Providing a folder structure to keep similar readings together • Improving the
highlighting function • Improving the navigation within and between Kindle documents 45
[15] What libraries can do - Get ereaders for your staff to experiment with. - Continue to experiment with loaning ebooks and
ereaders to your users. - Become experts who can advise your readers about reading hardware and software. - Negotiate with
publishers to make borrowing viable in this new world. - Keep current with developments in this area. 78
[16] What works - small lightweight, carry many books with you - easy to get new books immediately - many free books
available - many books are cheaper than print - easy to customize views: larger font sizes, different background colors/fonts
- very long free samples available for most books - quick dictionary lookups - read same content on different devices for
different situations & sync between devices 42
[17] Where we read http://www.flickr.com/photos/seandreilinger/ 133370210/sizes/o/in/photostream/
110
ISBN 1-63102-455-8
KNOWLEDGE MANAGEMENT IN KENDRIYA VIDYALAYA
LIBRARIES
MRS. PARNA GHOSH | Librarian | Kamala Chatterjee School for Girls | Kendriya Vidyalaya
Sangathan | mou_lib@yahoo.co.in
Abstract: The paper describes various initiatives taken by Kendriya Vidyalaya Sangathan to
organize knowledge in school level. Also discusses the role of librarian in this context. Librarian
is also working as knowledge manager in the current perspective. Points out the major problem
faced by the librarians regarding knowledge management.
Keywords: Knowledge Manager, KendriyaVidyalaya, Knowledge sharing, Explicit knowledge, Tacit
knowledge.
INTRODUCTION
“In the digital age, knowledge is our lifeblood. And documents are the DNA of knowledge”
……. Rick Thoman
Knowledge is the most important asset of any academic institution. The better management of knowledge will
lead to an institution to enhance its best performance. Knowledge management is the new vista to manage
internal and external knowledge of an institution. The present age of information explosion is triggering a global
knowledge revolution. Most important aspect of knowledge management is to convert tacit knowledge into
explicit knowledge, so that it can be accessed. Mapping of knowledge is most challenging and vital part of any
institution. Knowledge management determines which knowledge, where, in which form and at which point of
time, should be available within an institution.
A successful knowledge management programme includes generation, sharing and utilization of knowledge.
Hence, libraries and librarians have a key role to play in knowledge management. Knowledge Management is
incorporated in libraries to improve its effectiveness.
These knowledge management practices can help in capturing, codifying and distributing knowledge in schools
through the application of Information and Communication Technology (ICT) so that it can be shared by all the
users. Knowledge management also supports innovative teaching and effective learning.
What is knowledge?
According to Webster’s Dictionary, knowledge is “the fact or condition of knowing something with familiarity
gained through experience or association”
According to Cambridge Dictionary, “knowledge is understanding of or information about a subject that you get
by experience or study, either known by one person or by people generally”.
Knowledge can be either explicit or tacit. Tacit knowledge is inexpressible. Tacit knowledge represents what we
know in our mind. Explicit knowledge can be stored in databases, books, journals etc. and expressed in some
written form. Tacit knowledge is personel, context specific, difficult to formalize and explicit knowledge is
packaged, easily codified, transferable and communicable. [2]
What is Knowledge Management?
Knowledge management can be defined as accessing, filtering and distributing information in a manner that is
useful to end user. [5]
Knowledge management involves the identification and analysis of available and required knowledge assets and
processes, so as to fulfill organizational objectives.
ISBN 1-63102-455-8
111
Knowledge Management in Kendriya Vidyalaya Libraries
The biggest challenge behind knowledge management is the dissemination of knowledge.
Synthesis
Flow of Knowledge
Knowledge management is about managing the knowledge assets. It is a process, method and technique of
presenting available knowledge to the user.
In the words of Peter Drucker, it is “the co-ordination and exploitation of organizational knowledge resources,
in order to create benefit and competitive advantage.”
Knowledge management is the art of creating value from an organization’s intangible assets.
The objectives are [1] :
To ensure dissemination of right information to the right people at the right time to make right
decision.
To reduce the time of the user.
Knowledge management opens the door to a new era of collaboration and sharing.
To ensure the effective distribution of best knowledge available within the library.
To apply knowledge when required.
To ensure effective securing of knowledge.
Knowledge management may also include new knowledge creation and knowledge sharing, storage and
refinement.
CONCEPT OF KENDRIYA VIDYALAYA AND ITS LIBRARY
Kendriya Vidyalaya is an autonomous organization under the Ministry of H.R.D., Govt. of India. The
headquarter is located at 18, Institutional Area, Shaheed Jeet Singh Marg, New Delhi.
Kendriya Vidyalaya Sangathan was established way back in 1965. The Sangathan administers its scheme
through 26 regional office, 1094 Kendriya Vidyalayas including 03 KVs abroad. Policies of Kendriya Vidyalaya
Sangathan are framed through its board of Governors headed by Hon’ble Minister, HRD.; Commissioner, KVS
is the executive head of the organization.
Salient features of KVS are –
112
All KendriyaVidyalaya are affiliated to CBSE.
All K.Vs are co-educational, composite school.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Common text-books and bilingual medium of instructions for all KVs.
No tuition fee for boys upto class VIII, girls’ upto class XII and SC/ST students and children of KVs
employee.
Kendriya Vidyalaya has a four-fold mission –
1.
To cater to the educational needs of children of transferable central government employees including
defence and para-military personnel by providing a common programme of education.
2.
To pursue excellence and set the pace in the field of school education.
3.
To initiate and promote experimentation and innovations in education in collaboration with other bodies
like CBSE, NCERT etc.
4.
To develop the spirit of national integration and create a sense of “Indianness” among the children.
All Kendriya Vidyalaya should have a well-equipped library and a trained qualified librarian for the best help of
the user. The library set-up is mandatory for each and every Kendriya Vidyalaya. Most of the Libraries are wellequipped with documents and bar-code technology is a must for books in Kendriya Vidyalaya Library.
PROCESS OF KNOWLEDGE MANAGEMENT IN KVS
School, like most organizations, should organize knowledge properly to improve decision making of the user
community. There are many sorts of knowledge which need to be managed in schools [6].
Due to increasing knowledge explosion and digitization of knowledge resources, many students have also
pointed out the importance of introducing knowledge management into schools.
Process :
► Knowledge collection – At first the Vidyalaya Library Management Committee take a plan to identify the
knowledge required for the students to meet its short and long term objectives. So, the first step is acquisition of
external knowledge by various means. The steps are –
identify the required knowledge
locate the source of knowledge
acquire the knowledge
generate the required knowledge of the pupil by using technology (if needed).
► Knowledge presentation – After acquisition of knowledge, the next steps followed are –
codify the knowledge,
represent the knowledge in a refined, organized and user-friendly manner.
- Provision of right knowledge to the right person at the right time is the
► Knowledge dissemination
main aim of the knowledge dissemination. The acquired knowledge is disseminated to the students and teachens
as and when needed.
► Knowledge sharing – The librarian of the Vidyalaya, in most cases, maintain knowledge sharing system and
disseminate it to the target group. Knowledge must be distributed to those who can make use of it.
► Monitoring knowledge – The librarian monitors the usage of knowledge. The provision of necessary
feedback is there. Students are asked to submit feedback to the librarian.
ISBN 1-63102-455-8
113
Knowledge Management in Kendriya Vidyalaya Libraries
In KendriyaVidyalaya libraries, the database of books is prepared by using a common software “e-granthelaya”,
provided by KendriyaVidyalaya Sangathen to help the user to search information quickly.
Web services are available in most of the KendriyaVidyalaya library to acquire knowledge scattered all
over the world. A common “Library Policy” is provided to all the librarians andit should be strictly maintained.
This is very helpful in data sharing. Bar-code technology for books is the latest advent in KendriyaVidyalaya
library.
TOOLS FOR KNOWLEDGE MANAGEMENT
There are some tools associated with knowledge manage.
Internet
Document management system
Content management system
Tele conferencing etc.
LIBRARIAN AS KNOWLEDGE MANAGER
114
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
A Librarian can manage the explicit knowledge quite well. A person having a higher degree of computer
literacy, knowledge of information and communication technology, knowledge of transferring tacit knowledge
to explicit knowledge can become knowledge manager. [7]
Librarian in Kendriya Vidyalaya can take a leading role in the establishment and facilitation of knowledge
management of the organisation.
The responsibilities are –
managing knowledge acquisition.
providing extensive and highly diverse global knowledge to the user.
finding, packaging and disseminating knowledge
converting tacit knowledge to explicit one
finding, mapping, filtering, packaging and disseminating knowledge
integrating internal and external sources.
identifying needs and requirements of the user
reducing the learning time and to avoid mistake
to keep up with new technologies provided by Kendriya Vidyalaya Sangathan
Creation of database using a common software provided by Kendriya Vidyalaya Sangathan to provide
quick reference service to users.
Free flow communication and feedbacks.
enabling timely delivery of relevant usable information
making design of knowledge bank or knowledge repository
designing new information services and products
preparation of indexing and databases
create metadata
provide context rich information in reply to short term request
use internet tools to manage information
help user to avoid unnecessary data
to provide security of data on the internet
teaching of user community i.e. user education is a most significant task of a knowledge manager
The librarian needs to work as a knowledge worker. Knowledge manager should take steps to shape the
knowledge policies, structures, processes and systems that will nurture organised learning [8].
ROLE OF KVS IN HELPING KNOWLEDGE MANAGEMENT THROUGH LIBRARIANS
ISBN 1-63102-455-8
115
Knowledge Management in Kendriya Vidyalaya Libraries
The Librarian requires a variety of competencies for managing knowledge in a proper and distinct way. So,
Kendriya Vidyalaya Sangathan has a pivotal role in the overall development of the librarian as knowledge
manager. The Sangathan acts as a friend, philosopher and guide for the librarian/ For that purpose KVS
organizes training programme regularly,
in-service course for librarians,
workshop for the librarians from time to time,
refresher courses also,
The above mentioned programmes are very much essential to develop core competencies among the librarian.
Training should be given on how to access the database provided by KendriyaVidyalayaSangathen, providing
network-based information services and so on. This will help to provide better services to the users.
Knowledge manager should be able to extract, filter and disseminate vital external knowledge. Librarian helps
the students to develop important digital citizenry attributes to demonstrate the use of information and
technology.
So, to meet the challenges of knowledge management, librarians need to acquire more I.T. and management
skills to transform themselves into knowledge manager.
PROBLEM FACED BY KVS LIBRARIANS
Lack of various information technology based tools
Lack of proper idea about knowledge management
Lack of documentation from beginning
Lack of informal channel to involve students in activities
Reluctance of people to share knowledge
Lack of willingness among some librarians.
KVS focuses much more on preservation of books and maintaining exact number of books in the
library
Libraries are passive repositions of knowledge
Changes may be discontinuous or transformational
Need budget flexibility
Need to establish a common platform
Lack of idea about monitoring and feedback mechanism required to set up
Need skills for preservation and maintenance of digital resources
No helping hand is there in the library
Lack of learning through either formal or informal channels
Another problem is teacher’s unwillingness to share their tacit knowledge
SUMMARY
School knowledge management programme is a new organizational activity that makes optimum use of
knowledge to improve Vidyalaya’s behaviour, student learning, teaching processes and collegial relationship
that enables the overall improvement of the school.
Librarian must take the necessary initiative and leading role in changing the present scenario of the library. The
librarian not only procures and processes the resources of the library, but also organises them properly for
optimum access by the students. So, knowledge management is essential in the school library also to run the
library is a smooth way.
The arrangement of training for the library personnel are made by KVS. Professional staffs are improving their
efficiency by learning on hands. The librarians only improve the knowledge assets of the school by maintaining
proper knowledge management programme.
116
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Knowledge management must be guided by a strategic vision to fulfill the organizational objectives improving
knowledge sharing. Yet, there seems to be some lacuna somewhere in our entire struggle to share our
knowledge within entire KVS libraries.
Overall, knowledge is an important asset to support school’s overall development. So, most urgent task of the
day is to create an organisation capable of managing the knowledge properly and this is called knowledge
management.
REFERENCES
[1]. Jena, P. &Rautaray, B (2003). Human Resource Planning for Knowledge Management : A Study on Kalinga Institute of
Industrial Technology. In Knowledge Management in Special Libraries in Digital Environment : XXIV All India
Conference of IASLIC, 2003, 293-300. Kolkata : IASLIC.
[2]. Jose, A (2003). Information Management to Knowledge Management : The Road Ahead for LIS Professionals. In
Knowledge Management in Special Libraries in Digital Environment : XXIV All India Conference of IASLIC, 2003,
65-68. Kolkata : IASLIC.
[3]. Sirumath, S.S (2003). Knowledge Management : A New Paradigm for Electronic Document Management System in
Corporate Libraries. In Knowledge Management in Special Libraries in Digital Environment : XXIV All India
Conference of IASLIC, 2003, 57-64. Kolkata : IASLIC.
[4]. Swain, C.K. &Satpathy, S.K (2003). Knowledge Management in Digital Library Environment : An Implementation
Plan. In Knowledge Management in Special Libraries in Digital Environment : XXIV All India Conference of IASLIC,
2003, 69-72. Kolkata : IASLIC.
[5]. Vyas, S.D. & Singh, D.K (2003). Knowledge Management : Challenges for Library and Information Professionals.
Library Harald, 41 (1), 15-15.
[6]. Chu, K.W & Wang, M. Implementing Knowledge Management in School Environment:Teacher’s Perception.
Retrieved from www.kmal-journal/org/ojs/index.php/online-publication/article/view file.
[7]. Lee, H.W. Knowledge Management and the Role of Libraries. Retrieved from www.whiteclouds.com/iclc/cliej/cl19lee.htm.
[8]. Naikel, A &Paloti, R. Role of Libraries in Knowledge Management. Retrieved from www.academia.edu/3308329.
[9]. http://www.kvsangathan.nic.in
ISBN 1-63102-455-8
117
SOCIAL NETWORKING AND LIBRARY CONSORTIA
Pratibha Gautam | Assistant Librarian | New Delhi Institution of Management |pratibha_xyz@yahoo.com
Abstract: Social Networking is a Social Structure that lets the users interact and work
collaboratively with other users, including the ability to browse, search, invite friends to connect
and interact with web world to share feelings, knowledge’s and experiences. . Social Networking
is now a mainstream. People need to know the importance of getting information quickly and
present a variety of growing. Various combinations of resources are used. Previously, in 1980s
people began to get information through Internet but to very limited network. One of the famous
styles of getting information is through Social media or Web 2.0. By rapid development of
information and communication technology, the web-based services in particularly social
networking services are very useful for the users interact and work collaboratively. The use of
social networking services such as Facebook, Twitter and nowadays Whatsup (is being a very
popular) has become a popular and integral part of everyday life communication of all educated
peoples in India. The aim of this paper is to describe a exploratory study or to examine academic
librarians perspective on using social networking services for developing library consortia or
collaboration and how are libraries considering social networking as a part of their core
communication and engagement strategies?. And also this paper explains how this Social Network
will help the major library and information services Such as Information Communication,
Information Delivery and Knowledge organization, Resource Sharing with other libraries.
Keyword: Social Networking, Internet, Social Media, Web 2.0, Library Consortia, Information
Communication, Information Delivery and Resource Sharing.
INTRODUCTION
The term “Social Networking” refers to a range of web enable software program that allow users to interact and
work collaboratively with each others.
A Social Network is a Social Structure made of nodes that are generally individuals or organizations. A social
network represents relationships and flows between people, groups, organizations, computers or other
information/ knowledge processing entities
Fig.1 Social Networking
Today’s age is an age of advanced technology. With boon of internet reaching almost every corner of the world,
there has been an immense transformation in each and every field. Be it setting up a better platform of
communication or connecting the globe under a common network. Social Media is referred to define certain
websites that facilitate inter-personal communication through certain websites wherein people can create their
own profile page and communicate with friends and associates through online messages. The most commonly
used websites that have become popular over last couple of years are Twitter, Facebook, LinkedIn, MySpace,
118
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Ding and StumbleUpon etc. Social Media and Social Networking Sites have not only contributed to take interpersonal communication to a different level, but also have been a great marketing tool for the small business.
DEFINITION OF SOCIAL NETWORKING SITES
Social Networking Sites can be used to describe community-based web sites online discussions forums,
chartrooms. Various definitions of social networking websites exist.
According to Computer Dictionary (2011) Social Networking Sites as any websites designed to allow multiple
users to publish content of them. The information may be on any subject and may be for consumption by
friends, mates, employers, employees just to mention a few.
Taylor-smith & Linder (2009) stated that wikis, blogs, chat rooms instant messengers, message boards and
social book marking are technology applications that have been used to facilitate members, interaction and thus
have been referred to as social networking tools.
Boroughs (2010) stated that social networking websites allow users to share interests and communicate with
others
Seufert et al (1999) defines social networking in terms of knowledge networking as signifying a number of
people, resources and relationship among them, who are assembled in order to accumulate and used knowledge
primarily by means of knowledge creations and transfer processes, for the purpose of creating value. The
concept of social networking is one of the tools of web 2.0 which also forms the basis of library 2.0.
SOCIAL NETWORKING VS LIBRARY
”The Online world has opened up so many opportunities for us to embed library services into spaces out
constituencies may visit. It makes sense to look at what social software sites our patrons frequent and how we
can provide services there just like putting a library branch in a strip mall, creating presence in social
networking software makes the library more visible and more convenient to access”
There are four reasons why libraries should engage in Social Networking:
Communication – Social Media is another way for libraries to get into contact with their patrons,
wherever they are.
Gathering Positive/Negative Feedback – One of the most important tenets of customer service is to
be responsive to users concerns and needs.
Marketing/Advertising – An alternative to the traditional way e.g. fliers, bookmarks, announcements
in calendars of events, newspaper ads, press releases etc.
Understanding users better
SOCIAL NETWORKING TOOLS USING IN LIBRARIES
Today, in the age of information technology the library users are more techno savvy and need micro information
about the subject. For this, now a day’s everyone is connected with each other by means of various social
networks medium.
Social networking helps librarian to share information with patrons in the easiest way for the digital library
environment. The librarian can use in three broad
activities those are connected with each other in library
and information services. The major three are
Information Communication- In this process librarian
can keep constant touch and effective interaction with
users in online collaborative environment. The social
networking tools that can be used by library professionals
to fulfill this activity.
MySpace:
ISBN 1-63102-455-8
MySpace
is
a
popular
social
119
Social Networking and Library Consortia
networking sites which primarily have a social function allowing people to make friends, talk online
and share resources.
Facebook: Another social media site frequented by students, Facebooks is librarian friendly. Group
communication among patrons can be possible in web 2.0.
LinkedIn: This social networking site for professional is a great way to get library patrons connected
with the people that can help them find information. Whether that’s you faculty, authors, historians or
other sources, they can find them in your linkedIn network.
Ning: Librarian can use this tool to get connected with students, library associations and more, you can
also use it to share information with many people at a time.
Blog: By creating a blog you will be able to disseminate information to lots of people at one time. Blog
are a powerful tool, especially when combined with RSS.
Twitter: Use Twitter, a micro blogging application to keep staff and patrons updated on daily
activities, like frequently updated collection, new arrival, current content services of library.
Knowledge Organization: The Knowledge Organization is about behavior such as document explanation,
indexing and classification performed in information centers, library database, archives etc. these types of
activities are done by specialists as well as computer algorithms.
Library Thing: This cataloging networking is great for librarians and you can catalogue along with
Amazon, the library of congress and more than 200 other libraries around the world. You will get
recommendation and easy tagging as well.
aNobii: It helps book lovers to share reviews and recommendation. It also prepare due date alerts,
lending and discussions
Connotea: It is great reference tool, allowing you to save and organize reference; link and share them
with other
Knowledge Distribution- Information/Knowledge sharing is the major part and crucial area where the Library
professionals should look seriously while considering and designing library activities in Library Environment.
Patron’s satisfaction should give first priority by providing the right information at the right time in a right way.
Some social networking tools that help the professional to distribution the information:
Flickr: library can share photo collection of workshops, conference and different program that is
organized with the campus through this tool
YouTube: Library video and e-learning tutorials, events and other video library services can be
effectively promoted and webcast through YouTube
Wikipedia: it is an online encyclopedia updated by users. You can you this tool to share your
knowledge by editing or simply point in right direction.
Digg: It is a great way to find useful content that you would not come across in traditional ways.
The use of all these tools which that academics libraries and public libraries don’t only use social media for
communication purposes, but had adapted their research strategies to this environment. Libraries with social
networking wall, the wall are mostly used to
Announce programmes of the library
Give students the opportunity to ask question pertaining to the use of library.
Paste new books on the wall to inform the university community.
Send brief updates to patrons
Ask a Librarian
Briefly we can say that the benefits of the social networking tools/sites will librarians and libraries to keep pace
with technologies and complete effectively with the developed world.
120
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
CONSORTIA: DEVELOPMENT OF LIBRARY CONSORTIA
A library consortium can apply as a library or as a consortium. "A ‘library consortium’ is any local, statewide,
regional, or interstate cooperative association of libraries that provides for the systematic and effective
coordination of the resources of schools, public, academic, and special libraries and information centers, for
improving services to the clientele of such libraries. For the purposes of these rules, references to library will
also refer to library consortium."
In the late 1980s the first US state-wide consortium –OhioLink–was established. It received widespread
attention as they were able to obtain additional state funding for their cooperative work. During this period when
libraries started using the term ”Library Consortium” instead of library cooperation and resources sharing to
elucidate the present scenario in digital environment.
In India: The first limited purpose and successful, consortia-like model can be traced to Tata Institute of
Fundamental Research (TIFR) in 2000 , which used the consortia model offered by Springer for multi-site
licensing and cross sharing of content among all the libraries falling under TIFR’s affiliation
According to Alien and Hirshon the 90s are the period in which “the most of the academic libraries the scenario
of activates has been changed and during this decade the libraries move from organizational self-sufficiently to a
collaborative survival mode for the growth of library consortia”.
Library Consortia – Genesis
“Library Consortia” refers to Co-operation, Co-ordination and
Collaboration between and among libraries for the purpose of
sharing information resources. Libraries have been Co-operating
and Collaborating on collection building and resource sharing for
many years. The Cooperation between academic libraries has
always been at the basis of library activities. The collaboration
was based on inter-library loan and preparation and publication of
union catalogue.
OBJECTIVES OF LIBRARY CONSORTIUM
Fig.3 Genesis of Library Consortia
with Different Phases
Libraries have been cooperating and collaborating on collection
building for many years. The main objective of library cooperation
and resources sharing is to maximize the availability of and access
to information and services at a minimize cost. The library
cooperation, networking and resource are synonymous with
cooperation and collaborative activities.
To find out the social networking services which are to be used as a collaborative tool n the academic
libraries.
To measure the perspective on professional user of social networking services among librarian.
To facilitate collective acquisition and sharing of traditional and e-resources.
To cooperate in processing of information resources.
To download and access the required resources remotely by the users of the participating libraries.
To help develop a country wide-acquisition policy to avoid unnecessary and waste duplication in
purchase.
To establish an electronic journal centre to serve as a permanent archive for electronic journals
To develop a more sophisticated search engine enabling simultaneous search of multiple database.
To provide extensive facilities to use full text database and e-journals.
To develop digital resources jointly and to provide access to such materials to the members of the
consortium.
ISBN 1-63102-455-8
121
Social Networking and Library Consortia
THE ROLE OF SOCIAL NETWORKING IN THE LIBRARY CONSORTIUM
Library consortia refer to co-operation, coordination and collaboration for the purpose of sharing information
resources among libraries. The appreciations of the need for cooperation lead to the formation of library. But the
way of cooperation in building resources and access to information resources was not easy and effective library
cooperation for access to information resources was limited to the formation of networking among the libraries
having homogenous interest. To materialize the concept first of all, several libraries are required to come
together for mutual benefit of respective user in the form of library cooperation. Secondly, libraries linked
together with the help of communication system in the term of networking and finally they come together to
acquire traditional and e-resources under the umbrella of library consortium.
Access to Internet connectivity and computers is increasing day by day. In this century no one is interested in
printed work. For libraries to make libraries interesting innovations such as social networking site should be
introduced to attract them to the library environment. The emergence of internet particularly www is a new
medium of information storage and delivery in the 21 st century. In the age of information explosion the most
challenging task for the information professionals and information centre all over the world is to share the huge
of information. It is impossible for a single library to monitor all the explosion of knowledge field and
accumulate for the users. The phenomenon of consortia has become very important last few years. Initially the
term used for resource sharing activities was library cooperation. Through cooperation theoretically could
embrace almost all library activities and practically it was confined to inter-library loan of library documents.
However with the advent of information technology, new opportunities opened up for library for cooperation
among libraries. Not only for at international level internet but at national and local level internet several library
networks came in vogue and databases create for sharing. Consortium of libraries is well known for sharing of
resources as well as e-resources all over the world. By forming a consortium among libraries it becomes
possible to purchase information in stabilized and reasonable prices.
Although, Social Networking Sites will help in establishing a relationship between librarian and patrons. Social
Networking Sites become one of the largest online platforms in the world for sharing real times information. To
implement the fourth law of Dr. SR. Ranganathan “Save the Time of the Users” Social Networking Sites is
becoming the interesting area of libraries, documentation Centers, for implementing new services in libraries
and informing their clientele in short time period. Last but not the least the librarian must take the responsibility
of planning, organizing and implementing social networks in library and information centers.
NEED OF E- CONSORTIA
Technological developments electronic publishing of scholarly journals, prizing model of publishers for
consortia gives new opportunities for libraries to provide instant access to information of resources. Following
factors justifies the need of consortia development for the management of e-resources.
122
Overloaded Budget – libraries are committing larger portions of their budgetary allocation for either
procuring or accessing electronic resources. A consortium facilitates the member of libraries to get the
benefit of wider access to electronic resources a affordable cost and at the best terms of licenses.
Information Explosion – The developed of new material like books and electronic version of old
materials are availability in numerous form not only in available in print form, books are becoming
available in online form also. A consortium is better position to resolve the problems of managing,
organizing and archiving the electronic resources.
Willingness of Publishers – In this factor the publisher helped to get attractive discounted rates and
give the best offers to the consortia for purchasing the electronic journals
Diversity of user needs – The expectation of researchers is very high. with technology has changed the
expectation of researchers are also change because library user want to access the materials as quickly
as possible the web based electronic resources fulfill the expectation of users.
Quick Access – Consortia provide electronic delivery resources to users that are speedy and easily
accessible at remote.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Improving quality Standard of research – In this factor the consortia provide access to international
electronic databases and full text resources to users for that libraries are to add electronic resources to
their collection.
Professionalism of library Science – The value of library consortia has enhanced through the invent
of information technologies particularly WWW and librarian are called as navigator or disseminator of
information because librarian always keep up to date oneself.
Future Development – One of important issues related to technologies is stability of system that they
develop to store, retrieve and delver to electronic resources Consortia help to have a watchful eye on
coming latest technological changing which can affect the libraries directly or indirectly.
SOME LIBRARY CONSORTIA DEVELOPED IN INDIA
India is a vast country with a total of 665 universities and 35829 colleges and 11443 institutions that provide
higher education in all disciplines. Total enrolment in higher education has been estimated to be 29.6 million
with 16.3 million boys and 13.3 million girls.(AISHE Survey 2012-13) and the total no. of teachers 1337726.
Out of which more than half about 61 % are male teachers and 39 % are female teachers. Academic libraries in
India are also facing problems such as increasing demands and high expectations from user budget cuts high
cost of library material especially e-journals and a rise in the amount of information. Resources in general. It is
impossible for a single library to provide access to all materials to meet their users need library consortia has
have been initiated in India in order to overcome these problems and efforts to form library consortia are still in
their infancy. At present there are some networks working at national level e.g. INFLIBNET, DELNET. Some
in metropolitan area e.g. ADINET in Ahmadabad, CALIBNET at Calcutta and PUNENET in Pune and other
covering specific topic areas e.g. HELNET - health libraries and MANLINBET management libraries. Details
of four consortia in India are:
UGC: InfoNet e-journal Consortium and INFLIBNET- As stated on its website
(www.inflibnet.ac.in) - The Information and Library Network (INFLIBNET) centre is an autonomous
body of UGC (India) and is involved in resources and services among academic and research
institutions. This is being achieved via the UGC –InfoNet work which aim to provide high speed
internet connectivity.
CSIR Consortium- The Counsel of Scientific and Industrial Research (CSIR) in India has 40
laboratories involved in basic and applied research in various disciplines. Many of the laboratories have
well equipped libraries and some of them act as the main information centers for different subject
functioning as consultant libraries at the National level. Access to e-journals though the use of state -of
–heart technology is possible in many of the libraries belonging to these laboratories. Each of the
laboratories has a well to established library or documentation centre that is also backed up with
strategic information support from National Institute of Science Communication and Information
Resources (NISCAIR) a constituent establishment of CSIR.
INDEST Consortium – The ministry of HRD has set up the Indian National Digital Library in Science
and Technology (INDEST) in 2003 ,provide funds required for the subscription to e-resources for 62
core institutions including Indian Institutes of Science (IIScs), Indian Institutes of Technology(IITs),
Indian Institutes of Management(IIMs) and a few other centrally funded government institutions
through the consortium.
FORSA Consortium – The Indian Astrophysics Consortium called Forum for Resource Sharing in
Astronomy (FORSA) consist of five members who joined together for negotiating. Licensing for
astronomy journals and indentified a subscription agent as a supplier of journal. Subscription for both
print and e-format are paid through their supplier. Some other organization such as the Indian Council
of Agricultural Research (ICAR) state agricultural universities, Indian Space Research Organization
(ISRO), Defense
Research and Development Organization (DRDO), AICTE have started working to form different consortia.
ISBN 1-63102-455-8
123
Social Networking and Library Consortia
CONCLUSION
The exchange of thoughts, messages or information as by speech, signals, writing or behavior is called
communication. The evaluation of internet and World Wide Web (WWW) has transformed the whole globe and
present a new way of communication. The limitless connectivity to create an open social order and system of
interaction and collaboration has been made possible only because of information and communication
technology. Information and technology are added advantages in the hands of library professional in the current
scenario. Social Networking is helpful for Professional development and Professional networking purpose for
all specific field those has established their goal. This is particularly true for library and Information Industry.
Social Networking can be successful by conducting maximum research and experiment on different point of
view on library and also the personal involvement in social networking is usefulness for development of
collaboration among the libraries and library professionals.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
124
http://en.wikipedia.org/wiki/Social_networking_service
http://www.ijodls.in/uploads/3/6/0/3/3603729/vol-5,_issue-2.78-87.pdf
http://ijiset.com/vol2/v2s3/IJISET_V2_I3_114.pdf
http://eprints.rclis.org/17504/3/Implications%20of%20Library%20Consortia.pdf
http://collaborativelibrarianship.org/index.php/jocl/article/viewFile/299/259
http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1897&context=libphilprac
http://conferences.alia.org.au/alia2012/Papers/18_Crystall.Choi.pdf
http://irjlis.com/wp-content/uploads/2014/06/10-IR174.pdf
http://www.asis.org/asist2012/proceedings/Submissions/85.pdf
http://static.aminer.org/pdf/PDF/000/264/832/developing_a_digital_resources_consortium_for_university_libraries_i
n_bangladesh.pdf
http://librarydotcom.webs.com/
ISBN 1-63102-455-8
PRESENT STATUS OF CONVERGENCE WEB 2.0
TECHNOLOGY IN TECHNICAL LIBRARIES WEB PAGE: A
STUDY OF IIT LIBRARIES IN INDIA
Sur Chandra Singha | Research Scholar | DLISc | Assam University | Silchar | surchandrasngh162@gmail.com
Sumit Paul | Rabindra Library | Assam University | Silchar | spsumitpaul88@gmail.com
Pradip Kumar Singha |Librarian | Janata College | Kabuganj | pradips1087@gmail.com
Abstract: Web 2.0 tools acts as information facilitators to provide the essential information not
only on demand but also in improvise of its use. These tools through LIS professionals appreciate
to meets the library users of information need. The present study has been carrying out with an
observation to examine the application of various Web 2.0 tools by the IIT Libraries website. The
data used for the present study were collected through intensive content analysis of the library
websites of the sixteen IITs in India. It has been revealed that 12 (75%) of IIT Library websites
adopted Web 2.0 tools in their library webpages whereas remaining other not adopting still now.
Most of the IIT Libraries offers the facility of Web OPAC to search the various information
resources available in their libraries. The result indicated that IIT Indore used the highest number
of Web 2.0 tools in the library website.
Keywords – Web 2.0, IIT, Library, Web OPAC, SNS
INTRODUCTION
Change within the profession is the most important challenge facing LIS professionals who needs to understand
the differences between the old and new cultures. Web 2.0 tools are one of emerging technology as well as best
practices to enhance and innovative library services. As well as new demands on libraries, there are new
opportunities such as participate, contribute and collaborate in the creation of a new content over the web.
The term Web 2.0 is the name given to new capabilities and services offered by the second generation World
Wide Web (WWW) that facilitates online collaboration and sharing among users. It provides a space that allows
anyone to create and share information online – a space for collaboration, conversation, and interaction; a space
that is highly dynamic, flexible, and adaptable. In Web 2.0 environment large numbers of users are creating
content using a seemingly ever-increasing variety of tools and devices and this content is made available via a
wide variety of commercial Web 2.0 services like Blogs, Wikis, and Social Networking Sites (Kelly et al.,
2009).
The present study is an effort to determine the use of Web 2.0 tools in IIT libraries website in India. IITs are the
top most institutions in India imparting technological expertise in different branches of engineering and each IIT
is an autonomous institution, associated to the others through a common IIT Council, which oversees their
administration. The Union HRD Minister is the ex-officio Chairperson of IIT Council.
PURPOSE AND OBJECTIVE OF RESEARCH
The present research paper is an attempt to highlight below:
a) To examine the Web 2.0 tools that have been deployed by IIT Libraries as exposed on their websites;
b) To evaluate/examine the purpose of Web 2.0 tools use in these libraries;
c) To find out how IIT libraries website are answering to the much communicated about newly emergence
technology namely SNSs;
d) To compare the different features of Web 2.0 tools used in their libraries.
ISBN 1-63102-455-8
125
Present Status of Convergence Web 2.0 Technology in Technical Libraries Web Page: A Study of IIT Libraries in India
METHODOLOGY EMPLOYED
Researcher adopted a webpage survey method. A well structure checklist was designed keeping in mind the
listed aforesaid objectives and literature available to examine the various Web 2.0 features of library website.
Researcher personally visits to see all IIT Libraries websites to gather the data about using Web 2.0 applications
in library as on 26.3.2014. All the available library website links were surveyed and observations were noted
down in tabular form and data gathered in the tabular form were then carefully analysed to get a clear picture of
the use of Web 2.0 tools in IIT Libraries website.
PREVIOUS WORK IN WEB 2.0 THEME
Web 2.0 applications are one of current and research interest area among researcher and LIS Professionals.
Many studies undertaken worldwide in Web 2.0 related on particular theme. Researcher consults only those
literatures which are related and contributed by different experts. The following are some of them.
Hussain (2015) undertook a survey on “Adoption of Web 2.0 in library associations in the presence of social
media”, which was found that the majority of Web 2.0 tools have been used by American continents library
associations. This stands at, 89.86 percent, whereas only a small number of Web 2.0 tools have been used by
Asian continent library associations, that is, 25.64 percent. The most of Web 2.0 tools used by library
associations, is, Facebook, Twitter, RSS feeds, LinkedIn, Flickr and Blogs. The findings of this study can be
utilized to assess the status of assorted Web 2.0 tools used in libraries associations. It may enable future research
to investigate other aspects, such as the adoption of Web 2.0 tools in library associations of a particular country
as well as continent.
Boateng & Liu (2014) made a study on “Web 2.0 applications usage and trends in top US academic libraries.”
The results of this exploratory study indicate an overwhelming implementation and usage of Web 2.0
applications in the top 100 US academic libraries. All 100 academic libraries examined had a social media
presence on Facebook and Twitter, making SNS the most widely applied Web 2.0 tool. The Wiki was the least
used Web 2.0 technology, but it was still used by 34 percent of the academic libraries. Most libraries have
adopted multiple Web 2.0 tools including IM, RSS, Blog, Podcast/Vodcast, SNS, Wiki, and social
bookmarking/tagging. This trend is a very significant improvement from the earlier studies described in the
literature review. Those studies did not find such extensive implementation of Web 2.0 technologies in US
academic libraries. These academic libraries are developing strategies for making the best use of social media,
recognizing the unique qualities of different applications, and using them to promote and offer enhanced library
services. The trend shows that all libraries will adopt a user-participated Web 2.0 tools for enhancing the quality
of their services.
Gul et. al. (2014) conducted a research entitle on “Emerging Web 2.0 applications in open access scholarly
journals in the field of agriculture and food sciences.” Research results also reveal that majority of Web 2.0
enabled journals are from universities, it should be noted that technological research in Brazil is largely carried
out in public universities and research institutes, and more than 73 percent of funding for basic research comes
from government sources. The USA also leads in terms of Web 2.0 adoption in the journals because it has been
a leader in scientific research and technological innovation since the late nineteenth century. Countries and the
titles from their domain that have not tested waters with Web 2.0 enabled tools should adopt Web 2.0
interactivity in their journals, which will help in developing a Web 2.0 sensibility in the open access journals,
and will then help in achieving a convenient scholarly communication platform. New Web 2.0-based scholarly
modes of communication will help in rising like a phoenix that will provide greater accessibility to the open
journal content. The editorial staff associated with open access journals should adhere to the adoption of more
and more Web 2.0 tools, so that a more interactive environment in the scholarly world can be created. The
adoption of Web 2.0 tools in open access journals can help editors to interact with the researchers interested in
publishing in open access journals, answer questions and provide information about the various journal services.
Web 2.0 technologies, if adapted to a greater level in the open access journals, can provide unique and powerful
information sharing and collaborative platform for the scholarly world.
Wordofa (2014) conducted a survey on “Adoption of Web 2.0 in academic libraries of top African universities.”
The use of the internet in Africa has shown significant growth, the adoption of Web 2.0 technologies by
126
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
academic libraries in Sub-Saharan Africa appears to be still at an early stage. The adoption rate by libraries of
the elite universities in Africa was found to be far below that of the developed world. Patron participation in
using these web-based technologies was also very low, and the libraries did not have extensive activity on their
social websites. However, the indications of Web 2.0 utilization were encouraging as about half of the libraries
in this study attempted to use some kind of Web 2.0 tool. The use of social networking sites – largely Facebook
and Twitter – was relatively high, followed by Blogs and RSS. Social bookmarking and tagging sites were the
least used tools. The libraries mostly used Web 2.0 tools to share library news and announcements, market
library services and resources, provide information literacy tutorials, and receive feedback from patrons.
Yan et. al. (2014) in their article on “Exploring employee perceptions of Web 2.0 virtual communities from the
perspective of knowledge sharing.” The independent samples t-test and one-way ANOVA present the effect of
individual differences on knowledge contributing, knowledge seeking, trust and norm of reciprocity. The paired
samples t-test suggests that employees are more likely to seek knowledge from than contribute knowledge to
Web 2.0 virtual communities. The correlation analysis suggests there are positive correlations between
knowledge contributing, knowledge seeking, trust and reciprocity. Based on knowledge quantity and knowledge
quality whose significance cannot be over-emphasized in virtual communities, this study explores employee
perceptions of Web 2.0 virtual communities from the perspective of knowledge sharing, which the authors think
provides a new view for knowledge sharing research and practice alike in China.
Shafi et. al. (2013) conducted a study on “Web 2.0 interactivity in open access repositories.” A total of 1,499
open access repositories having English as one of the interface/content languages (75.82 percent of total OA
repositories) are developed from 81 nations and only 61 countries have most of their repositories Web 2.0
enabled. About 57 percent (804) repositories make use of Web 2.0 tool/s, 43 percent (608) have yet to avail
benefits of Web 2.0 tools while 5.8 percent remain inaccessible (87) during the study period. Though the USA
leads in terms of OA repositories, the percentage of Web 2.0 enabled repositories is higher for the UK (75.27
percent) as compared to the USA (51.08 percent). Really Simple Syndication (RSS), a syndication tool, is found
in the majority of repositories (736, 91.54 percent) followed respectively by Social Bookmarking and ATOM
(syndication tool) in 228 and 160 repositories.
RESULTS AND DISCUSSIONS
Researcher undertaken a webpage survey and attempted to determine those IIT libraries are not using Web 2.0
applications, to make inform decisions on whether IIT libraries should make use of certain convergence Web
2.0 technology to enhance their excellent library services and facilitate information sharing among generations.
Following table and figure shows the entire result of the survey.
Table 1: Library Websites of Indian Institute of Technology (IIT) in India
Sl. No.
Name of IITs
Year of Estd.
URL of Library Websites
1.
IIT Bhubaneswar
2008
http://library.iitbbs.ac.in/
2.
IIT Bombay
1958
http://www.library.iitb.ac.in/
3.
IIT Delhi
1961
http://library.iitd.ac.in/
4.
IIT Gandhinagar
2008
http://www.iitgn.ac.in/library.htm
5.
IIT Guwahati
1994
http://www.iitg.ernet.in/lib/
6.
IIT Hyderabad
2008
http://library.iith.ac.in/
7.
IIT Indore
2009
http://library.iiti.ac.in/
8.
IIT Jodhpur
2008
http://library.iitj.ac.in/
ISBN 1-63102-455-8
127
Present Status of Convergence Web 2.0 Technology in Technical Libraries Web Page: A Study of IIT Libraries in India
9.
IIT Kanpur
1959
http://pkklib.iitk.ac.in/
10.
IIT Kharagpur
1951
http://www.library.iitkgp.ernet.in/
11.
IIT Madras
1959
http://www.cenlib.iitm.ac.in/docs/library/index.
php
12.
IIT Mandi
2009
http://library.iitmandi.ac.in/
13.
IIT Patna
2008
http://www.iitp.ac.in/index.php/servicesandamenities/central-library/about-iitplibrary.html
14.
IIT Roorkee
1847
http://mgcl.iitr.ac.in/
15.
IIT Ropar
2008
http://www.iitrpr.ac.in/library#
16.
IIT Varanasi
1919
http://www.iitbhu.ac.in/library/
Table 1 revealed how many IIT libraries in India and disclosed the year of establishment. In this tables showed
that Sixteen IITs in India.
Web 2.0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
AI
Blog
-
-
-
-
-
√
√
-
-
-
-
-
-
-
-
-
2
SNS
-
√
-
-
-
-
-
-
-
-
-
-
-
-
-
-
1
Wiki
-
-
-
-
-
-
√
-
-
-
-
-
-
-
-
-
1
RSS Feed
-
-
-
-
-
√
√
-
-
-
-
-
-
-
-
-
2
IM
√
√
-
-
-
-
-
-
-
-
√
-
-
-
-
-
3
Mashup
-
-
-
-
-
-
√
-
-
-
-
-
-
-
-
-
1
√
√
√
√
√
-
√
√
-
-
√
√
-
√
-
√
11
2
3
1
1
1
2
5
1
0
0
2
1
0
1
0
1
21
Web OPAC
Total
Table 2: Web 2.0 Features in IIT Library Websites
Note: 1. IIT Bhubaneswar 2. IIT Bombay 3. IIT Delhi 4. IIT Gandhinagar 5. IIT Guwahati 6. IIT Hyderabad 7.
IIT Indore 8. IIT Jodhpur 9. IIT Kanpur 10. IIT Kharagpur 11. IIT Madras 12. IIT Mandi 13. IIT Patna 14. IIT
Roorkee 15. IIT Ropar 16. IIT Varanasi AI – Application Index
Table 2 represented the Web 2.0 features in IIT Library Websites. The majority of library website i.e. 11
(68.75%) used Web OPAC for search and retrieve the information, which was followed by 3 (18.75%) of library
websites adopted IM for responding particular user query. 2 (12.5%) of library websites deployed Blog and RSS
Feed. Only 1 (6.25%) of IIT Libraries used SNS and, Wiki and Mashup. One more noticeable point was that IIT
Indore used the highest number of Web 2.0 tools in Library website.
128
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Using
25%
75%
Figure 1: Status of Using Web 2.0 Tools
In order to know the status of Web 2.0 in IIT Libraries website, Fig. 1 showed the clear picture overall scenario
of library website. 12 (75%) of IIT Library websites adopted Web 2.0 tools whereas remaining other not
adopting still now.
Sl. No.
Name of IIT
SNS Used
Application Index
1.
IIT Bhubaneswar
Nil
0
2.
IIT Bombay
Facebook, Twitter, You Tube
3
3.
IIT Delhi
Nil
0
4.
IIT Gandhinagar
Nil
0
5.
IIT Guwahati
Nil
0
6.
IIT Hyderabad
Twitter
1
7.
IIT Indore
Nil
0
8.
IIT Jodhpur
Nil
0
9.
IIT Kanpur
Nil
0
10.
IIT Kharagpur
Nil
0
11.
IIT Madras
Nil
0
12.
IIT Mandi
Nil
0
13.
IIT Patna
Nil
0
14.
IIT Roorkee
Nil
0
15.
IIT Ropar
Nil
0
16.
IIT Varanasi
Nil
0
Table 3: Status of SNS (Social Networking Sites) in IIT Libraries
ISBN 1-63102-455-8
129
Present Status of Convergence Web 2.0 Technology in Technical Libraries Web Page: A Study of IIT Libraries in India
Table 3 showed the status of SNS in IIT Libraries websites. IIT Bombay, library was the highest number of SNS
like Facebook, Twitter and You Tube used in library website and only Twitter adopted by IIT Hyderabad,
library.
CONCLUSION AND RECOMMENDATIONS
With the emergence of new technology, users need to find reliable and authentic information, so that they can
get the information as instantly as possible. Using these technologies, LIS Professionals can assist the users at
any time any moment and anywhere. The result revealed that convergence Web 2.0 technology in present study
websites as per checklist found very meager features. In consequence, it can be understood that Web 2.0 tools
should implement more additional feature and continued with rich content. Hence, requirements and
expectations of its users can be fulfilled with facilitate innovative and excellent library services. Many Web 2.0
technologies are available freely. Thus, there is no financial restriction in using these tools and support in taking
advantage of the full potential of information services to the existing users and will also advantage in reaching
out to new potential users. Moreover, LIS Professionals should maintain consistency to upload and update the
information quickly, so that user can get the advantage of taking these tools.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Ahmed, W. (2015). Third generation of the web: libraries, librarians and web 3.0. Emerald Group Publishing
Limited, 32(4), 6-8. doi: 10.1108/LHTN-11-2014-0100
Boateng, F., & Liu, Y. Q. (2014). Web 2.0 applications’ usage and trends in top us academic libraries. Emerald
Group Publishing Limited, 32(1), 120-138. doi: 10.1108/LHT-07-2013-0093
Deodato, J. (2014). The patron as producer: libraries, web 2.0, and participatory culture. Emerald Group
Publishing Limited, 70(5), 734-758. doi: 10.1108/JD-10-2012-0127
Gul, S., Shah, T. A., & Nisa, N. T. (2014). Emerging web 2.0 applications in open access scholarly journals in the
field of agriculture and food sciences. Emerald Group Publishing Limited, 63(8/9), 670-683. doi: 10.1108/LR-052013-0060
Hussain, A. (2015). Adoption of web 2.0 in library associations in the presence of social media. Emerald Group
Publishing Limited, 49(2), 151-169. doi: 10.1108/PROG-02-2013-0007
Kelly, B., Bevan, P., Akerman, R., Alcock, J., & Fraser, J. (2009). Library 2.0: Balancing the risks and benefits to
maximize the dividends. Program: electronic library and information systems, 43(3), 311-327. doi:
10.1108/0330330910978608
Shafi, S. M., Gul, S., & Shah, T. A. (2013). Web 2.0 interactivity in open access repositories. Emerald Group
Publishing Limited, 31(6), 703-712. doi: 10.1108/EL-08-2011-0121
Wordofa, K. H. (2014). Adoption of web 2.0 in academic libraries of top African universities. Emerald Group
Publishing Limited, 32(2), 262-277. doi: 10.1108/EL-07-2012-0077
Yan, Y., Zha, X., & Yan, M. (2014). Exploring employee perceptions of web 2.0 virtual communities from the
perspective of knowledge sharing. Emerald Group Publishing Limited,66(4), 381-400. doi: 10.1108/AJIM-082013-0070
WEBSITE VISITED
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
130
http://mhrd.gov.in/iits
http://library.iitbbs.ac.in/
http://www.library.iitb.ac.in/
http://library.iitd.ac.in/
http://www.iitgn.ac.in/library.htm
http://www.iitg.ernet.in/lib/
http://library.iith.ac.in/
http://library.iiti.ac.in/
http://library.iitj.ac.in/
http://pkklib.iitk.ac.in/
http://www.library.iitkgp.ernet.in/
http://www.cenlib.iitm.ac.in/docs/library/index.php
http://library.iitmandi.ac.in/
http://www.iitp.ac.in/index.php/services-and amenities/central-library/about-iitp-library.html
http://mgcl.iitr.ac.in/
http://www.iitrpr.ac.in/library#
http://www.iitbhu.ac.in/library/
ISBN 1-63102-455-8
BIG DATA: INTRODUCTION TO APPLICATIONS IN
LIBRARIES
Ms. Purnima Joshi | Librarian | K. C. Law College | India | kclawlibrary@gmail.com
Abstract: Big Data is the digital data that is rapidly increasing on three fronts of volume, velocity
and variety. Analysis of big data reveals patterns, trends and associations that can be used by
businesses, academic institutions and libraries. This paper introduces the concept of big data. It
also discusses in detail, big data applications in libraries especially data mining, data curation
and research data management.
Keywords: Big Data, Data mining, Data curation, Research data management.
INTRODUCTION
Sloan Digital Sky Survey project started in 2000. In the first few weeks, its telescope in New Mexico collected
more data than that collected in the entire history of astronomy. Now, after a decade, its archive contains 140
terabytes of information. The new telescope that will be installed in Chile in 2016 is expected to gather
equivalent amount of data every five days. We also encounter such astronomical amounts of data closer to
home. The social networking website Facebook hosts more than 40 billion photos. It also stores almost 800
pages information about each user. All these examples illustrate the huge volume of digital data currently
available in the world. This data is constantly increasing at a very rapid pace. The growth of data is such that it
has already exceeded the available storage space as shown in the following graphical representation (GSV
Capital, 2014). This rapidly increasing volume of data (or information) is called as “Big Data”. According to
Diebold (2012), John Mashey and his colleagues at Silicon Graphics Inc. (SGI) were responsible for coining the
term ‘Big Data’ in mid-1990s.
CHARACTERISTICS OF BIG DATA
Generally big data is defined as large data that come from unstructured sources and can be used in real-time.
Laney (2001) was the first to identify the three Vs that are the definitive attributes of big data - Volume,
Velocity, and Variety:
1. Volume: A primary feature of big data is its huge size. The huge data can neither be stored nor analyzed by
conventional methods. Traditional softwares can handle datasets of kilobyte (KB) size, but softwares for big
data analysis should be able to handle datasets of terabyte or petabyte sizes i.e., 109 or 1012 KBs of data. Torrent
of social media updates due to the internet-mobile revolution and huge growth of e-commerce have resulted in
voluminous data. If used correctly, this data can be of immense value.
2. Velocity: The second feature refers to the extremely high speed of data creation and the increasing speed at
which it moves around. Currently in one minute, 100 hours of video are being uploaded on Youtube, 3 lakh
tweets are posted and more than 200 million mails are sent. The speed of social media interactions is such that
these figures become outdated as soon as we read them. This is the phenomenal rate of growth of digital data
that is being created. Processing this data in real time helps companies to provide personalized services book
recommendations and personalized advertisements based on the person’s search, viewing and purchase history.
ISBN 1-63102-455-8
131
Big Data: Introduction to Applications in Libraries
3. Variety: Traditionally, the data collected for research was only structured data, such as that in a spreadsheet
with specific rows and columns. Big data sets also contain unstructured data like images, texts, internet posts, email messages, audio and video files, etc. in addition to structured data.
These three Vs give an insight into the scale, speed of growth and the challenges posed by big data. Rijmenam
(2013) proposed four more Vs to further the understanding of the complex nature of big data.
4. Veracity: High potential value attributed to big data would prove to be worthless if the data is not accurate. It
is necessary to understand that big data may contain a lot of “noise” or errors that have to be cleaned and
rectified in order to create an accurate dataset for analysis.
5. Variability: Big data can be extremely variable. Variability refers to variance in meaning according to a
given context. An adjective can have both positive and negative connotations according to the context in which
it is used. For example, ‘terribly nice’ is positive whereas ‘terribly shameful’ is negative. For a proper analysis
therefore, the program should be able to understand the context and then decipher the meaning of words in that
context. This can be very difficult, but not impossible as such programs do exist.
Variability should not be confused with variety. Variety means different types of a single product. Variability
means variations or lack of uniformity in a particular product.
6. Visualization: This refers to presentation of processed data in an accessible or understandable manner.
Normal presentation tools are various graphical visualizations in the form of bar graph or pie charts.
Visualizations for big data are complex graphs that include many variables. Proper analysis and visualization is
the most crucial part that makes big data comprehensible and easy to read and interpret.
7. Value: Big data has a huge potential value. Industries can reap huge benefits from it provided they analyze
and interpret it accurately. The value of big data lies in the insights that can be derived from data analysis and
used in decision making to make the industry information-centric.
Raw big data actually has little value. It is very difficult to visualize patterns in raw data without efficient
analysis. Analyses help in converting a mass of data into applicable or usable information. Making sense of all
the available data is becoming increasingly difficult. Only very powerful computers can manage the available
data and provide new insights into it. Advancements in technology have enabled analysis of big data in real time
and also making predictions based on it. This is called as ‘Data Mining’ in technical terminology. Various
factors that have together enabled effective mining of large datasets are:
Cheaper servers to host the mined data
Availability of open source software tools
Availability of cloud computing facilities
Creation of massive datasets
Need for businesses to derive value out of the collected data.
APPLICATIONS OF BIG DATA
Commercial organizations were the first to adopt big data to identify market trends. Businesses collect huge data
about customer needs and experiences and also about the organizational processes. This data is then analyzed to
identify emerging market trends and to meet customers’ needs effectively. It can also help in providing better
services and more targeted products. In addition, businesses can also involve their customers in the process to
bring about improvements in products. For example, the famous toy company LEGO has started Mindstorm
community, where buyers of LEGO products can participate in designing future products.
When people browse the Internet they leave a trail, which can be followed by companies to create tailor-made
services. For example, book recommendations by Amazon, personalized search experience by Google.
Such an information-driven approach was not immediately adopted by the education sector. In the academic
environment, the following activities of students are sources of enormous potentially valuable information:
course or college registration, scholarship and internship arrangements, co-curricular and extracurricular
132
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
activities, online submissions, library usage and online resources usage. This information can be the raw
material for big data analysis and it can be repackaged to help the students.
Such an application is the SHERPA (Service-oriented Higher Education Recommendation Personalization
Assistant) software developed by the Saddleback College in California (Soares, 2011). It can suggest a course of
study to the students by analyzing the information about their profile, schedules and past courses undertaken by
them that is stored in the college database. The improved version of this software will also add the success
stories of students with similar profiles in the big data analysis.
Similarly, Course Signals software developed by Purdue University (Arnold and Pistilli, 2012) compares the
students’ performance and activity patterns to those of previously successful students. It thus helps them to
manage their success throughout their course.
APPLICATIONS OF BIG DATA IN LIBRARIES
Automation of library circulation systems and development of Worldcat by OCLC can be called as the early
applications of big data in libraries. Big data affects libraries both directly and indirectly. Direct effect is in the
use of big data tools to analyze big data sets of libraries. Indirect effect is through the library users who are
increasingly using big data in their research.
In order to deal with big data and data mining, there is no need for librarians to acquire new skills. They need
only to refocus on new issues and requirements. Librarians who have practiced cataloguing and metadata
creation have the ability of conceptualizing relationships among data. They can therefore, be the best persons to
advise the researchers about the data management mechanisms to be adopted from the beginning of a research
project so as to make it easier to collect, organize and preserve the data that will be generated.
BIG DATA CURATION
Librarians can make big data sets more accessible, visible and useful by creating metadata schemes and
taxonomies and designing standard retrieval methods. Traditionally librarians have always worked with
information sources, which are the finished products. Now they should also understand the value of the ‘raw
data’. With the help of new big data analysis tools, one can look at data in different ways. Information
Visualization Tools enable mining the raw data for new information different than the purpose for which it was
used originally.
RESEARCH DATA MANAGEMENT
Research data is the data that is produced as a result of any research activity. Such data is very valuable but it is
also diverse and heterogeneous in nature and can be huge in a university setup where active research is going
on. This research data is a pool of raw data which can be mined by other researchers according to their needs.
This will save their precious time that would have been spent in data collection. But, such an activity needs
proper planning for infrastructure and policy framework.
Researchers are normally focused on their own domains. It is very difficult to imagine how the data collected by
them can be useful for others. But a facet of the data that may be useless to the researcher who collected it might
be valuable for other researchers.
The librarians have to perform the task of data curation in such cases so as to make the data more valuable and
available for other future uses, especially because predicting the future uses can be very difficult. What to save
and in which format, are some of the crucial decisions to be taken.
Data archiving is the library skill that can be reoriented for big data management. For researchers, data
management is nothing but data storage. It can be stored locally on their computer disks or in the cloud. But
archiving actually means arranging, describing, documenting and preserving the data so as to enhance it and
make it easily retrievable. This is very important because storage or preservation of data is meaningless without
later access. If research data is archived properly, then it would make the research reproducible and also
facilitate new research.
ISBN 1-63102-455-8
133
Big Data: Introduction to Applications in Libraries
Such initiatives are being undertaken the world over. Their goal is to build large networks and repositories to
provide support for effective data management and access. But in order to do this, it is necessary to find out the
needs and habits of researchers, to develop powerful data analysis tools or adapt some from the available open
source software.
Hathi Trust (2015) is one such co-operative effort of more than 100 university libraries. It is administered by
Michigan and Indiana universities and is a collaborative repository of digital content from research libraries. It is
“committed to the long-term curation and availability of the cultural record”. Its textual data corpus can be used
by researchers for text mining according to their needs.
The Digital Preservation Network (DPN, 2015) is the newest and one of the most ambitious project with a
vision to preserve the complete scholarly record for future generations. It replicates multiple copies of various
digital repositories in diverse nodes in order to protect from “the risk of catastrophic loss due to technology,
organizational or natural disasters”.
For proper functioning of such initiatives for Data mining, Data curation or Research data management, a smart
policy framework is a necessity because here, personal research data is being used in new ways giving rise to
many information sharing issues. Policy makers therefore, should create proper guidelines for promotion of both
– an information sharing environment and researcher privacy. Guidelines should also define the extent and
nature of use that can be considered fair dealing. Whether the researchers will be able to opt out or control their
research data should also be specified clearly. Funding issues for maintenance of the data repository should also
be a major concern.
Majority of the initiatives in big data management for preservation and access are headed by the
librarians. But university officials are also involved in these projects. Preservation of big data and the
cultural heritage should be a joint responsibility of libraries and universities or research institutions.
This is because big data management involves social and economic issues in addition to the technology
issues.
CONCLUSION
Big data are extremely large data sets that can be analyzed only with the help of specialized software. This gives
rise to complex visualizations regarding patterns and trends in human behavior and interactions. Big data is
expanding continually on three fronts of volume, velocity and variety. Consideration of other characteristics like
veracity, variability, visualization and value is also very important for developing a big data program.
Businesses were the first to adopt big data analysis followed by the education sector. Big data is finding
applications in data mining, data curation and research data management. Libraries are at the fore front of such
initiatives with administrative and technological support from their universities or institutions.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
134
Arnold, K. E., and Pistilli, M. D. (2012). Course signals at Purdue: Using learning analytics to increase student
success. In S. Buckingham Shum, D. Gašević, & R. Ferguson (Eds.), Proceedings of the 2nd International
Conference on Learning Analytics and Knowledge (LAK 2012) (pp. 267-270). New York: ACM
Diebold, Francis X. (2012). A personal perspective on the origin(s) and development of ‘Big Data’: the
phenomenon, the term, and the discipline. Second version. PIER Working Paper No. 13-003. Retrieved from
http://dx.doi.org/10.2139/ssrn.2202843 on 9.7.2015
Digital Preservation Network. (2015). Retrieved from http://www.dpn.org/ on 13.7.2015
GSV Capital (2014). Market commentary. Retrieved from http://gsvcap.com/market-commentary/san-francisco37/ on 9.7.2015
Hathi Trust Digital Library. (2015). Partnership Community. Retrieved from
https://www.hathitrust.org/community on 13.7.2015
Laney, Doug. (2001). 3D data management: controlling data volume, variety and velocity. Retrieved from
http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-VolumeVelocity-and-Variety.pdf on 22.07.2015
Rijmenam, Mark van. (2013). Why the 3 Vs are not sufficient to describe big data. Retrieved from
https://datafloq.com/read/3vs-sufficient-describe-big-data/166 on 22.07.2015
Soares, Louis. (2011). The ‘Personalization’ of Higher Education: Using Technology to Enhance the College
Experience. Retrieved from https://www.americanprogress.org/issues/labor/report/2011/10/04/10484/thepersonalization-of-higher-education/ on 10.7.2015
ISBN 1-63102-455-8
PLAGIARISM AND RESEARCH MISCONDUCT: A
STUDY
Sanjay Kumar Jha | Assistant Librarian | Amity University | Noida | sjha1@amity.edu
Pratibha Pritam | Assistant Librarian | Dalmia House | New Delhi
Abstract: As the research integrity officer at my university for two years, I handled eight
allegations of plagiarism. These eight cases show that initial appearances can be mistaken, that
policies for handling allegations of research misconduct cannot cover every contingency, and that
many cases can be resolved collegially without resort to formal procedures.
Keywords: Plagiarism, research misconduct, research integrity officer
INTRODUCTION
Plagiarism has become an increasingly serious problem in the University. It is aggravated by the easy access to
and the ease of cutting and pasting from a wide range of materials available on the internet. Plagiarism is
regarded as a very serious offence in the academic world. It constitutes academic theft - the offender has 'stolen'
the work of others and presented the stolen work as if it were his or her own. It goes to the integrity and honesty
of a person. It stifles creativity and originality, and defeats the purpose of education.
Plagiarism is the unacknowledged use of other people's ideas or work. Plagiarism is often unintentional and can
be avoided through careful work habits. Whether intentional or unintentional, plagiarism is recognized as a
serious academic offence.
I am never forget the day I first meet the great Lobachevsky. In one word he told me secret of success in
mathematics: Plagiarize! … Only be sure always to call it please “research” … I am never forget the day my
first book is published. Every chapter I stole from somewhere else. Index I copy from old Vladivostok telephone
directory. This book was sensational! 1 Since antiquity, writers and artists have borrowed words, images, and
ideas from predecessors without attribution. The acceptability of borrowing has varied throughout history and
across cultures, but academics in the West have generally taken a strict attitude toward plagiarism.2 In the
academy today, plagiarism is wrong because it is the misrepresentation of the ideas and words of someone else
as one’s own. By omitting citations, the plagiarist impedes scholarship by preventing readers from tracing
Department of Electrical and Computer Engineering, and Coordinated Science Laboratory, University of Illinois
at Urbana-Champaign, USA A preliminary version of this paper was presented at the Eleventh Annual Meeting
of the Association for Practical and Professional Ethics, February 28 – March 3, 2002, Cincinnati, Ohio.
The views, opinions, and recommendations expressed in this paper are not necessarily those of the University of
Illinois at Urbana-Champaign. M. C. Loui Science and Engineering Ethics, Volume 8, Issue 4, 2002backward to
identify the sources of an idea.3 Among academics, plagiarism is not “the sincerest form of flattery”—it is a sin.
Fig.1 Process of Plagiarism Checking
ISBN 1-63102-455-8
135
Plagiarism and Research Misconduct: A Study
Plagiarism occurs in research in all academic disciplines: the natural sciences, applied sciences, social sciences,
humanities, fine arts, and professions. It appears to be the most commonly reported form of research
misconduct.[4]
In response to widely publicized cases of scientific fraud, over the last ten years, many universities in the United
States have developed policies and procedures to handle allegations of research misconduct, although faculty
often do not know about them.5 These policies attempt to ensure that the allegation is handled promptly,
confidentially, and effectively, with attention to rights of the initiator of the allegation and the respondent. Due
process requires that the respondent be given an opportunity to respond within a reasonable amount of time. If
an investigation reveals that the facts do not support an allegation, then the reputation of the respondent must be
preserved; those who had heard the allegation must be informed that it was dismissed. Further, the respondent
should be protected from malicious charges, while the initiator should not suffer retaliation for bringing an
allegation in good faith. Finally, differences in judgment and honest mistakes do not constitute research
misconduct. campus. In this paper I recount these cases briefly, with names and other identifiers omitted to
protect the innocent and the guilty. I hope that the lessons drawn from these cases will be helpful to other
research integrity officers.
Seven Ways to Plagiarize: Handling Real Allegations of Research Misconduct Science and Engineering Ethics,
Volume 8, Issue 4, 2002 531
WHAT IS PLAGIARISM?
Plagiarism is the act of taking another person's writing, conversation, song, or even idea and passing it off as
your own. This includes information from web pages, books, songs, television shows, email messages,
interviews, articles, artworks or any other medium. Whenever you paraphrase, summarize, or take words,
phrases, or sentences from another person's work, it is necessary to indicate the source of the information within
your paper using an internal citation. It is not enough to just list the source in a bibliography at the end of your
paper. Failing to properly quote, cite or acknowledge someone else's words or ideas with an internal citation is
plagiarism.
These are some examples of plagiarism. Some are obvious, but some may be new to you:
Misrepresenting someone else's work as your own:
o Copying another student's paper or an article from a journal or website
o Buying an essay from a term-paper mill
Copying sentences or paragraphs without properly citing their source:
Quoting material without proper use of quotation marks (even if otherwise cited appropriately)
Using specific facts without proper attribution (other than information that qualifies as
'common knowledge')
o Using a specific argument or logic without crediting the source
o Using art, graphs, illustrations, maps, statistics, photographs, etc. without complete and proper
citation
o Translating a work from one language to another without complete and proper citation
Paraphrasing
o
o
o
o
Paraphrasing or summarizing information from a source without proper acknowledgement
Re-writing a section but not making it sufficiently different from the original (even if cited
appropriately)
WHAT TYPES OF WORK MUST BE CITED?
The work of others includes not only written words and ideas, but also "art, graphics, computer programs,
music, [. . .] charts, pictures, graphs, diagrams, data, websites, or other communication or recording media,"
including "formatting," images, statistics, and problem solutions ("Avoiding Plagiarism").*
136
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
WHICH SOURCES MUST BE CITED?
Both published (in digital or traditional formats) and unpublished sources must be cited. Published sources
include "books, magazines, newspapers, websites, plays, movies, photos, paintings, and textbooks" and online
papers; unpublished sources include "class lectures or notes, handouts, speeches, other students' papers, or
material from a research service" ("Avoiding Plagiarism").
HOW TO AVOID PLAGIARISM?
When you write a research paper, you have to explain where you got your information. Some of the ideas you
use will be your own, but many will have come from information you have read and people you have
interviewed about the topic. To explain where the information comes from, you have to give (cite) the source
correctly.
DISTINGUISHING "COMMON KNOWLEDGE" FROM ORIGINAL WORK
Facts can be viewed as common knowledge if they are generally known and widely established. The term
"common knowledge" implies that the audience and the author have agreed on certain facts, so accepted
common knowledge might vary depending on your audience. For example, dates referring to well-known events
can be viewed as common knowledge. So, when referring to July 4, 1776 as the date the Declaration of
Independence was adopted, you would not need to cite a source for your information—if Americans comprise
your target audience.
Be wary, however, when treating information as common knowledge. When making this judgment, consider
whether the information is both widely known and undisputed. As your expertise within your field grows, your
base of common knowledge, as it pertains to that field of expertise, will also grow. When in doubt about the
status of a piece of information, err on the side of caution and include a citation.
STUDENT MISCONCEPTIONS ABOUT PLAGIARISM AND THE INTERNET
Some students view all information on the Internet as equal to common knowledge simply because it is free,
publicly shared, widely available, and indeed, quite "common." Nevertheless, the language, ideas, and work in
electronic sources, even those without an identifiable author, must be cited.
According to the new federal policy on research misconduct, adopted in 1999,
[Research misconduct is] fabrication, falsification, or plagiarism in proposing, performing, or reviewing
research, or in reporting research results…. Plagiarism is the appropriation of another person’s ideas, processes,
results, or words without giving appropriate credit, including those obtained through confidential review of
others’ research proposals and manuscripts.
Fig.2 Research Misconduct
ISBN 1-63102-455-8
137
Plagiarism and Research Misconduct: A Study
DEFINITION OF RESEARCH MISCONDUCT
Research misconduct means fabrication, falsification, or plagiarism in proposing, performing, or reviewing
research, or in reporting research results.
1. Research misconduct does not include honest error or differences of opinion.
2. Fabrication is making up data or results and recording or reporting them.
3. Falsification is manipulating research materials, equipment, or processes, or changing or omitting data
or results such that the research is not accurately represented in the research record.
4. Plagiarism is the appropriation of another person's ideas, processes, results, or words without giving
appropriate credit.
This definition supersedes previous definitions used by the National Science Foundation (NSF) and the federal
Office of Research Integrity (ORI), and it applies to all federally supported research in the United States.[8]
The new federal definition omits the intent to deceive the reader, previously a part of the ORI definition, as
intent is difficult to prove.9 Under the previous ORI definition, the copying of sentences that describe previous
research might not constitute research misconduct if the reader were not deceived about the contribution of the
author.[10]
The new federal definition also omits the phrase “serious deviation from accepted practices”, previously an
important part of the NSF definition. Under the “serious deviation” standard, to qualify as research misconduct,
the copying must deviate significantly from the norms of the scholarly community; for example, the duplication
of a well-known procedure might technically be plagiarism, but would not be considered research
misconduct.[10]
For McCutchen,[11] the essence of plagiarism is the theft of someone else’s ideas or intellectual contribution.
The duplication of words, in itself, is only evidence of possible plagiarism. For example, in mathematical
writing the language is highly stylized, and an author can duplicate whole sentences—“Let x be a real
variable”—and even short sequences of sentences without plagiarizing.
The norms of an academic discipline are relevant in determining what constitutes plagiarism. Different
disciplines have different conventions, styles, and expectations for citing previous work.. Some disciplines
require quotation marks or indentation, some do not. Thus, in investigating an allegation of plagiarism, a hearing
panel should always include members who understand the norms of the academic discipline in which the
allegation occurred.
It is unnecessary to include citations and references for common knowledge within a discipline. For example, an
author today need not cite Darwin’s Origin of Species to introduce the concept of natural selection. In my
opinion, if a fact, concept, or theory is in the undergraduate curriculum or a first-year graduate course in the
discipline, then it is common knowledge, and no citation is necessary. Plagiarism and Copyright A case of
plagiarism is not necessarily a violation of copyright. An author can plagiarize without violating copyright by
quoting a document published many years ago that is now in the public domain. Conversely, an author can
violate copyright M. C. Loui 532 Science and Engineering Ethics, Volume 8, Issue 4, 2002 without plagiarizing
by quoting, with proper attribution, an amount of material that exceeds the “fair use” standard for copyright. A
university generally does not hold the copyright to a traditional academic work, such as a paper or a book
written by a professor or a student. Consequently, even if a plagiarism case does violate a copyright, the
university does not have an interest in protecting the copyright. Using copyright law to obtain redress for
plagiarism may not be effective for two reasons. First, few academic publications have significant monetary
value; provable monetary damages, if any, would be minimal. Second, a legal action could invite a counter-suit
for defamation.5 Most plagiarism cases can be resolved without recourse to a formal legal process.
Case #1: The Instant Paper Graduate student X takes a copy of a manuscript written by X’s research advisor Z
and replaces the title page with a new title page that includes the name of X.
138
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Case #2: The Unauthorized Translation Professor W publishes a book B1 in language L1 that reconstructs a
series of manuscripts published in language L0 some three centuries ago. Professor X translates B1 into X’s
own native language L2 . The book B2 written by X states only that W has also worked on these manuscripts,
with a citation of B1. Professor W brought the allegation to me because she knew that I handled allegations of
research misconduct.
Case #3: The Duplicate Publication Professor X publishes a paper P2 in journal J2 in which X includes several
long excerpts from a previous paper P1 in journal J1 that X (alone) wrote on a similar subject.
Case #4: The Background Section Professor X writes a grant proposal in which the background section
duplicates, nearly verbatim, two pages from a paper published by Professor Z. No ideas in this section of the
proposal are due to Z. The proposal cites this paper, but does not say that the background section is based on the
paper.
Case #5: The Review Article In seventeen places in a long review article, Professors X and Y quote nearly
verbatim from a book written by Professor Z. The book is listed among the references, but it is not cited in any
of these seventeen places. Professor X was the doctoral advisor of Y and Z; Professor Y was primarily
responsible for writing the review article.
Case #6: The Magazine Surprise Doctoral student W is surprised to see several paragraphs of W’s master’s
thesis appear verbatim in an article in magazine M written by Professor X. The article has no citations or
references.
Case #7: Another Magazine Surprise - In a short article in magazine M, Professor X states a theory originally
proposed by Professor Z, but confirmed through independent experiments by research articles that can be
included as references journal articles.
Case #8: The Professional Manual - In a professional manual written by practitioners X and Y, two pages
paraphrase procedures listed in a book written by Professor Z. The manual does not cite the book explicitly, but
it does include the book among the references at the end. The manual is published by X and Y themselves, and
neither X nor Y is employed by a university. On behalf of Professor Z, I attempted to contact the employers of
X and Y to find out The cases that I handled support some of the precepts proposed by Rhoades,6 who derived
lessons from cases of scientific misconduct reported to the Office of Research Integrity (ORI) at the federal
Public Health Service (PHS).
CONCLUSION
Plagiarism is the "wrongful appropriation" and "stealing and publication" of another author's "language,
thoughts, ideas, or expressions" and the representation of them as one's own work. The idea remains problematic
with unclear definitions and unclear rules The modern concept of plagiarism as immoral and originality as an
ideal emerged in Europe only in the 18th century. Now we can check plagiarism of research text, many tools are
available on the internet to check the originality of research work.
While some facts may be viewed as common knowledge, the presentation of those facts is considered the unique
work of an author. Again, when using the language or words of another, you must properly acknowledge his or
her work.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Lehrer, T. (1981) Lobachevsky, in: Lehrer, T. Too Many Songs by Tom Lehrer, Pantheon Books, New York.
Anderson, J. (1998) Plagiarism, Copyright Violation and Other Thefts of Intellectual Property: An Annotated
Bibliography with a Lengthy Introduction, McFarland and Company, Jefferson, N.C.
Snapper, J.W. (2001) On the Web, Plagiarism Matters More Than Copyright Piracy, in: Spinello, R.A. & Tavani,
H.T. (eds) Readings in Cyberethics, Jones and Bartlett, Sudbury, Mass., pp. 280-294.
Price, A. (1994) The 1993 ORI/AAAS Conference on Plagiarism and Theft of Ideas. Journal of Information Ethics
3: 54-63.
Kock, N. (1999), A case of academic plagiarism. Communications of the ACM 42: 96-104.
Rhoades, L.J. (2000) The American experience: lessons learned. Science and Engineering Ethics 6: 95-107.
Anderson, C. (1993) Michigan gets an expensive lesson. Science 262 (5130): 23.
ISBN 1-63102-455-8
139
Plagiarism and Research Misconduct: A Study
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Federal Register, October 14, 1999
Bird, S.J., & Dustira, A.K. (2000) New common federal definition of research misconduct in the United States.
Science and Engineering Ethics 6: 123-130.
Parrish, D. (1995) Scientific misconduct and the plagiarism cases. Journal of College and University Law 21: 517554.
McCutchen, C.W. (1994) Plagiarism: a tale of telltale words. Journal of Information Ethics 3: 48-50.
Bebeau, M.J. (1995) Moral Reasoning in Scientific Research: Cases for Teaching and Assessment, Poynter Center
for the Study of Ethics and American Institutions, Indiana University, Bloomington, IN, USA.
LaFollette, M.C. (1992) Stealing into Print: Fraud, Plagiarism, and Misconduct in Scientific Publishing, University
of California Press, Berkeley, CA, USA.
Gilbert, W.S., and Sullivan, A. (1878) H.M.S. Pinafore, Or the Lass that Loved a Sailor.
Gunsalus, C.K. (1998), Preventing the need for whistle blowing: practical advice for university administrators.
Science and Engineering Ethics 4: 75-94.
WEBSITES
[1] https://www.google.co.in/search?q=Plagiarism+and+Research+Misconduct&biw=1352&bih=634&source=lnms&
[2]
[3]
[4]
[5]
[6]
[7]
[8]
140
tbm=isch&sa=X&ved=0CAcQ_AUoAmoVChMI39bzgYPxxgIVyYuUCh0WGAsq#imgr=2sFreDbQqOIuiM%3A
https://ori.hhs.gov/definition-misconduct
http://www.lib.usm.edu/legacy/plag/whatisplag.php
http://cai.ucdavis.edu/plagiarism.html
https://en.wikipedia.org/wiki/Plagiarism
http://www.lib.sfu.ca/help/writing/plagiarism
http://www.rss.hku.hk/plagiarism/page2s.htm
http://www.concordia.ca/students/academic-integrity/plagiarism.html
ISBN 1-63102-455-8
DSPACE: A DAIS FOR DIGITAL RESOURCES
Sudha Kaushik | Researcher, DLIS | OPJS University | Churu | Rajasthan | sudhakaushik2@gmail.com
Dr. Somvir | Librarian | GITAM | Jhajjar | Haryana | somvirrathee9@gmail.com
Abstract- DSpace is an open source institutional repository software developed jointly by MIT
libraries and HP labs that is freely available and can be downloaded and installed without any
restricted. The code is currently licensed under the BSD open source license. To capture and
preserve the digital materials, the DSpace is an excellent dais. This paper deals with the
development, features, limitations, architecture and construction of DSpace. In addition it
highlight that DSpace is an open archival information system that allows users to use the system
and submit their digital content, even the administrator organize and configure the system. In
order to be more usable to different types of users, the software provides a configurable
submission and workflow process that can be useful for any institution’s information needs.
Keywords: DSpace, IR, Construction, Archicture
INTRODUCTION
Repositories now represent potentially rich sources of information, data, images and valuable research results.
The Repositories are powerful systems that allow organizations to store and maintain their digital documents
and allow for interaction and collaboration among users in the organizations. There are a number of digital
library software available as “Open Source” as well as in “Proprietary format”. Open source software helps
libraries mainly in lowering initial and ongoing costs, eliminating vendor lock-in and allowing for greater
flexibility. The main advantage of open source software is that it is generally available in free.[1]
When we talk about the ‘institutional repository’, we use ‘institution’ to refer the educational or research
establishment which is the library’s parent body. Institutional repositories have emerged from universities, but
are spreading into other types of educational institutions too, such as colleges and research institutes. The
concept of institutionally is an increasingly fragile one when we consider digital content and digital libraries,
and therefore we must ask whether we should be developing institutional repositories at all. [2]
DSpace is a Digital Institutional Repository System that captures items in different formats and stores in audio,
video, data and text. It redistributes it over the web an organization's research material. It indexes the digital
resources, so user can search and retrieve that. Research organizations are using the DSpace worldwide for a
variety of digital archiving needs from institutional repositories (IRs) to learning object repositories or electronic
records management. It preserves digital content for long duration. DSpace is freely available as open source
software which can customize and extend.
OBJECTIVES
To study the DSpace development and find suitability for use.
To study the architecture and construction of DSpace.
To study the creation of DSpace IR and workflow.
To study hurdles of DSpace.
HISTORICAL DEVELOPMENT OF DSPACE
The first public version of DSpace was released in November 2002, as a joint effort between developers
from MIT and HP Labs. Following the first user group meeting in March 2004, a group of interested institutions
formed the DSpace Federation, which determined the governance of future software development by adopting
the Apache foundation's community development model as well establishing the DSpace Committer Group. In
July 2007 as the DSpace user community grew larger, HP and MIT jointly formed the DSpace foundation, a
not-for-profit organization that provided leadership and support. In May 2009 collaboration on related projects
and growing synergies between the DSpace Foundation and the Fedora Commons organization led to the joining
of the two organizations to pursue their common mission in a not-for-profit called DuraSpace. Currently the
ISBN 1-63102-455-8
141
Dspace: A Dais for Digital Resources
DSpace software and user community receives leadership and guidance from DuraSpace. The different versions
of DSpace with release dates are:
DSpace 1.0.1
2003
DSpace 1.1.1
2005
DSpace 1.2.2 and DSpace 1.3.2
2007
DSpace 1.4.2
2009
DSpace 1.5.2
2010
DSpace 1.6.2
2013
DSpace 1.7.3 and 1.8.3
2015
DSpace 3.4, 4.3, 5.2 and 6.x (unreleased)
WHY DSAPCE SHOULD BE CHOOSED?
Largest community of users and developers worldwide: DSpace has over 1000 organizations that are
currently using the DSpace software in a production or project environment. The most common use is by
research libraries as an institutional repository; however there are many organizations using the software
to host and manage subject based repositories, dataset repositories or media based repositories.
Free open source software: The DSpace open source platform is available for free to anyone and can be
downloaded from the source forge open source software repository. The code is currently licensed under
the BSD open source license. This means that any organization can use, modify, and even integrate the
code into their commercial application without paying any licensing fees. Today there are more than 100
contributors around the world contributing code, bug fixes, etc. DSpace software is managed by a
smaller group of volunteer developers (called committers) that work together to plan releases and
integrate new features and bug fixes submitted by the community.
Completely customizable to fit organization’s needs: DSpace can be customized in the following key
ways to suit different needs:
142
2002
Customize or theme the user interface - The users can fully customize the look and feel of their
DSpace website so it will integrate seamlessly with the institution's website and can be more
intuitive for the users. DSpace provides two main user interface options: JSPUI and XMLUI.
Customize the metadata - Dublin Core is the default metadata format within the DSpace
application. However users can add or change any field to customize it for the application. DSpace
currently supports any non hierarchical, flat name space, although it is possible to ingest other
hierarchical metadata schemas into DSpace such as MARC and MODS. This requires using tools
such as crosswalk and having some technical capability to map the transfer of data.
Configure Browse and Search - Users can decide what fields they would like to display for
browsing, such as author, title, date etc. on DSpace website. Users can also select any metadata
fields they would like included in the search interface. All of the text within a given item and
metadata associated with the item, are indexed for full text search if desired.
Local authentication mechanisms - DSpace comes with plugins for most university authentication
methods, including: LDAP (and hierarchical LDAP), Shibboleth, X.509, IP-based. In addition,
DSpace comes with its own internal authentication method, or can be configured to use multiple
authentication methods at once. User can also build their own authentication plugin if he use a
custom authentication mechanism.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Standards compatibility - DSpace complies with many standard protocols for access, ingest, and
export. The standards DSpace supports include: OAI-PMH, OAI-ORE, SWORD, WebDAV,
OpenSearch, OpenURL, RSS, and ATOM.
Configurable database - Either PostgreSQL or Oracle can be choose for the database where
DSpace manages its metadata.
Default language -The DSpace web application is multilingual and available in over twenty
languages. So, the user can customize the preferred language which DSpace uses. DSpace can be
configured to support multiple languages, so that the language of user sees is the 'preferred
language' set in their web browser.
Used by Educational, Government, Private and Commercial Institutions: The DSpace platform is
used by higher education institutions for which the platform was initially developed, while also showing
a much broader appeal. The software has been used by museums, state archives, museums, state and
National Libraries, journal repositories, consortiums, and commercial companies to manage their digital
assets.
Can be installed out of the box: DSpace comes with an easily configurable web based interface, which
any system administrator can install on a single Linux, Mac OSX or Windows box to get started.
Can manage and preserve all types of digital content: The DSpace application can recognize and
manage a large number of file format and mime types. Some of the most common formats currently
managed within the DSpace environment are PDF, Word, JPEG, MPEG, TIFF files. DSpace also
provides a simple file format registry where any unrecognized format can be registered, so that it can be
identified in the future.
ARCHITECTURE OF DSPACE
The DSpace system is organized into three layers, each of which consists of a number of components.
DSpace System Architecture
The storage layer is responsible for physical storage of metadata and content. The business logic layer deals
with managing the content of the archive, users of the archive (e-people), authorization, and workflow. The
application layer contains components that communicate with the world outside of the individual DSpace
installation, for example the Web user interface and the Open Archives Initiative protocol for metadata
harvesting service.
Each layer only invokes the layer below it; the application layer may not used the storage layer directly, for
example. Each component in the storage and business logic layers has a defined public API. The union of the
APIs of those components are referred to as the Storage API (in the case of the storage layer) and the DSpace
Public API (in the case of the business logic layer). These APIs are in-process Java classes, objects and
methods.
ISBN 1-63102-455-8
143
Dspace: A Dais for Digital Resources
Each layer is described in a separate section:
Storage Layer
RDBMS
Bit stream Store
Business Logic Layer
Core Classes
Content Management API
Workflow System
Administration Toolkit
E-person/Group Manager
Authorization
Handle Manager/Handle Plugin
Search
Browse API
History Recorder
Checksum Checker
Application Layer
Web User Interface
OAI-PMH Data Provider
Item Importer and Exporter
Transferring Items Between DSpace Instances
Registration
METS Tools
Media Filters
Sub-Community Management
WORKFLROW TO CREATE THE IR
The DSpace submission workflow system is a critical part of the DSpace architecture that allows submission,
processing, and final addition of content to the live repository. DSpace’s underlying model includes E-People,
users who have registered with the system and have certain authorizations, roles, rights, and privileges that
translate abilities to complete certain tasks within the DSpace system. A typical submission begins with the
system asking the user a couple of questions about digital document to be added in the repository and number of
files involved in the submission. Then the system guides the user through the different steps, which are:
Step 1: Create a Top level Community
Log in as Administrator on instance of DSpace at My DSpace.
Click on Communities & Collections (just below Browse).
Click on Create Top‐Level Community.
Complete the online form describing the Top‐Level Community and click on Create. The new
Top‐Level Community will be displayed (also referred to as the ‘Edit Community’ page).
Step 2: Create a Sub Community (optional)
144
To create a Sub‐Community, go to the Community home page of the Community that is to be the
parent of the new Sub‐Community.
Then, click on the Create Sub‐community in the Admin Tools box at the top right‐hand corner of the
page. This will create the new Sub‐Community and take us to the home page for that Sub‐Community,
also referred to as the ‘Edit Community’ page for that Sub‐Community.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Editing a Top‐level Community or a Sub‐Community
Fill out the forms as needed. Name is required. All other fields are optional.
Short Description: Appears on the Community List page below the Community name, and should be
one or two sentences of plain text describing the Community.
Introductory Text, Side Bar Text, Copyright Text Fields are displayed on the Community’s home page.
Introductory Text and Side Bar Text are both HTML fields, which means we should place text in <p>
</p>.
Upload Logo: Relatively small logo sizes look best due to the design of the Collection home page.
Click Create or Update when done with changes.
Step 3: Create a Collection
To create a Collection, go to the Community home page of the Community that is to be the parent of
the new Collection.
Then, click on the Create Collection in the Admin Tools box at the top right‐hand corner of the page.
Follow the wizard, and click on Next to move forward each time. [3]
WORKFLOW
STEP DESCRIPTION
Describe
User enters metadata about the document
(s) they are submitting, including but not
limited to author, title, keywords, and a
description.
Upload
The user selects and uploads the files on
their local machine that they like to
upload as part of the submission. Each
file’s type is identified by the system and
the user verifies the file type.
Verify
An overview of all details of the
submission is given including a summary
of the entered metadata and the files
involved in the submission.
License
The user is shown and must agree to the
license the system administrator has
assigned to submit content for this
collection.
Complete
The user’s actions in the submission
process are complete. Based on the
workflow steps set for the collection, the
item may immediately be added to the
collection or have to be reviewed by
system administrators before its addition
to the collection.
BARRIERS OF DSPACE
1. DSpace software is required high level of technical skills personals to function it properly.
ISBN 1-63102-455-8
145
Dspace: A Dais for Digital Resources
2. Institutions do not appoint the IT professionals or experts on regular basis for the library. They just hire them
on part time basis. In this situation, if any problem causes, it leads to delay in routine work of library due to
unavailability of those professionals.
3. Vendors are also not authorized for DSpace software (FOSS) as compared to commercial softwares.
4. Technical terms are written in manuals which are not easily understandable by the normal users.
CONSLUSION
The different organizations and academic institutions have been effort to started addressing a growing and their
needs by DSpace. MIT Libraries has been running DSpace as a live service at MIT for several months, and
several other institutions have successfully installed and started to run DSpace. MIT Libraries remain committed
to maintaining the DSpace service and software.
The DSpace does not currently address all of the issues of long-term preservation and access of digital material
naturally, although it serves as a useful basis for developing and setting up the solutions to those issues. Already,
an open source community is forming around DSpace. This exciting development bodes well for the future
development and impact of DSpace. Additionally, two further pieces of work are already under way to boost up
the DSpace system. This paper has described that Dspac is one of the free, open source and leading software to
build the digital institutional repository. The DSpace is most appropriate software for digital library because of
content acquisition, content management and information searching & retrieving methods. It can potentially
provide value to a great many institutions, and stands to benefit from a large community of developers and
information science professionals.
REFERENECES
[1]
[2]
[3]
[4]
[5]
146
Juli Thakuria, Building An Institutional Repository With DSpace, p102-114 https://atmire.com/DSpacelabs3
/bitstream/handle/123456789/22917/DSpace%20paper.pdf?sequence=1.
https://www.era.lib.ed.ac.uk/bitstream/handle/1842/858/Chapter_1.pdf;jsessionid=A3771D7C2261009F2B227CB49D7
5D84C?sequence=1, The institutional repository in the digital library.
http://wiki.lib.sun.ac.za/images/3/3e/Manual.pdf.
https://wiki.duraspace.org/display/DSPACE/User+FAQ#UserFAQ-WhatisDSpace?.
http://ir.inflibnet.ac.in/bitstream/1944/1747/1/IR%20Using%20DSpace.pdf.
ISBN 1-63102-455-8
ANALYZING OF CLUSTER, GRID & CLOUD COMPUTING
Shweta Agrawal | PhD, Research Scholar | Mewar University | Rajasthan | shweta.airen@gmail.com
Dr. P. C. Agrawal | PhD, Research Supervisor | Mewar University | Rajasthan
Abstract: Cloud computing is rapidly growing as an alternative to conventional computing.
However, it is based on models like cluster computing, distributed computing, utility computing
and grid computing in general. This paper presents an end-to-end comparison between Cluster
Computing, Grid Computing and Cloud Computing, along with the challenges they face. This
could help in better understanding these models and to know how they differ from its related
concepts, all in one go. It also discusses the ongoing projects and different applications that use
these computing models as a platform for execution. An insight into some of the tools which can
be used in the three computing models to design and develop applications is given. This could
help in bringing out the innovative ideas in the field and can be explored to the needs in the
computing world.
Keywords—Cluster Computing, Grid Computing, Cloud Computing, Computing Models, Comparison.
INTRODUCTION
High-performance computing (HPC) was once restricted to institutions that could afford the significantly
expensive and dedicated supercomputers of the time. There was a need for HPC in small scale and at a lower
cost which lead to cluster computing. The emergence of cluster platforms was driven bya number of academic
projects, such as Beowulf [1], Berkeley NOW [2], and HPVM [3]. The popularity of the Internet and the
availability of powerful computers and high - speed network technologies has changed the way computers are
used. Grid computing originated in academia in the mid 1990s with an aim to facilitate users to remotely utilize
idle computing power within other computing centers when the local one is busy [1]. Initially, it only referred to
a compute grid and had a rather limited audience. However, after years of development the grid gained
momentum and came to mean an effective way for coordinated resource sharing and problem solving in
dynamic, multi-institutional virtual organizations. Cloud computing, is a kind of computing model that came
into existence around the end of 2007. It provides a pool of computing resources which the users can access
through Internet. The basic principle of cloud computing is to shift the computing done from the local computer
into the network [4]. This makes the enterprise use the resource which includes network, server, storage,
application, service and so on that is required without huge investment on its purchase, implementation,
maintenance rather use it for other significant purpose. A resource is requested on-demand without any prior
reservation and hence eliminates over-provisioning and improves resource utilization.
To the best of our knowledge, in the literature, only a few comparisons have been appeared in the field of
computing. In this paper we bring out a complete comparison of the three computing models. Rest of the paper
is organized as follows. The cluster computing, grid computing and cloud computing models are briefly
explained in Section II. Issues and challenges related to these computing models are listed in Section III. Section
IV compares these three models from different perspectives. Section V discusses projects and applications.
Tools and simulation environment are part of Section VI. Concluding remarks is presented in Section VII
THREE COMPUTING MODELS
In this section, we briefly explain the three computing models: cluster, grid and cloud.
A. Cluster Computing
For many years supercomputer was the leader in the field of computing. But due to some of the problems faced
in the area of science, engineering, and business, could not be effectively dealt with using supercomputers. They
were replaced with clusters [5] with the aim of overcoming these problems and also offered a very cheap way
for gaining access to potentially huge computing power.
Definition: A cluster is a collection of parallel or distributed computers which are interconnected among them
using high-speed networks, such as gigabit Ethernet, SCI, Myrinet and Infiniband. They work together in the
ISBN 1-63102-455-8
147
National Conference on Library Information Science and Information Technology for Education
execution of compute intensive and data intensive tasks that would be not feasible to execute on a single
computer. Clusters are used mainly for high availability, load-balancing and for compute purpose. They are used
for high availability purpose as they maintain redundant nodes which are used to provide service when system
components fail. The performance of the system is improved here because even if one node fails there is another
standby node which will carry the task and eliminates single points of failure without any hindrance [5]. When
multiple computers are linked together in a cluster, they share computational workload as a single virtual
computer. From the users view point they are multiple machines, but they function as a single virtual machine.
The user’s request are received and distributed among all the standalone computers to form a cluster. This
results in balanced computational work among different machines, improving the performance of the cluster
systems. Often clusters are used mainly for computational purposes, than handling IO-based activities.
B. Grid Computing
Grid computing [6] combines computers from multiple administrative domains to reach a common goal, to
solve a single task, and may then disappear just as quickly. It is analogous to the power grid [7]. One of the
main strategies of grid computing is to use middleware to divide and apportion pieces of a program among
several computers. Grid computing involves computation in a distributed fashion, which may also involve the
aggregation of large-scale cluster computing-based systems. The size of a grid may vary from small a network
of computer workstations within a corporation to large collaborations across many companies and networks.
Some of the definitions on grid computing are given below:
Definition: Buyyaet. al. [7] defined grid as a type of parallel and distributed system that enables the sharing,
selection, and aggregation of geographically distributed autonomous re-sources dynamically at runtime
depending on their availability, capability, performance, cost, and users quality-of-service requirements.
Definition: Ian Foster [8] defined grid as a system that coordinates resources which are not subject to
centralized control, using standard, open, general-purpose protocols and interfaces to deliver nontrivial qualities
of service.
C. Cloud Computing
Cloud computing [9] refers to both the applications delivered as services over the Internet and the hardware and
system software in the data centers that provide those services.
Definition: According to Buyyaet. al. [10] a cloud is a type of parallel and distributed system consisting of a
collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or
more unified computing resources based on service-level agreement. Cloud computing is a model for enabling
ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction [11]. Cloud computing provides basically three kinds of service: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS.)
SaaS is a kind of services where in many users can make use of the software hosted by the service
provider and pay only for time its being used. It will be better than buying the hardware and software as
keeps off the burden of updating the software to the latest version, licensing and is of course more
economical. Some example service providers are Sales force, Customer Relationships Management
(CRM) system and Google Apps.
PaaS provides a high-level integrated environment to de-sign, build, test, deploy and update online
custom applications. Some example service providers are Google’s App Engine, Microsoft Azure,Right
Scale and Sales Force.
IaaS refers to the services provided to the users to use processing power, storage, network and other
computing resources, to run any software including operating systems and applications. Some of the
IaaS providers are AWS, Eucalyptus, Open Stack, Go Grid and Flexi scale.
CHALLENGES IN CLUSTER, GRID AND CLOUD COMPUTING
Every computing model has similar or unique challenges, needs to convert challenges into opportunities and
148
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
has scope for further research. In this section, we highlight some of the challenges of the three computing
models considered.
A. Challenges in the Cluster Computing
The research challenges of cluster computing are as follows:
1) Middleware: To produce software environments that pro-vides an illusion of a single system image,
rather than a collection of independent computers.
2) Program: The applications that run on the clusters must be explicitly written which incorporates the
division of tasks between nodes; also the communication between them should be taken care of.
3) Elasticity: The variance in real-time response time when the number of service requests changes
dramatically.
4) Scalability: To meet the additional requirements of a resource thus effecting the performance of the
system.
B. Challenges in grid computing
The research challenges faced in grids include:
1) Dynamicity: Resources in grid are owned and managed by more than one organization which may enter
and leave the grid at any time causing burden on the grid.
2) Administration: To form a unified resource pool, a heavy system administration burden is raised along
with other maintenance work to coordinate local administration policies with global ones.
3) Development: Problems are concerned with ways of writing software to run on grid-computing
platforms, which includes decomposing and distributing to processing elements, and then assembling
solutions.
4) Accounting: Finding ways to support different accounting infrastructure, economic model and application
models that can cope well with tasks that communicate frequently and are interdependent.
5) Heterogeneity: Finding ways to create a wide area data intensive programming and scheduling
framework in heterogeneous set of resources.
6) Programming: The low-coupling between nodes and the distributed nature of processing make the
programming of applications over grids more complex.
C . Challenges in the cloud computing
The challenges of cloud computing includes the following:
1) Dynamic scalability: The compute nodes are scaled up and down dynamically by the application
according to the response time of the user’s queries. The scheduling delays involved are real concern
which leads to the need of effective and dynamic load management system.
2) Multi-tenancy: When the number of applications running on the same compute node increases, it will
reduce the amount of bandwidth allocated to each application which may lead to performance
degradation.
3) Querying and access: Scalable provenance querying and secure access of provenance information are
open problems for both grid and cloud environment.
4) Standardization: As every organization has their own APIs and protocols used which makes the user data
or vendor lock-in. Thus integration and interoperability of all the services and application is a challenge.
5) Reliability and fault-tolerance: Tools for testing the application against fault tolerance and compute
failures are required which help in developing a reliable system.
6) Debugging and profiling: Parallel and remote debugging has always been a problem for developing HPC
programs and is an issue in cloud computing also.
7) Security and Privacy: The user has no idea where data is stored and who will use it as there are more
hackers than developers.
8) Power: Though cloud computing offers many type of services finally to meet the needs of users,
enormous amount of power is consumed. An autonomic energy aware resource management is very much
required.
ISBN 1-63102-455-8
149
National Conference on Library Information Science and Information Technology for Education
COMPARISON OF CLUSTER, GRID AND CLOUD COMPUTING
Viewed in a broad sense, the concepts of cluster, grid and cloud computing seems to have similar features. This
section puts light to differentiate in different perspectives and give an end-to-end comparison. It could be
understood easily when represented in a tabular form as given in table I.
Clusters
Grids
Clouds
SLA
Limited
Yes
Yes
Allocation
Centralized
Decentralized
Both
Resource Handling
Centralized
Distributed
Both
Loose coupling
No
Both
Yes
Protocols/API
MPI,
MPI,MPICH-G,
TCP/IP,SOAP,
Parallel Virtual
GIS,GRAM
REST,AJAX
Reliability
No
Half
Full
Security
Yes
Half
No
User friendliness
No
half
Yes
Virtualization
Half
Half
Yes
Interoperability
Yes
Yes
Half
Standardized
Yes
Yes
No
Business Model
No
No
Yes
Task Size
Single large
Single large
Small & medium
SOA
No
Yes
Yes
Multitenancy
No
Yes
Yes
System Performance
Improves
Improves
Improves
Self service
No
Yes
Yes
Computation service
Computing
Max. Computing
On demand
Heterogeneity
No
Yes
Yes
Scalable
No
Half
Yes
Inexpensive
No
No
Yes
Data Locality Exploited
No
No
Yes
Application
HPC,HTC
HPC, HTC, Batch
SME interactive apps.
Switching cost
Low
Low
High
Value Added Services
No
Half
Yes
Table-1: Comparison of Cluster, Grid and Cloud Computing
PROJECTS AND APPLICATIONS IN CLUSTER, GRID AND CLOUD COMPUTING
In this section, we present some of the projects and applications in cluster, grid and cloud computing.
A. Cluster computing projects and applications
Some of the projects in the field of cluster computing are:
1) Condor [12]: It is a multifaceted project engaged in five primary activities.
a) Research in distributed computing.
b) Participation in the scientific community.
c) Engineering of complex software.
d) Maintenance of production environments.
e) Education of students.
2) ShaRCS (Shared Research Computing Services) [13]: This pilot project has been designed to
define, demonstrate and measure how shared computing and storage clusters residing in
regional data centers can provide computing services to investigators.
Some of the applications in the field of cluster computing are:
1) The Weather Research and Forecast (WRF) is a collaborative project by several institutions to develop a
150
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
next-generation regional forecast model and data assimilation system for operational numerical weather
prediction and atmospheric research.
2) Hadoop [14] is an open-source framework for running data-intensive applications in a processing cluster
built from commodity server hardware. Some customers use Hadoop clustering to analyze customer
search patterns for targeted advertising. Other applications include filtering and indexing of web listings,
facial recognition algorithms to search for images in a large database.
3) Clusters were also used for solving grand challenging applications such as weather modeling, automobile
crash simulations, life sciences, computational fluid dynamics, nuclear simulations, image processing,
electromagnetic, data mining, aerodynamics and astrophysics. Clusters were used as a platform for data
mining applications which involve both compute and data intensive operations. They are also used for
commercial applications like in banking sector to have achieved high availability and for backup. Clusters
are used to host many new Internet service sites like Hotmail, web applications, database, and other
commercial applications.
B. Grid Projects and applications
Some of the projects in grid computing are briefed here
1) Globus[15][16]: It is an open source grid software that addresses most challenging problems in distributed
resource sharing. The first release of Globus Demo Grid [17], a tool that will build an instructional grid
environment that can be deployed using virtual machines on a cloud or on physical resources. The main
goal of Demo Grid is to provide easy access to an environment with various grid tools, without having to
install the tools themselves or needing an account on an existing grid.
2) EGI-InSPIRE[18] project (Integrated Sustainable Pan-European Infrastructure for Researchers in Europe):
Started in 2010, co-funded by the European Commission for four years, as a collaborative effort involving
more than 50 institutions in over 40 countries. Its mission is to establish a sustainable European Grid
Infrastructure (EGI) to join together the new Distributed Computing Infrastructures (DCIs) such as clouds,
supercomputing networks and desktop grids, for the benefit of user communities within the European
Research Area. The ultimate goal of EGI-InSPIRE is to provide European scientists and their international
partners with a sustain-able, reliable Infrastructure that can support their needs for large-scale data
analysis.
3) Some other grid projects are the NSFs National Technology Grid, NASAs Information Power Grid ,
GriPhyN, NEESgrid, Particle Physics Data Grid and the European Data Grid.
Some of the applications in grid computing are briefed here
The grid applications range from advanced manufacturing, numerical wind tunnel, oil reservoir simulation,
particle physics research, High Energy Nuclear Physics (HENP), weather modeling, bio-informatics, terrain
analysis of nature observation, scientific database, and popular science web services.
1) MammoGrid [19]: It is a service-oriented architecture based medical grid application. The aim is to
deliver a set of evolutionary prototypes to demonstrate the mammogram analysts, specialist radiologists
working in breast cancer screening who can use the grid information infrastructure to resolve common
image analysis problems.
2) DDGrid (Drug Discovery Grid) [20]: This project aims to build a collaboration platform for drug
discovery using the state-of-the-art P2P and grid computing technology.
This project intends to solve large-scale computation and data intensive scientific applications in the field of
medicine chemistry and molecular biology with the help of grid middleware. Over 10 6 compounds database
with 3-D structure and physiochemical properties are also provided to identify potential drug candidates
C. Cloud Projects and Applications
Some of the initiative projects in the area of cloud computing are briefly presented below:
ISBN 1-63102-455-8
151
National Conference on Library Information Science and Information Technology for Education
1) CERN: The European organization for Nuclear Research is developing a mega computing cloud to
distribute data to scientists around the world as part of the LHC project.
2) Unified Cloud Interface (UCI): This project is proposed by the Cloud Computing Interoperability
Forum (CCIF) working on the development of standard APIs which can be used by all cloud service
providers to overcome the interoperability issues.
3) Cloud-Enabled Space Weather Platform (CESWP): The purpose is to bring the power and flexibility of
cloud computing to space weather physicists. The goal is to lower the barriers for the physicists to
conduct their science, i.e., to make it easier to collaborate with other scientists, develop space weather
models, run simulations, produce visualizations and enable provenance.
4) Open Nebula: This project is successful with the release of the most advanced and flexible enterpriseready cloud management tool, and the growth of an active open-source community. They aim to
develop the most-advanced, highly-scalable and adaptable software toolkit for cloud computing
management. They plan for operation network to simplify the management of Open Nebula cloud
instances, fault tolerance functionality to maximize uptime in the cloud, enhanced management of
images and templates, new security functionality, enhanced sup-port for federation of data centers and
support for multi-tier architectures.
5) TClouds [21] : The goal of the project is to proto type an advanced cloud infrastructure that can deliver a
new level of secure, private and resilient computing and storage that is cost-efficient, simple and
scalable. To achieve security, resiliency and scalability needed when outsourcing critical IT-systems to a
cloud; scientists will build an advanced Cloud of Clouds framework for the project. This framework
provides multiple back-ups of the TClouds data and applications in case of a hardware failure or
intrusion.
Some of the applications that can be deployed on cloud include web hosting, media hosting, multi-tenant
service, HPC, distributed storage, multi-enterprise integration, etc.
1) With the expansion of cloud computing and establishing a pubic cloud among many University libraries, it
can conserve library resources and improve its user satisfaction. Although there are OPAC (Online Public
Access Catalog) and ILL (Inter-library loan) services, access to the shared resources through an uniform
access platform is difficult which can be made possible with the adoption of cloud computing in such
libraries [22] [23].
2) RoboEarthis a European project led by the Eindhoven University of Technology, Netherlands, to develop
a WWW for robots, a giant database where robots can share information about objects, environments, and
tasks. Researchers at ASORO (A-Star Social Robotics Laboratory, Singapore) have built a cloudcomputing infrastructure that allows robots to generate 3-D maps of their environments much faster than
they could with their onboard computers [25].
3) Cloudo, a free computer that lives on the Internet, right in the web browser. It allows accessing
documents, photos, music, movies and all other files from any computer or mobile phone.
4) Panda Cloud antivirus [26], the first free antivirus from the cloud. Regular updates are not a problem and
it occupies very little system resources, uses collective intelligence servers for fast detection, simple
interface and protects PC offline.
TOOLS AND SIMULATION ENVIRONMENT
In this section, we highlight some of the tools and simulators that can be used to develop applications on the
three computing models.
A. Tools for cluster computing
Nimrod [27] is a tool for parametric computing on clusters and it provides a simple declarative parametric
modeling language for expressing a parametric experiment. By using this it can be easy to create a plan for a
parametric computing and use the Nimrod runtime system to submit, run, and collect the results from multiple
cluster nodes.
1) PARMON [28] is a tool that allows the monitoring of system resource and their activities at three different
152
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
levels: system, node and component. It is used to monitor C-DAC PARAM 10000 supercomputer, a
cluster of 48 Ultra-4 workstations powered by Solaris.
2) Condor [12][29] is a specialized job and resource management system for compute intensive jobs. It
provides a job management mechanism, scheduling policy, priority scheme, and resource monitoring and
management. Users submit their jobs, tool chooses when and where to run them based upon a policy,
monitors their progress, and ultimately informs the user upon completion.
3) MPI and OpenMP[30]: Message passing libraries pro-vide a high-level means of passing data between
process executing on distributed memory systems. They help to achieve high performance out of
collections of individual cluster nodes. MPI I is the de facto standard for parallel programming on clusters
which consists of a rich set of library functions to do both point-to-point and collective communication
among parallel tasks.
4) Other cluster simulators include Flexi-Cluster a simulator for a single compute cluster, VERITAS a cluster
server simulator, etc.
The tools used in the field of grid computing for resource discovery, management and performance analysis are:
1) Paradyn, a performance analysis tool supports performance experiment management through techniques
for quantitatively comparing several experiments and performance diagnosis based on dynamic
instrumentation. Experiments have to be set up manually, whereas performance analysis is done
automatically.
2) Nimrod-G [27] uses the Globus middleware services for dynamic resource discovery and dispatching jobs
over computational grids. It allows scientists and engineers to model parametric experiments and
transparently stage the data and program at remote sites, run the program on each element of a data set on
different machines and finally gathers results from remote sites to the user site.
3) Condor-G [12] represents the work of Globus and Condor projects which enables the utilization of large
collections of resources that span across multiple domains as if they all belonged to the user’s personal
domain.
From Globus comes the use of protocols for secure inter domain communications and standardized access
to remote batch systems. From Condor comes the concern of job submission, job allocation, error
recovery, and creation of a friendly execution environment.
4) Globus, an open source software toolkit that facilitates construction of computational grids and grid based
applications, across corporate, institutional and geographic boundaries.
5) Gridbus(GRID computing and Business) [31] toolkit project is associated with the design and
development of cluster and grid middleware technologies for service-oriented computing. It provides endto-end services to aggregate or lease services of distributed resources de-pending on their availability,
capability, performance, cost, and QoS requirements.
6) Legion [32] is an object-based meta-system that supports transparent core scheduling, data management,
fault tolerance, site autonomy, and a middleware with a wide range of security options.
7) Other simulators used in grid computing include Grid-sim [40], ZENTURIO, Optorsim, Chicsim, etc.
B. Tools used in Cloud Computing
Various tools and products which provide assistance in development applications on cloud computing are:
1) Zenossa single, integrated product that monitors the en-tire IT infrastructure, wherever it is deployed
(physical, virtual, or in cloud). It manages the networks, servers, virtual devices, storage, and cloud
deployments.
2) Spring Roois a next generation rapid application development tool, combined with the power of Google
Web Toolkit (GWT) that enables developers to build rich browser apps in enterprise production
environments.
3) CloudSimandCloudAnalystare important for developers to evaluate the requirements of large scale cloud
applications in terms of geographic distribution of both.
4) Cloudera[41], an open-source Hadoop software frame-work is increasingly used in cloud computing
deployments due to its flexibility with cluster-based, data-intensive queries and other tasks. It allows
ISBN 1-63102-455-8
153
National Conference on Library Information Science and Information Technology for Education
exploring complex, non-relational data in its native form.
CONCLUSION
In this paper, we have presented a detailed comparison on the three computing models, cluster, grid and cloud
computing. The issues and challenges related to these computing models are highlighted. The projects and
applications in various fields are briefly discussed. Also the tools and simulation environments useful for
development of applications are highlighted. Such a comparison in different perspectives will make easy to
understand the computing models since the features of these computing models seems to be similar
conceptually. It also helps in identifying the similarities and differences from each other. Grid and cloud
computing appears to be a promising model especially focusing on standardizing APIs, security,
interoperability, new business models, and dynamic pricing systems for complex services. Hence there is a
scope for further research in these areas.
REFERENCES
[1] Beowulf, http://www.beowulf.org
[2] High Performance Virtual Machine, http://www-csag.ucsd.edu/projects/hpvm.html.
[3] T. Anderson, D. Culler, and D. Patterson, “A Case for Network of Workstations”, IEEE Micro, 15(1), pp. 54-64,
1995.
[4] I. Foster, C. Kesselman, S. Tuecke, “The Grid: Blueprint for a New Com-puting Infrastructure”, Intl. Jr. of
Supercomputer Applications, 15(3), 2001.
[5] “Cluster Computing”, http://en.wikipedia.org/wiki/Cluster computing.
[6] K. Krauter, R. Buyya, and M. Maheswaran, “A Taxonomy and Survey of Grid Resource Management Systems for
Distributed Computing”, Jr.of Software Practice and Experience, 32,(2), pp. 135-164, 2002.
[7] M.Chetty and R. Buyya, “Weaving Computational Grids: How Anal-ogous Are They with Electrical
Grids?”,Computing in Science andEngineering (CiSE),4, pp. 61-71, 2002.
[8] I. Foster, “What is the Grid? A Three Point Checklist”, 2002.
[9] M. Armburst et al., “Above the Clouds: A Berkeley View of Cloud Computing”, Tech. report, Univ. of California,
Berkeley, 2009.
[10] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision,
hype, and reality for de-livering computing as the 5th utility, Future Gener”, Computer Systems, 25(6), pp. 599-616,
2009.
[11] NIST, http://csrc.nist.gov/groups/SNS/cloud-computing/.
[12] “Condor toolkit”, http://www.cs.wisc.edu/condor/condorg.
[13] “ShaRCS”, http://srcs.ucop.edu/pilot.php.
[14] “Hadoop”, http://hadoop.apache.org.
[15] “Globus”, http://www.globus.org/ogsa/.
[16] Ian Foster and C. Kesselman, “Globus: A Metacomputing Infrastructure Toolkit”, Intl. Jr. of Supercomputer
Applications, 11(2), 1997.
[17] “Globus project”, http://www.globus.org/demogrid/.
[18] “EGI-InSPIRE”, http://www.egi.eu/projects/egi-inspire/.
[19] “MammoGrid”, http://mammogrid.vitamib.com.
[20] “DDGrid”, http://www.ddgrid.ac.cn.
[21] “Cloud Security Alliance (CSA)”, http://www.cloudsecurityalliance.org/trustedcloud.html.
[22] Fan Bingsi, “Cloud Computing and Libraries: Defense for Research on the Cloud Computing”, Jr. of Library and
Information Service, 21, 2009.
[23] FengXiaona, BaoLingyun, “Application of Cloud Computing”, 3rd Intl.Conf. on Advanced Computer Theory and
Engineering (ICACTE), 2010.
[24] Aiwu Shi, Youfu Xia and Haiyan Zhan, “Applying Cloud Computing in Financial Service Industry”, Intl. Conf. on
Intelligent Control andInformation Processing, 2010.
[25] EricoGuizzo, “Robots with their heads in the cloud”, IEEE Spectrum, 2011.
[26] “Panda Cloud”, www.cloudantivirus.com/
[27] R. Buyya, D. Abramson and J. Giddy, “Nimrod/G: An Architecture for a Resource Management and Scheduling
System in a Global Computa-tional Grid”, IEEE Intl. Conf. on High Performance Computing (HPCASIA) 2000.
[28] “PARMON”, http://www.cloudbus.org/course/parmon.php.
[29] D. Thain, T. Tannenbaum, and M. Livny, “Distributed computing in, practice: The Condor Experience”,
Concurrency and Computation: Prac-tice and Experience, 17, pp. 323-356, 2005.
[30] N. Karonis, B. Toonen, and I. Foster, “MPICH-G2: A Grid-Enabled Implementation of the Message Passing
Interface”, Jr. of Parallel andDistributed Computing,63, pp.551-563, 2003.
[31] “Gridbus toolkit”, http://www.gridbus.org.
[32] “Legion toolkit”, http://www.legion.virginia.edu.
[33] R. Prodan, T. Fahringer, “On Using ZENTURIO for Performance and Parameter Studies on Cluster and Grid
Architectures”, Proc. of the 11thEuromicro Conf. on Parallel, Distributed and Network-Based Processing (EuroPDP’03), 2003.
[34] F. Berman, A. Hey and G. Fox, “Grid Computing: Making the Global Infrastructure a Reality”, John Wiley and Sons,
2003.
[35] RaduProdan and Thomas Fahringer, “ZENTURIO: An Experiment Management System for Cluster and Grid
154
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Computing”, Proc. of the IEEEIntl. Conf. on Cluster Computing (CLUSTER’02).
[36] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud
definition”, SIGCOMM Computer Comm.Review, 39(1), pp. 50-55, 2009.
[37] Luis M. V., Luis R-M, R. Buyya, “Dynamically Scaling Applications in the Cloud”, ACM SIGCOMM Comp.
Comm. Review, 41(1), 2011.
[38] I. Foster, Y. Zhao, I. Raicu and S. Lu, “Cloud Computing and Grid Computing 360-Degree Compared”, Proc.
IEEE Grid Computing Envi-ronments Workshop, pp. 1-10, 2008.
[39] Yi Wei and M. Brian Blake, “Service-Oriented Computing and Cloud Computing Challenges and Opportunities”,
IEEE Comp. Society, 2010.
[40] R. Buyya and M. Murshed, “GridSim: A Toolkit for Modeling and Simulation of Distributed Resource”,
Concurrency and Computation:Practice and Experiance, 14, pp. 1175-1220, 2002.
[41] “Cloudera”, http://www.cloudera.com.
[42] Won Kim. “Cloud Computing: Today and Tomorrow”, Jr. of ObjectTechnology, 8(1), 2009.
[43] M. J. Chin, S. Harvey, S. Jha, and P. V. Coveney, “Scientific Grid Com-puting: The First Generation”, Computing
in Science and Engineering, 7, pp. 24-32, 2005.
[44] Vecchiola, M. Kirley, and R. Buyya, “Multi-Objective problem solving with Offspring on Enterprise Clouds”, Proc.
10th Intl. Conf. on HighPerformance Computing (HPC Asia’09), 2009.
[45] R. Buyya (Ed.), “High Performance Cluster Computing: Architectures and Systems”, 1, 1999.
[46] B. Allcock, et. al. “Data Management and Transfer in High Performance Computational Grid Environments”,
Parallel Computing Jr., 28(5), pp. 749-771, 2002.
[47] I. Foster and C. Kesselman, “Globus: A Metacomputing Infrastructure Toolkit”, Intl. Jr. Supercomputer Applications,
11(2), pp.115-128, 1997.
[48] I. Foster, C. Kesselman and S. Tuecke, “The anatomy of the Grid: Enabling Scalable Virtual Organization”, Intl. Jr.
of High PerformanceComputing Applications, 15(3), pp. 200-222, 2001.
[49] Y. Zhao, I. Raicu, I. Foster, “Scientific Workflow Systems for 21st Century, New Bottle or New Wine?”,IEEE
Workshop on ScientificWorkflows, 2008.
[50] Q. Chen and Q. N. Deng, “Cloud Computing and its Key Techniques”, Jr. of Computer Applications, 4, pp. 25-62,
2009.
ISBN 1-63102-455-8
155
INFORMATION LITERACY IN INDIA: ENHANCING
SERVICES TO THE RESEARCH COMMUNITY IN THE
DIGITAL ENVIRONMENT
Rajeev Mishra | Research Scholar | School of Library and Information Science | Galgotias University, Greater
Noida | Gautam Budh Nagar | Uttar Pradesh | rajeev.mishra2008@gmail.com
Dr. Ashok Kumar Upadhyay | Assistant Librarian | Galgotias University | Greater Noida | Gautam Budh Nagar
| Uttar Pradesh | ashok.upadhyay@galgotiasuniversity.edu.in
Abstract: The rapid use of Information Communication Technologies has changed the way of
information generation, organization, storage, retrieval and dissemination. The libraries are nowa-days more concerned with identifying the increasing information needs of its users and provide
them the latest information resources to meet analyze, evaluate, synthesize, and communicate the
resulting knowledge. The purpose of this paper is to outline the development of these digital
resources and how the resources have been shares, reused and repurposed to enhance IL
progression. The information professionals need to possess the right skills in appropriate areas,
as well as having a wide range of knowledge of various sources of information and teaching skills.
Keywords: Information Literacy, Digital Information Literacy, Information Literacy Programme,
INTRODUCTION
Information Literacy is a survival skill in the information age. Instead of drowning in the abundance of
information that floods their lives, information-literate people know how to find evaluate, and use information
effectively to solve a particular problem or make a decision, whether the information they select comes from a
computer, a book, a government agency or any of a number of other possible resources. Information users may
be bewildered by a variety of digitized information. The process of identifying and selecting information has
become complex. It is critical to promote Information Literacy (IL) in the digital age. Librarianship in the
present digital age is not restrained to the documents rather; the profession has now amalgamated to
multifarious, subfields. Advancement of technologies and its application in library services, multifarious,
multidimensional needs of the users due to inter-disciplinary research are some of the factors which are
responsible for the librarian to accept and adapt to the changing situations causing thereby, change in library
profession. In the developing scenario, the dimension of the profession has been extended to content developer,
knowledge creator, content manager, etc. Information Literacy happens to be one of the important sub-fields of
librarianship that has now been recognized as an independent and indispensable field of librarianship. Librarians
justify information literacy as increasing democratic participation by all users. Has Library and Information
Science professionals has developed and redesigned the user education program. Various issues involved haves
been presented in this paper in order to clarify the concept of information literacy. It’s not important only the
competency of information but the skill of tools for handling information is also more significant. However, the
competency of information technology cannot help user access to information successfully without the
knowledge of information. In this situation the users must understand both the information itself and technology
as tools for accessing information.
DEFINITIONS
To be information literate, a person must be able to recognize when information is needed and have the ability
to locate, evaluate, and use effectively the needed information. (American Library Association)
Information literacy is knowing when and why you need information, where to find it, and how to evaluate, use
and communicate it in an ethical manner. (CILIP)
156
ISBN 1-63102-455-8
Information Literacy In India: Enhancing Services To The Research Community In The Digital Environment
LITERATURE REVIEW
Foster, M. (2015) Stated that in the study appeared to show that Information Literacy for users are always an
experience of contextual knowledge creation, of the development of the knowledge and knowledge based
decision-making abilities that users need in the specific contexts of their practices.
Buehler, Marianne A. (2013) suggest that Information Literacy can be understood on multiple levels, that is as
a knowledge/competency domain and as an educational process expressive of the library’s educational ambition.
The strategies and structures used to build information literacy into curricula and student learning experiences
are as important a focus as the content itself.
Helen Foster (2003) study focuses on the embedded tasks of information retrieval and how instructors can
use reflection, pre-selected sources, and internet-connected classrooms to support teaching these tasks.
DIMENSIONS OF INFORMATION LITERACY
Information Literacy is a comprehensive and never ending life long process. It has a wide range of fields which
can be summarized as follows:
Media Literacy: It is the ability to decode, analyze, evaluate, and produce communication in a variety of forms.
Network Literacy: It is the ability to manage, connect and organize to assess, evaluate and get information in a
right manner.
Web Literacy: Web literacy is a subset of information literacy requires the ability to access, search, utilize,
communicate and create information on the World Wide Web.
Digital Literacy: It is the ability to assess, collect, organize, evaluate of digital resources and services in an
effective manner.
Visual Literacy: Visual literacy as a set of competencies that enable a visually literate to thinking, learning, and
expressing oneself in terms of image. Photographs, cartoons, line drawing, diagrams, concept maps, and other
visual representations are all important in visual literacy.
Scientific Literacy: Scientific literacy is the knowledge and understanding of scientific concepts and processes
which are required for personal decision making, participation in civic and cultural affairs, and economic
productivity.
Critical Literacy: It is the ability to evaluate critically the human, intellectual and social strengths, benefits and
costs of information technology.
INFORMATION LITERACY PROGRAMMES INITIATIVES IN INDIA
Some noteworthy Library networks and higher learning institutions are conducting information literacy
programmes in India are:
A. Information literacy programmes by the Library Networks and Documentation Centres
DELNET was started at the India International Centre Library in January 1988 and was registered as a society in
1992. It was initially supported by the National Information System for Science and Technology (NISSAT),
Department of Scientific and Industrial Research, Government of India. It was subsequently supported by the
National Informatics Centre, Department of Information Technology, Ministry of Communications and
Information Technology, Government of India and the Ministry of Culture, Government of India. DELNET is
organising several orientation programme across the country to develop professional skills in the field of Library
Science. The National Convention on Knowledge, Library and Information Networking (NACLIN) is also
organised by the DELNET every year collaboration with different institutions.
Information and Library Network (INFLIBNET) has taken number of steps so as to update the knowledge of
LIS professionals and for keeping them abreast with new information technology. The Centre provides proactive
ISBN 1-63102-455-8
157
Information Literacy In India: Enhancing Services To The Research Community In The Digital Environment
help in automating libraries in the country through INFLIBNET Regional Training Programme on Library
Automation (IRTPLA).
The major activities of the Centre include development of software for automating libraries, development of
web-based union database of the library resources, promoting library automation, creation of ICT infrastructure
in the universities through UGC-Infonet programme, facilitate access to e-resources to universities and colleges,
promotion of usage of e-resources by developing online search aids and tutorials. As such, the Centre has a lot
to offer to personnels working in libraries and educational institutions.
National Informatics Centre (NIC) is a premier science and technology institution of the Government of India,
established in 1976. NIC has taken serious view to setup a Libraries Network to bring all the libraries under an
umbrella. NIC is keen to extend ICT support to these libraries, especially the ministries, departments and Public
Libraries in India. NIC is organising short-term training, conferences and seminars for library professionals time
to time on various topics.
National Social Science Documentation Centre (NASSDOC), a constituent unit of the Indian Council of Social
Science Research (ICSSR) was established in the year 1970, to provide library and information support services
to social science researchers. NASSDOC is organising short term training workshops for over 30 years for
information professionals, researchers and others working in academia in social science sector. The training
workshops as easy way to refine the information locating skills of the users.
National Information on Science Communication and Research (NISCAIR) formerly known as India National
Science Documentation Centre (INSDOC) is organises and oversees the activities related to the Associateship in
Information Science (AIS) programme which is a two year advances Master’s degree level academic course in
information science & documentation. In addition, the Education and Training Division (ETD) conduct various
short-term courses and attachment training programmes in various areas of information technology and
computer applications of library and information science.
Documentation Research and Training Centre (DRTC) was established in January 1962. DRTC grown into a
centre of higher learning, today the centre is organising workshops, Conferences, training programmes for
research and development of libraries. DRTC has taken number of steps so as to update the knowledge of LIS
professionals and for keeping them with new information technology.
B. Information literacy programmes by the some Higher Learning Institutions
University Libraries in India are also offering several information literacy programmes. Sayaji Rao Gaekwad
Central Library of Banaras Hindu University has started the information literacy program, as scheduled every
year on the occasion of new session, to aware the students, research scholars and teachers about the e-resources
made available through the Central Library since 1st September, 2014. In the first phase of this programme,
more than 500 students and research scholars of Institute of Agricultural sciences has trained with the help of
computer and multimedia instructions. The Central Library provides more than 1 lakh e-books, approximately
13 thousand e-journals and about 10 databases on various subjects by notable publishers like sage, Springer,
Nature, web of Knowledge etc for advocacy and research. Information Literacy Program is scheduled every year
by Central Library in different subjects to enhance the usefulness of available knowledge.
Delhi University Library System (DULS) has huge print collections, DULS also subscribes to a valuable
number of databases. Besides, DULS is regularly researching on open access initiatives to reap the full benefit
of Public Domain Electronic Resources. In, addition to with a view to educate the users and enhance their
capabilities about electronic and make them competent for retrieving precise and relevant through Internet,
DULS has offered regular Information Literacy Programme since 2006. In continuation DULS has recently
organised a two-days Training The Trainers: Workshop on Information Literacy and Competency for University
and College Library Professionals. The aim is to train the library and information professionals for onward
transmission of the skills to end user.
Jawaharlal Nehru University, Central Library, is a knowledge hub for JNU research community. Library
provides comprehensive access to books, journals, theses and dissertations, reports, newspaper clippings to the
158
ISBN 1-63102-455-8
Information Literacy In India: Enhancing Services To The Research Community In The Digital Environment
users. As the part of Information Literacy Programme, the Central Library has organised number of lectures for
faculty, researchers and students in collaboration with various academic institutions, publishers and database
producers in JNU.
Jamia Milia Islamia Universty Library has been organizing a Information literacy programme for the fresher and
trained them for digital resource i.e. e-journals and other in-house digitized e-resources. The Library is also
provides support to visually impaired students through assistive technology.
Jamia Hamdard University Library is offered Library orientation programme for the students and research
scholars and introduce them to the online journals and database subscribed by the library through the UGC
Infonet Digital Library Consortia.
Guru Govind Singh Indraprastha University Library has separate University Information Resource Centre
(UIRC). The centre has number of e-journals, e-books, databases for the users for their teaching, study and
research activities. UIRC is also organised orientation programme for the new users in the Library.
Indian Institute of Technology, Delhi central library is organising every year orientation and information literacy
programme for U.G., P.G. students and research scholars for the library e-resources and services.
Delhi technological University Library has rich collections of more than 123000 books and a large numbers of
foreign and Indian journals to facilitate the ongoing research activities and to expand the areas of future research
activities. The Library has prepared a manual for exposing the library activities to the new users. This manual is
provided at the time of enrolment as member of the library. This is also available on the digital library for
reference. Library organises information Literacy programmes under the title “explore the library” for the users.
SUGGESTIONS TO ACHIEVE INFORMATION LITERACY:
1.
2.
3.
4.
5.
6.
7.
Digital libraries need to be open access with flexible boundaries and effective services.
Access to information as a basic right.
There is a need of proper guidance, training and assistance on use of Internet, followed by Computer
training, use of print and electronic resources and databases.
Workshop on fair use and plagiarism needs to be organised regular basis.
A uniform policy of ILP should have for all institutions.
All Institutions should have well stocked, active libraries equipped with ICT.
All higher education institutions and documentation centres unify and undertake a ILP and make it
compulsory for all users whether undergraduates, postgraduates, and research scholars.
CONCLUSION
Library and Information centres have a important role to collect organize and manage information for the users.
It is not only helps to empower the user but also act as lifelong learning for capacity building. Library &
Information science professionals has crucial role to organise scattered and unorganised information to provide
the refined and tailored made information to the research scholars. The distance between user and librarian
should be bridged so that user can feel free to clear his doubts to enrich his knowledge. Information literacy is
very essential to promote maximum utilization of information resources. Therefore, ongoing information
literacy both the Libraries and Documentation Centres have become indispensable so as to coup with the
emerging changing situations.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Barefoot, Betsy. Bridging the Chasm: First-Year Students and the Library. Chronicle of Higher Education 52
(2006).
Brodsky, Karen. Information Competence in the Freshman Seminar. Academic Exchange (2002): 46-51.
Buehler, Marianne A. At the Nexus of scholarly communication and Information Literacy, 2013 pages 215.235.
Fitzgerald, Mary Ann. Making the Leap from High School to College. Knowledge Quest. 32 (2004): 19-24.
Foster, M. Journal of Information Literacy, Vol. 9 (1), June, 2015. Pages 62-73.
Anderson, K., and May, F.A., 2010. Does the method of instruction matter? an experimental examination of
information literacy instruction in the online, blended, and face-to-face Classrooms. The Journal of Academic
Librarianship, 36 (6), pp.495-500.
http://delnet.nic.in/index.htm (Accessed on 21.07.2015)
ISBN 1-63102-455-8
159
Information Literacy In India: Enhancing Services To The Research Community In The Digital Environment
[8]
[9]
[10]
[11]
[12]
[13]
160
http://www.cilip.org.uk/ (Accessed on 17.07.2015)
http://www.du.ac.in/du/ (Accessed on 14.07.2015)
http://jmi.ac.in/ (Accessed on 14.07.2015)
http://www.jnu.ac.in/library/ (Accessed on 14.07.2015)
http://www.dce.edu/ (Accessed on 13.07.2015)
http://www.ipu.ac.in/urc/digital.htm (Accessed on 13.07.2015)
ISBN 1-63102-455-8
INFORMATION LITERACY KNOWLEDGE MANAGEMENT
Bhupender Kumar | Assistant Librarian | Ashoka University | Haryana | bhupen_20@rediffmail.com
Anil Kumar Singh | Assistant Librarian | Central Library | Amity University | NOIDA | aksingh5@amity.edu
Abstract: With liberalization, privatization and globalization the entire human activities has been
changed drastically. With the development of science, infrastructure, techniques, new issues and
problems also emerged. It was the time when the concept of ‘Knowledge Management’ was also
developed. In such a changing scenario Knowledge Management works as a tool, which helps in
managing the vast flow of information and knowledge not only in libraries but in all type of
organizations. It increases the efficiency and effectiveness of the organization and improves the
quality of services, which result in satisfaction of both, service providers and service receivers.
The paper deals with the Knowledge Management, which is very important for libraries and all
other type of organizations.
KEY WORDS: Knowledge, Knowledge Management (KM), Information Management (IM), Libraries,
Knowledge Creation (KC), Knowledge Capturing and Acquisition (KCA), Knowledge Analysis (KA).
INTRODUCTION
Knowledge Management (KM) is a very broad area. It is the collection of process that governs the creation,
dissemination and utilization of knowledge information. But, what is the importance and benefits of KM? What
role does it play in today’s information age? Infect, these process exit whether we acknowledge them or not. It
has a profound effect on the decisions we make and the actions we take. Both of these, decisions and actions are
enabled by some type of knowledge. If this is the case, and we agree that many of our decision and action have
profound and long lasting effects, it makes sense to recognize and understand the processes that effect our
decisions or actions. It also calls for possible steps to improve the quality of these processes, with which we can
also improve the quality of actions and decisions which we take.
KM is not just a technology type of thing or a computerized sort of mechanism. But, it is a vast and continuing
process, with which we move forward. If we accept the premise that KM is concerned with entire processes of
discovery, creation of knowledge, dissemination of knowledge and the utilization of knowledge, then we would
strongly accept that KM is much more than a technology thing and it’s elements exits in all spares of
organizational activities. It's important to note that some definitions might say nothing about technology, while
KM is often facilitated by IT. Therefore, technology by itself is not KM.
It is the process through which organizations generate value from their intellectual and knowledge-based assets.
Most often, generating value from such assets involves codifying what employees, partners and customers
know, and sharing that information among employees, departments and even with other companies in an effort
to devise best practices. The entire Knowledge process is equally applicable for libraries, as libraries are also
organizations and they need to cop up with the current trends and changes.
CONCEPT OF INFORMATION LITERACY KNOWLEDGE MANAGEMENT
Before discussing Knowledge Management (KM), it’s important to know if there is any difference between
knowledge and information. According to Marc Portal, “Information is data that has been organized and
communicated.” As far as knowledge is concerned Daniel Bell defines knowledge as “a set of organized
statements of facts or ideas, presenting a reasoned judgment or an experimental result, which is transmitted to
others through some communication medium in some systematic form. Whereas, Stephen Abram sees the
process for knowledge creation and use as a continuum where data transforms into information, information
transforms into knowledge and knowledge drives and underpins behavior and decision-making.
The management of information has long been regarded as the domain of librarians and libraries. Librarians and
information professionals are trained to be experts in information searching, selecting, acquiring, organizing,
preserving, repackaging, disseminating and serving. People often use information and knowledge
ISBN 1-63102-455-8
161
National Conference on Library Information Science and Information Technology for Education
interchangeably because we are unable to clearly distinguish between the two as they are very much related.
KM involves not only all activities of IM, but some more specialized activities centered around creation and
recording of new knowledge and sharing it. IM basically deals with information present in the documents while
KM deals not only with the information content of documents but also with the knowledge present in the
employee’s brain. In IM coded information becomes knowledge for the future use but in KM, coded knowledge
becomes information for future knowledge base. Therefore, KM is much broader than IM.
In the KM literature, knowledge is most commonly categorized as either explicit or tacit. This characterization
is however rather too simple, but a more important point, and a criticism, is that it is misleading. A much more
nuanced and useful characterization is to describe knowledge as explicit, implicit, and tacit.
Explicit Knowledge: information or knowledge that is set out in tangible form. (Knowledge that is
documented and public: structured, fixed-content, externalized, and conscious).
Tacit Knowledge: information or knowledge that one would have extreme difficulty operationally
setting out in tangible form. (Personal, undocumented knowledge: context-sensitive, dynamicallycreated and derived, internalized, and experience-based)
Today, we deal with huge amount of data and information. Data and information is not knowledge until we
know how to dig the value out of it. This is the reason we need KM. Unfortunately, there's no universal or all
acceptable definition of KM.
ORIGIN AND DEFINITION OF INFORMATION LITERACY K.M
Knowledge Management (KM) is a concept and a term that arose approximately two decades ago, roughly in
1990.
But, there are various early thinkers and philosophers who have written tremendous amount of literature on
knowledge. Here it’s necessary talk about Peter Drucker who has already pointed out in 1965, that ‘knowledge’
would replace land, labor, capital, machines, etc. to become the chief source of production. His vision was not
given much attention at that time. It 1991, Ikujiro Nonaka raised the concept of ‘tacit’ and ‘explicit’ knowledge,
as well as the theory of ‘spiral of knowledge’ in the Harvard Business Review. It was the time when
‘knowledge-based competition’ finally came out. Very early on in the KM movement, Thomas H. Davenport
offered the still widely quoted definition. According to Davenport, “KM is the process of capturing, distributing,
and effectively using knowledge.” This definition is very simple and to the point.
The operational origin of KM, as the term is understood today, arose within the consulting community and from
there the principles of KM were rather rapidly spread by the consulting organizations to other disciplines. The
consulting firms quickly realized the potential of the Intranet flavor of the Internet for linking together their own
geographically dispersed and knowledge-based organizations. Once having gained expertise in how to take
advantage of intranets to connect across their organizations and to share and manage information and
knowledge, they then understood that the expertise they had gained was a ‘product’ that could be sold to other
organizations. It was like a new product which was given name ‘Knowledge Management’. Therefore, the term
KM came out when people realized that information is a resource and product, which can and needs to be
managed.
A few years later, the Gartner Group created another second definition which sought to take a process view to
define KM. According to this view, “KM is a discipline that promotes an integrated approach to identifying,
capturing, evaluating, retrieving, and sharing all of an enterprise's information assets. These assets may include
databases, documents, policies, procedures, and previously un-captured expertise and experience in individual
workers.” According to Jennifer Rowley, “KM is concerned with the exploitation and development of the
knowledge assets of an organization with a view to furthering the organization’s objectives. The knowledge to
be managed includes both explicit (documented knowledge) and tacit (subjective knowledge). Management
entails all of those processes associated with the identification, sharing and creation of knowledge. This requires
systems for the creation and maintenance of knowledge repositories, and to cultivate and facilitate the sharing of
162
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
knowledge and organizational learning. Organizations that succeed in KM are likely to view knowledge as an
asset and to develop organizational norms and values, which support the creation and sharing of knowledge.”
In today’s movement towards KM, organizations are trying to best leverage their knowledge internally in the
organization and externally to their customers and stakeholders. They are trying to capitalize on
their organizational intelligence to maintain their competitive edge. In simple, the KM refers to a multidisciplined approach to achieving organizational objectives by making the best use of knowledge. KM focuses
on processes such as acquiring, creating and sharing knowledge and the cultural and technical foundations that
support them.
TECHNIQUES OF INFORMATION LITERACY K.M IN LIBRARIES
With KM the ideas of information analysis and information planning came out. Libraries and other
organizations have started considering ‘knowledge’ as resource. It means we also need ways and methods for
managing the knowledge in an organization. We can use techniques and methods that were developed as part of
knowledge technology to analyze the knowledge sources. Using these techniques we can perform knowledge.
Knowledge Analysis (KA): It is a very useful step. In this the usefulness, weakness and appropriateness
of knowledge within the organization is analyzed. It is a necessary step which increases the ability of a
library. It increases the efficiency of a library and alerts a library about less important or unnecessary
resources. In short, it is also a process of managing knowledge.
Knowledge Planning (KP): Planning is another very important component in all activities of libraries. It
is done when a library or an organization has performed KA. With this an organization or library could
develop a multi-year knowledge plan that defines how to view and develop its knowledge resource. Only
with effective knowledge planning a library can achieve its aims and objectives, and utilize its human and
material resources in a much better way.
Knowledge Sharing (KS): It is based on internal and external experiences in an organization for
problem solving and decision making. For academic libraries it is essential that they have to behave and
work as knowledge based organization. KS capability of the librarians is concerned to identify, integrate
and acquire external knowledge, which is most important. It increases the internal knowledge and
provides better and quick services to the users. In result it leads towards satisfaction of both libraries and
its users.
Knowledge Technology (KT): This is also another step in libraries where librarians and library
professionals play important roles. It is the application of techniques and methods, which makes the field
of analysis more specific. It is the form of expert system and decision support system.
Computer Support Work System (CSWS): This is a formal and informal activity system, within an
organization where the (human) agents are supported by computer system. As the economy becomes
more global and the use of PCs more pervasive, there has been a dramatic increase in e-learning, also
known as computer based learning and training. E-learning can be an effective medium for KM.
Knowledge Creation (KC): In libraries, various type of knowledge process must be put together, which
includes knowledge of library - operations, users and their needs, collections, facilities and technologies
available. With the help of this new knowledge is created which leads to the development and
improvement of the library services. KC is basically an interactive process that involves a number of
information and individuals.
Knowledge Capturing and Acquisition (KCA): It is very important to capture knowledge. The libraries
capture knowledge from internal and external sources. It is a process where libraries should be very
careful while identifying knowledge based on correct information and its importance. Only after such
identification the knowledge can be captured, otherwise there would be extra flow of un-useful or less
important knowledge.
IMPORTANCE OF INFORMATION LITERACY KNOWLEDGE MANAGEMENT
No doubt the KM is of prime importance today. The impact of globalization on information, service providers
and service receivers is very vast. The overload of data is making KM increasingly more important. Following
are some of the reasons with which KM becomes more important in libraries and all other organizations:
ISBN 1-63102-455-8
163
National Conference on Library Information Science and Information Technology for Education
It facilitates and improves decision-making capabilities in libraries and organizations.
It builds learning organizations by making learning a routine.
It increases the efficiency of the libraries and organizations.
It helps in providing satisfaction to the users or clients.
It helps to fulfill aims and objectives of libraries and organizations.
It stimulates change (regarding product and services).
It stimulates innovations and new ideas (regarding product and services) much faster
Finally it helps in transforming a library or organization into a more successful one.
BENEFITS OF INFORMATION LITERACY KNOWLEDGE MANAGEMENT
What are the real benefits that can be gained from the effective KM for the individual, organization, community,
nation or even entire earth? KM is far reaching, may be its about developing one’s personal KM competencies
to become a more effective player in the global knowledge economy or becoming a more competitive
knowledge leader and knowledge driven organization. One may even wish to develop and apply KM strategies
to world peace, people’s welfare, good governance, global poverty eradication, international disaster
management, global climate change and many more. KM is applied today across the world, in all public,
private, industrial sectors, and non-governmental sectors. KM is now recognized to be the key driven of new
knowledge and new ideas. Effective KM will greatly contribute to improve excellence by:
Improve product and services. Increasingly product and services are becoming smarter and more
knowledge based.
Reduce costs of products and services.
Increase value and/or profitability.
Provide potential to expand and grow.
Far reachable.
Respond faster.
CONLUSION
The objectives of academic, public and research libraries are different from the objectives of corporate libraries
and knowledge centers. Both have a different orientation and value based structure. The objective of public,
academic, and research libraries is to expand the access of knowledge for all users whereas, the other, is based
on little sharing of knowledge, and for internal use only. Therefore, the role and responsibilities of academic,
public and research libraries are much higher than the other one. In these libraries KM is needed to improve
library services, record information, create knowledge and enables users to share and learn by providing user
friendly approach in all the activities. It is a tool with which libraries can cop up with current changes.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
164
Abram, Stephen. (1997). “Post Information Age Positioning for Special Librarians: Is Knowledge Management the
Answer?” Information Outlook. June 1997.
Bell, Daniel. (1973). The Coming of Post-industrial Society: A Venture in Social Forecasting. New York: Basic
Books.
C. Lal and K. Kumar. (2007) “Descriptive Questions in Library and Information Science. New Delhi: Ess Ess
Publications.
Liebowitz, Jay. (2000). Building Organizational Intelligence: A Knowledge Management Primer. Boca Raton, FL:
CRC Press.
Jack M. Maness MLS, University of Colorado at Boulder Libraries, Libraries 2.0 Theory: Web 2.0 and its
applications for Libraries
Prashant Kumar and Anvita Srivastava : Implementation of Web 2.0 Technology in Library Environment paper
published in a book title Digital Library Management and Challenges by Dr. Satyapraksh Singh Asian Book Pvt
Ltd. New Delhi
Davenport, Thomas H. (1994), Saving IT's Soul: Human Centered Information Management. Harvard Business
Review, March-April, 72 (2).
Drucker, Peter. (1993). Post-capitalism Society. Oxford, Great Britain: Butterworth-Heinemann.
Duffy, Jan Duffy. (2000). “Knowledge Management: To Be or Not to Be?” Information Management Journal.
Duhon, Bryant (1998), It's All in our Heads. Inform, September, 12 (8).; also see 11 Bair, Jim. (1999).
“Knowledge Management is About Cooperation and Context,” Gartner Advisory Services Research Note (May
14).
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
[11]
[12]
[13]
[14]
[15]
[16]
[17]
Nonaka, Ikujiro. (1991). “The Knowledge-Creating Company,” Harvard Business Review (Nov.-Dec. 1991).;
Also, Nonaka, Ikujiro and Takeuchi, Hirotaka. (1995). The Knowledge-creating Company: How Japanese
Companies Create the Dynamics of Innovation. New York: Oxford University Press.
Porat, Marc. (1977). The Information Economy: Definition and Measurement. Washington, D.C.: U.S. Department
of Commerce, Office of Telecommunications.
Rowley, Jennifer. (1999). “What is Knowledge Management?” Library Management. 20 (8).
http://www.unc.edu/~sunnyliu/inls258/Introduction_to_Knowledge_Management.html
http://www.2.unescobkk.org/education/ict/v2_2/info.asp
http://en.wikipedia.org/wiki/web_2.0
http://crl.du.ac.in/ical09/papers/index_file/ical-98_130_287_1rv.pdf
ISBN 1-63102-455-8
165
ACCESSING KNOWLEDGE THROUGH THE ATTRIBUTES
AND POPULARITY OF SEARCH ENGINES
Mrs. Uma Pandey | Assistant Librarian | Central Library | Integral University | Lucknow |
umaraj.lib@gmail.com
Dr. (Ms.) Shiva Kanaujia Sukula | Dy. Librarian | Central Library | Jawaharlal Nehru University | New Delhi |
shivajrf@rediffmail.com
Abstract: This paper present a review of recent litereature related to Web search and search
engine and nature of search. The major factors that influence user evaluation, quality of search
results are discussed. The usefulness of search engines for accessing knowledge is outlined by
contrasting search engines against meta-search engines with evaluation and comparative study of
the effect of web searching on online public access catalogue (OPAC) users. A technique for
assessing search results retrieved from different sources is described. It is also demonstrated how
personalization helps in finding the right information in the shortest time with the least effort.
Intensive training for students and faculty members in order for them to acquire the
essential search strategies for effective information retrieval was made is recommended so that
Indian academics can use these searching strategies for retrieving information. The impact of
search engines can be enhanced by for designing a user friendly OPAC that entails
simplistic search strategies for university libraries of India and other developing countries were
made. Recommendation is made as to which aspects to be considered when evaluating web search
engines’ accessibility for people with disabilities. Need for intensive training for students and
faculty members in order for them to acquire the essential search strategies for effective
information retrieval by search engines by the Indian academics can be made.
Keywords: Search Engines, Accessing, Knowledge, Usefulness, Impact.
INTRODUCTION
The facts related to Web search and search engine have also showed new perspectives on Web searching
research from different perspectives and these need to be integrated into a more cohesive perspective. There
have been various aspects of search engines, but emphasis on emerging areas of Web searching and search
engine evaluation going beyond traditional methods and is part of this study (Lewandowski, 2012). Rall ( 2012)
reviewed the concept of truth claim. Stating the framework for four research traditions namely science, social
science, law, and judgments of excellence. "Truth claim” as connected to traditional research methods was
initially presented by Rall himself before in 2002 and 2004. The operational mechanisms of networks and
sufficient definitions for how truth claims are built in four established research traditions. There has been idea
of most Internet scholars neglecting the philosophy of research methodologies. This was the reason for Rall to
review the “truth claim’ concept. The literature shows the focus on r research work on information seekers as
well as on the politics of search engines and the computational problems in search engine results. There has
been following aspects to consider the nature of search:
i. Aesthetic theory of indexing,
ii. Study perceives search from the psychology of learning, and
iii. Examination of the relationship between performance and recent economic models of how data
accumulates in today's world.
The previous studies help library and information science (LIS) scholars to reframe Web search that permit
linkages to the established research traditions. The insights into the development and use of alternative search
engine interfaces their search outcomes in terms of retrieving high-quality, credible information supports the
progress (Kammerer and Gerjets, (2012). The effects of alternative Search Engine Result Pages or popularly
called SERP- layouts on searchers' information quality or credibility assessments of search results has been of
great help to researchers, search engine developers, educators, and students. The alternative search engine
166
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
interfaces might affect Web users' search and evaluation strategies in Web searching. Markus and Christain
(2012) defined social search, different from other interpretations of the social search concept, by unifying some
existing definitions with view to ambiguity and vagueness of the term social search. Classification of the
heterogeneous landscape of social search implementations on the WWW leads towards extensive literature
review to unify and enhance existing ideas and concepts was performed. The existing social search engines by
their specific features and social aspects present the illustration of social search the discussion of social search as
well as a comparison of existing social search engines. The in-depth information provides many ways people
can search the web together. There has always been a need to make an assessment of future developments in this
area. The evaluation of search engines by developing a conceptual model has presented a path to follow
(Palanisamy, 2013). This effort pursues and presents following facets:
i.
The attributes that determine a good search engine and why users repeatedly visit their favorite search
engines.
ii. The reasons why users change search engines.
iii. Identification of key factors that influence user evaluation of search engines, effective and efficient
criteria for evaluation by considering user satisfaction and usage as the search engine success variables.
The research issues, evolved out of the conceptual model play a great role to identify the implications that are
useful for searchers and search engine providers are given. The factors which matter for search engine
popularity are given as following:
i.
ii.
Key design issues to access through search engine.
Attributes including aesthetics
These aspects determine and shape the popularity of a good search engine. The users repeatedly visit their
favorite search engines due to certain features. The reasons as users change search engines also exist. These key
factors that influence user evaluation of search engines must meet effective and efficient criteria by:
i. Considering user satisfaction and usage as the search engine success variables.
ii. Indexing as well as perceiving search from the psychology of learning.
iii. Examination of the relationship between performance and recent economic models of how data
accumulates in today's world.
Suggestions by researchers are that LIS scholars must cater to reframe Web search that permit linkages to the
established research traditions. The developers also have to play their role by design alternative search engine
interfaces as these alternative search engine interfaces might affect Web users' search and evaluation strategies
in Web searching. Definition of social search and the comparison of social search engines summarize the many
ways people can search the web together.
USEFULNESS OF SEARCH ENGINES FOR ACCESSING KNOWLEDGE
The usefulness of search engines for accessing knowledge can be enhanced by including the modern features of
present search engines to improve practices of OPACs. Shiv (2011) identified the comparison of the effect of
web searching on online public access catalogue (OPAC) users in the libraries of the three universities in the
Union Territory of Chandigarh and Punjab state in India was carried out. Unawareness of users regarding the
difference between internal–search methodology of OPAC and common search engines such as Google was
observed. This effort makes following recommendations:
i.
ii.
University libraries should share user expectations with OPAC designers and Library community.
Collaboration with OPAC designers must be put in place so as to develop a user-friendly OPAC system.
The expectations of library users while searching OPAC are high. As well as, ready access to information
through search engines became considerably straightforward. Also, like popular search engines, that majority of
searches were performed on OPAC therefore Web searching influenced their OPAC searching process greatly.
The Comparison of search engines against meta-search engines was made. This effort which used the physics
field as information retrieval domain demonstrated that measured the overlapping degree of retrieved
ISBN 1-63102-455-8
167
Accessing Knowledge Through The Attributes And Popularity Of Search Engines
information from search engines against meta-search engines. Six search engines and six public meta-search
engines from the "searchenginewatch.com" website were used for the experiment (Esmaeil and Kiaie, 2011).
The following measurements were used:
i.
ii.
Averages, percentages and other statistical measures such as, frequency distribution
MS Excel for drawing tables and graphs.
The major findings are as follows:
i.
ii.
"Yahoo" retrieved 40% whereas "CurryGuide" retrieved maximum 77.1%, of physics documents in
search engine category.
The maximum overlapping degree with various other search engines i.e. 39% was found with "AOL"
search engine had search engines.
The geographic information community often discusses about the use of digital libraries of search engines for
the discovery of geographic information resources (Fransico...[et.al.] 2011). This research measured and
compared the performance of major search engines in the discovery of geographic web services. The
performances of Bing previously known as Microsoft Live Search, Google and Yahoo! in searching
standardized XML documents that describe, identify and locate geographic web services were compared.
Automated evaluation of three search engines using their API (application programming interfaces)-library
functions. The queries submitted for XML documents contained geographic web services, and documents
containing links to those documents. Relevant XML documents linked from the documents found in the search
results were also included in the evaluation results. The results suggested the following specifics:
i. Search engines are a feasible alternative for searching geographic web services.
ii. Resource- oriented search should combine simple queries with the exploration of the pages linked from
the search results of the search engines.
In addition, the findings show that:
i.
The discovery of geographic web services in search engines does not require the use of advanced search
operators. Research also disclosed that some technical advances in search engines could harm resourceorientation.
ii. No significant difference was observed in the precision for Google and three NL search engines whilst
retrieving the exact answer documents for NL queries.
iii. The performance of natural language (NL) search engines in retrieving exact answers to the natural
language (NL) queries differs from that of keyword searching search engines.
In terms of the precision of exact answer and relevant documents showed that Ask.com retrieved exact answer
document descriptions at the top of the results list in 60 percent of searches better than the other search engines.
The mean value of the number of exact answer top list documents for three NL search engines (20.67) was a
little less than Google's (21) (Hariri, 2013). The research was carried out to determine the implications of gender
in awareness and use of search engines by private south Nigerian university lecturers. Anyira (2013)
investigated the gender in awareness and use of search engines. This investigation was related to the university
library usage by Lecturers in private universities. The T-test results indicated following observations:
(i) The awareness-level of search-engines between male and female lecturers’ 3.69 is significantly different
with t (df.73) =at 0.001.
(ii) Utilization-extent of Google search engine 4.80 is also significantly different with t (df.73) at .0000.
(iii) Utilization-extent of Yahoo search engine is 1.16 and this did not indicate a significant difference
between male and female lecturers with t (df: 73) at 0.0500.
The recommendations made on the basis of the above observations that university libraries should put up an ICT
policy document that promotes gender impartiality in the delivery of library and information services to users.
The studies focus on the finding the factors:
168
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
i.
ii.
Contrasting differences between search engines against meta-search engines were observed which effect
overlapping degree of retrieved information from search engines against meta-search engines.
Answers to the natural language (NL) queries differ from that resource of keyword searching search
engines.
The research effort helped in outlining the steps needed for increasing the usefulness of search engines for
accessing knowledge:
i.
ii.
An ICT policy document is a must for university libraries.
Gender impartiality must be a key clause in the ICT policy document that promotes in the delivery of
library and information services to users.
iii. University libraries should share user expectations with OPAC designers and Library community.
iv. Use of digital libraries of search engines for the discovery of geographic information resources.
Another only drawback visible was that certain technical advances in search engines could influence
MOST POPULAR SEARCH ENGINES FOR SCHOLARLY COMMUNICATION
Two new automatic methods for the performance evaluation of Ask.com, Bing and Google search engines were
used. , This performance evaluation can help users to select a truly effective search engine. The results of the
evaluation are of great assistance to vendors of web search engines for improving their technology.
Experimentally the search engines performance is assessed based on the 2002 TREC web track’s 50 topics. To
compute the similarity degree between the lists two measures called the “tendency degree” and “coverage
degree” is introduced. The “tendency degree” assessed a search engine in terms of results presentation and the
“coverage degree” evaluated it in terms of retrieval effectiveness (Sadeghi, 2011). Investigation’s findings show
that Google outperformed the others, followed by Bing and Ask.com. In addition, significant degrees of
consistency about 92.87 percent for automatic approach and 91.93 percent for human-based approaches were
found
For verification of searching and for developing an evaluation criteria system for search engines using the
Delphi method, Chinese search engines were taken up (Zhu, Du, Meng and Sun (2011). The evaluation criteria
system also helped in establishing the analytic hierarchy process. Systematically comparison the major search
engines was done by Major web search engines are tested on their performance on navigational queries, i.e.
Searches for homepages. The comparisons are performed on navigational queries. Six search engines namely,
Google, Yahoo!, MSN, Ask, Seekport, and Exalead were submitted with 100 user queries. Users described the
desired pages, and the results position of these was recorded (Lewandowski, 2011). The performance of the
major search engines Google, Yahoo!, and MSN was found to be the best and around 90 per cent of queries
were answered correctly. But the Ask and Exalead were worst performers but received good scores as well. And
the findings suggested the following:
(i) Care should be taken on the performance on navigational queries while designing a search engine so that
designed search engine may compete with the major search engines.
(ii) Users can be influenced easily in their quality ratings of search engines based on this performance.
The results are limited by the fact that only German-language interfaces of all the search engines were used and
all the queries were in German. Therefore, the results are only valid for German queries. The search engine
performance and characteristics of different search engines were compared. This comparison was done on
parameters such as, quality, accuracy, appearance and significance of the search results that are produced upon
searching. Many a information retrieval systems (IRS) were evaluated. Librarians' behavior in the application of
search engines is analyzed. The detailed view on international and Greek search engines as an information
retrieval tool and their utilization is presented (Garoufallou, 2012). The factors that results gratified the
librarians were identified as:
(i) Search results’ significance i.e. Precision and hence the quality and value of result
(ii) Presentation and the visualization,
ISBN 1-63102-455-8
169
Accessing Knowledge Through The Attributes And Popularity Of Search Engines
Librarians favored using international search engines rather than Greek ones. A pioneering analysis of search
engine queries used to locate the ETDs collection with the purpose to find out the search engine queries and
variation in different locations. To answer these questions, search engine queries used to locate the AUETDs
collection were obtained from Google Analytics and were separated into groups based on user location.
Implications indicated following trends:
Most local users’ queries contained person names, variation for thesis or dissertation, and variants.
The definiteness of their queries indicates that full-text indexing will be more helpful to users than
metadata indexing alone.
iii. Queries from users located within the state but outside of the local area were intermediate between these
groups. Nearly all out-of-state users’ queries contained title and subject keywords and appeared to be
seeking specific research studies.
iv. Repository content must be indexed by search engines such as Google as this is an important factor to be
considered while designing. (Coates, 2014)
i.
ii.
The researchers have concluded users can be influenced easily in their quality ratings of search engines based on
this performance. The popularity-comparison of the search engines for scholarly communication can be
performed by new automatic methods performance evaluation methods. Specifically web-based Delphi method
was quite responsive in popularity-comparison Implications of these performance comparison shows:
(a) Out of available popular search engines Ask.com, Bing and Google gave the best performance. The
results of the researches showed that Google outperformed the others, followed by Bing and Ask.com.
Performance of the major search engines Google, Yahoo!, and MSN was found to be the best and around
90 per cent of queries were answered correctly.
(b) The parameters “tendency degree” assessed a search engine in terms of results presentation and the
“coverage degree” evaluated it in terms of retrieval effectiveness.
(c) Care should be taken on the performance on navigational queries while designing a search engine so that
designed search engine may compete with the major search engines.
The effort of studies suggests that most local users’ queries contained person names, variation for thesis or
dissertation, and variants for Auburn University. Nearly all out-of-state users’ queries contained title and subject
keywords and appeared to be seeking specific research studies.
EFFECTIVE SEARCHING METHODS AND TECHNOLOGY MAKE SEARCH ENGINES AS EFFECTIVE INFORMATION
RETRIEVAL TOOL
By drawing upon the patterns of web search behavior effective searching methods can be formulated. The use of
social search taxonomy and a user-centered social search method was tested by MacDonnell and Shiri (2011).
There is the value and power of “collective intelligence” in web search. Analysis of the notion of social search
and proposed taxonomy of social search by using socially enhanced web-based tools such as, social
bookmarking systems, social tagging services and social media sites improved general web searches. A dual set
phase methodology was used for comparing and evaluating search results from different sources was
formulated. lan and Levene (2011) developed this methodology. Analysis of important similarities and
differences disclosed several disparities in social search approaches. A practical method was proposed that
allows users to directly leverage social search without special features built into search engines. Results showed
that local Google interface, was preferred by a group of users i. e. Google succeeded in the country specific
customization of search results.. Live search was much less successful in this aspect. Recommendations are for
preferring country specific customization design of search engines, digital libraries and the browser add-ons.
The research on general search engines such as Google and Yahoo!, was first of its kind, in dynamic online
information environments, provided useful insights for search engine designers by examining the indexing
quality and ranking of XML (Dublin Core and MARC 21 metadata elements) based content objects. Results
showed that the XML-based Dublin Core Metadata Initiative and MARC 21 both do not demonstrate any
preference regarding access. Google made full retrieval of all the content objects via its Dublin Core and MARC
21 metadata elements and surprisingly. Yahoo! search engine did not respond at all. All Dublin Core and
MARC 21 metadata elements were indexed by Google search engine Farajpahlou and Tabatabai (2011) Li,
170
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Wang and Yu (2012) presented search engine evaluation models that can be personalized. This personalization
is achieved by enabling a particular Web searcher choose an appropriate search engine for his/her informational
requirements and hence finding the right information in the shortest time with the least effort. This customizable
evaluation model for comparing search engines was designed as a hierarchy of weighted parameters thus
enabling customization by simply changing the weights and modifying the features considered. This
customization is not possible in other evaluation models. As the other models are user oriented and focus on
relevance issues. Identifiable statistical patterns are found in performance measures of search engines. Search
engine features and performance measures were given quantitative and qualitative ratings by an individual user.
The results show:
i.
ii.
The precision and recall are the fundamental measures used in many search engine evaluations due to
their simplicity, evenhandedness and reliability.
Histograms based on three metrics enable user to perceive the characteristics of a search engine quickly
using the quantitative measure of histogram patterns that represent the search performance metrics
introduced.
Further refinement of specific parameters used in the evaluation model can be done. A larger scale search
engine evaluation is required to confirm the validity and usefulness of the model. The three performance
measures presented give a reasonably informative overview of the characteristics of a search engine. Other
performance parameters and their resulting statistical patterns would make the methodology more valuable to
the users. For the purpose of using search engines, a detailed observation was made on the usage of various
search engines. This was done for Meta search engines by Indian academics for retrieving information on the
web as well . The observation also looked into the learning mechanisms of various search strategies by Indian
academics (Sampath and G. T., 2013). The results show:
i.
Google usage was 91.93 percent and Yahoo usage came 43.85 percent while Dogpile and Ixquick came
35.78 percent each.
ii. 65.26 percent of respondents used the search strategy for retrieving information. A significant
relationship was inferred between the respondent's profession and use of search engines (p=0.018) as
well use search strategies o search engine (p=0.028).
iii. Method of learning the search strategies of search engines is also associated with the respondent's
profession (p=0.008).
These implications are clearly for information literacy instruction in the context of search engines. Need for
intensive training for students and faculty members in order for them to acquire the essential search strategies
for effective information retrieval was felt. The findings can assist to concerned authorities to enhance the
effective and efficient use of search engines by the Indian academics. Factors affecting the analyzing patterns of
web search behavior. There several effective searching methods and technology that make search engines useful
as effective information retrieval tool .There are patterns of web search behavior. The value and power of
“collective intelligence” in web searching. Analysis of the notion of social search and proposed taxonomy of
social search by using socially enhanced web-based tools such as social bookmarking systems, Social tagging
services and media sites improved general web searchers. There are group of users who prefer specific
customization of search results. Live Search was much less successful in this aspect. The XML-based Dublin
Core Metadata Initiative and MARC 21 both do not demonstrate any preference regarding access. Google made
full retrieval of all the content objects via its Dublin Core and MARC 21 metadata elements and surprisingly.
Yahoo! search engine did not respond at all. The fundamental measures used in many search engine evaluations
are precision and recall due to their simplicity, evenhandedness and reliability.
IMPACT OF SEARCH ENGINES FOR KNOWLEDGE ACCESSING
The influence of user’s demographic characteristics on the impact of web searching is noticeable. This impact is
seen with regard to OPAC in the context of an Indian university setting (Shiv 2012). There are certain
characteristics which definitively impact the web searching in some limited activities.
Following significant relationships were observed:
ISBN 1-63102-455-8
171
Accessing Knowledge Through The Attributes And Popularity Of Search Engines
(1) Relationship between male and female users regarding their perception of unsuccessful searches.
(2) There were significant differences between OPAC usage patterns and demographic characteristics of user
categories and age groups.
(3) Significant variations were noticed in awareness among user age groups about the differences between
web search engines.
In addition, certain variations were also observed among academic majors with regard to perceptions of users
after failed searches. Impact assessment of web searching on OPAC users of the Punjabi university library
Punjab Patiyala (India) was carried out. Shiv Kumar, (2012) made following conclusions :
(1) Search engines not only affected OPAC users in developed countries but also less developed countries
like India.
(2) OPAC and web search engines compete for survival and sustainability.
(3) The information searching behavior of academicians was changing significantly in the web environment.
(4) A large number of users explored the web to garner relevant information for academic purposes.
The majority of researchers were influenced by search engines because they also used OPAC.
Recommendations for designing a user friendly OPAC that entails simplistic search strategies for university
libraries of India and other developing countries were made. Relation of ‘Rank-correlation’ to the
documentation on search engine evaluation was performed by Melucci (2012). This presentation is done in a
practical way for the researcher’s active in the different domains of search engines. A model for the application
of rank correlation within scientific experimentation or item/service recommendation has inferred that Rank
correlation analyses impact on the success or failure of a search engine in performing the tasks for which it has
been designed and hence on the people's daily life activities. Rank correlation analyses has impact on the
success or failure of a search engine in performing the tasks for which it has been designed and hence on the
people's daily life activities. There are significant differences observed between OPAC usage patterns and
demographic characteristics of user categories and age groups.
RECOMMENDATIONS FOR IMPROVEMENT IN SEARCH ENGINES
Several improvements are suggested in the search engines. Real barriers of web search engines and criteria of
satisfaction for people with disabilities do not exist as of yet. Insights are provided into the principles of
disability studies and the idea of inclusion is described. The W3C Web Accessibility Initiative’s (WAI)
evaluation model is helpful in evaluating accessibility features of search engines. Kerkmann, and Lewandowski
(2012) suggested WAI Methodology for accessibility review of search engines in a comprehensive manner. The
WAI methodology consists of three-steps:
i. Preliminary review to quickly identify potential accessibility problems;
ii. Conformance evaluation to determine whether a website meets established accessibility standards;
iii. User testing to include real people with disabilities in a practical use.
There are various aspects to be considered when evaluating web search engines’ accessibility for people with
disabilities. A theoretical framework outline for a comprehensive accessibility review of web search engines
does also have practical implications for web search engine developers to improve accessibility of their product.
Various measurements of several accessibility aspects and as well impertinence of accessibility of web search
engines for people with disabilities and for the elderly or temporarily handicapped people are mentioned. The
paper is of great help for the researches, search engine developers and educators in practice, with reference to
the aspects of disability studies. Research is limited as it describes a theoretical concept and also that the model
is not tested so far. A variety of diversification approaches are available. Web provides a rich source of a variety
of information mainly in unstructured textual form. New challenges to make the user aware of the
diversification of content i.e. variety of content available. It is also hard to satisfy users best with such manifold
content (Denecke, 2012). Diversification issue from two angles:
i.
172
Diversity is introduced with its notions and dimensions. This diversity is a SERPs/ result set's coverage
of multiple interpretations of a query. and
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
ii.
The organization and classification of content within diversification become increasingly important.
Objective of the web search is diversity. As the diversification of content increases ranking, methods to assess
diversity within web search are presented. Approaches for diversification are extremely important. Web search
tries to address this problem from different perspectives. For the future, following recommendations are made:
i.
ii.
Combination of text search with image search result is important in achieving diversification.
Benchmarks and standard data sets for evaluations need to be established to ensure comparability of
results from various approaches.
The general computer searching behaviors demonstrated that digital natives are different from older age groups
(Zimerman, 2012). Digital natives were different in Bing. More emphasis needs to be placed on the digital
natives' search habits to find out how best to serve. More emphasis needs to be placed on the digital
natives' search habits to find out how best to serve this population and that it will be a great disservice to digital
natives. Research efforts on the computer searching behaviors suggested about disservice to digital natives
unless they are taught how to search academic databases. Several ways are provided to reach out to the users by
exploiting present day mighty web search engines. Vinit (2012) identified problems related to unfriendliness of
library OPACs and the reasons behind these problems. The author recommended:
i.
ii.
Use of sitemaps to expose the bibliographic records to search engines.
Creation, upload, and submission of sitemaps options to search engines.
It is also established that Web OPACs architecture does not help search engine robots or crawlers to index the
huge library data. Therefore by exploiting some of the best practices of information architects and webmasters,
libraries can also open their huge data to the search engines. This will greatly help in getting listed in the top
results by getting more visibility. Adoption of empirical approach was made for the examination of
characteristics of relevant libraries' website. This approach helped in two ways:
i.
ii.
Determining the visibility performance of search engine result pages (SERPs).
Proved the advantage of using search engine optimization (SEO) phenomenon asfor improving
libraries' digital content search-ability on the web.
Libraries' application of SEO is very important factor for scholarly academic research. In addition, several
website characteristics are identified that can be optimized for higher SERP rankings. There is an impact of
following factors on higher SERP rankings
i. External links
ii. The number of indexed web pages by search engines on
iii. Application of web analytical tools, such as Alexa.com
The concepts from the Integrated IS&R Research Framework are applied to analyze SEO as an element within
the Framework. The findings confirmed the following:
i.
ii.
Effect of certain characteristics of websites on ranking of libraries’ websites) by search engines.
Reputation of a library's website and the number of its search engine indexed web pages also increased
its ranking on SERPs
These findings can help in the search-ability of libraries’ digital content. Herbert and Mellius (2013)
recommended designing content oriented website with high quality, well-written content. These three
biggest search engines interpret keyword stuffing has been considered as a negative design element. Although
keyword stuffing is likely to lead to search engine rankings increase, it could deter human visitors and reduce
website value. Spam-dexing, characterized by different keyword density measurements in the body text of a
webpage play a role too. Upon monitoring of three major search engines, namely Google, Bing and Yahoo!, the
claims of high keyword densities leading to blacklisting by search engines have been disproved (Taheri, Hariri
and Fattahi (2014). The research has helped and some patterns are identified to the metadata creators and the
ISBN 1-63102-455-8
173
Accessing Knowledge Through The Attributes And Popularity Of Search Engines
end users for better indexing and retrieval. With the help of data island method for creating the metadata
records, it is suggested that metadata records based on DCXML, MARCXML, and MODS are effective for
better indexing and increased visibility of the metadata element tag names. Following implications are derived:
i.
ii.
All the tag names of the metadata records created based on the data island method relating to the
experimental group indexed by Google and Bing were visible in the search results. But the tag names
in the control group’s metadata records were not indexed by the search engines.
It is possible to index and retrieve the metadata records by their tag name in the search engines.
Whereas, the records of the control group are accessible by the element values only.
For increasing search engine visibility of websites / portals the website must be content oriented with high
quality well-written content. The WAI methodology includes real people with disabilities, helps in describing
the aspects to be considered when evaluating web search engines’ accessibility. To be successfully qualified the
WAI testing, two aspects are very important:
i.
ii.
The organization and classification of the website content,
Diversification of the content,
Approaches for diversification are extremely important. Several website characteristics were identified that can
be optimized for higher SERP rankings:
i.
ii.
iii.
iv.
The search-ability of digital content of library's website
Reputation of a library's website.
The number of library's website search engine indexed web pages.
The tag names of the metadata records created based on the data island method.
CONCLUSION
The conclusions derived from the review on knowledge-access through search engines are overwhelming. Many
factors are responsible users repeatedly visit their favorite search engines and also there are reasons why users
change search engines. Aesthetic theory of indexing must be considered as the attributes including aesthetics
that determine a good search engine. Due importance to the satisfaction and usage must be given. As the
satisfaction and usage variables determine search engine success. The alternative search engine interfaces might
affect Web users' search and evaluation strategies in Web searching. Users can be influenced easily in their
quality ratings of search engines based on this performance. The definiteness of full-text indexing will be more
helpful to users than metadata indexing alone. Socially enhanced web-based tools such as social bookmarking
systems, social tagging services and social media sites must be used while designing as consideration to this
result in improved general web searches.
SUGGESTIONS
i.
The design of search engines, digital libraries and the browser add-ons must be done keeping in
consideration the web search behavior patterns.
ii. Local interface must be made available to academic researchers, as Google succeeded in its
country‐specific customization of search results. That’s why country‐specific customization of search
engines is preferred.
iii. Fundamental parameters of search engines must be evaluated along with, precision and recall due to their
simplicity, evenhandedness and reliability, as Google also made full retrieval of all the content objects via
its Dublin Core and MARC 21 metadata elements, these elements can be useful for designers.
iv. OPAC usage patterns and demographic characteristics of user categories and age groups are important
while designing search engines.
v. There is need for intensive training for students and faculty members in order for them to acquire the
essential search strategies. This is necessary for the effective information retrieval by the Indian
academics. A user friendly OPAC must be designed that entails simplistic search strategies for university
libraries of India and other developing countries were made.
174
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
vi. Diversification makes the ranking in a way that the top results are diverse. Methods to assess diversity
within web search must be exploited by information architects and webmasters,
vii. Libraries can also open their huge data to the search engines and can get listed in the top results to get
more visibility.
viii. It is also recommended designing content oriented website with high quality, well-written content.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
Esmaeil, Sedigheh Mohammad, Kiaie & Robabeh Mansour. (2011). A Comparison between Search Engines and
Meta-Search Engines in Retrieving Information Related to Physics and the Extent of Their Overlap. Faslname-Ye
Ketab/Library and Information Studies, 22(3), 130-140.
Shiv Kumar (2011). Effect of web searching on the OPAC: a comparison of selected university libraries. Library
Hi Tech News, 28(6), 14-21.
Mc Donnell, Michael &Ali Shiri (2011).Social search: A taxonomy of, and a user‐centered approach to, social web
search. Program, 45(1), 6 – 28.
Sadeghi, Hamid. (2011).Automatic performance evaluation of web search engines using judgments of metasearch
engines. Online Information Review, 35(6), 957-971. DOI: http://dx.doi.org/10.1108/14684521111193229.
Zhu, Qingua. [et.all.] (2011). Using a Delphi method and the analytic hierarchy process to evaluate Chinese search
engines: A case study on Chinese search engines. Online Information Review, 35(6), 942-956. DOI:
http://dx.doi.org/10.1108/14684521111193210.
Lewandowski, Drik. (2011). The retrieval effectiveness of search engines on navigational queries. Aslib
Proceedings, 63(4), 354-363. DOI: http://dx.doi.org/10.1108/00012531111148949.
Lopez-Pellicer, Francisco J., Florczyk, Aneta J., Bejar, Ruben , Muro-Medrano&Pedro R., Zarazaga-Soria. (2011).
Discovering geographic web services in search engines. Online Information Review, 35(6), 909-927. DOI:
http://dx.doi.org/10.1108/14684521111193193. Access on 17/04/2015
Ilan, Judit Bar&Levene Mark. (2011). A method to assess search engine results. Online Information Review, 35(6),
854-868. DOI: http://dx.doi.org/10.1108/14684521111193166.
Faraipahlou, A Hossein & Faeze, Tabatabai . (2011). How are XML-based Marc 21 and Dublin Core records
indexed and ranked by general search engines in dynamic online environments?Aslib Proceedings: New
Information Perspectives , 63(6) , 586-592.
Garoufallou, Emmanouel.(2012). Evaluating search engines: A comparative study between international and
Greek SE by Greek librarians. Program: Electronic Library and Information Systems, 46(20), 182-198.
Kerkmann, Friederike & Lewandowski, Dirk (2012). Accessibility of web search engines: Towards a deeper
understanding of barriers for people with disabilities. Library Review, 61 (8/9), 608-621. DOI: http://dx.doi.org/
10.1108/00242531211292105.
Shiv Kumar, (2012), The impact of demographic characteristics of users on patterns of usage on search engines
and OPAC, Library Review, 61 (3), 172 – 187. DOI: http://dx.doi.org/10.1108/00242531211259300.
Shiv Kumar, (2012). Impact of internet search engines on OPAC users: a study of Punjabi
University,Patiala(India).Program,46(1),56-70.
DOI:
http://www.emeraldinsight.com/doi/abs/10.1108/00330331211204566
Lewandowski, Drik (2012). Chapter 1 New Perspectives on Web Search Engine Research, in. Lewandowski, Dirk
(ed.): Web Search Engine Research. Bingley: Emerald Group Publishing, 2012. DOI:
http://books.emeraldinsight.com/display.asp?K=9781780526362.
Rall, Denise N. (2012). Chapter 11 What Would Kant Think? Testing Truth Claims in Research Traditions, and
Proposing Deeper Meanings for the Concept of “Search". Lewandowski, Drik (ed.). Web Search Engine Research
(Library and Information Science, Volume 4). Emerald Group Publishing Limited, 281 – 307 DOI –
10.1108/S1876-0562(2012)002012a013.
Kammerer, Yvonne&Gejets, Peter (2012). Chapter 10 How Search Engine Users Evaluate and Select Web Search
Results: The Impact of the Search Engine Interface on Credibility Assessments, in Lewandowski, Drik (ed.) Web
Search Engine Research (Library and Information Science, Volume 4) Emerald Group Publishing Limited,.251279. DOI: 10.1108/S1876-0562(2012)002012a012.
Denecke, Kerstin (2012). Chapter 6 Diversity-Aware Search: New Possibilities and Challenges for Web Search, in
Lewandowski, Drik (ed.) Web Search Engine Research (Library and Information Science, Volume 4) Emerald
Group Publishing Limited, 139 – 162.DOI: 10.1108/S1876-0562(2012)002012a008.
Li, Kin Fun, Wang, Yali &Yu, Wei (2012).Chapter 7 Personalised Search Engine Evaluation: Methodologies and
Metrics, inLewandowski, Drik (ed.)Web Search Engine Research (Library and Information Science, Volume
4) Emerald Group Publishing Limited, 163 – 202. 101108/S1876-0562(2012)002012a009.
Melucci, Massimo (2012). Chapter 8 Search Engines and Rank Correlation, inLewandowski, Drik (ed.) (ed.) Web
Search Engine Research (Library and Information Science, Volume 4) Emrald Group Publishing Limited,203 –
224. DOI: 10.1108/S1876-0562(2012)002012a010.
Markus, Heckner&Christain, Wolff (2012) Chapter 2 The Many Ways of Searching the Web Together: A
Comparison of Social Search Engines , Lewandowski, Drik (ed.)Web Search Engine Research (Library and
Information Science, Volume 4) Emrald Group Publishing Limited, 19 – 46. 10.1108/S18760562(2012)002012a004
Zimerman, Martin (2012). Digital natives, searching behavior and the library. New Library World, 113(3/4), 174 –
201. DOI: http:/dx.doi.org/10.1108/03074801211218552.
ISBN 1-63102-455-8
175
Accessing Knowledge Through The Attributes And Popularity Of Search Engines
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
176
Vinit Kumar (2012). Exposing Library Catalogues to Search Engines. DESIDOC Journal of Library &
Information Technology , 32( 6), 493-498.
Onaifo, Daniel & Rasmussen, Diane (2013). Increasing libraries' content find ability on the web with search engine
optimization. Library Hi Tech, 31(1), 87 – 108. doi: http://dx.doi.org/10.1108/07378831311303958.
Sampath Kumara&G.T Kumar.(2013). Search engines and their search strategies: the effective use by Indian
academics.
Program:
electronic
library
and
information
systems,
47(4),
437
–
449.
DOI:http://www.emeraldinsight.com/doi/abs/10.1108/PROG-03-2012-0009.
Hariri, Nadjla. (2013). Do natural language search engines really understand what users want? A comparative
study n three natural language search engines and Google. Online Information Review,37 (2), .287 –
303..DOIhttp://dx.doi.org/10.1108/OIR-12-2011-0210
Zuze, Herbert & Weideman, Mellius. (2013). Keyword stuffing and the big three search engines. Online
Information Review, 37(2), 268 – 286. DOI:http://dx.doi.org/10.1108/OIR-11-2011-0193
Anyira, Isaac E. (2013). Gender implication in awareness and use of search engines by the private university
lecturers in south- south Nigeria. Library Philosophy and Practice (e-journal). Paper 1039.DOI:
http://digitalcommons.unl.edu/libphilprac/1039
Coates, Mildred (2014). Search engine queries used to locate electronic theses and dissertations: Differences for
local and non-local users. Library Hi Tech, 32 ( 4), 667 – 686. doi: http://dx.doi.org/10.1108/LHT-02-2014-0022
Taheri, Sayyed Mahdi, Hariri, Nadila & Fattahi, Sayyed Rahmatillah (2014) . Using data island method for
creating metadata records with index ability and visibility of tag names in web search engines. Library Hi Tech, 32
(1), 83-97. DOI: 10.1108/LHT-06-2013-0065.
ISBN 1-63102-455-8
REINVENTING LIBRARY AS GREEN LIBRARY:
BEGINNING OF GREAT TRANSFORMATION
Dr. (Mrs) KusumLata Malik | Chief Librarian | K.V.M.M.(P.G) College | CSJM University | Kanpur | U.P |
latamalikkusum@gmail.com
Abstract: A green or eco-friendly library is designed to minimize negative impact on the natural
environment and maximize indoor environmental quality by means of careful site selection, use of
natural construction materials and biodegradable products, conservation of resources (water,
energy, paper), and responsible waste disposal (recycling, etc.). The paper presents the LEED
(Leadership in Energy and Environment Design) rating system for green building criteria. The
green libraries are measured by this LEED system which was developed by U.S. Green Building
Council. The paper also suggested that like LEED, Indian Green Building Council (IGBC) is a
way that should choose by Indian libraries to becoming green and sustainable. The paper
concluded that the big challenges as energy depletion, water restoration, and indoor air quality,
building material, information resources and environmental changes can be solve through green
libraries.
Keywords: Green, Sustainable, Libraries, Programs, LEED, Environment and Design etc.
INTRODUCTION
The Green Library Movement has been in existence since last 15 years. The Movement started in the early
1990s and became popular in the library profession around 2003. This innovation is happening by building
green library buildings, by greening existing library facilities, providing green library services, and embracing
environmentally supportive and sustainable practices within the library.
Despite the fact that there are many paths to sustainable design, the emergence of the trend has created a
demand for quantifiability. In the United States, the non-profit organization the United States Green Building
Council (USGBC) developed the Leadership in Energy and Environmental Design (LEED) rating system in the
year 2000. It is a point-based system in which projects earn LEED points for meeting green building criteria.
The six credit categories for new building construction are sustainable sites, water efficiency, energy and
atmosphere, materials and resources, indoor environmental quality, and innovation in design. The LEED has the
point based rating a total of 100 base points possible, and buildings can be categorized as with four level of
certification certified (40 points), silver (50), gold (60), or platinum (80+). LEED uses five different categories
to judge a building's sustainability; 1) site location (sustainable site), 2) water conservation (water efficiency), 3)
energy efficiency, 4) resources and materials, 5) indoor air quality or indoor environment, and a bonus category
for innovation and design (Brown, 2003).
There are currently Six type of certification as LEED for New Construction (LEED-NC), LEED for Commercial
Interiors (LEED-CI), LEED for Core and Shell (LEED-CS), LEED for Existing Buildings (LEED-EB), LEED
for Neighborhood Development (LEED-ND), and LEED for Homes (LEED-H) (Yudelson, 2007). The LEED
rating system is progressive with four levels of certification: Certified, Silver, Gold and Platinum. Each
certification level has 32 categories of environmental design and energy concerns for a maximum point value of
69. Sustainable library design is strongly tied to the overall green building movement, but libraries have specific
needs that present some extra challenges for green builders.
WHAT ARE GREEN LIBRARIES?
According to the Oxford English Dictionary the term green is defined as pertaining to, or supporting
environmentalism and the term sustainable relates to forms of human economic activity and culture that do not
lead to environmental degradation, especially avoiding the long-term depletion of natural resources.
When imaging about green libraries the simple question comes to mind that what are green library buildings? It
may be defines as a green or sustainable building which is designed, built, renovated, operated, or reused in an
ISBN 1-63102-455-8
177
Reinventing Library as Green Library: Beginning of Great Transformation
ecological and resource efficiently. Interest in green library design intensified in December 2007 when the
Library Journal Design Institute hosted the Going Green seminar in Chicago, Illinois. At the event architects,
city planners, and librarians shared the latest developments and cutting-edge solutions being adopted in green
library buildings (Library Journal, 2007).
There is no universal definition on green library. But actually, green library is that library which minimizes the
negative effect and maximizes the positive effects and the building will have on the local environment. Green
libraries reduce the use of water and energy by designing the building to maximize the use of natural and
renewable resources. These libraries also integrate actual plants greenery and vegetation into the building and
site design, preferably with drought resistant and/or native vegetation. They also maintain high standards of
indoor air quality to help ensure the health of the people who inhabit the building.
Green library, also known as a sustainable library, is a library built with environmental concerns in mind. Green
libraries are a part of the larger green building movement. Libraries are not only repositories of knowledge, but
are also important information resources for raising awareness about environmental concerns. Green libraries
educate the public about environmental issues through their collections, sustainable and environmentally
friendly facilities, and public library programs. Among other things, green libraries maximize the effects of
natural sun light and natural air flow. Green libraries are thoughtfully designed while taking into account site
selection to structural design, water conservation energy use, use of materials in buildings, indoor air quality and
human health effects. (Antonelli, 2008)
HOW CAN LIBRARIES BECOMING GREEN?
Green design is an integrated process. Without proper integration from the earliest moments of the planning
phase, redundancies can occur, eliminating many of the potential benefits of sustainable design. Good
sustainable design capitalizes on the synergistic relationships that occur between the various design elements.
LEED groups these elements into five categories. Buildings can be designed in a way in which, good design in
one category helps another category fulfill its goal.
FIVE CATEGORIES OF GREEN DESIGN:
Site selection: Before building can start, a site must be chosen. The selection of the site has a large impact on
how ecologically friendly the library will be. LEED has a number of guidelines to help the site
selection process. There are a number of questions to consider that will help guide the site selection process,
including, what kind of impact will construction have on the local environment, will there be erosion, what can
be done with storm runoff, and is the site already green? Also, the library should be located in a densely
populated area, near a number of other service related buildings. People should be able to reach the building via
public transportation and the parking lots should give priority parking to those driving energy efficient
automobiles. The heat island effect can be reduced by shading hard surfaces, putting them underground, or by
implementing a vegetative roof (LEED, 2005)
Water conservation: There are many different ways for libraries to conserve water. A number of them rely on
proper site selection. If a site is selected properly strategies can be used to capture rainwater runoff to be used in
irrigation. Another strategy is to use low flow fixtures, and waterless urinals.
Energy conservation: Energy efficiency is considered by many to be the most important category in becoming
sustainable. In the LEED rating system it is the heaviest weighted of all the categories. Energy efficient design
is in many ways a return to passive design principles that evolved over thousands of years, until the advent of air
conditioning and cheap energy made those strategies appear to be unnecessary. After air conditioning became
widely available, buildings were designed to eliminate influences of the outside environment. As environmental
awareness increases, as well as the cost of fossil fuels needed to operate giant heating, air conditioning, and
ventilation [HVAC] systems, building designers are beginning to recognize that the outside environment cannot
be ignored, and should be taken advantage of. What 21st-century designers are beginning to do is implement
ancient passive design principles, while taking advantage of the most advanced technology available.
178
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
The passive strategies vary according to location, but they are always implemented to capitalize on the natural
elements, mostly wind and sun, to manage the temperature and to provide ventilation and light. Active strategies
are more technologically advanced solutions that include using various forms of renewable energy resources and
using sensors to adjust lighting. Using photovoltaic cells that turn sunlight into energy is becoming an
increasingly popular way to reduce energy dependence. In order to fully maximize energy efficiency and
comfort, libraries are combining passive and active strategies (LEED, 2005).
Building materials: The primary responsibility in selecting materials for the library is to contribute as little
waste as possible. Another responsibility is to choose materials that can be produced without causing too much
damage to the natural environment. In order to fulfill the first responsibility, post-industrial and post-consumer
recycled materials are being used. When purchasing materials claiming to be made from recycled goods it is
important to investigate what their claims mean. Such materials should be chosen that will going to be able to be
reused or recycled 50–100 years down the road when the library building has reached the end of its useful life
(Tseng, 2007). As non-renewable resources decrease, reusing and recycling are going to become increasingly
necessary in the future.
It is also important to consider what type of materials are using as certify wood based on a number of factors
regarding how it was produced; rights of indigenous peoples, environmental impact, workers’ rights, efficiency,
management, and conservation (Forest Stewardship Council, FSC, 1996). Another material option is using
quickly renewable materials such as bamboo in place of wood whenever possible.
Indoor air quality: Along with energy inefficiency, poor air quality has been another side-effect of the post air
conditioning building design. Because most modern buildings are temperature controlled, they are designed to
be airtight. The lack of ventilation can not only make buildings expensive to cool, it also traps harmful toxins
that can do serious damage to people's respiratory systems. Toxins come from a variety of sources. Materials
that make up the library, including paints and carpeting; have volatile organic compounds (VOC's), which
produce a ground-level ozone after reacting with sunlight and nitrogen. The carbon dioxide that people breathe
into the atmosphere is another toxin. To improve air quality, materials can be bought that have a low VOC
content, and CO2 monitors can be installed to ensure that CO2 levels remain at a safe level. On average, people
spend about 90% of their time indoors. Therefore, green buildings need to be designed in a way in which the air
gets recycled, and does not stay stagnant. A green library is not just about taking care of the environment, it is
about taking care of the health and well-being of those who work in it and patronize it.
SOME IMPORTANT GREEN DESIGN ELEMENTS FOR LIBRARIES:
Green libraries combine the needs of a library, sustainable design, and real cost savings in energy consumption
(Brown, 2003). The main goal of green buildings is to develop and use sustainable energy-efficient resources in
construction, maintenance, and overall life of the structure. Libraries considering green design will often look at
the Leadership in Energy and Environmental Design (LEED) rating system. Brown (2003) identifies the
following green design elements, which can be incorporated into libraries:
Community collaboration – makes sure that community assets are efficiently used and helps to
maintain public support
Daylight – pair daylight with artificial lighting to reduce energy costs
Green materials – use renewable materials like wood, linoleum, bamboo, and cork
Green roofs
Raised floor systems
Energy efficiency
Natural ventilation
Green power and renewable energy
Indoor environmental quality (Wikipedia, 2015)
ISBN 1-63102-455-8
179
Reinventing Library as Green Library: Beginning of Great Transformation
WHAT FORCED LIBRARIES BECOMING GREEN?
First, libraries have been expanding the scope of their mission statements, to include working for the betterment
of mankind. Second, technology is to increase awareness energy and environmental issues. Third, greenery is
great for the image of the library. Finally, sustainability offers the library a degree of independence, because
cost of maintenance goes down, as do as reliance on the volatile fossil fuels market. (Wikipedia, 2015)
Mission: All libraries have mission statement to preserve knowledge so that it can be passed on to the future
generations and to improve the condition of humankind. The Buildings produce about 40% of the dangerous
greenhouse gasses emitted into the atmosphere (Anisko& Willoughby, 2006). Libraries are an investment in the
future of our society, so libraries have a responsibility to not contribute to the destruction of the environment, to
educate the people regarding our current situation, and empower them to make a difference. Libraries are
discovering that their green building gives them a great opportunity to educate the citizenry (Tseng, 2007).
Technology: The technology and knowledge to build green buildings has passed a tipping point. The diversity
of green technology, it is necessary to capitalize on the local natural resources available, and customize the
building to most efficiently operate in the local environment. Along with the advancement of technology, the
increasing awareness of environmental issues decreases the burden on the green builder. With these advances,
sustainable construction is no longer a utopian fantasy, but is simply becoming the way good buildings are being
built.
Image: Today, the library is undergoing an identity transformation and struggling to stay relevant, while its
image as an outdated institution is not entirely deserved, it is trying to assert itself as an irreplaceable part of the
community that plans on being an assertive force for good in the twenty-first century. Green design helps it do
that three different ways. First, a sustainable building makes a statement that the library is investing in the future
of the community. Second, sustainable buildings are smartly designed, aesthetically pleasing, and are powered
by state-of-the-art technology. When people see these emerald marvels they will no longer be able to maintain
false stereotypes regarding libraries as anachronistic relics from an analog age. Finally, as more people take
environmentalism seriously, a green image can improve an institution's image.
Independence: Libraries are constantly battling with budget issues. Sustainable design offers libraries a way to
reduce maintenance and energy costs, providing them with a degree of independence (Boyden & Weiner, 2000).
One of the most important features of green design is a shift from the reliance on depleting fossil fuels to
renewable energy resources. The independence from fossil fuels will save the library large sums of money, and
it will relish its independence if prices continue to rise. Because of the long-term nature of the library, green
design is potentially less expensive than standard design, as heavy up-front costs often pay for themselves,
waste is reduced, efficiency is increased, and energy and water are conserved. Evolving libraries of the 21st
century are integrating sustainable practices, because it is becoming the most cost-effective way to do things
(Boyden & Weiner, 2001).
EXAMPLE OF FAMOUS GREEN LIBRARIES
Fayetteville (AR) Public Library:
The Fayetteville Public Library designed by Meyer, Scherer and Rockcastle Ltd. in Minneapolis opened in
October 2004. The library, Library Journal's 2005 Library of the Year, was the first building in Arkansas to
register with the U.S. Green Building Council and achieved the silver LEED designation in 2006. To earn this
designation the library employed many green-design techniques. The library was built on an empty lot a few
blocks away from the city's bustling square, making it a textbook infill project. During construction, any trees
removed were harvested and used for furniture or donated to local parks. Throughout the project, almost 99% of
the construction waste was recycled or reused. More than 65% of the materials used to build the library were
made within 500 miles (800 km) of the city. By incorporating a green roof and using alternative roofing
materials, the design team reduced air temperature as much as 20 degrees. Water collected on the roof is reused
for landscape irrigation. The library's green roof saves about $4,000 a year in energy savings. The building's
reading spaces and circulation desks were situated to take advantage of the natural sunlight without over-
180
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
working the building's air conditioners, reducing energy costs by 25% and the overall building's energy
consumption by 30%. Sunlight streams through 75% of the building's public spaces.
Seattle Central Library:
The Seattle Central Library designed by Rem Koolhaas opened in May 2004. It employs a number of innovative
techniques to achieve the status of a green library. It is located in a dense urban area, accessible by public
transportation. Rainwater runoff is stored in a 40,000 gallon tank, and used to irrigate the landscape. It has triple
glazed glass, used to reduce heat buildup. Seventy-five percent of the demolition and construction waste was
recycled (Fox, 2004).
National Library, Singapore:
The Singapore National Library has been called the greenest building on the planet. Designed by Ken Yeang, it
opened in July 2005. It is designed using light shelves that allow the light to filter into the library, without
having any harsh effects. During the moments that the sun is either to bright or not bright enough, sensors are
programmed to dim or brighten the lights, and raise and lower the shades to maximize comfort and reduce costs
(Anisko& Willoughby, 2006)
Minneapolis Public Library (MPL):
The Central Branch of the Minneapolis Public Library System was designed by Cesar Pelli, and it opened in
May 2006. It has a 18,560-square-foot (1,724 m2) green roof. The green roof is planted with vegetation that does
well in Minnesota's harsh climate, and it reduces rainwater runoff, reduces the building's heating and cooling
load, reduces the buildings heat island effect, and adds green space to the downtown cityscape (MPL, 2006).
Merced Kolligian Library:
This library opened in August 2005 in university of California and awarded Gold Leeds Certification in 2007.
The 180,000-square-foot (17,000 m2) glass-and-concrete building uses 42% less water and 50% less energy than
comparable buildings. The building's carpet contains 37% recycled content, while its acoustical ceiling tiles
contain 66% recycled content that includes telephone books and newspapers. Nearly 30% of the materials used
to construct the building were manufactured locally, resulting in significant transportation and energy savings.
WHY SHOULD GREEN LIBRARIES?
There may be several reasons to build green libraries. First, the cost of constructing green buildings has become
affordable. It is now possible for libraries to build green buildings on conventional budgets. Second, most
readily available energy resources are finite resources. It is vital to the health of the planet and our libraries’
budgets that we use these energy sources prudently. Third, it is important that we reduce the carbon footprint of
our buildings. The carbon footprint means the total amount of greenhouse gases produced to directly and
indirectly support human activities.
A simple green libraries can improve the health of the planet and their employees is by quit to use of toxic
chemical cleaners because these cleaners can trigger allergies and asthma attack in users and switch the
environmentally friendly certified green cleaning products that emit fewer fumes.
Now internet has become the medium of choice for many. The concept of a Green Library is spreading all
around the world. It isn’t only a matter of sustainable buildings, but it is also a library management issue. In
order to survive the technologic challenge, many libraries around the globe are re-discussing their identity in
order to live up to the challenge of our times and to users’ high expectations. By reducing paper waste energy
inefficiency and promoting recycling of used material, green libraries are developing a new idea of the Library
as a sustainable service. By providing sustainable services and values within their walls, Green Libraries claim
to keep faith with the task they were born for: the betterment of humankind. Digital information is producing
less carbon than paper based information that is why digital collections are a main point of Green Libraries’
agenda.
Green Environmental movement can be stand as thinks globally but acts locally. Green Library movement,
which is comprised of librarians, libraries, cities, towns, college and university campuses committed to greening
libraries and reducing their environmental impact. Constructing a green library building using performance
ISBN 1-63102-455-8
181
Reinventing Library as Green Library: Beginning of Great Transformation
standards like Leadership in Energy and Environment Design (LEED) & Indian Green Building Council (IGBC)
is a way that some libraries are choosing to become green and sustainable. To strengthen global consistency of
the LEED rating system, effective June 2014, GBIC (Green Building Council of India) began managing the
certification system process of all LEED rating system in India, which has previously managed by Indian Green
Building Council (IGBC). Environmental challenges like energy depletion and climate change will influence the
type of information resources and programs libraries will provide to their communities.
A green library minimizes the negative impact that builds on the local environment, and maximizes the
positive impact. Reduce the use of water and energy by designing in a way that maximizes the use of natural and
renewable resources. Integrating actual greenery and vegetation into the building and site design; preferably,
using drought resistant and/or native vegetation. And, maintaining high standards of indoor air quality to help
ensure the health of the user who inhabit the building.
GREEN LIBRARY CHALLENGES
While green libraries are concern with the overall green building movement, libraries have specific needs that
face some extra challenges:
The biggest challenge in front of green libraries is preservation of books must be kept away from sunlight,
moisture as well as temperature changes. However, many individuals find sunlight to be the most enjoyable
light for reading. Sunlight also plays a major role in green design, because it can be used to reduce the reliance
on artificial lighting. For a long time, libraries needed to protect the collection from the damaging ultra-violet
rays of the sun. New developments in glass technology over the past ten years have given designers more
flexibility in their ability to place collections (Mcabe, 2003).
Another, often overlooked, challenge the library presents is the weight of the books. A common strategy in
green design is to raise the floors to increase circulation, but the weight of the stacks can be an impediment to
this strategy. To deal with this challenge, many designers have resorted to zoning the library into designated
areas, so these strategies can be enacted in certain areas and alternatives can be used in others (Lamis, 2003).
Library buildings are long term investments made to benefit the community, so when designing them architects
need to be looking 50 or 100 years into the future. These obstacles by no means present insurmountable
challenges to green libraries. The special needs of the library just need to be taken into consideration from the
beginning of the project.
CONCLUSION
Because of the long-term nature of the library, green design is potentially less expensive than standard design,
as heavy up-front costs often pay for themselves, waste is reduced, efficiency is increased, and energy and water
are conserved so, libraries should designing in a way that maximizes the use of natural and renewable resources.
Constructing a green library building using performance standards like Leadership in Energy and Environment
Design (LEED) and Indian Green Building Council (IGBC) is a way some libraries are choosing to become
green and sustainable. The amount of information available on green libraries and green library practices is
limited but continues to grow. These libraries are distinct over other libraries not only in the physical appearance
but it is also in the concept of services offered.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
182
http://in.usgbc.org/help/how-leed-certification-india-administered
http://in.usgbc.org/about?gclid=COT5-K7a-sYCFQNwvAodWQ0HFg
B. Brown,“The new green standard: With the LEED rating system in place it is easier to make sure your new
library saves money as it treads lightly on natural resources” in Library Journal, Vol. 128(20),2003,pp. 61-64.
Retrieved from http://members.cruzio.com/~dolson/FLF/green2.pdf
Monica, Antonelli , 2008. “The Green library movement: An overview of green library literature and actions from
1979 to the future of green libraries”in Green Journal, Vol. 27, 2008, pp. 1-11. Retrieved
fromhttps://green.nd.edu/assets/24828/escholarship_uc_item_39d3v236.pdf retrieved on 26.07.15
https://en.wikipedia.org/wiki/Green_library retrieved on 24.07.2015.
E. Anisko, and M. Willoughby, Producers,“Deeper shades of green”, Television mini-series episode, directed by
Tad Fettig, narrated by Brad Pitt and Ken Yeang, Arlington, VA: Public Broadcasting Station, 2006.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
Tseng, S.H. (2007) An eco-building, a healthy life, and good service: A new Century in public library architecture
[Electronic Journal] Retrieved on 25.07.2015.
Forest Stewardship Council [FSC], 1996. Retrieved from http://www.fscus.org/standards_criteria/ on 24.07.2015
L. Boyden and J. Weiner, “Sustainable libraries: Teaching environmental responsibility to communities”
[Electronic version] in The Bottom Line, Vol. 13(2), 2000, pp. 74-82.
L. Boyden and J. Weiner,“For the public good: Sustainability demonstration in public library building projects”
[Electronic version] in Public Libraries, Vol. 40(6), 2001, pp. 44-6.
H.
Fox,
“Seattle
central
library:
Water
conservation,”
2004
[Web
Video].
Retrieved
fromhttp://www.seattlechannel.org/videos/video.asp?ID=2205
New
Minneapolis
Central
Library,
MPL,
2006.
Retrieved
from
https://en.wikipedia.org/wiki/Minneapolis_Public_Library
http://libraries.universityofcalifornia.edu/groups/files/uc-circ/docs/merced.pdf Retrieved on 26.07.2015.
McCabe, G.B. (2003). “New Concepts for Technology in Library Design.” In planning the modern public
building, G.B. McCabe and J.R. Kennedy Eds,Westport, CN: Libraries Unlimited, 2003, pp. 31-45.
A.P. Lamis, "Greening the library: An overview of sustainable design." In planning the modern public building,
G.B. McCabe and J.R. Kennedy Eds, Westport, CN Willoughby (Producers). 2006. Deeper shades of green
[Television mini-series episode]. Directed by Tad Fettig,: Libraries Unlimited, 2003, pp.31-45. ISBN 0313321558
ISBN 9780313321559.
LEED,
Reference
Guide,
Version
2.2.
US
Green
Building
Council,
2005.
Retrieved
fromhttp://www.usgbc.org/DisplayPage.aspx?CategoryID=19
http://www.usgbc.org/Docs/Archive/General/Docs1095.pdf
http://ecil2014.ilconf.org/wp-content/uploads/2014/11/kurbanoglu_boustany.pdf
http://www.manlibnet.in/ConventionReport/MANLIBNET2012-Conf-Report.pdf
ISBN 1-63102-455-8
183
CLOUD COMPUTING AND ITS APPLICATIONS IN
LIBRARY SERVICES
Rajpal Singh Rajpurohit | Sr. Librarian | Lachoo Memorial College of Science & Technology | Rajasthan |
sidhartrajpal77@gmail.com
Abstract: Cloud computing is an evolving technological paradigm that facilitates conveniently,
on-demand network access to a shared pool of configured computing resources like network,
servers, storage, retrieval, applications and services etc. Information and Communication
Technology (ICT) have forced the libraries & Librarians to change in its functioning and
processing of the information retrieval system. At present, libraries are moving in advanced level
called cloud computing. In cloud computing, the libraries not required the software, operating
system and applications in the premises, which will be provided by the service providers. Through
this technology, the users can retrieve the information from any part of the world any time, and
helps to save the money, time and resources. The future librarians can provide the services
effectively without bothering about the technical problems of software, hardware. This paper tries
to explore cloud computing origin, different types, its impact in libraries, advantages and
disadvantages in library services.
Keywords: Cloud Computing; Library Services; Information and Communication Technologies; Information
Retrieval; Database Storage; Resource Sharing
INTRODUCTION
Cloud computing will be the one stop solution to share the information virtually emerged as on- demand
computing tool for network access in the form of shared computing concept. Nowadays, cloud computing is the
key term is being used in the world of Information Technology and it is the new kind of computing where the
virtual resources are shared among the users1. Through the cloud computing, it is possible to share the network,
servers, software, applications, storage, and services. The user need not buy all the software, hardware,
applications, networks and so on and need not depend on the traditional library. Instead, they can log in to the
system and get only required services, for which only they have to pay. In this method, the users will pay for
what they have used i.e. pay-per-use model.
Cloud computing helps the academic libraries to save the money, time and resources without having the
software, OS, hardware in the library premises, which are must to access the information at present. The future
libraries may be in the cloud so that libraries can focus directly
for materials and services if the libraries hardware and software are directly controlled by the could computing.
In this study, the authors have made an attempt to study about the cloud computing, its origin, types, its
application in libraries and features.
Cloud computing can transform the way systems are built and services delivered, providing libraries with an
opportunity to extend their impacts2. Cloud computing offers a new dimension in computing, it Changes how
we invent, develop, scale, update, maintain and pay for applications and the Infrastructure on which they are
run. In cloud computing data and services reside in massively scalable data centers in the cloud and can be
accessed from a web browser. Cloud computing is away of providing various services on virtual machines
allocated on top of a large physical pool which reside in the cloud, in other words cloud computers is capable of
collecting large quantity of information and resources stored in personal computers, mobile phones and other
equipment and integrate them and put them on the cloud for serving users.
WHAT IS CLOUD COMPUTING?
Cloud computing is not a new technology that suddenly appeared on the web but it is a new form of computing.
Cloud computing is a kind of computing technology which facilitates in sharing the resources and services over
the internet rather than having these services and resources on local servers/ nodes or personal devices. The
184
ISBN 1-63102-455-8
Cloud Computing And Its Applicationa In Library Services
combination of servers, networks, connection, applications and resources is defined as 'cloud'. Cloud computing
is acting as a resources pooling technology for accessing infinite computing services and resources as per
demand of users and can be compare with models of pay as you use or utility model same as used for mobile
services usages and electricity consumption.
According to Wikipedia, cloud computing is the delivery of computing as a service rather than a product,
whereby shared resources, software and information are provided to computers and other devices as a utility
(like the electricity grid) over a network (typically the Internet).
U.S. National Institute of Standards and Technology (NIST) defines Cloud computing is a model for enabling
convenient, on-demand network access to a shared pool of configurable computing resources(e.g., networks,
servers, storage, applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction. This cloud model promotes availability and is composed of
five essential characteristics, three service models, and four deployment models.
Buyya3 defined 'Cloud computing is a parallel and distributed computing system consisting of a collection of
inter-connected and virtualized computers that are dynamically provisioned and presented as one or more
unified computing resources based on Service Level Agreements (SLA) established through negotiation
between the service provider and consumers.'
Origins of Cloud Computing
The present state of cloud computing starts with emergence of Internet. The implementation of Virtual Machine
came in 1970s, when IBM released VM, allowed distinct computers processing with same environment. In this
method, each user will have computer with processor, memory and other peripherals, but majority of the
resources will be shared by others.
Telecommunication network enabled to start ARPANET (Advanced Research Projects Agency Network),
which is the forerunner for the today’s Internet. In 1971 first e-Mail was sent. In 1971, CompuServe and Source
both went online showing that commercial service providers can also host Internet. 1993, Mosaic, a graphicalbased browser emerged and soon after netscape, which was used and managed by average users. During 2000,
Salesforge.com is the pioneer in delivering enterprise-class applications over a web site. In 2002, Amazon web
services gave option to users to access, store and solution through Internet and in 2006, they went even elastic
compute cloud (EC2), in which developers may rent space for running their applications. In 2009, Google and
Microsoft delivered applications to common users and business companies in the form of simple services5. IBM
and Soft Layer were the leading in the cloud-based services.
Types of cloud computing Deployment Models
Deploying cloud computing can differ depending on requirements, and the following four deployment models
that have been identified4, each with specific characteristics that support the needs of the services and users of
the clouds in particular ways.
Private Cloud: The cloud infrastructure has been deployed, and is maintained and operated for a specific
organization. The Operation may be in-house or with a third party on the premises.
Community Cloud: The cloud infrastructure is shared among a number of organizations with similar interests
and requirements. This may help limit the capital expenditure costs for its establishment as the costs are shared
among the organizations. The operation may be in-house or with a third party on the premises.
Public Cloud: The cloud infrastructure is available to the public on a commercial basis by a cloud service
provider. This enables a consumer to develop and deploy a service in the cloud with very little financial outlay
compared to the capital expenditure requirements normally associated with other deployment options.
Hybrid Cloud: The cloud infrastructure consists of a number of clouds of any type, but the clouds have the
ability through their interfaces to allow data and/or applications to be moved from one cloud to another. This
ISBN 1-63102-455-8
185
Cloud Computing And Its Applicationa In Library Services
can be a combination of private and public clouds that support the requirement to retain some data in an
organization, and also the need to offer services in the cloud.
LITERATURE REVIEW
Various studies were conducted on cloud computing and libraries related issues such as Khan5 provided the
concept of cloud computing and also highlighted that how libraries can be benefited using cloud computing
technology by providing some live examples. Pandya6 investigated the implication issues of cloud computing in
libraries on the basis of SOWAT analysis and pointed out the strengths, weaknesses, opportunities, and threats
associated with cloud computing and libraries. Goldner 7 expressed the view with regard to cloud computing,
how cloud computing is differed from the other computing and its advantages to libraries in three basic areas:
Technology, data and community. Srivastava8 presented the vision of cloud computing with various
commercially cloud services available on the Infrastructure as-a-Service (IaaS) and found that cloud computing
is changing the way towards hardware and software for on-demand capacity fulfillment and development of web
applications to make business decisions. Sasikala9 argued the concept of cloud computing from the perspectives
of diverse technologists, services and models available, cloud standards, cloud in government, enterprises and
higher education, along with opportunities, challenges and implications on the basis past, present and future
situation. Wang10 examined the trends of cloud computing on the basis of extant information systems literature,
industry reports and practical experience reflections and also pointed out the significance of cloud computing
and its implications for practitioner and academics.
OBJECTIVES
To define the concept of cloud computing.
To discover the library services that are clubbing with cloud computing technology.
To investigate advantage and Limitations to adopt cloud computing into library services.
TYPES OF CLOUD COMPUTING SERVICES
Cloud Providers offer services that can be grouped into three categories:Software as a Service (SaaS): In this model, a complete application is offered to the customer, as a service on
demand. A single instance of the service runs on the cloud & multiple end users are serviced. On the customers
side, there is no need for upfront investment in servers or software licenses, while for the provider, the costs are
lowered, since only a single application needs to be hosted & maintained. Today SaaS is offered by companies
such as Google, Sales force, Microsoft, Zoho, etc.
Platform as a Service (Paas): Here, a layer of software, or development environment is encapsulated & offered
as a service, upon which other higher levels of service can be built.
The customer has the freedom to build his own applications, which run on the providers infrastructure. To meet
manageability and scalability requirements of the applications, PaaS providers offer a predefined combination of
OS and application servers, such as LAMP platform (Linux, Apache, MySql and PHP), restricted J2EE, Ruby
etc. Google s App Engine, Force.com, etc are some of the popular PaaS examples.
Infrastructure as a Service (Iaas): IaaS provides basic storage and computing capabilities as standardized
services over the network. Servers, storage systems, networking equipment, data centre space etc. are pooled
and made available to handle workloads. The customer would typically deploy his own software on the
infrastructure. Some common examples are Amazon, GoGrid, 3 Tera, etc.
ADVANTAGES OF COULD COMPUTING IN LIBRARY SERVICES
Following are the advantages of using cloud computing
1.
2.
186
Service oriented architecture: the cloud is provided access to resources, software, networks, applications
through web, which is controlled by remotely located data centres.
Pay per use model: it works on demand. We can demand the service for certain period like for few days
or few weeks or months.
ISBN 1-63102-455-8
Cloud Computing And Its Applicationa In Library Services
3.
4.
5.
6.
7.
8.
9.
Cost effective: The resources, services, software etc are shared by group of institutions by cutting down
the individual institutes cost. Comparing to the traditional method of computing, cloud computing billing
may be comparatively less.
Portability: since the service is available over the web, the service can be availed through browser from
any part of the world.
Eco-friendly: since it is pay for use model, consumption of electricity will be minimum. Hence, it helps
green computing.
Adjustable storage: in the traditional system, if the server is less than what we have. The server should be
replaced with the new one. In this computing, the storage capacity can be adjusted according to the needs
of the institute, since the storage is controlled by the service provider
Flexible and Innovative: new technologies will be informed as and when available with the service
provider and the service utilized will be more flexible when comparing with the traditional computing
Cloud OPAC: Most of the institutes in the world are having the catalogue over the web. These catalogues
are available with their institutes local server made it available over the web. If the catalogue of the
institutes made it available through cloud, it will be more benefit to the users to find out the availability of
materials.
When the data comes to cloud, the data becomes cloud, which can be shared among the users. The need
for storage in local server, installation, maintenance and backup is removed so that the librarians can
concentrate on innovative services.
LIMITATIONS OF COULD COMPUTING IN LIBRARY SERVICES
Any technology will have its own limitations. Below mentioned are some of the limitations in Cloud
Computing.
1.
2.
3.
4.
Moving to the trusted cloud computing service will become a challenging task.
Security: Library deals with information and has large volume of information. In order to have cloud
computing the data has to be uploaded to the cloud machine. Hence, there should be strict service level
agreement before entering into the process.
Reliability: reliability is the big question in cloud computing. Once entered in to cloud computing, if the
companies satisfy as per the service agreements, it will be good.
Data back up, intellectual property rights are the other problems which has to be taken care before.
CONCLUSION
This study provides cloud computing concepts and implications of cloud based applications in libraries in order
to enhance their services in a more efficient manner. No doubt, libraries are moving towards cloud computing
technology in present time and taking advantages of cloud based services especially in building digital libraries,
social networking and information communication with manifold flexibilities but some issues related to
security, privacy, trustworthiness and legal issues were still not fully resolved. Therefore it is time for libraries
think seriously before clubbing libraries services with cloud based technologies and provide reliable and rapid
services to their users. Another role of LIS professionals in this virtual era is to make cloud based services as a
reliable medium to disseminate library services to their target users with ease of use and trustworthiness.
REFERENCES
[1] Tuncay Ercan, “Effective use of clod computing in educational institutions”, Procedia Social and Behavioral
Sciences, 2, (2010): 938-942.
[2] G. Matt. (Winds of change: Libraries and cloud computing. OCLC Online Computer Library Center. (2010).
[Online]. pp. 5. Available: http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-windsof-change-paper.pdf
[3] Buyya, R., Yeo, C.S., Venugopal , S., Broberg, J. & Brandic, I. Cloud computing and emerging IT platforms: Vision,
hype, and reality for delivering computing asthe 5th utility. Future Generation Computer Systems, 25, (2009): 599616.
[4] Dialogic Making Innovation Thrives. A White Paper on Introduction to Cloud Computing. [Online]. Available:
https://www.dialogic.com/~/media/products/docs/whitepapers/12023-cloud-computing-wp.pdf
[5] Khan, S., Khan, S. & Galibeen, S. Cloud computing an emerging technology: Changing ways of libraries
collaboration. International Research: Journal of Library andInformation Science, 1(2). (2011).
[6] Pandya, M. Cloud computing for libraries: A SWOT analysis. 8th Convention PLANNER-2012 Sikkim University,
Gangtok, (2012). 387-394
ISBN 1-63102-455-8
187
Cloud Computing And Its Applicationa In Library Services
[7] Goldner, M.R. Wind of change: Libraries and cloud computing. BIBLIOTHEK Forschung und Praxis, 34(3),
(2010):270-275.
[8] Srivastav, K. & Kuma, A. A new approach of cloud: Computing infrastructure on demand. TRIM, 7(2), (2011):145153.
[9] Sasikala, P. Cloud computing: Present status and future implications. International Journal Cloud Computing, 1(1),
(2011): 23-36.
[10] Wang, W.Y.C., Rasid, A. & Chung, H.M. Toward the trend of cloud computing. Journal of Electronic Commerce
Research, 12(4), (2011):238-241.
[11] Anna Kaushik and Ashok Kumar, “Application of Cloud Computing in Libraries”, International Journal of
Information Dissemination and Technology, 3 no. 4, (Oct.-Dec. 2013): 270-73.
[12] Kulveen Kaur, “Moving libraries to the cloud”, International Journal of Information Dissemination and Technology
4, no.1, (2013): 28-30.
188
ISBN 1-63102-455-8
ROLE OF E- RESOURCE MANAGEMENT IN ACADEMIC
LIBRARIES
Dr. Pankaj Kumar | Assistant Professor – Library | A.K.P. (P.G.) College | Khurja | Bulandshahr | U.P. |
pankaj.lib123@gmail.com
Abstract: Academic system largely relies on teaching, learning and research. Eternally,
education depends on information resources. These resources are the driving forces for making an
educated society. The educated society can exit only when information is stored, shared and
utilized properly in an academic arrangement; both ‘education’ and ‘library’ are inseparableindivisible concepts. Working for the promotion and evolution of teaching, learning and research
for greater use of academia. It is the age of information, every person, and industry also a country
that has information is powerful. But every of the person who has current information is more
powerful than others; that can be solved through electronic sources it is because e-resources can
accessed with short time throughout the world. Electronic resources are one of the emerging
environment in libraries & information communication in the competitive service. E- Recourses
usually consist of e-books, e- journals, articles, newspaper, thesis, dissertation, databases and
CD-ROMs, which are likely to be the alternative to the print media. Emerald, Ebsco, Scopus are
some of the examples of online databases. All updated information is published in these eresources. The familiarity and use of electronic information resources in the libraries for rapid
development is necessary and important. This paper explains types of E-resources, need of Eresources as well as features of E-resources. This paper also discusses about the advantages and
disadvantages of E-resources.
Keywords: Electronic Resources, Electronic Resource Management (ERM), E- Journals, E- Books, Features of
E- Resources.
INTRODUCTION
Electronic Resource Management (ERM) is the practices and software systems used by libraries to keep track of
important information about electronic information resources, especially internet-bases resources such as
electronic journals, databases, and electronics books. The most time consuming and labor intensive aspect of
populating an electronic resource management system is the input of terms and conditions from license
agreements. Meridian and other commercial ERM systems provide pre- defined fields to documents usages
rights and restrictions. The capability to store an entire license agreement and link to the full text of terms and
conditions housed on vendor websites is also available.
An electronic resource is defined as a resource which requires computer access or any electronic product that
delivers a collection of dada, be it text referring to full text bases, electronic journals, image collections, other
multimedia products and numerical, graphical or time bases, as a commercially available title that has been
published with an aim to being marketed. These may be delivered on CD- ROM, on tape, via internet and so on.
Over the past few years, a number of techniques about related standards have been developed which allow
documents to be created and distributed in electronic form. The e- resource on magnetic and optical media has a
vast impact on the collections of university libraries.
E-resources starting get developed during year 2001-2002 as a result carry out by Tim Jewell at the University
of Washington. The digital library federation and NISO began a continued effort in May 2002 to develop
electronic data. These standards were published in 2004 as electronic resources management; report of DLF
ERM initiatives. Science the publication of the report several vendors of integrated library system have released
ERM products. Till them the contribution of E- resources in literary field is increasing day by day.
“Electronic resources includes website, online databases, e-journals, e-books, electronic integrating resources
and physical carriers in all formats, whether free of fee based, required to support research in the subject
covered, may be audio, visual or text files etc.”
ISBN 1-63102-455-8
189
Role of E- Resource Management in Academic Libraries
TYPES OF E- RESOURCES
Types of E-resources are:
E-Books: An e-book is an electronic version of book that can be read by using a personal computer or by using
e-book reader. User can purchase an e-book on diskette or CD. A e-book available fully electronically via a
web site on the internet; E- books are preferred by the users for their features like portability, upgradability, note
making, citation, changeable font size, references links to other relevant sites, searching etc.
E-Journals: E-Journals are available in the electronic form and can be accessed using computer and
communication technology. It could be available free or as part of a paid service. E- Journals have now become
a major source of information delivery for scholars and researchers. Their timely production, delivery,
Incorporation of multimedia, hyper linking and searching facility has attracted the interest of people.
Library catalogs: Most libraries now provide access to their catalogs from their web sites. Many others provide
information about their holding into larger databases such as World Cat or the RLG Union Catalog the Library
provides links to these catalogs under the “Catalogs” section on its web site.
Reference sources: Many dictionaries, almanacs, encyclopedias, and other reference sources are now available
online in full-text; you can locate these resources through the Library’s Database Finder, the Library Catalog or
through many of the Library’s Research Guides by Subject.
Statistical Sources: The library has access to a variety of subscription databases which provide economic data
or statistics. You can locate these resources through the Library’s Database, the Library Catalog, or through
many of the Library’s Research Guides by subject. Be aware that there are many statistical sources available in
print which cannot be found online.
CD-ROM: CD-ROM is a non volatile optical data storage medium using the same physical format such as
audio, compact discs, readable by a computer with a CD-ROM drive. Various dictionaries, directories, year
books are available on CD/DVD ROM.
Sound Recording: There are only a few Library databases which provide access to sound recordings. If you are
looking for music online, start at the Music Subject Guide for the resources which are available to the University
of Chicago Community.
Image Databases (Art, Maps, Medical, etc.): Some databases include graphic or images, such as photos,
paintings or maps. You can use the Database Finder page to locate these. The art subject guide also provides
extensive information about locating images.
Hard Disk: It includes Hard Disk of Library Server or Organization Server. It provides 24x7 accessibility of eresources.
Other Portable Devices: It include pen drive, we can easily shift huge data in electronic form from one place to
another place.
NEED OF E- RESOURCES
To providing current information.
To find the objectives of the organization.
Save the time of users and staff.
Users can find his/her desired information.
To solve the problem like space in library.
To solve the problem like information explosion.
FEATURES OF E-RESOURCES:
There are some important features of E- resources:
190
E- resources can be used by multiple users at a time
E-resources can be accessed very fast. We can access desired information through online within
minute.
Electronic resources are having remarkable effect on information value chain.
Electronic resources are used for the modernization of the library and information centers.
ISBN 1-63102-455-8
Role of E- Resource Management in Academic Libraries
It can be used for optimum utilization of library resources.
The open sources electronic resources can be used for the content management.
They are supporting in archiving and preservation of cultural and heritage knowledge.
Electronic resources can be utilized for the electronic publishing.
Digital resources are facilitating information storage and retrieval.
E-resources can be storage easily. It can be secured on CD, DVD, Pen Drive and Hard Disk. It covers
minimum space.
E-resources are not time bound. It can be accessed in 24x7 at any place.
ADVANTAGES OF E- RESOURCES:
Main advantages of E- Resources are:
Save the Time of Users: E- Resources save the time of the users; in past times whenever any user of
the library want to get any information from the library, then most of the time of the user was spent on
getting the information within the library. But now users can get any desired information within or
outside the library in electronic form through online at any time and any place.
Quick Retrieval: Library users can retrieval needed information in less time in the form of E-resources
on computer screen. It is available quickly.
Common platform: E- resources provide common platform for all users, because all e-resources are
available on library sever in online mode and users are free to use this service without any cost.
Therefore huge e-collection can be used by users on common platform.
Multi access: A networked product can provide multiple point of access at multiple points in time (24
hours a day & 356 days in a year) and to multiple simultaneous users.
Flexibility: E- Journals evolved quickly. They are not tied to a format, printer and distribution
network.
Space: E- Resources solve the space problem. Library collections in printed form cover the maximum
space of the library but e-resources covers minimum space.
Budget: E-Resources are less expensive than printed form. It includes cheap and best collections.
Download: E-resources can be easily downloaded through internet at nay place of the world at 24x7.
Speed: - An electronic user is a lot quicker to browse or search, to exact information form and to
integrate that information into other material and to cross search or reference between different
publications.
Easily searchable: each journal can be searched quick and easy often through the complete full text or
articles and via online index.
Links: Hypertext format should be exploited and links to related articles, information on other web
sites, stable URLs for individual articles and email alerts when latest issue loaded.
DISADVANTAGES OF E- RESOURCES
Main Disadvantages of E- Resources are:
E-resources are very costly. If any library wants to subscribe, it individually it will be managed very
costly.
Difficulty reading computer screens.
Limitations of computer monitor.
Some users of the library prefer printed books therefore they can’t prefer e-resources.
Search engine ignores PDF files.
Accessibility of e-resources always depends upon internet connections.
ISBN 1-63102-455-8
191
Role of E- Resource Management in Academic Libraries
CONCLUSION
To conclude we can say that in near future impact of E- resources will increase and information will become
like the meal. It is because scientists, teachers and research scholar as well as general society are depending on
E- resources. E-resources are important part of the library collection. Any library can't satisfy in users without
purchase or subscribe E- resources. Today library users are more aware they want to get required document or
information in less time and their demands can be fulfilled through E-resources.
REFERENCES
[1] Bhataini, Suamn. (2013). E- resources: usage in Delhi University Library System
www.nlist.inflibnet.ac.in/(accessed on 26/03/2013)
[2] Govindaraju, Nemani. (2010). Use and user awareness of E-resources in Andhra University Library: A
study. PEARL: A journal of library and information science, 4(3), pp.183-188.
[3] Narayana, Pooranima. (2005). E- Resources Management through portal: A case study of technical
information center. International conference of knowledge management (ICIM 2005), 222-25 Feb 2005,
pp.17-19.
[4] Singh, Pravin Kumar and Prasad, H.N. (2011) Access web-based electronic resources in agricultural
research. Trends in Biosciences, Kanpur, 4(1), pp. 5-7.
[5] Sinha, Manoj Kumar; Sinha, Gauri and Sinha, Bimal. (2011). Usage of e-resources available under UGCINFONET digital library consortium by Asaam University Library Users. 8th international caliber-2011,
Goa University, Goa. March 02.04.2011.
[6] Vishakhi, P. (2009). Consortium for e-resources in agriculture. DESIDOC Journal of library &
information technology, 29 (5), pp.24-30.
[7] http://inflibnet.ac.in/econ/ (accessed on 30 March 2013).
[8] http://en.wikipedia.org/ wiki/library.
192
ISBN 1-63102-455-8
TOTAL QUALITY MANAGEMENT IS NOT A QUICK FIX
FOR LIBRARIES
Dr. MANGE RAM |Deputy Librarian & Incharge | Central Library | Dayalbagh Educational Institute |
Dayalbagh, Agra | U.P. | mram721@rediffmail.com
Abstract: The present paper explores the concept of Total Quality Management in general and
application to libraries. TQM is not a quick fix solution for the libraries, it takes time for
application. TQM means quality in all aspects, operations, services, personnel and products of
any organisation or company. Measurement of application of TQM in libraries is not an easy task
as its measurement comes from library personnel’s satisfaction and most form the users of the
libraries. Users are different kind nature and satisfaction of all users in libraries is not an easy
task. The present paper explores above all concepts of Total quality Management.
Keywords: Total Quality Management, Library, Library Process.
INTRODUCTION
Total Quality Management is a management approach that initiated in the 1950-51 and has gradually become
more popular since the early 1980-81. In the aftermath of the Second World War, American industry, basking in
success, did not want to listen to Dr. Edward Deming’s quality philosophy. In 1950 he was sent to explode postwar Japan by the MacArthur Government- as an adviser to the Japanese census. While he was there, he met
some of the members of the Japanese Union of Scientists and Engineers (JUSE) with the intention of helping
them to rebuild their industry. He spoke to some 100 (hundred) Japanese senior managers about his quality
philosophy. At the same time, Dr Joseph Juran was also stressing to Japanese the customers’ point of view of a
product’s fitness for use, and was advocating extensive training and hands-on management to satisfy customer’
requirements. The Japanese industrialists listened to Deming and Juran and learned from their teaching. The
result was that they apprehended markets all over the world and today, Japanese companies are not just
competitive but they dominate the world market and, true to Dr Deming’s predication’ the rest of the world is
seeking protection from them. In 1970, Oil crisis forced Japan to eliminate waste in the use of all resources as a
matter of survival. This involved the involvement of all organization personal to work towards one common
objective. In the true sense, then, TQM was launched providing an ultimate way of quality thinking shared by
everyday in the organization.
Some of the companies who have implemented TQM include Ford Motor Company, Phillips Semiconductor,
SGL Carbon, Motorola and Toyota Motor Company.
TQM DEFINED
Total Quality Management, TQM, is a method by which management and employees can become involved in
the continuous improvement of the production of goods and services. It is a combination of quality and
management tools aimed at increasing business and reducing losses due to wasteful practices.
The modern concept of quality is defined as conformance to requirements, and requirements are defined as the
task to be accomplished in meeting customer needs. Quality cannot be examined into the products or services;
the customer satisfaction must be designed into the whole system. The confirmation check then makes sure that
things according to plan.
In general, TQM is defined as follows:
•
•
•
Quality is to satisfy agreed customer requirements continually.
Total quality is to achieve quality at low lost.
Total quality management is to obtain total quality by involving everyone’s daily commitment.
Some of the management experts like Jurow & Barnard define TQM as “a system of continuous improvement
employing participative management and centred on the needs of customers.
ISBN 1-63102-455-8
193
Total Quality Management Is Not A Quick Fix For Libraries
According to ISO definitions Total Quality Management is “management approach of an organisation centred
on quality, based on participation of all its members and aiming at long terms success through customer
satisfaction and benefits to all members of the organisation and society. ”
J. L. Riggs (1979) says that “Today quality control is taking on the emphasis of quality assurance the means to
achieving true product reliability. Reliability cannot be inspected into a product; it must be designed and built
in”
TQM is a management philosophy that seeks to integrate all organizational functions (marketing, finance,
design, engineering, and production, customer service, etc.) to focus on meeting customer needs and
organizational objectives. The ability to fulfil customer requirements is essential not only between companies
but within the same company. In every organisation, every department, every section and even every small unit
is a series of customers and suppliers. The secretary of a department is a supplier to the head of the department.
He/She has to meet his/her customer‘s requirements.
FACTS OF TQM
The quality philosophies of Deeming which have given birth to TQM and have created the second industrial
revolution in the world. They are the following list of 14 points for management (see Deeming, 1986; Neave,
1987) which created revolution:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Constancy of purpose: create constancy of purpose for continual improvement of product and service.
The new philosophy: adopt the new philosophy. We are a new economic age, created in Japan.
Cease dependence on inspection: eliminate the need for mass inspection as a way to achieve quality.
End ‘lowest tender’ contracts: end the practice of awarding business solely on the basis of price tag.
Improve every process: improve constantly and for every process for planning, production and service.
Institute training on the job: institute modern methods of training on the job.
Institute leadership: adopt and institute leadership aimed at helping people and mechanics to do a better
job.
Drive out fear: encourage effective two-way communication and other means to drive out fear throughout
the organization.
Break down barrier: break down barrier between department and staff areas.
Eliminate exhortations: eliminate the use of slogans, posters and exhortations.
Eliminate targets: eliminate work standards that prescribe numerical quotas for the workforce and
numerical goals for people in management.
Permit pride of workmanship: remove the barriers that rob hourly workers, and people in management, of
the right to pride of workmanship.
Encourage education: institute a vigorous programme of education and encourage self-improvement for
everyman.
Top management commitment: clearly define top management’s permanent commitment to everimproving quality and productivity.
APPLICATION OF TOTAL QUALITY MANAGEMENT IN LIBRARIES
A universal misinterpretation about quality is that it is only concerned with objects in industries and companies.
This is not true, as we know that hospital, banks, hotels and retail shops already documented the facts that
quality of service is an essential factor in the customer’s decision to be a regular customer. Manufacturing
companies are also beginning to understand the necessity of quality of service to retain customer, and the need
for well-trained, obliging and well-informed staff to maintain quality of service. It is not only the person with
direct involvement with the customer who has to establish these qualities, but also the support staff who must
have the same goals of fulfilling customer needs in any organisation.
Now service provider organisation are also taking much interest in application of TQM as it prove its impotence
in an efficient way. Now, libraries are also starting to understand the requirement of quality of service to retain
customer, and the need for well-trained, obliging and well-informed staff to maintain quality of service in the
library. Now the entire environment of libraries has changed from traditionally to electronically in a modern
194
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
way of technology. The physical form of collection has changed drastically as result of recent developments in
resources of libraries transformed into e-resources and in this environment the application of TQM may support
to library manager to justify their roles.
The application of Information Technology compels library personals to shift from the traditional form of
library practices to the one which delivers the best of services conforming to the user’s requirements. User is
most important to a library; if he /she is not satisfied with the library services then he/she looks certainly another
alternative. User is the main determinant of the standard for quality of service in library and information centres.
The librarian/information officer should identify reader’s requirements and set certain goals to be achieved, thus
reducing the dissatisfaction of the readers.
TQM in Collection of Library
Library should be design standard and well defined “acquisition policy” for ensuring qualitative (rather than
quantities) and balanced (rather than uneven) growth of their library collection through joint efforts with their
respective users community. Library manager should keep the following points in mind:
•
•
•
•
Qualitative approach to acquisition rather than quantitative.
Selection of material should be based on user’s requirements rather than on approval.
Promptness in delivering and payments etc.
Neatness in budget keeping.
TQM in Library Process
Now, users have approach to OPAC (Online Public Access Catalogue) and WebOPAC instead of manual
searching of documents. We may no longer be fussy about punctuation marks and other such little useful aspects
prescribed by the catalogue codes rather should instruct the machines to do all sorts of permutation and
combinations in doing all such jobs for our patrons in desired fashions.
TQM in Library Services
TQM should be applicable in all services of library (reference service, scanning, printing, reprography, internet
service, user education, e-journal and eBook services etc.) in an efficient way to facilitate user in qualitative way
instead of quantified way. Library personnel should create the awareness about the resources, services and
facilities provided by their libraries. There should be maximum utilization of library resources with the
provision of information literacy program.
Circulation
TQM presuppose that the systems in operation should by and large provide for quick and accurate information
on 1) Where a particular document is at any given point of time; 2) it when due for return, if issued 3) how to
reserve it 4) subject wise issue/return statistics, etc. so essential indicators for ensuring judicious & optimum use
of the collection; and further enriching the collection. Now, we may justify the application of TQM in
circulation service with the application of ICT.
ROLE OF LIBRARY PERSONNEL IN TQM
Quality is not just the responsibility of one person in the organisation. This is the message. Everyone involved
directly or indirectly in the production of an item or in the performance of a service is responsible.
Unfortunately, something that is viewed as everyone’s responsibility can fall apart in the implementation phase
because one person may feel that someone else will follow the appropriate procedures . Library personnel play
any important role in application of TQM, they the basic and important assets of any library. Any thinking on
the TQM would be incomplete if the most crucial element-the people (staff), responsible for the making it
happen are not given due attention. Quality will definitely come up when every individual in the library is taken
into self-assurance and when all of them are made clear about the library’s mission, goals and objectives. This
element presupposes that the pursuit of quality must begin from the top down. Training and retraining
employees is an essential element in the quality process in any library.
ISBN 1-63102-455-8
195
Total Quality Management Is Not A Quick Fix For Libraries
TQM IS NOT A QUICK FIX
TQM is a continuous process of any organization like libraries, it takes time. There are many stages in
application of Total Quality Management. The process of TQM in any organisation can be developed in the
following four stages:
a)
Documentation and preparation
• Identifying and collecting information about the organisation in the prime areas where improvement
will have most impact on the organisation’s performance.
• Preparing the detailed basic work for improvement of all the organisation’s activities.
b) Management understanding and commitment
• Making sure that the management understands the objectives and methodology of TQM and are
prepared to adopt them all the time.
c)
Arrangement for improvement
• Identifying and resolving quality issues by involving all management and supervision in a proper
scheme of training and communication.
d) New creativity , new target and critical examination
• Starting new initiative with new targets and taking the complete improvement process to everybody,
indicating suppliers and customer links in the quality chain.
• Obtaining information about progress and consolidating success.
Total quality improvement can be achieved rapidly by the proper use of appropriate quality techniques.
Choosing the right kind of techniques for the TQM process is one of the vital roles of senior management and
the degree of success will depend on their skill.
TQM is Continuous Process
TQM is mainly concerned with continuous improvement in all stages, from high level strategic planning and
decision-making, to detailed execution of work elements on the shop floor. It stems from the belief that mistakes
can be avoided and faults can be prevented. It leads to continuously improving results, in all aspects of work, as
a result of continuously improving capabilities, people, processes, new technology and machine capabilities.
Continuous improvement must deal not only with improving results, but more importantly with improving
capabilities to produce better results in the future. The five major areas of focus for capability improvement are
demand generation, supply generation, technology, operations and people capability. A central principle of
TQM is that mistakes may be made by people, but most of them are caused, or at least permitted, by faulty
systems and processes. This means that the origin cause of such mistakes can be identified and removed, and
repetition can be prevented by changing the process.
It is clear that TQM is a continuous process for the improvement and it takes time. TQM does not come in a day
or month or one year, TQM is not a quick fix, it takes time for application in any organization.
TQM MEASUREMENT
There are many tools and approaches to measuring the quality, some of them as follow:
(i)
(ii)
(iii)
(iv)
(v)
196
User/Customer Survey
User’s/Customer complaints
Suggestion Boxes
Organisation Culture
Human Resource management
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
BARRIERS OF TQM
There are some barriers of TQM which comes time to time in all stages in application of TQM. While TQM
clearly has positive aspects, implementing it can have potential challenges as well. Jurow and Barnard (1993)
identified four barriers to the adoption of TQM in libraries: 1) vocabulary: objections to terms such as “total,”
“quality,” and “management” which imply that high standards are not already being met; 2) commitment: TQM
takes several years to implement and require a long-term commitment by library managers; 3) process: our
culture tends to be impatient and we try to solve problems quickly, contrary to TQM’s careful process analysis;
and 4) Professionalization: profession staff can be resistant to turning over their practices and services to what
they are perceive as the “uniformed whims of the customer.” Sirkin (1993) also notes that it is not possible to
satisfy everyone’s demand s; choices will need to be made.
CONCLUSION
Total Quality Managements was initiated basically for profit making organisation, industries and companies
etc., after the success of TQM in these organisation, it gradually entered in service provider organisation like
hospital, railways, education and libraries etc. Libraries are idyllic place to implement total quality management.
Libraries are service organisations dedicated to their customers, the patrons. By formulating a strategic plan, and
following it with a commitment to continuous quality improvement, library managers can convert and improve
their organisations (Riggs 1992) summarizes the notable principles of TQM: 1) manage by fact: make library
decision after careful analysis of data gathered with tools 2) eliminate rework: library work is often labour
intensive-simplify it and make sure it is done properly the first time; 3) respect people and ideas: staff are the
library’s most valuable resources, and they should be encouraged to point out problems without fear of
management; and 4)empower people: trust library staff to act responsibly and give them the appropriate
authority to make decisions that can improve the quality of work they do. Finally, remember that TQM is not a
“quick fix”. It needs to implement gradually over a two –to- three year period.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
Jurow, S and Barnard, S.B., Ed. (1993) Integrating total quality management in a library setting. Binghamton, NY,
Haworth Press.
Daleja, Suresh & Saurabh (1999). ISO 9000: A manual for total quality management, documentation and
certification for ISO 9000. New Delhi, S. Chand.
Ahluwalia, JS (1997). Total quality management: the transforming role of quality in a turbulent world. New Delhi,
Tata McGraw-Hill.
Mitra, Amitava. (1998) Fundamentals of quality control and improvement 2 nd ed. Delhi, Pearson.
Jurow, S. and Barnard, S.B. (1993). Introduction: TQM fundamentals and overview of the contents. “Journals of
Library Administration” 18 (1/2). 1-13
Sikrin, A.F. (1993). Customer service: Another side of TQM. “Journal of Library Administration,” 18 (1/2), 71-83
Riggs, D.E. (1992). TQM: quality improvement in new clothes. “College & Research Libraries” 53 (6), 481-483
(Ej 454720)
ISBN 1-63102-455-8
197
DIGITIZATION PROCESS IN LIBRARY AND
INFORMATION CENTER: PROBLEMATIC APPROACH
Kasifa Khatoon | Library Assistant | Integral University | Lucknow | kashifa.khatoon96@gmail.com
Aslam Ansari | Library Assistant | Integral University | Lucknow | aslam.dlis@gmail.com
Abstract: This paper examines the concept of digitization. The cognitive flexibility, relational
communication and non-verbal immediacy communication theories were used for illustration. It
also discusses the challenges often encountered during digitization and the implications for
planning and policy. It also revealed that the purposes of digitalization are: to enhance access
and improve preservation of library materials. A number of challenges are encountered in the
process of digitizing library materials. These challenges include human and technical problems,
which have implications for planning and policy. It was concluded that digitization is an essential
task in modern day libraries, because of the current challenges, and the need to go digital, that is,
provide online services.
The new activities, methods and technology used in digitization and formation of digital libraries.
Digital Libraries are being created today for diverse communities and in different fields e.g.
education, science, culture, development, health, governance and so on. With the availability of
several free digital Library software packages at the recent time, the creation and sharing of
information through the digital library collections has become an attractive and feasible
proposition for library and information professionals around the world. Digitization and digital
preservation are very vital to preserve cultural heritage collections, and also make them
accessible to the scholars and public. There are document resources, especially manuscripts and
rare books, which are very valuable, but they are not allowed to be accessed due to concerns of
damage to original documents. By digitization, the originals can be safely secured and the copies
used by researchers for any required information.
Keywords: Digitization, Digital Preservation, Digital Library, Library and information Center.
INTRODUCTION
In recent years Technologies are changing very fast .Library professionals are searching for the new roles in
order to fit themselves into space that is referred to as digital world Librarians. So, there should be improved
processes and additional technological tools that will help to manage information. The most important one is to
preserve the documents through digitization and making them accessible on demand or when needed.
“Digital Preservation” refers broadly to the series of managed activities necessary to ensure continued access to
digital materials for as long as necessary, such as collection, description, migration and redundant storage. The
materials subjects to digital preservation may be born digital or be the products of digitization projects. Digital
preservation activities are undertaken by a range of preservation institutions, including libraries, archives and
museums. Such institution may operate independently or may be located within other bodies, such as
educational institutions or government entities.
Traditional preservation strategies, such as providing appropriate storage and environmental conditions, are still
necessary in the digital environment, but they are not enough to ensure that digital information is preserved.
DIGITIZATION
Digitization is the process of converting analog information into digital format. The Materials to be converted
could be letters, manuscripts, books, maps, audio recordings, microform etc. Three dimensional objects can also
be digitized. The goal of digitization is to improve access to the materials. To that end, most digitized materials
become searchable via databases on the internet.
198
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Libraries collect and preserve sources of information in order to serve the relevant among them to information
seekers. The most obvious benefit of digitization is to preserve and provide the aggregation of various resources,
in digital form, using digital technology. Resources are preserved for future generation and simultaneously these
are made accessible for the current use also. In order that the materials to be digitized, they may be converted
using a method to capture the materials digitally with the help of scanning, digital photography, digital
recording, without altering the information that the materials contains. That means the digital representation
contains the same information /data as the analog representation.
A wide variety of equipment is available to assist in this process. Standards and guidelines exits in order to
ensure that the conversion processes used are consistent and correct so that the results are of a high quality.
DEFINITION
Digitization implies conversion of documents and art works into digital images. Digital images here mean
electronic copies of documents. It is a process in which materials are converted from the hard copies to
electronic copies. According to Arora (2009) digitization and digital preservation are related to each other in a
number of ways. One of the main goals of digitization is to preserve rare and fragile materials by making them
accessible to multiple numbers of users simultaneously. In India, digitization and preservation are a major focus
of libraries, which have been building their in-house databases and have begun subscribing to electronic
resources and other computer-based services since the mid-1980s. The author discusses the challenges involved
in preserving digital content and looks at a number of digital preservation strategies. Witten & David (2003)
defined digitization as the process of taking traditional library materials, that are in the form of books and papers
and converting them to the electronic form, where they can be stored and manipulated by a computer. This
basically involves changing analog data into a digital form, so that it is easier to access and also has a long study
life. According to Bist (2009) digitization is an important aspect of developing digital libraries, as it opens up
new avenues of access, use, research and preservation of valued information resources. The goal of digital
preservation is the accurate rendering of authenticated content over time.
STEPS FOR DIGITIZATION & DIGITAL PRESERVATION
The following points need to be considered:
Selection of samples and producing test images.
Preservation quality images- its types and resolution enhancement, grayscale and color
Image compression
Defining and deriving access quality images
Hardware for scanning
The Actual works starts for the digitization of the document. The document is scanned with the suggested type
and resolution and then the images are compressed and stored in the archival storage. To link the images from
point to point, programmers are prepared using HTML, and Microsoft Front Page packages. The access is given
by WWW browser to the users.
Tools: Primary tools required for digitization of documents can be categorized into:
Hardware
Software
Hardware:
1.
2.
3.
4.
Computer: Since the power of digital images creation lies in computer, speed of computer is of vital
concern.
Storage Devices
Monitors
Digitizing devices
Scanners
ISBN 1-63102-455-8
199
Digitization Process In Library And Information Center: Problematic Approach
5.
Digital Camera
Output Devices
Printers
Modem and CD/DVS
Software
There are number of software, which can be used for different functions
For Editing images
For Page layout programmes, to integrate text and graphics
File transferring utilities, to share files between computer platforms.
File translation programmes, to convert files from graphics.
File compression software
DIGITIZATION VERSUS DIGITAL PRESERVATION
There is a common misconception that to digitize something is the same as digital preservation. To digitize
something is to convert something from an analog into a digital format. An example would be scanning a
photograph and having a digital copy on a computer. This is essentially the first step in digital preservation. To
digitally preserve something is to maintain it over a long period of time
Digital preservation is more complicated because technology changes so quickly that a format that was used to
save something years ago may become obsolete, like a 5 1/4” floppy drive. Computers are no longer made with
them, and obtaining the hardware to convert a file from an obsolete format to a newer one can be expensive. As
a result, the upgrading process must take place every 2 to 5 years or as newer technology becomes affordable,
but before older technology becomes unobtainable. The Library of Congress provides numerous resources and
tips for individuals looking to practice digitization and digital preservation for their personal collections.
Digital preservation can also apply to born-digital material. An example of something that is born-digital is a
Microsoft Word document saved as a .docx file or a post to a social media site. In contrast, digitization only
applies exclusively to analog materials. Born-digital materials present a unique challenge to digital preservation
not only due to technological obsolescence but also because of the inherently unstable nature of digital storage
and maintenance. Most websites last between 2.5 and 5 years, depending on the purpose for which they were
designed
Many libraries, archives, and museums, as well as other institutions struggle with catching up and staying
current in regards to both digitization and digital preservation. Digitization is a time-consuming process,
particularly depending on the condition of the holdings prior to being digitized. Some materials are so fragile
that undergoing the process of digitization could damage them irreparably; light from a scanner can damage old
photographs and documents. Despite potential damage, one reason for digitizing some materials is because they
are so heavily used that digitization will help to preserve the original copy long past what its life would have
been as a physical holding.
Digitization can also be quite expensive. Institutions want the best image quality in digital copies so that when
they are converted from one format to another over time only a high-quality copy is maintained. Smaller
institutions may not be able to afford such equipment. Manpower at many facilities also limits how much
material can be digitized. Archivists and librarians must have an idea of what their patrons wish to see most and
try to prioritize and meet those needs digitally
PROBLEMS IN DIGITIZATION
A number of challenges are encountered in the process of digitizing library materials. These challenges include
human and technical problems, which have implications for planning and policy. It was concluded that
digitization is an essential task in modern day libraries, because of the current challenges, and the need to go
digital, that is, provide online services, the new activities, methods and technology used in digitization and
200
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
formation of digital libraries. It set out some key points involved and the detailed plans required in the process,
offers pieces of advice and guidance for the practicing Librarians and Information scientists.
Even though libraries and librarians all over the world are marching towards digitization, there exist some
constraints in the process and their maintenance. The problems facing digitization are
Longevity of Storage media
Many of the storage media praised by people all over the world may become less useful only long after they
become unreadable. Thus documents digitized and stored in such media become useless and their maintenance
will be more difficult than print media. The digital archival media today used are magnetic tapes, CD-ROM
discs and DVDs. From the scene magnetic tapes disappeared because of their short life due to demagnetization,
material decay and oxidation.
During 1980’s CD-ROMS emerged into the field and boasted of a longer life span of 30-100 years. Now a day’s
most of the CD’s go to the way of 51/4 diskettes. DVD having several standards pushed CD’s behind the screen.
The changes and improvements of storage medium put serious questions about the future of digitized materials
and their alteration.
Technology obsolescence
The technology behind digitization is undergoing drastic changes continuously. The computer hardware,
software, storage media etc are undergoing great revolution. The digitized materials become unreadable
if the background devices become obsolete as time passes by which ultimately results in the loss of Digitization.
Migrations
The periodic change of digital systems from one configuration to another to overcome the problem caused by
technological obsolescence is termed as migration. Migration to a new storage system is more expensive and
this will ultimately result in the loss of data.
Selections of Documents
In an age of information explosion and information pollution, librarians are in a dilemma about ‘what types of
records are to be digitized’ and ‘what type of records not to be digitized’. The documents in high demand today
may become obsolete even tomorrow because of the vast developments in the subject and printing and
publishing industry. A digitized document deselected from the collection is lost forever.
To overcome the problem, librarians should seek the advice of subject experts in each field and users of the
library about the importance of each and every record and from this list selection of records for digitization can
be done.
Copyright
The issues regarding copyright raise serious matters before librarians in digitization. Research scholars usually
include graphs, data from books and journals without prior permission of the author. In a digital library users are
always demanding back issues of journals and rare historical archives for which the library has no copyright.
This may lead to serious dissatisfaction about digitization among users. As a final solution to this matter,
librarians must be given permission to digitize copyright works in connection with digitization
The main problems faced by Indian libraries were human resource and IT support, while inadequate funding
was the main problem for a majority of Iranian libraries. A large segment of Indian libraries stored digitized
material on local computers and CDROMs, DVDs, while a majority of Iran libraries stored digitized materials
on departmental servers and central institution servers.
CONCLUSION
A large majority of Indian libraries used 'AC with low temperature' and 'chemical treatment' for preservation,
whereas a majority of libraries used 'anti-termite' and 'chemical treatment' for preservation of heritage collection.
Microfilming was the most preferable method among libraries for preservation of heritage collections for the
ISBN 1-63102-455-8
201
Digitization Process In Library And Information Center: Problematic Approach
development of digital preservation; a large majority of Indian libraries preferred 'an in-house digital repository.
Many studies also revealed that, there was demand for using digitized manuscripts and rare books, by the
respondents. Hence, it is opined that libraries should digitize more of their resources based on the materials that
are in demand. Most of the respondents preferred online open access for using of digitized materials. Hence, it is
recommended that access to digital material in the field of heritage resources should be made on-line and free of
charge.
It can be concluded that digitization will help to preserve heritage resources as well as retrieval of information.
What is most important is augmenting the existing programme of sharing the resources in the holdings of these
libraries in the networked environment with scholars and the general public. The heritage holdings libraries have
to be freely accessed and shared for mutual and reciprocal benefits.
It therefore now common, to find more and more information being digitized, and uploaded into the internet or
on compact discs so that it is globally accessible, easily and quickly
The digitization of collection of a library opens its doors to the world so that local collections get a wider
exposition. In the field of Science and Technology, there is emergence of interdisciplinary and multidisciplinary
subjects and research reports. Articles are being published in science journals in a huge amount than in the parts.
The escalating price of the journals is not affordable to each library. The emergence of E-journals and
digitization of journals abstracts and indices reduce the burden of their procurement and save storage of space.
Although there are drastic changes in digital technology, finance,
Staff training, manpower, infrastructure etc are serious problems to be tackled before libraries attempt for
digitization. In a country like India having great history in traditional medicine, ancient art, culture, architecture,
etc, the information that our great ancestors gave us through inscriptions, archives, and through rare books is to
be digitized for our future generation.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
202
Arora, J. (2009). Digitisation and digital preservation. DESIDOC Journal of Library and Information Technology,
29(2), 82-84.
Bist, R. S. (2009). Digitization initiatives of LBSNAA library: A case study. SRELS Journal of Information
Management, 46(3), 267-275.
Digital Library Federation. (2001), Registry of Digitized Books and serial publication. (accessed June 10, 2015)
http://shodhganga.inflibnet.ac.in/ (accessed June 10, 2015)
http://www.ala.org/alcts/resources/preserv/defdigpres0408(accessed June 12, 2015)
http://www.dpconline.org/(accessed June 20, 2015)
https://en.wikipedia.org/wiki/Digitizing#cite_note-30(accessed July 10, 2015)
https://en.wikipedia.org/wiki/Digitizing#cite_note-31(accessed June 23, 2015)
https://www.google.co.in(accessed June 15, 2015)
Prasher, R. G, and Sharma, R.K(2012)ICT Based Information Management in Indian Libraries. Bookwell, New
Delhi.
Witten, I. H. & David, B. (2003). How to Build a Digital Library. London: Morgan Kaufman, Publishers.
ISBN 1-63102-455-8
LIBRARY REACH TO USER THROUGH SOCIAL MEDIA:
PROSPECTS AND PROBLEMS A PRACTICAL APPROACH
TO LPU
Jitu Mani Das | Central Library | Deputy Librarian | Lovely Professional University | Phagwara | Punjab |
dasjitumani7@gmail.com
Abstracts: Social Networking tools such as Facebook, Blog, Tweeter, Orkut, Google+, LisLink
are popular among the young generation. It attracts users to communicate with similar interest
people through networking and information in the form of blogging and social networking. It has
become evident that our services will need to change to meet the growing needs of our ends users.
Libraries have an important role to play to support these endeavors using these tools. As
Facebook has become dominating in the Social Networking sites arena, more libraries have
created their own library web-Pages on Facebook to create library awareness and to function as
a marketing tool of the library, its resources and services as well. Social media is seen as the
transforming power of 21st century librarianship. With innovative application of web 2.0 and 3.0
features. Social networkings become an interactive and intellectual platform for innovative
services in various spheres of human life and library is not an exception for this. With its
innovative application social networking could enable librarians to make library services more
interactive, responsive, and innovative. In this paper I have made an attempt to examine how
libraries can make use of social networking and social media skills to provide innovative and
intelligent library services to meet the changing and dynamic needs of the users with unlimited
economic resources.
Key Words: Social Network, Social Media, Internet, Web 2.0, Innovative Library Services
INTRODUCTION
Library as social institution brings to relation the writer, publisher, librarians and reader. This relationship can
also be viewed in terms of producers, intermediary and consumer. Social Networking tools such as Facebook,
Blog, Twitter, Orkut, watsapp, Google+, LisLink are popular among the young generation. Libraries and library
professionals are not legging behind to use these SNS for the better library service to users. Libraries have an
important role to play to support these endeavors using these tools. As Facebook has become dominating in the
Social Networking sites arena, more libraries have created their own library web-Pages on Facebook to create
library awareness and to function as a marketing tool of the library, its resources and services as well. Social
media is seen as the transforming power of 21st century librarianship. With innovative application of web 2.0
and 3.0 features. Social networking’s become an interactive and intellectual platform for innovative services in
various spheres of human life and library is not an exception for this. With its innovative application social
networking could enable librarians to make library services more interactive, responsive, and innovative.
Among all facebook and blog playing most vital role in this case.
OBJECTIVES OF LIBRARY
1.
2.
3.
To assemble, preserve and administer books and related educational materials in order to promote,
through guidance and stimulation, an enlightened citizenship and enriched personal lives.
To serve the community as a general center of reliable information.
To provide opportunity and encouragement for children, young people men and women to educate
themselves continuously.
FUNCTIONS OF LIBRARY
1. To increase economic resources of humanity to the extent necessary to maintain the ever increasing
population in comfort and free from want of any kind and also.
2. To help in the elevating, self-independent use of leisure with the aid of freely served books, pictures, sounds
records and graphic materials.
ISBN 1-63102-455-8
203
Library Reach To User Through Social Media: Prospects And Problems A Practical Approach To LPU
3. To help in increasing the opportunity for the spiritual awakening of one and all of the numbers of humanity.
4. Services towards user community.
Library Services:
Libraries help the user to get the information they want. For this purpose the library staff has developed a
number of tools and techniques. In addition the reference library staff provider personalized services, whenever
the user is in difficulty. Services other than these normal services one can call as reference services.
Social Networking:
Network is a set of nodes, points or locations connected by means of data, voice and video communications for
the purpose of exchange. A social network is a social structure made up of a set of action such as individuals or
organizations with the harmonious lies between these actors. Social networking is a recent invention that has the
interact still at the edge of its seat due to its popularity with people. Bringing every kind of social group together
in one place and letting them interact and share information is really a big revolution.
Research in a number of academic fields has shown that social networks operates on many levels, from families
up to the level of nations and play a critical role in determining the way problems are solved, organizations are
run and the degree to which individuals succeed in achieving their goals. Interest in social network has grown
exponentially with the development and spread of online social networks sites.
Social Networks sites are web-based services that allow individuals to (a) conduct a public and semi-public
profile within a bounded system, (b) articulate a list of other users with whom they share a connection and (c)
view and traverse their list of connection and these made by others within the system. SNSs are commonly
viewed as part of the overall Web 2.0 revolution that aimed to enhance creativity, communications, secure
information sharing, collaboration and functionality of the Web.
WHY SOCIAL NETWORKS FOR LIBRARIES
21st century Libraries are the agents of the growth in the knowledge driven society, being the agent of change
they are providing various innovative services with high technical skills. Social networking the way of
communication in 21st century. The term social networking refers to a process of relationship building among a
group of people who have a common interest with this features it is proved that social networking an innovative
platform for re-engineering the Library Services. Services through Social Networking allow users to share ideas,
activities, events and interests. Major aims and purposes of Social networking in library are:
To provide a platform to share news and information.
To share links to recommended Internet resources.
To provide alerts services like SDI and CAS.
To provide a platform for students to improve their writing skills through blogs.
Building the special interest groups in various subjects to share and discuss their views.
To share the AV materials related to various subjects.
To assess the needs of the users through social networks.
To educate the users about new and innovative services in the library.
Social Networking Sites
Social Networking Sites are web- based services that allow individual to construct a public or semi-public
profile within a bounded system to articulate a list of other users with whom they share a connection and those
made by others within the system.
USE OF SOCIAL NETWORKING SITES FOR LIBRARY SERVICES
Today, libraries are using the latest technologies and trends to make their services popular and user friendly. The
concept of a library as physical place where one can visit to get information is rapidly changing to a social
cyberspace where users access, communicate and contribute to existing knowledge.
204
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
If libraries have a Facebook profile one can update most of the activities, which of course will be related with
the information and its sources easily, and users can also check easily. Some of the library services which can be
provided via Facebook to its users connected with Facebook are:
1.
2.
Regular update of arrival of new books, documents, journals etc in the library.
Providing links of different e-resources, like e-Book, e-Journals, and many other useful websites,
which can be providing by directing the users to the links by simply posting on the wall. Whenever a
new source becomes available it can be posted instantly and can be updated time to time.
3. Reference services can be provided through instant massages and on chats, which will help the users in
selecting the appropriate internet based resources without wasting mush time.
4. It the library and its user group in the Facebook keep active in communication and prepare good user
profile with their information interest libraries can provide Current Awareness Services to the
particular users.
5. Online open help desk for all the internet users not only for the profile users can also be provided,
where guidance may be given in information search process by guiding to the proper search option,
proper website and the selection of proper information with good source.
6. Most students are not aware of the different services offered in the library such as reservation of books,
reference services and Strategic Dissemination of Information (SDI). The awareness can be given to
the student users by providing maximum information of the library in the profile. Since visiting a
Facebook profile is considered more appropriate than visiting a library to get the information about the
library.
7. The library can create a discussion forum or group for its users so that the user share their knowledge’s
and thoughts regarding the library, its services, collection, and any other related topics or even a
feedback from its users which will help in the further development of the library.
8. The user will also be able to provide any new information if available which may be of the education
related or the institution also.
9. Facebook can be used as a platform for the marketing of the library and regular updates of activities
etc.
10. OPAC can be directly link with the Facebook profile. One of the most important aim of librarians is to
make library resources available to its users and information seekers so if social networking; Facebook
can help achieve this goal then it should be pursued vigorously.
11. The use of Facebook as a tool does not require any special equipment apart from computer, Internet
connectivity and a trained professional to manage, which is affordable in most of the Academic
libraries at present.
12. Using Facebook as a tool for library services may be more effective for Distance Education students.
PROBLEMS OF USING SOCIAL NETWORKING TOOL FOR LIBRARY SERVICES
When we discuss about the problems of using social networking, they are not exactly the technical problems but
problem from the professional point of view. Being in Facebook require a lot of activeness from the libraries
and its professionals side. Librarians must be aware that using social networking as a tool requires a lot of
attention both technically and professionally. Though we have to mention that this tool does not require much
except for some equipment only but it may be too much for some libraries in certain condition, especially in
Developing country like India.
There will be need of constant and regular update of profile or the Facebook page at least once a week or more.
If not updated it will become useless which require regular monitoring of the page and the library also. In such a
case it may not be suitable for very small on convectional libraries instead may be helpful for large and active
libraries that host a lot of events, exhibitions, workshops and other activities and having large amount of data’s
in its collection.
Though it is a good medium for communicating with the users but the library professional should not get too
attached to Facebook as there will always be a next or better tool coming up for the purpose. Every technology
ISBN 1-63102-455-8
205
Library Reach To User Through Social Media: Prospects And Problems A Practical Approach To LPU
changes quickly and the internet is constantly changing; and the libraries and the library professionals should be
prepared to leave current tool strategy to jump to the next tool quickly.
Another problem from the users side is that most of the Facebook users including the academicians for
socializing and recreational purpose and they might not like the idea of combining the education with their
recreation, it may take time to adapt the new changes.
There will be constant requirement of some professionals to attend the web queries and have to give full time on
that which may affect the regular work of the library.
Apart from these problems there are some other noticeable problems that may affect, especially in India use of
computer and internet is restricted to only a group of people of students though efforts have put to made
available of these facilities, but the process is rather slow.
LOVELY PROFESSIONAL UNIVERSITY
Lovely Professional University is Recognized by UGC under Section2 (f) of the University Grants Commission
Act, 1956 by Notification No. F9-10/(CPP-1). LPU recognize as one the India’s largest University with 600+
acres hitech campus, State of the art infrastructure. LPU have combined more than 25000 students from the 29
states of India and 26 countries of the Globe. Around 18000 students are accommodated in the Wi-Fi connected
hostels.
LIBRARIES OF LPU:
LPU is a large university with combination of total 11 libraries including the Knowledge Resource Center
(Central Library) and 10 different School Libraries.
1. Knowledge Resource Center (Central Library) , Block No-37
2. Lovely School of Hotel, Tourism and Airlines Management Library
3. Lovely School of Education Library
4. Lovely School of Law Library
5. Lovely School of Business Library
6. Lovely School of Architecture Library
7. Lovely School of Pharmacy Library
8. Lovely School of Polytechnic Library
9. Lovely School of Physical Education Library
10. Lovely School of Physiotherapy
USERS VIEWS
There are about 15000 days scholars and 5000 night scholars using these Libraries of LPU. I had a survey
randomly the different types of user: students, research scholars, teaching staff and non-teaching staff.
Numbers of
Responds
% respond
questionnaire
Faculties
100
80
80%
Non- teaching staff
50
38
76%
Research Scholars
50
88
88%
Students
200
150
75%
Total/ Average
400
356
79.75%
Table 1: Number of respondents and Average of response
Categories
%
Non-responds
20%
24%
12%
25%
20.25%
L.P.U. is a Higher Academic institution with around 30000, peoples with different kinds- teaching staff, nonteaching staff, Research Scholars, Post Graduate, Undergraduate and diploma students. For this paper I have
randomly did survey of the Users to find their view in library use in wireless environment. For this study I have
gone through 100 faculties, 50 non-teachings, 50 research Scholars and 200 students (post graduate,
undergraduate and diploma). From the total of 400 users I have got back responds from 401 users i.e. 79.75%.
206
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Categories
Faculties
Android Mobile
Laptop
Tablet
Non- teaching staff
Research Scholars
Students
Table 2: System used by various categories of users
Desktop
It is found from the study that 100% of the users are using web connection i.e. internet or Wi-Fi and 100% of
the users are using Android Mobile Cell Phone and Laptops and around in each category of users are having
Tablets. And users of Desktop in minimum out of all categories, maximum from the non-teaching are technical
and office assistants staff they have desktop in the respective office so they used the system for availing the
services.
As LPU has fully wi-fi campus there is no problem of internet connection so most of the user have android
application mobile, tablet and laptop. All the members are having a group in facebook or in watsapp.
Services/ Categories
Facebook
Twitter
Blog
Watsapp
Google+
Lis link
LinkedIn
Mobile applications SNS
Faculties
Non Teaching
Research
Scholars
Students
Table 3: SNS used by different users
From the survey conducted though questionnaire methods, it is come to know that all most all the mention SNS
are used by user categories. But twitter is use very rare and LIS LINK is used by only few library professional
only. From the above mention popular SNS facebook and watsapp are common in the user community.
Faculties
Non
Teaching
Research
Scholars
Chat
Upload information
Share information
Seeking information
Fun
Table 4: SNS used by different users for different purpose
Students
From the above tables it is found that all categories of users using SNS for Chatting, upload information, sharing
information, seeking different information and for fun. Mostly facebook and watsapp are using for fun as well as
they are using for sharing of information also.
1.
2.
SNS USING BY LIBRARIES FOR LIBRARY SERVICES TO USER
New Arrival: Upload the cover page of new arrivals in the library.
Content Page of Print Journals: Content pages are uploading in the facebook group; from there
users came to know about the articles in the respective journals.
ISBN 1-63102-455-8
207
Library Reach To User Through Social Media: Prospects And Problems A Practical Approach To LPU
3.
4.
New Rules: if any new rule of policy is amended by the library committee than it is upload in the
facebook page,
Lost and Found: If any lost and found happen than the users update the matter in the facebook page.
CONCLUSION
Though Facebook has been considered as the most recent tool for Library services out of other social
networking sites, we cannot deny the availability of various other tools for the purpose. But it has come to the
fact that the dimension of a modern library has changed a lot from time to time so as the approach of the
information user seekers towards information sources. Especially the students of this new academic
environment have different strategy regarding information and acquisition of knowledge. And here Facebook
become a prominent amongst its group as based on different study based documents. The emergence of online
social networks and its expanding user base demand immediate attention from the side of academic libraries.
The library’s profiles on these networks facilitate the reaching out strategy to the new generation users at their
own space and time. Using Facebook as a tool has both positive and negative sides but being new in the field
still can be considered.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
208
Faisal, S.L. (nd). Blogs and Online Social Networks as User Centric Service Tools in Academic Libraries: An
Indian Library Experience. Kendriya Vidyalaya, Pattom: India. (Retrieved from http://slfaisal.wordpress.com).
Praveen., & Noushia. (2011). International Journal of Digital Library services. Use of Social Networking
Site(Facebook) In Making Awareness Among The Library And Information Science Professionals Of University
Libraries Of U.P: A Case Study. (Retrieved From www.ijodls.in).
Ayiah, Efua Mansa., & Kumah, Cynthia Henewaa. (2011). IFLA 2011. Social Networking: a tool to use for
effective service delivery to clients by African Libraries. (Retrieved from http://conference.ifla.org/ifla77).
Penzhorn Cecilia., & Pienaar Heila (nd). The use of social networking tools for innovative service delivery at the
University of Pretoria Library. (Retrieved from http://www.arl.org).
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college
students’ use of online social network sites [Electronic Version]. Journal of Computer-Mediated Communication,
12, 1143–1168 (Retrieved from http://jcmc.indiana.edu/vol12/issue4/ellison.html).
https://idv.sagapub.com/cgi/content/abstract/23/4/266.
Seufert, Andreas, Von Krogh Georg., & Bach.
ISBN 1-63102-455-8
RFID TECHNOLOGY: A GATEKEEPER TO LIBRARY
SECURITY
Dr. Raj Bala Gaur | Sarojini Nagar | New Delhi | rajgaur1975@gmail.com
Abstract: As per fifth law of library science library is a growing organism. As the organization
grows there are many functional ability and security issues also grows with it naturally. It
becomes difficult to handle these responsibilities manually. Similarly library security has always
been an area of almost concern for safety for management. But today’s technological world there
are many technologies are available for the libraries to resolve any kind of problems whether
automation, functioning security issues. Radio Frequency Identification (RFID) is an emerging
technology that has been explored and successfully applied in many different areas in the libraries
such as document security, circulation of the library collection, time saving service to the users,
self-check in and check-out etc. Radio Frequency Identification (RFID) is a technology that
identifies objects through a tag containing a microchip and a radio antenna and has been applied
in libraries to meet needs for security, self-service and stock management. This paper is
describing a technique for deploying RFID systems, how it works and its application in present
era in the libraries and also introduce the advantages and disadvantages of RFID.
Key Word: RFID, Transmitter, receiver, frequency.
INTRODUCTION
RFID is a technology that facilitates non line of sight identification. Basic elements of comprehensive RFID
systems for library kind of environment are tags, readers, and library management System. RFID streamlines
work flow in the area of self service, book return, shelf management and inventory.
RFID stands for Radio Frequency Identification technology. Radio Frequency Identification technology is the
latest technologyto make their security strong and automated identification surveillance system in the
libraries.Radio-frequency identification (RFID) is a technologywhich is used to automatically identifying an
object, person and a package by using radio signals. For this,its depends onRFID tags. RFID is a complement
for distant reading of codes. These are small transponders combined radio receiver and transmitter that will
transmit identity information over a short distance, when asked.
RFID Design and its Components
1. RFID Tags
2. Readers
3. Antenna
4. Server
RFID Tags: RFID tags play a very significant role in the system.Tags are not required any electric
power to function. These tags can be fixed on an object in the library like books; CDs DVDs. Theses
tags are prepared with a programmable chip and an antenna. There are three types of tags available i.e.
read only tagswhich are encoded at the time of manufacturing and the information cannot be changed
by rewriting, WORM tags are write-once-read –many programmed by the organization but without
using the capacity to rewrite them later and Read/ Write tags are usedin libraries in which the stored
information can be changed or rewrite as its common practice to secure the information e.g. the
identification number of books/CDs/DVDs.
Readers:Reader is also a component of RFID technology. It works as a receiver device, detect the
signal as it enters into its radio range and decode the number for interpretation. There are two types of
RFID readers available i.e. (ARPT) An Active Reader Passive Tag system has an active reader, which
transmits interrogator signals and also receives authentication replies from passive tags. And second
one (ARAT) An Active Reader Active Tag system uses active tags awoken with an interrogator signal
from the active reader. Fixed readers are set up to create a specific interrogation zone which can be
ISBN 1-63102-455-8
209
RFID Technology: A Gatekeeper To Library Security
tightly controlled. This allows a highly defined reading area for when tags go in and out of the
interrogation zone.
Antenna:An antenna does the work of receiving and transmitting the signal. The antenna produce radio
signals to activate the tag and read write data to it. These antenna works as a channel between a tag and
the reader which control the systems data acquisition and communication. Signaling between the reader
and the tag is done in several different incompatible ways, depending on the frequency band used by
the tag.
Server: The server is the heart of some comprehensive RFID Systems. It is the communication
gateway among the various components (Boss2004).
Optional Components of RFID
Optional RFID system includes the following components:
RFID Label Printer: It is used to print the labels with an individual barcode, library property slip etc
when the print is applied, it simultaneously programs the data in to the chip. After the processes, the
RFID label is taken from the printer.
Handheld Reader: It is basically used in stock verification, used in search for individual book on
request asit is handy and easily movable.
External Book Return/ Book Drop Station: It is machine with a slot with a chip RFID reader
integrated into a wall. User identifies him or her then put the books into the slot. After completion of
return, user gets a receipt showing his details of books retuned.
Self-checkout station: It is a touch screen computer and built in RFID reader, software for personal
identification, document handling and circulation.
Anti-theft Detection Gates : RFID EAS Gates is the anti-theft part of the Library RFID Management
System using the same RFID tags embedded in the library items. Each lane is able to track items of
about 1 meter and would trigger the alarm system when an un-borrowed item passed through them. The
alarm will sound and lights on the gate will flash as patron passes through with the un-borrowed library
material
BENEFITS OF RFID USE IN LIBRARY
RFID improves library workflow by reducing non-value added work processes
Improves staff productivity: library staff can focus on other value added services
Improves customer service: manual system limit patrons for wait in a long queue but RFID
technology reduce this limitation which results in improved service.
Assist inventory check with ease with help of RFID Technology
Easy book identification for shelving process
Assist traceability of book allocation
Enhance book return processes by full automation of check-in, EAS activation and system updates
completed simultaneously in the self-return chute
Allow better accuracy in book collection management, resulting in reduced book purchase
More than one item can be checked out or checked in at the same time.
Items can be placed on reader without careful placement that it is required for line of sight system.
Faster inventory process.
Ability to locate specific items
RFID SYSTEM WORKING IN LIBRARY
In the library context, RFID works by placing a one-inch passive tag, without power supply, in each library item
( book,CD,DVD, etc.). Each tag contains only barcode information for that item. When library patrons place
items to be checked out on or near a receiver pad and insert their library card, the items are checked out to them.
This occurs when the minute electrical current induced in the antenna by the incoming radio frequency scan
(from the transmitters/receiver) provides enough power for the tag to send a response to the receiver. Items can
also be checked back in easily, saving time and energy and simplifying up- to- date inventory tasks.RFID in the
check-out/check-in system in intended to promote efficiency and help free library workers to have more contact
210
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
with the public. By allowing patrons to check out their own materials and by making the library’s check-in
process more efficient, RFID allows Library workers to help patrons seek information, find materials and use
library equipment such as Internet computers and copy machines. Those friendly conversations across the
check-out desk will now take place throughout the library. No library staff members were or will be laid off due
to the implementation of RFID.
RFID tags are already being used on individual books in pilot program in libraries in the U.S. and Canada. In
these cases, grants are covering the cost of implementation by companies like VTL. The fact that books circulate
drops the cost per book use to a reasonable level. Once a person is identified as a library patron, check-out is
easy. The patron walks past the check-out reader station and without stopping the books are recorded as checked
out. Similarly, patrons can check in any time just by dumping the books down the return chute, where a reader
automatically records their return. A special wand that reads every chip on every book on the shelf allows
librarians to know instantly which books are in or out or improperly shelved.
ADVANTAGES OF RFID IN LIBRARIES
Rapid Check in/out: RFID technology's ability to read ID tags regardless of position or orientation, as
well as detect signals through physical materials, is particularly advantageous for library circulation
processes. Since several items can be read at once, checkout procedures can be accomplished much
more rapid. RFID can be equally advantageous for check in processes.Implementation of RFID in
libraries generally leads to greatly-reduced queues at the checkout counter, enhanced customer service,
and less repetitive strain injuries for library staff [1].
Self charging/discharging: Patron self-discharging shift that work from staffs to patrons and library
staff can utilize their time in value added services.
Reliability:Correctly operating readers and tags can have near 100% detection rates. Since the tags and
sensors communicate with the Integrated Library System (ILS) it is possible to know exactly which
items are moving out of the library. The high reliability is especially important when RFID is used in
theft detection.
Streamlined Inventory Management: RFID also has had a significant impact on inventory processes
in libraries. With a fully-tagged collection, inventory can be taken with a portable, hand-held wand
which is passed alongside the books on the shelves; the reader picks up the individual signals from
each item's tag, without needing to remove or even tip the books outward from the shelves.
Long Tag life: RFID tags lastlonger than barcodes. The term RFID describe the use of radio frequency
signals to provide automatic identification of terms. RFID vendors claim a minimum of 1, 00,000
transactions before a tag may need to be replaced.
Reduction in workplace injuries: Karen Schneider, director of Library’s Index to the internet, states
that the repetitive motion required by bar code scanners, including flipping an item and angling it
correctly, cost libraries millions of dollars a year in work place injuries. Some libraries, including the
San Francisco Public Libraries, look to RFID as a way to reduce the repetitive stress injuries caused by
sustained and repetitive motion connected to circulation duties especially. Research varies as to the
amount of workman’s compensation claims that are connected to repetitive stress injuries caused by
circulation duties and to what level RFID technology will reduce these injuries and claims.
Automated materials handling: Another application of RFID technology is automated material
handling. This significantly reduces the amount of staff time required to ready material for shelving as
itssorting system that can move library material and sort them category wise.
DISADVANTAGES OF RFID IN LIBRARIES
High Cost: The major disadvantages of RFID technology is its cost. While the readers and gate sensors
used to read the information typically cost around $2,000 to $3,500 each and the tags cost $ 40 to $75
each. RFID Technology is very costly affair to implement in as budget of libraries is already shrinking.
Accessibility to compromise: It is possible to compromise RFID system by placing two items against
one another so that one tag overlays another. That may cancel out the signals. This requires knowledge
of the technology and careful alignment.
ISBN 1-63102-455-8
211
RFID Technology: A Gatekeeper To Library Security
Chances of removal of exposed tags : RFID tags are typically affixed to the inside back cover and are
exposed for removal. This means that there would be problem when users become more familiar with
the role of the tags. In Indian libraries, it is a major challenge to keep the tags intact.
User Privacy concern:Privacy concerns associated with item- level tagging is another significant
barrier to library use of RFID tags. The problem with today’s library RFID system is that the tags
contain static information that can be relatively easily read by unauthorized tag readers. This allows for
privacy issues described as “tracking” and “hot listing”. Tracking refers to the ability to track the
movements of a book( or person carrying the book) by “correlating multiple observations of the book’s
bar code” or RFID tag. Hot listing refers to the process of building a database of books and their
associated tag numbers (the hotlist) and then using an unauthorized reader to determine who is
checking out items in the hotlist.
Reader collision: The signal from one reader can interfere with the signal from another where
coverage overlaps. This is called reader collision. One way to avoid the problem is to use a technique
called time division multiple access.
Tag collision: Another problem readers have is reading a lot of chips in the same field. Tag clash
occurs when more than one chip reflects back a signal at the same time, confusing the reader. Different
vendors have developed different system for having the tags respond to the reader one at a time. Since
they can be read in milliseconds, it appears that all the tags are being read simultaneously.
CONCLUSION
It is quite clear from the above discussion that an RFID system may be Comprehensive system that addresses
both the security and materials tracking needs of a library. RFID in the library is not a threat if best practices
guidelines followed religiously, that is speeds up book borrowing and inventories and frees staff to do more
user-service tasks. The technology saves money too and quickly gives a return on investment. If is important to
educate library staff and library users about RFID technology before implementing a program. In this
technology, libraries do not have to depend on one single supplier for tags. As libraries make a long -term
investment, which mainly consists of the quantity of tags needed this is a very important requirement. All the
works of library done quickly and correctly by this RFID technology.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
212
Bansode, S.Y and Desale, S.K. (2009). Implementation of RFID technology in the University of Pune library.
Program: electronic library and information system, 43(2), pp. 202-14.
Chan, P.Y. and ying, Z. (2005). Application of RFID technology with the establishment of book drop in library.
Bulletin of Library and information Science, 55(6), pp. 101-8.
Golding, P. and Tennant, V.(2008). Evaluation of a radio frequency identification (RFID) library system:
preliminary results. International journal of Multimedia and Ubiquitous Engineering, 3(1), pp. 1-18
Hopkinson, A. (2007). State of the art in RFID technology. INFOTECH- Journal of informatics and librarianship,
8(1/2),pp. 17-23.
Hopkinson, A. and Chandrakar, R. (2006). Introducing RFID at Middlesex University learning resources.
Program: electronic library and information system, 40(1), pp. 89-97.
Jose, A; Chand, B.B. and Rao, M.N. (2005).RFID applications in libraries. SRELS Journal of Information
Management, 42(4), pp. 427-39.
Iyer, Sridhar (2005). RFID: technology and application. IIT Bombay.
Maheta, M. and Jani, J. (2007). RFID technology: a changing scenario and new pilgrim for libraries. Paper
presented at the 5th International CALIBER Conference, 8-10 Feb, Punjab University, Chandigarh,
pp. 46876.
Rafiq, Muhammad (2004). Radio Frequency Identification (RFID): Its usage and Libraries.
Weinstein, Ron (2005). RFID: A Technical Overview and its Application to the Enterprise. IT PRO. IEEE
Computer Society.
www.tagsys.net.
http://www.google.com
http://www.zebrasoultions.com
http://www.RFIDsoulutions.com
ISBN 1-63102-455-8
CLOUD COMPUTING: AN INNOVATIVE TOOL FOR
LIBRARY SERVICES
Rekhraj Sahu | Assistant Librarian | TCB College of Agriculture & Research Station | Indira Gandhi Krishi
Vishwavidyalaya | Bilaspur (C.G.) | India | rekhrajsahu@gmail.com
Abstract: Cloud computing is a new technique of Information Communication Technology
because of its potential benefits such as reduced cost, accessible anywhere anytime as well as its
elasticity and flexibility. In this Paper defines cloud Computing, Definition, Essential
Characteristics, model of Cloud Computing, Components of Cloud, Advantages & Drawbacks of
Cloud Computing and also describe cloud computing in libraries.
Keywords: Cloud Computing, SaaS, PaaS, IaaS, Components of Cloud, Models of Cloud Computing, Libraries
and Cloud.
INTRODUCTION
Cloud computing is making it possible to separate the process of building an infrastructure for service
provisioning from the library of providing end user services. Cloud computing provides people the way to share
distributed resources and services that belong to different organizations or sites. Cloud computing share
distributed resources via the network in the open environment. It is a virtual pool of computing resources
through internet. Cloud computing provides people the way to share distributed resources and services that
belong to different Organizations or sites. Many companies, such as Amazon, Google, and Microsoft and so on,
accelerate their paces in developing Cloud Computing systems and enhancing their services to provide for a
larger amount of users. Cloud computing is broken down into three segments: "application" "storage" and
"connectivity." Each segment serves a different purpose and offers different products for businesses and
individuals around the world.
Libraries are using computers for run ning services such as Integrated Library Management Software (ILMS),
website or portal, digital library or institutional repository, etc. These are either maintained by parent
organization’s computer staff or library staff. It involves investment on hardware, software, and staff to maintain
these services and undertake backup and upgrade as and when new version of the software gets released.
Library professionals in most cases not being trained in maintaining servers find it difficult to undertake some of
these activities without the support of IT staff from within or outside the organization. Now cloud computing
has become a new buzzword in the field of libraries, which is blessing in disguise to run different ICT services
without much of a problem as third-party services will manage servers and undertake upgrades and take backup
of data.
WHAT IS CLOUD COMPUTING?
Cloud computing is a new technology model for IT services which many organizations and individuals are
adopting. Cloud computing can transform the way systems are built and services delivered, providing libraries
with an opportunity to extend their impact.
Cloud Computing is internet based computing where virtual shared servers provide software, infrastructure,
platform devices and other resources and hosting to customers on a pay-as-you-use basis. All information that a
digitized system has to offer is provided as a service in the cloud computing model. Users can access these
services available on the “Internet Cloud” without having any previous know- how on managing the resources
involved.
DEFINITION OF CLOUD COMPUTING
According to National Institute of Standards and Technology (NIST) “Cloud computing is a model for enabling
ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
ISBN 1-63102-455-8
213
Cloud Computing: An Innovative Tool For Library Services
networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction.”
According to the Gartner Group cloud computing as “a style of computing in which massively scalable and
elastic IT-enabled capabilities are delivered as a service to external customers using Internet technologies.”
According to the Forrester defines cloud computing as “A pool of abstracted, highly scalable, and managed
compute infrastructure capable of hosting end-customer applications and billed by consumption.”
Cloud computing is a type of computing that relies on sharing computing resources rather than having local
servers or personal devices to handle applications.
Essential Characteristics of Cloud Computing
NIST has identified five essential characteristics of cloud computing: on-demand service, broad network access,
resource pooling, rapid elasticity, and measured service. Cloud services exhibit five essential characteristics that
demonstrate their relation to, and differences from, traditional computing approaches:
On-demand self-service: A consumer can unilaterally provision computing capabilities such as server time and
network storage as needed automatically, without requiring human interaction with a service provider.
Broad network access: Capabilities are available over the network and accessed through standard mechanisms
that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs) as
well as other traditional or cloud based software services.
Resource pooling: The provider’s computing resources are pooled to serve multiple consumers using a multitenant model, with different physical and virtual resources dynamically assigned and reassigned according to
consumer demand. There is a degree of location independence in that the customer generally has no control or
knowledge over the exact location of the provided resources, but may be able to specify location at a higher
level of abstraction (e.g., country, state, or data center). Examples of resources include storage, processing,
memory, network bandwidth, and virtual machines. Even private clouds tend to pool resources between
different parts of the same organization.
Rapid elasticity: Capabilities can be rapidly and elastically provisioned in some cases automatically to quickly
scale out; and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning
often appear to be unlimited and can be purchased in any quantity at any time.
Measured service: Cloud systems automatically control and optimize resource usage by leveraging a metering
capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, or
active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for
both the provider and consumer of the service.
Multi Tenacity: It is the 6th characteristics of cloud computing advocated by the Cloud Security Alliance. It
refers to the need for policy driven enforcement, segmentation, isolation, governance, service levels, and
chargeback/ billing models for different consumer constituencies.
It is important to recognize that cloud services are often but not always utilized in conjunction with, and enabled
by, virtualization technologies. There is no requirement, however, that ties the abstraction of resources to
virtualization technologies and in many offerings virtualization by hypervisor or operating system container is
not utilized.
CLOUD COMPUTING MODELS
Cloud Providers offer services that can be grouped into three categories.
Software as a Service (SaaS): In this model, a complete application is offered to the customer, as a service on
demand. A single instance of the service runs on the cloud & multiple end users are serviced. On the customers‟
214
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
side, there is no need for upfront investment in servers or software licenses, while for the provider, the costs are
lowered, since only a single application needs to be hosted & maintained. Today SaaS is offered by companies
such as Google, Salesforce, Microsoft, Zoho, etc.
Platform as a Service (PaaS): Here, a layer of software, or development environment is encapsulated &
offered as a service, upon which other higher levels of service can be built. The customer has the freedom to
build his own applications, which run on the provider’s infrastructure. To meet manageability and scalability
requirements of the applications, PaaS providers offer a predefined combination of OS and application servers,
such as LAMP platform (Linux, Apache, MySql and PHP), restricted J2EE, Ruby etc. Google’s App Engine,
Force.com, etc are some of the popular PaaS examples.
Infrastructure as a Service (IaaS): IaaS provides basic storage and computing capabilities as standardized
services over the network. Servers, storage systems, networking equipment, data centre space etc. are pooled
and made available to handle workloads. The customer would typically deploy his own software on the
infrastructure. Some common examples are Amazon, GoGrid, 3 Tera, etc.
Cloud computing is defined to have several deployment models, each of which provides distinct trade-offs for
agencies which are migrating applications to a cloud environment. NIST defines the cloud deployment models
as follows:
Private cloud: The cloud infrastructure is operated solely for an organization. It may be managed by the
organization or a third party and may exist on premise or off premise.
Community cloud: The cloud infrastructure is shared by several organizations and supports a specific
community that has shared concerns (e.g., mission, security requirements, policy, and compliance
considerations).It may be managed by the organizations or a third party and may exist on premise or off
premise.
Public cloud: The cloud infrastructure is made available to the general public or a large industry group and is
owned by an organization selling cloud services.,bascvffr4u7=
Hybrid cloud: The cloud infrastructure is a composition of two or more clouds (private, com¬munity, or
public) that remain unique entities but are bound together by standardized or proprietary technology that enables
data and application portability (e.g., cloud bursting for load-balancing between clouds).
COMPONENTS OF CLOUD
A Cloud system consists of three major components such as clients, data centre and distributed servers. Each
element has a definite purpose and plays a specific role.
Clients: Clients are in a cloud computing architecture are similar to the clients of everyday local area network
(LAN). These are the computers which are residing on the desk of the end users. This is where the front-end
applications are installed. They can be laptops, tablet computers, mobile phones or PDAs. In short clients are the
devices at the user side and used to manage client information. The physical specification brings the client into
the following three categories.
•
•
•
Mobile- Mobile devices include smart phones, Tablets or PDAs.
Thin-These are the dump terminals having no hard disk space rather it let the servers do all processing
activities. It simply displays the information.
Thick- This type of client is a regular computer, using a web browser like Firefox or Internet Explorer
to connect to the cloud.
Data Centre: The data centre is the collection of servers where the applications to which the user subscribes are
hosted. A data centre server can be virtualized in nature where the software can be installed in the main physical
server but appeared as separate server identity to the user. In this way, one can have half a dozen virtual servers
running on one physical server.
ISBN 1-63102-455-8
215
Cloud Computing: An Innovative Tool For Library Services
Distributed Servers: It is not necessary that the data centre always contains only one server in our place.
Sometimes servers are placed in geographically disparate locations in the globe. But from the end user
perspective it seems that data is coming from a central server. In this approach if one server is down or instantly
not available to a client request, may be due to congestions etc., the other services activate to cater the clients. In
order to provide seamless service to the client, the data in these servers are synchronized frequently.
ADVANTAGES OF CLOUD COMPUTING IN LIBRARY SERVICE
•
•
•
•
•
•
•
•
Cost reduction- Ability to increase or decrease the consumption of hardware or software resources
immediately and in some cases automatically.
Scalability- “Pay as you go” allowing a more efficient control of expenditures.
Lower investment, reduced risk- Immediate access to the improvements in the resource proposed
(hardware and software) and debugging.
Support included- Enjoyment of the most advanced security procedures, availability and performance
of providers with experience and knowledge in this type of service.
Greater security and accessibility- Access to resources from any geographical point and the ability to
test and evaluate resources at no cost.
Portability- since the service is available over the web, the service can be availed through browser from
any part of the world.
Adjustable storage- In the traditional system, if the server is less than what we have. The server should
be replaced with the new one. In this computing, the storage capacity can be adjusted according to the
needs of the library, since the storage is controlled by the service provider.
Cloud OPAC- Most of the libraries in the world are having the catalogue over the web. These
catalogues are available with their libraries local server made it available over the web. If the catalogue
of the libraries made it available through cloud, it will be more benefit to the users to find out the
availability of materials.
DRAWBACKS OF CLOUD COMPUTING
The drawbacks are actually the same as those encountered by institutions that have information hosted outside
of the entity. Whereas, in the case of hard-copy document files and at the enterprise level, this fear disappeared
years ago, given the benefits of cost reduction in infrastructure management and security, in the case of digital
data there is still a huge fear of putting our information in the hands of third parties. This fear arises due to
issues such as confidentiality, theft, loss etc. Yet people are increasingly more likely to do so now that the use of
Web 2.0 and social networks has become so widespread. There is nothing more sensitive than banking or
personal data, yet this data is stored in servers over which we have no domain or ownership.
An institution might take the decision to progressively move towards Cloud Computing by uploading
applications which are not very sensitive such as: messaging, the booking of rooms, meeting management, the
liquidation of costs, and holiday management. Following this learning process, more valuable information
involving the corpus of the institution, i.e. “Business intelligence” might be uploaded to the cloud. In the case of
libraries and information centers, this information would include management funds and network transactions.
LIBRARIES AND CLOUDS
Today we are living in the age of information. Information technology plays a very vital role in handing library
resources ranges from collection, storage, organization, processing, and analysis of information dissemination.
Library field facing many challenges in the profession due to applications of information technology. New
concepts and technologies are being added to ease the practices in the libraries and satisfy the needs of the
knowledge society. With the advent of information technology, libraries have become automated which is the
basic need towards advancement followed by networks and more effort are towards virtual libraries.
The emergence of digital library, internet usage, web tools application for libraries, consortium practices leads
to the advancement in library profession. Cloud computing is a completely new IT technology and it is known
as the third revolution after PC and internet in IT. The later technology trend in library science is use of cloud
computing for various purposes and for achieving economy in library functions. Since cloud computing is a new
216
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
and core area the professionals should be aware of it and also the application of cloud computing in library
science.
CONCLUSION
Libraries are moving towards cloud computing technology in present time and taking advantages of cloud based
services especially in digital libraries, social networking and information communication. Therefore it is time
for libraries think seriously for libraries services with cloud based technologies and provide reliable and rapid
services to their users. Another role of LIS professionals in this virtual era is to make cloud based services as a
reliable medium to disseminate library services to their users with ease of use and save the time of users.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
http://www.thbs.com/downloads/Cloud-Computing-Overview.pdf
https://www.priv.gc.ca/resource/fs-fi/02_05_d_51_cc_e.pdf
https://www.nsa.gov/research/_files/publications/cloud_computing_overview.pdf
http://www.tutorialspoint.com/cloud_computing/cloud_computing_tutorial.pdf
http://broadcast.rackspace.com/hosting_knowledge/whitepapers/Understanding-the-Cloud-Computing-Stack.pdf
http://www.journalofcloudcomputing.com/content/pdf/s13677-014-0021-5.pdf
http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-winds-of-change-paper.pdf
http://www.ijidt.com/index.php/ijidt/article/viewFile/3.4.9/pdf
http://www.kiit.ac.in/centrallibrary/pdf/pdf_presentation/Impact_of_Cloud_Computing_on_Library_Services.pdf
http://www.ijodls.in/uploads/3/6/0/3/3603729/vol._2_july_-_sept._2012_part-2.pdf
http://www.emeraldinsight.com/journals.htm?issn=0888045X&volume=25&issue=3&articleid=17062886&show=
html&PHPSESSID=ufq4bgqsp3hpbd70rru9dfc8t4
http://www.webopedia.com/TERM/C/cloud_computing.html
http://csrc.nist.gov/publications/nistpubs/800- 145/ SP800-145.pdf
Journal of Commerce & Management Thought IV – 2 ISSN 0975-623X(print)0976-478X(online) Cloud
Computing : An Innovative Tool for Business Progress Manju Mittal Prathiba L.
http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-winds-of-change-paper.pdf
Bhattacharjee, Nilratan and Purkayastha, Sriparna Das (2013), CLOUD COMPUTING AND ITS
APPLICATIONS IN LIBRARIES, e-Library Science Research Journal Vol.1,Issue.7 May, 2013.
DAS Amit Kumar and Sukumar Mandal (2013), Development of cloud computing in integrated library
management and retrieval system , International Journal of Library and Information Science Vol. 5(10), pp. 394400, November, 2013.
ISBN 1-63102-455-8
217
MOBILE TECHNOLOGY: USE IN LIBRARY
Sonali Malhotra | Senior Library Information Assistant | Indian Institute of Technology | Mandi | H.P. |
sonali@iitmandi.ac.in
Harpreet Kaur | Assistant Library Information Officer | Indian Institute of Technology | Ropar |
Punjabharpreet.iitrpr@gmail.com
Abstract: When we started to move from computerized to web based mobile services in libraries,
our first motive was to provide information to the users with the technology available. The 2009
“Horizon Report” called mobile technologies “an opportunity for higher education to reach its
constituents in new and compelling ways.” The report implied that academic libraries would find
them to be the ideal tools for bringing reluctant researchers to the library, mainly for their
convenience.
The International Telecommunication Union (ITU) estimated that more than 5 billion mobile
subscriptions would exist worldwide by the end of 2010, which more than tripled home Internet
access. ITU also predicts Web access from mobile devices will exceed access from desktop
computers within the next five years.
These statistics are hardly surprising; with advancements in technology and the rise in
Smartphone use, people are taking advantage of being connected to data wherever they are.
Mobile phones aren’t just phones anymore: they can access e-mail, search the Web, video chat,
and play games. Even mobile devices like I Pad and iPod touch can bring social media,
productivity tools, and entertainment literally into the palm of your hand.
Therefore, libraries should be exploring mobile devices as a way to connect with patrons.
Creating a library application (“app”) or mobile Web site that allows patrons to access library
hours, view their library account or even search databases is easier than most people think. This
paper explores the need of mobile technology in libraries.
Keywords: Mobile technology, SMS, Library services, Smart phones and electronic resources.
INTRODUCTION
In the era of information technology the use of mobile technology is growing very fast most of the information
is now available over the internet, so there is a difficulties for libraries to ensure the proper utilization of library
resources to their users. As technology develops, communication protocol also develops. Now a day Mobile
takes an important place in every one life. Mobile phones are wireless devices. It is very helpful in automated
library system. Wireless always provides new services to its users to keep them up to date. Mostly library users
are using their cell phones and other devices for searching and browsing the web & other things to do by
computers & laptop. Mobile technology has brought major impact on higher education. It is observed that
library users depend on mobile devices for latest information regarding their studies and research areas.
The report of New Medias Consortium, 2009, p.9 commented’ Over the past several years, we have watched
mobiles become ever more capable and more common. The rapid pace off innovation in this arena continues to
increase the potential off these little devices, challenging our ideas of how they should be used and presenting
additional options with each new generation off mobiles”.
MOBILE TECHNOLOGY ITS NEED
Now a day’s people are increasingly dependent on their mobiles. Most of them use mobiles as dairies, for
making notes and other internet based works. So it’s the demand of every user that “libraries in hand” they
needed that libraries will provide some mobile services. Libraries can offer a communication channel for user to
connect with the library with a device that they always with them. Easy and quick sharing of information is
possible through mobile phones. Libraries today are covering most of the technologies given by mobile industry
218
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
like PDA’s, Blackberry, iPod, Cell phones, UM PC’s (Ultra Mobile PC) and mobilizing library contents in a
portable form suitable or small screen and delivering short services in the form of contents/ information with
device’s multiple searching features.
Mobile
services provide users. Mobile technologies are
very helpful in feedback mechanism in libraries
and information centers. There are so many
benefits of Web based mobile services like:
A.
B.
C.
D.
E.
Access information any time
Unlimited access
Time saving
User Friendly
To access current information
SERVICES PROVIDED BY THE LIBRARY
The main objective of the library is to provide
better services to its users with current
technology implemented in the library. There are some helpful tools which satisfied the need of the user. Firstly
communication with the users plays an important role. Regular interaction with the users through email,
telephonically, by using Mobile applications etc. is helpful to satisfy their needs. We will provide them the clear
instruction about library, bay guides in stack area, user guide, threw the audio/video tour of library. With the
help of Mobile based library services OPAC facility fulfill their needs and saves the time of the users as well as
library staff also. Users want the services very fast and in easy mode. Some time library professional provide
orientation to the users time to time to know which the latest technology use in the library is some suggestions
& their expectations also. They can use library in anywhere.
SKILL REQUIRED FOR EMERGING MOBILE TECHNOLOGY
LIS professionals should require some technological skills to provide mobile based services. They should have
knowledge of mobile devices. LIS Professional should familiar with web based services. They should have
knowledge about mobile applications as well as mobile web applications. Librarian should give the training to
provide current information related to mobile services and its application through user orientation programme.
Librarian should acquire skills relating to training & user orientation to familiar these mobile services to users.
There are so many mobile library web sites available on web which is listed below:
NAME OF MOBILE LIBRARY AND WEB SITES
S. No.
1
2
3
4
5
6
7
Mobile Library
University of California Riverside Libraries
American University Library
Virginia Tech University Library
New York University Libraries
Adelphi university libraries (AU2GO
Albertsons library ( Boise State University)
Ball State University Library
Websites
http://library.ucr.edu/m/
http://www.american.edu/library/
http://m.lib.vt.edu/
http://library.nyu.edu/
http://it.adelphi.edu/catalog/mobile/
http://library.boisestate.edu/
http://cms.bsu.edu/academics/libraries
BARRIER TO IMPLEMENTING MOBILE TECHNOLOGIES AMONG LIBRARY PROFESSIONAL
Mobile technology has so many advantages in libraries but there are various challenges to implement these
technologies also. It is not an easy task or to use and implement in libraries with the enormous growth of
electronic resources and products it becomes difficult to handle these resources. To maintain the campus
Network facilities with fast access is another barrier to Lib professionals. New technology brings new role and
responsibilities to new tools and techniques of information handling create some problems. There are some
important barriers to adopt mobile technology which is given here:-
ISBN 1-63102-455-8
219
Mobile Technology: Use In Library
•
•
•
•
•
Budget for all libraries
Many new technologies are also adopted by the libraries.
Security Issues
Lack of staff
Lack of suitable studies indicating efficiency o mobile based information.
With the enormous growth of electronic resources and products it becomes difficult to manage resources for use.
To maintain the campus network facilities with accurate and fast access is another barrier to LIS professionals.
A new technology brings new roles and responsibilities new tools and techniques of information handling create
some problems to LIS processionals. Access to online materials beside OPAC .The main barriers is to create,
maintain and authorization of resources in library. To avoid such kind of barriers in implement the mobiles
technologies in library, the LIS professional should have some skills to overcome these difficulties.
UPCOMING MOBILE UTILITIES
Mobile Library Directions:- libraries distribute their knowledge and materials by audio and video files that
users can take with them threw mobile devices.
•
•
•
•
•
SMS Services - Libraries can provide speedy notices as aided services to the users. Threw library SMS
notification, library professional can provide announcements reminders about important events.
Reference Service- According to the need of the users anywhere, anytime.
OPAC on mobile- Library OPAC system can be mobilize by facility of text SMS to check the
availability and cataloguing details of reading materials in the library.
Log in by mobile-Library can send a SMS reminder if the book is due or for renewing books and
outstanding fine, etc
Cloud computing by mobile- Google drive, Drop box, Mega Cloud Drive, One Drive, Apple i cloud,
Amazon cloud drive etc.
CONCLUSION
In conclusion we can say that the main objective of mobile based service is to provide information to the user
according to his approach quick and fast with the current information. Use of Mobile in libraries give a new
look to the library and it also create the awareness, they can use, search information.
LIS professionals should require some technological skills to provide mobile based services. Mobile technology
has brought major impact on higher education. Librarian should acquire skills relating to training & user
orientation to familiar these mobile services to users.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
Andrew Walsh. "Using mobile technology to deliver library services: a handbook".2012, p.106 Gaur, Babita
http://www.inflibnet.ac.in/caliber2009/CaliberPDF/33.pdf
http://ijecs.in/issue/v2-i6/10%20ijecs.pdf
https://www.asis.org/Bulletin/Oct-11/OctNov11_Thomas.pdf
http://www.yeedao.net/iccse2014/cd/data/papers/13676.pdf
http://www.inflibnet.ac.in/caliber2009/CaliberPDF/33.pdf
http://libraries.pewinternet.org/2013/01/22/part-5-the-present-and-future-of-libraries/
http://eprints.rclis.org/15228/1/Innovative%20use%20of%20SMS%20technology%20for%20the%20excellence%20i
n%20library%20services%20in%20Kerala..pdf
[9] http://www.community-of-knowledge.de/fileadmin/user_upload/attachments/
Application_of_Mobile_Technology_among_Engineering_College_Library_Users_A_Study.pdf
220
ISBN 1-63102-455-8
A PERSPECTIVE ON ICT-IMPLEMENTATION AT
KARNATAKA JUDICIAL SYSTEM
Meera B J | Librarian | Seshadripuram Law college | Bangalore | bjmeera@rediffmail.com
Abstract: Judicial service centers are part of e-court project. Providing individual lap tops with
broad band facility has made it possible to have access to internet and to have the window open
to the world at large to have a broader vision in deciding a case in an effective manner. In fact
this is a part of e-courts implementation project as projected by the National Informatics
Centre. Application features are made available as per there functions and defined roles and
responsibilities provided imaging solutions for evidences and documents to court. Application
features are made available as per there functions and defined roles and responsibilities
provided imaging solutions for evidences and documents to court. E-court concept the amount
of data that needs to be managed and protect will be an ultimate challenge for the judiciary. It
is of no doubt that ICT can reduce the duplicity of the paper world and make courts greener
through electronic case filing and video conferencing. Further development of artificial
intelligence could be used to impose appropriate sentence in a criminal case, speedy disposal of
cases.
Keywords: ICT, Internet, E-Courts, E-Judiciary, Cases
INTRODUCTION
The rapid accumulation & slow disposal rate of pending cases has increased burden on our judicial system
tremendously. Courts had to maintain all the records in physical manner i.e. either in files or registers and to
keep such large data in paper form is not easy to retrieve and also not even safe and is prone to physical
tempering & environmental degradation. The case takes long time to solve, apart from this Cases/Judges/Court
keep on changing during the course of judgments. The back-log of cases have grown and ultimately it is
virtually over-burdening the judiciary. India has 15,000 judges, including 630 High Court Judges. The mounting
arrears of cases in Courts, particularly in District Courts and High Courts, have been a cause of great concern
When computerization was started the Bar members were much relented to use the technology but now the
things are changing gradually and are now coming out with an openness that ICT is to be considered as a part of
life. Major privileged areas are inter - linked with courtroom operations. They are Judge, administrator,
courtroom staff and public prosecutor, lawyers. Application features are made available as per there functions,
roles defined and responsibilities, provided in imaging solutions for evidences and documents to court. The
images from police, hospitals reports etc. can be uploaded from camera or any other imaging solutions as
evidences and documents to the court.
FEATURE
Roles based on access to authorized users.
Uploading the scanned files/evidence and adding appropriate metadata.
Allows Judges to see recording of proceeding for review and why case was rescheduled last time.
Making the knowledge and information content available on 24x7 online environments.
Appropriate Searching of case records.
Provision to provide case CD/DVD to authorized person.
Provision for taking record backup at a specified backup site.
Live webcast of case proceedings through web portal.
Can be used by court reporters if in case a word or statement is missed out.
Need for a New Look: Ex. President Bharataratna Dr.A.P.J.Abdul Kalam stated: Let me unfold the scenario. A
litigant comes with his documentary evidence which he possesses. E-Court Service Centre helps electronically
to identify a civil lawyer to present his case. The objective in bringing the reduction in the time period of
disposal of cases and to reduce the existing pendency of cases in a time bound period is of paramount
ISBN 1-63102-455-8
221
A Perspective on ICT-Implementation At Karnataka Judicial System
importance. The judges are to decide not only on the disputes but also have to act as administrators in
administering the affairs of his court and should act as good managers.
The E-courts project was established in the year 2005. According to the project, all the courts including taluk
courts will get computerised. As per the project in 2008, all the District courts were initialised under the project.
In 2010, all the District court was computerised. The entry of back log case has started. The IT department had
one system officer and two system assistants in each court. They initiated the services in the Supreme Court in
June 2011. The case lists and the judgements of most district courts are available in http://lobis.nic.in. in
http://judis.nic.in, which is used to connect all High Courts and Supreme Court judgements and cause list. They
are updated daily by a technical team. Now the establishment work is going on, in taluk courts. The project also
includes in producing witnesses through video conferencing. Filing cases, proceedings, and all other details will
be on computers. Each district court contains 1 system officer and 2 system assistants. This technical manpower
is involved in training the staff, updating web sites. Establishment of e-courts in India is in infancy stage till the
month of October 2014 we are still waiting for the establishment of first e-court of India. The Public as well as
the advocates can walk in directly and ask for the case status, stage and next hearing dates. This service is
provided for free. E-court project, the access to online journals like that of All India report, Supreme Court
Cases are provided. The judgments of the Supreme Court are available on line. The judgments from 1950 till the
date are now available at the click of mouse.
Implementation of ICT - High Court of Karnataka: The e-judiciary electronically facilitates the decision
making process in a transparent manner. In an e-judiciary environment, a case object is traveling into various
stages of judicial process and creates a Meta data in each stage of the judicial process, thereby creating a foot
print of data about the case. There was a complete automation from filing a case and to grant a certified copy.
Digital production of under-trial prisoners by video-conferencing was made possible in all the three courtcomplexes at Bangalore, which was later extended to six more districts in Karnataka. Through the Karnataka
judiciary website, cause lists of the High Courts and district courts was made available online, a day before, for
the first time in the country. The system thus created, has subsequently been adopted in different states in India.
In State of Karnataka, the steps are taken at many of the courts to have dedicated line. The services of Indian
telephones are availed of. The best utilization of technology in developing LAN, WAN, State Wide area
network has been put in to an effective use.
ICT – Criminal Case: Section 154 of Criminal procedure code deals with reference to First Information
Report. F I R is a document prepared by police in India, or a report lodged with police by any person having
social concern. ICT helps in performing the task without any delay which may give rise to unwanted arguments
and also prevent wastage of time. In due course the steps have to be taken to transmit them from the
jurisdictional police station to the court within whose limit the offence had been reported.
Providing individual lap tops with broad band facility has made it possible to have access to internet and to have
the window open to the world at large to have a broader vision in deciding a case in an effective manner. In fact
this is a part of e-courts implementation project as projected by the National Informatics Centre.
Karnataka at the level of High Court, the practice of scanning the judgments and archiving. On the other hand
the digitized copies are now stored with authentication. Causelist system is now gradually dispensed with at the
level of high courts. Karnataka high court has saved nearly utilization of lakhs together sheets of paper every
day. Maximum utilization of e-banking should be provided, instead of asking the litigant public to make any
payment either by way of demand draft.
Cause list through SMS: This service is available for providing customized delivery of causelist through SMS
on the mobile. The causelist which is web hosted or put in front of the Court Hall should be verified. Neither
High Court nor NIC Karnataka will be responsible for the non-delivery of the SMS on the mobile. The Causelist
through SMS service is available for the cases filed in the High Court of Karnataka and the Circuit Benches at
Dharwad and Gulbarga. The service is open for general public to register the court cases which they want to
track when they appear in the causelist and receive an alert whenever the main case is posted in the court and
appears in the causelist for that day. The service is free of cost. If the credentials are not received within 1 hr, the
222
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
user can send an SMS from the same mobile number to 9243355223 to receive the credentials with the message
text as KARHCCL 5. Once the user registers the cases, the SMS will be received after the daily causelist is
generated. If the number of cases is more, it will be received as multiple SMS messages.
Kiosks: The High Court of Karnataka has developed the facility to know the status of the case filed in the High
Court and its Circuit Benches, status of the Application filed for Certified Copy of the Orders and Judgments
and the current case being heard in a Court Hall through Cell phone SMS messages for the benefit of the litigant
public. Further, he High Court has installed 4 information KIOSKs at the premises of the High Court to provide
information to the Advocates and Litigant public regarding the Cause list, Status of a case, Status of application
for certified copy, Judicial Deposits and all other information that is available over the Website. Both the
facilities stand dedicated to the public as per the directions of the honorable Chief Justice. The suggestions and
feedback if any may be sent to The Registrar General, High Court of Karnataka, Bangalore or through e-Mail at
shhcourt@nic.in. The facility is being provided with technical assistance of NIC Bangalore and the SMS
Gateway provided through NIC, Delhi. The same facility is also being provided at the Circuit Benches, with
technical assistance of NIC Bangalore Touch Screen Information Kiosk for High Court of Karnataka an
application has been developed by NIC, Bangalore to use an Unmanned, Touch Screen Information Kiosk
which provides the following information to the advocates and the litigant public 1. Status of the cases for a
given case number
1.
2.
3.
4.
5.
6.
Status of the Certified Copies for the given CR Number or Case Number
Caveat details for the given Caveat Number or the Case Number
Application filing details for a given case number
Party details for given Case Number
Cheque deposited details for the given Case Number
Cause list by Court hall Numbers
The user interface is kept simple and the components in the User Interface are made Touch Screen friendly. The
application can be used with the touch of the screen as the only input mechanism and there is no need for mouse
and key-board for normal operation by the end user. Context based On-screen keypad is used to enable the user
to input the data. Since the keyboard is not provided, an on screen keypad is provided to enter the data. The
application connects to the live High Court Litigant Management System database that is running in the
respective location (Principal Bench & Two Circuit Benches) and provides up-to-date information as in the case
of the Query Counters.
High Court of Karnataka at Bengaluru Bench (Online Display Board)
Note: Click on Court Hall No. [CH No.] To View the Corresponding Court Hall Cause List
Place a Mouse Cursor on Hall No. [CH No.] to View the Passed Over Cases for the Corresponding Court Hall
CH
No.
List
No.
Sl.
No.
Stage
Case
No.*
CH
No.
List
No.
Sl.
No.
Stage
Case
No.*
Transparency-Decision making process- E-judiciary ICT legal expert system assists the advocates and the
judges with the legal provisions, previous case history, and previous judgment details in various courts thereby
helping them to arrive at a decision based on the spirit of the legal provisions. Hence a fully operational eGovernance GRID is vital for the success of E-Judiciary. List of Business Information System, Filing Counter
Computerization, COURTNIC, JUDIS, Supreme Court and High Courts pending Cases on IVR, display boards,
and Cause Lists on Internet, are some of the positive steps which were taken in a consistent manner over a
period of time. These things indeed have a very high impact in not only making the institution of judiciary at
higher level a people friendly but also has cut the expenditure on the exchequer.
One more major aspect to be covered under e-courts project is Videoconferencing technique through which
courts will be connected to the Jail by ISDN lines and at both ends a camera unit and a display unit will be
ISBN 1-63102-455-8
223
A Perspective on ICT-Implementation At Karnataka Judicial System
provided with recording facility at the court’s end. Under trial is produced at the Jail end. The Judge, Lawyers
and witnesses etc. remain present in the court and regular trial is conducted. The judicial remand of the undertrial can also be extended without physically producing him in the court. The benefits of Videoconferencing
includes evidence of witnesses unable to come to court can be recorded, the trial is expedited with use of this
facility, cost and manpower in producing under-trials only for remand extension can be saved, dreaded
criminals can be tried without risks, multiple trials of an accused lodged in one jail is possible in different states.
Videoconferencing is the wave of the future. In case of virtual court rooms videoconferencing will have a major
role to play. During video conferencing any person can give his/her deposition from remote place. He/she just
needs a video conferencing setup either hardware or software based with internet connection. Initially police
stations and jail are connected to e-court for video conferencing. Producing accused/witness every time in court
consumes enormous amount of resources (transportation cost, security time and manpower etc) of the
government, using Video conferencing, they can give their deposition from jails itself.
Eg: Disproportionate Assets case against Jayalalithaa- she had even offered to get her statement recorded
through video-conferencing.
Virtual courts will have no court hall, no timing of a specific nature, but will have an environment of lawyers,
judges, parties and witnesses having meeting and exchange of documents by utilizing the facility of video
conference, exchange of documents through Electronic Documents interchange, use of digital signatures. The
technological improvements like Skype, Google Hangouts which could be used to have one to one look among
different parties of the case, to have discussions, exchange of documents could be done by interrogatories, and
admissions which are available in the existing laws. C as investment on building, storage, management of time
in a modern racing society, it functions on 24x7x365.The first e court established at New Delhi as a paperless
court is not a virtual court but a real court; where in the use of paper is dispensed with.
ICT leads to : -Enable greatly expanded access to legal information for both advocates and clients through
internet and email technologies -expansion to access for clients by using telephones for screening, obtaining
basic client information, referrals, and providing brief advice and services, and also by posting information on
the Internet -enables better case management and data collection, along with automated templates for document
creation –Improvisation of communication between lawyers and clients through new telephone technologies,
cell phones, and video conferencing - recruitment through e-mail and the Internet -Provides new avenues for
outreach to clients and the public - Increased training opportunities for advocates- creates a greater sense of
community through e-services.
When computerization was started the Bar members were much relented to use the technology but now the
things are changing gradually and are now coming out with an openness that ICT is to be considered as a part of
life. Indeed justice Ram Mohan Reddy of Karnataka High court had lamented that to the effect that how can we
think of e-courts if advocates are not ready to adopt, cause-list provided in electronic form and object to the
stopping of supply of cause list in printed form. Use of lap tops, I-Pads, e-books, and other devises have brought
in a concept of having mobile libraries by using the digital media.
OUTCOME OF THE E-COURT
There is a provision of a document visualize and any document can be projected on the LCD Screens installed in
the e-court, so that the same are visible to the accused, witnesses or the prosecutor in the same court, as well as
when they are connected through video-conferencing. Parties of the case can have access to e-Files using secure
login and password. Court has been digitized and a touch screen has been installed on the dais of Judge. He can
view any file of the e-Court in digitized form by searching for the same date-wise, name-wise or Act/Section
wise. The overall impact of establishment of E-Court will result in quick disposal of cases, ease of record
maintenance, reliability of the evidence recorded and to bring more transparency in the functioning of the
District Courts. Reduce the paper work. Ease of record maintenance Judges can review the case. Use as a
backup by concern persons who have some doubt about the authenticity of the documents. Courts are able to
share the information online.
224
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
ADVANTAGES
Registration of cases: by auto generated unique case number.
Copies of Judgments: judgments will be made available through web.
Preparation and delivery of decrees: decree should be made available to the concerned parties by email,
wherever applicable.
Generation of automated causelist.
Generation of automated court diaries.
Availability of case status: online case status right from filing of case till it gets disposed.
Generation of daily orders.
Website for each court.
DISADVANTAGES
Online case-filing services may unintentionally, due to cost or lack of awareness, erect further barriers to justice
for individuals who traditionally remained outside of the sphere of access. In the same vein, if ICT is favored
for use in criminal rather than civil courts, technology may simply become a tool used to sentence people, more
quickly. This scenario sits quite polemic to visions of technology serving as a tool to empower individuals to
better assert their rights and seek justice. Foreshadowing the role ICT may play in the future of India's judicial
reform process. Technologies are currently piloting the use of video technology in criminal courts. India's
judiciary has made several attempts to insulate itself from the provisions of the RTI act, indicating that new
laws, and even new technologies, may not be able to change practice. There are also strong doubts looming that
the Gramin Nyayalayas Act will be successful in leveraging the required financial support needed to construct
civil courts in rural areas. Even within a favorable legal framework, may not necessarily spell a more accessible,
transparent and accountable justice system.
FUTURE
With the arrival of e-Court concept the amount of data that needs to be managed and protect will be an ultimate
challenge for the judiciary. Based on data generated in the established e-Court, huge data will be generated per
year. System can’t afford to lose even a single file as it makes the entire records unreliable and invalid in
judicial terms currently H.264 video format has been used with AES encryption for video recording which may
be change/upgrade in the future therefore it is required to develop methodology for interoperability of ever
changing media formats/codes and building decision support system for Judiciary.
CONCLUSION
As e-government initiatives continue to transform the nature of India's bureaucracy and enhance the quality of
government services, there is a mood of great optimism that ICT will also come to play a central role in judicial
reform efforts. Strategies may be designed and implemented from an access perspective, seeking to restore faith
in the justice system by increasing transparency and accountability. This could be done, for example, by
installing video technology in court rooms, or publishing legal information online. It is of no doubt that ICT can
reduce the duplicity of the paper world and make courts greener through electronic case filing and video
conferencing. Online case filing systems can increase speed in which citizens can have their cases heard, and
real time access to online repositories of legal information drastically expedites the case cycle. Features of this
newly envisioned e-justice system include the use of video hearings to reduce transportation costs, case filing
operation systems, RFID based file tracking, and the creation of a publicly accessible and easily searchable elibrary is important that the use of technology remains complimentary to a sound national judicial reform
strategy. Some critics say that the judiciary in India is over burdened and the days are not too far that it may
collapse on account of its overweight unless some remedial steps are taken. The design utilize to help our
judicial system, to streamline and expedite their operation and case disposal rate in secure and cost effective
manner. The information technology has paved its way and has made a firm in road in to the judicial field of the
country. In this context how far the further development of artificial intelligence could be used to impose
appropriate sentence in a criminal case, speedy disposal of cases by using proper software are all the area which
needs consideration. Rule of Law a reality than to allow the things to be governed by Rule by law.
ISBN 1-63102-455-8
225
A Perspective on ICT-Implementation At Karnataka Judicial System
REFERENCES
[1] (2009),E -Justice: Practical Guide for the Bench and the Bar, Universal Law Publishing.
[2] 2.Cerrillo I Martinez Agustí (editor) (2009), E-Justice: Using Information Communication Technologies in the
Court System
[3] 3.Investigation and Development of an E Judiciary Service for a Citizen Oriented Judiciary System for Rural
Communities (2010), University of Fort Hare,
[4] 4. Prakash Rishi (2011) ICT in Indian Court Challenges & Solution, International Journal of internet Computing
(IJIC), Vol-1, Issue-2
[5] 5. Dr. Setlur B N Prakash (2014) E Judiciary: a step towards modernization in Indian legal system, Journal of
Education & Social Policy, Vol.1 No.1
[6] http://en.Wikipedia.org/Wiki/Judiciary_of_India
[7] http://cis-india.org/The Role of ICT in Judicial Reform- An Exploration
[8] karnatakajudiciary.kar.nic.in/
226
ISBN 1-63102-455-8
A STUDY ON DETERMINING THE USER AWARENESS TO
EVALUATE THE EFFECTIVENESS OF DIGITAL
REFERENCE SERVICES PROVIDED BY ACADEMIC
LIBRARY OF ENGINEERING AND TECHNOLOGY
INSTITUTIONS IN TAMILNADU
K. Chandraprabha | Research Scholar | DLIS | SIT | Madurai Kamaraj University | Madurai |
jcp378@gmail.com
Dr.K.Chinnasamy | Associate Professor and Head DLIS SIT | Madurai Kamaraj University | Madurai
Dr.S.Janakiraman | Assistant Professor | DBT | Pondicherry | University | Puducherry
Abstract: Digital Reference Service is a very essential component of every Academic Digital
Libraries. It is an advanced version of the traditional reference services that is need of the hour to
meet the user's information requirements in this dynamic and changing environment. This study is
to measure the effectiveness of Digital Reference Services (DRS) being provided by the Academic
libraries of Engineering and Technology institutions in Tamilnadu based on user's awareness and
perception. It focuses on the user awareness of DRS provided by academic libraries of various
categories of Engineering and Technology institutions. The research methodology employed was a
case study approach that combined two data collection methods: questionnaires, and content
analysis. This paper discusses the strength and weakness of existing digital reference services
being provided by the academic libraries under study, and also concludes with some specific
suggestions for improvement of digital reference services in Academic Libraries under study.
Keywords: Reference services, Digital Reference Services, academic libraries
INTRODUCTION
Historically, libraries have been a part of social milieu. Most of the human activities like education and training,
research and development, socio-economic growth, industry and business, trade and commerce, politics and
international relations, arts and culture, government administration, need active support of libraries. Academic
Libraries support learning, teaching, research and other educational functions appropriate to the parent
institutions. These libraries play at different levels of educational process. Libraries are considered only as the
storehouses of knowledge, have got a new outlook in the modern Information Communication Technology
(ICT) era. The activities like reference services, which were carried manually in libraries with so much of pain
and strain are being carried out smoothly with the help of ICT with greater effectiveness. The impact of ICT on
traditional libraries evolves digital libraries, which is consisting of digital materials and services. In current
trends Digital libraries are a key connector to the information resources.
LITERATURE REVIEW
Literature review is done based on the Indian experience on ICT in academic libraries. Salma Khan and J.
Dominic (2009) analyze the patterns of internet use, the internet skills of professionals, the perceived impact of
the internet on their academic efficiency and problems faced by them in using the Internet among Engineering
colleges of Moradabad, Uttar Pradesh. The study reveals that the use of conventional document is decreasing
and dependency on internet is increasing. It expedite the research process and also improve the professional
competency.
Sampath Kumar and Biradar (2010) observe the use of information communication technology in 31 college
libraries in Karnataka, India by analyzing the ICT infrastructure, status of library automation, barriers to
implementation of library automation and librarians' attitudes towards the use of ICT. The survey shows that
ISBN 1-63102-455-8
227
A Study On Determining The User Awareness To Evaluate The Effectiveness of Digital Reference Services Provided By
Academic Library Of Engineering And Technology Institutions In Tamil Nadu
lack of budget, lack of manpower, lack of skilled staff and lack of training are the main constraints for not
automating library activities.
Mohamed Haneefa and Shukoor (2010) observe the Information and Communication Technology (ICT) literacy
among the library professionals of Calicut University. The study reveals that the use of digital library and
institutional repository software is very low among the library professionals. Majority of the professionals had
confidence in routine ICT and Internet tasks, and need training or orientation in library automation, digital
library and institutional repository software.
Dhanavandan, Esmail and Nagarajan (2011) analyse the ICT infrastructure facilities with reference to selffinancing engineering college libraries in Tamil Nadu. The study traces out the status of electronic resources in
terms of topology of library network, electronic access points, electronic database, e-journals, and electronic
resources in the libraries. The study reveals that most of the engineering colleges in Tamil Nadu use the library
application software in their libraries. The establishment of ICT infrastructure facilities in the self financing
college libraries in Tamil Nadu can improve the efficiency of information support, the information retrieval and
quality of education also. It is clear that technological change clearly affects library staff and there is a need to
develop guidelines and policies to train the professionals in providing frontline services in academic libraries of
India.
Kalra, Harinder Pal Singh. (2011) concluded that the Digital reference services constitute a rapidly growing
extension of the traditional reference service offered to library users. The study highlighted real-time
architecture is the latest technological supports that enable the libraries to provide reference services beyond
traditional walk-ins, appointments, and telephone reference. For years, libraries have responded to questions via
e-mail, however, e-mail can only answer unambiguous where step-by-step instructions are not required. It fails
to work when the user and the librarian have to follow a series of steps to explain the scope and nature of the
question.
M.Magamma (2013) highlighted the present status of Digital reference service in the engineering college
libraries of Visakhapatnam, as well as discusses the strength and weakness of existing reference service being
provided in engineering college libraries under study. The study revealed that all the ten selected engineering
college libraries are providing online /digital services including Library Websites, Web-OPAC, Subject Portals,
Web-Database, Collaboration with National International Network and Links to e-resources.
Archana Saxena and Dr. T. N. Dubey (2014) discussed the impact of digital technology and role of libraries in
the age of knowledge and information societies. This paper also highlights the problems faced by the academic
libraries in India in implementation of digital technology.
Based on the literature in today's academic library environment the role of reference librarians is totally
transformed and need to be more teaching centred rather than stereotyped service centred. Now a days in
academic libraries educating and guiding students in terms of accessing information through digital
communication is the primary responsibility of reference librarians. The librarians would not be able to perform
their duties well if they do not have sufficient knowledge on ICT and training on appropriate and up to date
methods of library instruction and practices.
STATEMENT OF THE PROBLEM
The total number of Engineering and Technology Institutions are around 573 in Tamilnadu state in the year
2015, including Anna University Constituent Engineering Colleges, Government Engineering Colleges,
Government Aided Institutions, Self -financing Institutions. The 28 institutions out of 573 are autonomous and
are affiliated to Anna University Chennai, Tamilnadu. And also most of the deemed universities out of 30
deemed universities in Tamilnadu are offering Engineering and Technology programmes. Every year more than
200000 students are joining undergraduate and post graduate engineering and technology programmes in these
institutions in Tamilnadu. For the past few years Government of Tamilnadu is issuing free laptops for all higher
secondary school students. Most of the students of engineering and technology institutions are having their own
individual laptops.
228
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
According to World Internet Usage Statistics News and World Population Statistics which were updated in June
2014, there are about 3.035 billion users on the Internet. . The total number of Internet users in Tamilnadu is
20,416,458, as on 11.08.2014 (Source: Lok Sabha Unstarred Question No. 4636, dated 11.08.2014).
According to IAMAI-IMRB report, usage of social media in rural India has grown by 100 percent during the
last one year with 25 million users residing in that belt. However, urban India registered a relatively lower
growth of 35 percent with the total number of users at 118 million as on April 2015, says the 'Social Media in
India 2014' report by the Internet and Mobile Association of India (IAMAI) and Indian Market Research Bureau
(IMRB) International. There are 143 million social media users in India as on April 2015. The report stated that
the top four metros continue to account for almost half of the social media users in urban India. The report said
the largest segment accessing social media consists of the college going students with 34 percent followed by
young men at 27 percent. School-going children constitute 12 percent of the social media users. College-going
students and young men still form the 60 percent of the social media users in urban India. The report further
stated that 61 percent of these users access social media on their mobile device. The report highlights that "The
fact that almost two-thirds of the users are already accessing social media through their mobile is a promising
sign. With the expected increase in mobile traffic the number of users accessing social media on mobile is only
bound to increase". The number for rural India stood at 25 million, up from close 12 million last year, showing a
growth of 100 percent.
The ability that is necessary for the growth of research to disseminate and promote one's work and research is an
important component of managing and communicating information. Digital Reference Service is an
advancement of the traditional reference services that is emerging as natural solution to meet the user's
information needs in the changing environment The Digital libraries and the Web have brought enormously
powerful search mechanisms to the desktops or laptops of many researchers to do vast research, Magamma
(2013). There is a huge requirement from the students, research scholars and faculty members to search for
references such as articles, e-books, journals, magazines, etc., after the office hours of the institutions academic
libraries. This study is the need of the hour to measure the effectiveness of Digital Reference Services provided
by the academic libraries under study based on the feedback and perception of their users. And also this study is
to find the research gap and to provide suggestions for improvement of Digital Reference Services in the
Academic Libraries under study.
SCOPE OF THE STUDY
This study categorised various modes of Digital Reference Services such as e-mail, web-form, AskA Librarian,
online or instant chat, teleconferencing and video conferencing, and collaborative digital reference, digital
robots, remote login over 24/7, social media into five categories namely E-mail based Reference Services, Realtime reference services, Web-based reference services, Collaborative reference services, and Social network
based reference services. The scope of this study is to describe Digital reference service with its new features
and various forms like VoIP Service, Collaborative reference service, and Social network based services. The
study will include the comparison of digital reference service is being provided by Academic Libraries of
Engineering and Technology Institutions in Tamilnadu. In this study, institutions under study are classified into
four categories namely Universities, Deemed to be universities, Autonomous affiliated institutions, and nonautonomous affiliated institutions. The questionnaire set 1000 copies are sent to users of academic libraries of
all engineering and technology institutions in Tamilnadu. This study is based on the sample that is based on
responses received from users, since till the responses are being received from users.
OBJECTIVES OF THE STUDY
The main objective of this study is to explore and to measure the effectiveness of Digital Reference Services in
the Academic libraries of Engineering and Technology institutions in Tamilnadu based on users perception. The
objectives of the study can be summarized as follows:
a) To identify the status of user awareness about digital reference services being provided by academic libraries
of engineering and technology institutions under study.
ISBN 1-63102-455-8
229
A Study On Determining The User Awareness To Evaluate The Effectiveness of Digital Reference Services Provided By
Academic Library Of Engineering And Technology Institutions In Tamil Nadu
b To determine how demographic variables are related to awareness, usage, and the perceived needs of digital
reference services. Demographic variables in this context refer to category of institution, gender, age, user
education level, stay.
c) Comparative analysis of Digital reference service being provided by the academic libraries of various
categories of institutions under study
d) To recommend solutions pertaining to digital reference services in academic libraries.
METHODOLOGY
Case study is a valuable method of research, with distinctive characteristics that make it ideal for many types of
investigations. Eisenhardt (1999) noted that case studies typically combine data collection methods such as
questionnaires, interviews, observation, and archives. The case study is a specific field or qualitative research
method and thus is an investigation "of phenomena as they occur without any significant intervention of the
investigators". In this study questionnaire method is used. Questionnaire is designed according to the
information required for this study and data analysis. Around 1500 questionnaire are distributed to selected
engineering and technology institutions in Tamilnadu, In this study, engineering and technology institutions in
Tamilnadu are categorized in to four categories and about 1500 questionnaire were distributed to each categories
of institution as follows - Universities (300) / Deemed to be University (300) / Autonomous Affiliated
Institutions (300) / Non-autonomous Affiliated Institutions (600). The reason for more number of questionnaire
were distributed to Non-autonomous affiliated institutions is the number of institutions in this category is high
that is 545, where as other categories only around 30.
The relevant and required data are collected by fixing an evaluation criterion such as availability of Dedicated
web-site for library, Online Public Access Catalogue, E-mail, Chat, Video Conferencing, Instant Messaging,
DSpace Repository, Remote login, Social networking, collaborating networking etc., from the users of libraries
under study. The data thus obtained were categorized, analyzed, tabulated and interpreted for comparing digital
reference services provided by selected academic libraries. Modes of digital reference service and Online
Service criteria are selected for systematic evaluation of digital reference service in the libraries included in the
study.
The purposive sampling method is used in this for data collection. Sekaran (2000) stressed that purposive
sampling is confined to specific types of people who can provide the desired information either because they are
the only ones who possess it or they conform to some criteria set by the researcher. According to Sekaran's
(2000) statement, it is justified that the purposive sampling approach is suitable for this study. The users in this
context include teaching staff, research scholars, undergraduate and postgraduate students of the departments of
Computer Science & Engineering and Information Technology in the institutions under study were chosen. The
departments also have a similar structure in terms of staffing and resources, as well as physical facilities as per
the general guidelines of regulatory bodies like All India Council for Technical Education (AICTE) and
University Grants Commission (UGC). The data collected were analyzed using SPSS version 22.0 for
Windows.
DATA ANALYSIS AND FINDINGS
The data collected from the users' of academic libraries of approximately 600 engineering and technology
institutions (including deemed universities and colleges) in Tamilnadu has been prepared in the form of Tables
and analysed using statistical software. The comparative analysis on Digital Reference Services provided by the
institutions under study is made on the basis of various categories of institutions. Following tables and graphs
shows the comparison between academic libraries of different categories of institutions under study according to
the online services and various modes of digital reference services.
Demographic Data of Users
The summary of the Demographic Data of users as follows; Demographic variables are category of institution,
user education level, users' gender, users' age, and stay. Users include teaching staff, research scholars, postgraduate students and under-graduate students. Engineering and Technology institutions in Tamilnadu are
categorized into four namely Universities, Deemed to be universities, autonomous affiliated institutions, nonautonomous affiliated institutions.
230
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Institutions
University
Deemed to be university
Questionnaire Distributed (QD)
300
300
No. of responses received (RR)
113
187
300
600
1500
141
307
748
Autonomous and affiliated Institutions
Non-autonomous and affiliated institutions
Table 1 : Number of Responses for Questionnaire - Institution wise
PG
Students
UG
Students
Male
Female
RR*
113
187
Teaching
staff,
Scholars
RR*
15
21
RR*
RR*
RR*
RR*
29
55
69
111
46
106
67
81
141
12
32
97
65
76
307
39
69
199
134
173
748
87
185
476
351
397
Total
Institutions
University
Deemed to be university
Autonomous and affiliated
Institutions
Non-autonomous and affiliated
institutions
Table 2: Number of Responses for Questionnaire - User level and Gender wise *RR - Number of Responses Received
Table 2 shows the details of number of respondents that is user level wise and gender wise. In user level,
87(11.63%) were teaching staff and research scholars, 185(24.73%) were post-graduate students, 476(63.64%)
the majority were under-graduate students. The number of female respondents 397(53.07%) are more than the
number of male respondents 351(46.93%).
Institutions
University
Deemed to be university
Autonomous and affiliated
Institutions
Non-autonomous and affiliated
institutions
21 - 24
Age > 24
Hostel
RR*
66
101
RR*
RR*
RR*
Outside
the
campus
RR*
31
57
16
29
61
82
52
105
141
89
30
22
53
88
307
188
72
47
92
215
748
444
190
114
288
460
Total
Age < 21
RR*
113
187
Table 3 : Number of Responses for Questionnaire - Users' Age and Stay wise
*RR - Number of responses received
Table 3 shows that most of the respondents that is 444 (59.36%) were age below 21 years, followed by 190
(25.4%) were 21 to 24 years, followed by 114 (15.24%) were more than 24 years. And also it shows that most of
the students 460 (61.5%) were staying off-campus and 288 (38.5%) were staying on-campus.
Awareness of DRS
Respondents were asked whether they were aware of their academic library offering DRS. As can be seen in
Table 4, totally 339 (45.32%) respondents were aware of their institution academic library offering DRS out of
748 users responded.
The analyses of cross tabulations and Chi-square tests were performed to identify the (a) significance of the
awareness of DRS and Users from different categories of Institutions, (b) significance of the awareness of DRS
and Users Education Levels, (c) significance of the awareness of DRS and Gender of User, (d) significance of
ISBN 1-63102-455-8
231
A Study On Determining The User Awareness To Evaluate The Effectiveness of Digital Reference Services Provided By
Academic Library Of Engineering And Technology Institutions In Tamil Nadu
the awareness of DRS and Users' Age, and (e) significance of awareness of DRS and Users' stay. The summary
of results and findings from Chi-square tests of demographic variables are shown in Tables 4 - 8.
Users in Universities are well aware of DRS that is 92(81.42%) users are aware of DRS and 21(18.58% ) of
users are unaware of the DRS, whereas in Deemed to be universities and autonomous affiliated institutions user
awareness of DRS are 55.08% and 57.45% respectively. In case of Non-autonomous affiliated institutions, very
few that is 20.52% of users are aware of DRS provided by their institutions' academic library. The reason is
most of the Non-autonomous affiliated Engineering and Technology institutions in Tamilnadu are not providing
DRS (K.Chandraprabha, 2015).
Type of Institution
Universities
Deemed to be universities
Autonomous affiliated
institutions
Non-autonomous affiliated
institutions
Type of Institution Vs Awareness
YES YES* - Frequency
NO* - Frequency
%
92 (51.21) [32.48]
81.42
21 (61.79) [26.92]
103 (84.75) [3.93]
55.08
84 (102.25) [3.26]
NO %
18.58
44.92
Row
Totals
113
187
81 (63.90) [4.57]
57.45
60 (77.10) [3.79]
42.55
141
63 (139.14) [41.66]
20.52
244 (167.86) [34.53]
79.48
307
748
(Grand
Total)
The chi-square statistic is 151.1551. The P-Value is < 0.00001. The result is significant at p < 0.05.
*Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell].
339
Column Totals
45.32
409
54.68
Table 4: Type of Institutions Vs Awareness
The Chi-square value is calculated on the data collected from the questionnaire about the awareness of Digital
Reference Services provided by the academic libraries using SPSS 22.0 software. The Chi-square value is
151.155, Probability value is less than 0.00001. Hence the Type of Institution and the Awareness of DRS is
significant at p < 0.05.
Users' level Vs Awareness
YES* - Frequency
YES %
NO* - Frequency
NO %
Row Totals
Teaching staff and
Research Scholar
73 (39.43) [28.58]
83.91
14 (47.57) [23.69]
16.09
87
Post-graduate students
124 (83.84) [19.23]
67.03
61 (101.16) [15.94]
32.97
185
Under-graduate
students
142 (215.73) [25.20]
29.83
334 (260.27) [20.88]
70.17
476
Column Totals
339
45.32
409
54.68
748 (Grand
Total)
The chi-square statistic is 133.5295. The P-Value is < 0.00001. The result is significant at p < 0.05.
*Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell].
Table 5: Users' level Vs Awareness
Table 5 shows the significant relationship between the Users' education level and the awareness. It is found that
in the above three categories of users' education level, Teaching staff and Research Scholar category is well
aware of DRS that is 83.91%, when comparing with other categories post-graduate students and under-graduate
students the awareness percent is 67.03%, 29.83% respectively.
232
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Male
*Yes - Frequency
158 (159.08) [0.01]
Gender Vs Awareness
Yes - % No - Frequency
45.01
193 (191.92) [0.01]
No - %
54.99
Row Totals
351
Female
181 (179.92) [0.01] 45.59
216 (217.08) [0.01] 54.41
397
Column
339
45.32
409
54.68
748 (Grand Total)
Totals
The chi-square statistic is 0.0251. The P-Value is 0.874147. The result is not significant at p < 0.05.
*Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell].
Table 6: Users' Gender Vs Awareness of DRS
Table 6 shows that there is no significant relationship between users' gender and awareness of DRS. The Chisquare test result shows p-value 0.874 which is greater than 0.05.
Less than 21 years
21 to 24 years
More than 24
years
Column Totals
Users' Age Vs Awareness
*Yes - Frequency
Yes - %
*No – Frequency
125 (201.22) [28.87] 28.15
319 (242.78) [23.93]
No - %
71.85
Row Totals
444
117 (86.11) [11.08]
61.58
73 (103.89) [9.18]
38.42
190
97 (51.67) [39.78]
85.09
17 (62.33) [32.97]
14.91
114
339
45.32
409
54.68
748 (Grand Total)
The chi-square statistic is 145.8219. The P-Value is < 0.00001. The result is significant at p < 0.05.
*Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell].
Table 7: Users' Age Vs Awareness of DRS
Table 7 shows the relationship between users' age and awareness of DRS. The chi-square statistic value is
145.82 and the p-value is less than 0.00001. Thus there is significant relationship between users' age and
awareness of DRS at p < 0.05. It is found that in table 7, users with more than 24 years old are well aware of
DRS that is 85.09%, where as in the other two categories that is less than 21 years and 21 to 24 years the
percentage of awareness is 28.15% and 61.58% respectively. The reason is most of the teaching staff and
research scholars are older than 24 years.
*Yes - Frequency
192 (130.52) [28.95]
147 (208.48) [18.13]
Stay Vs Awareness
Yes - % *No - Frequency
66.67
96 (157.48) [24.00]
31.96
313 (251.52) [15.03]
No - %
33.33
68.04
Row Totals
288
460
In-campus
Off-campus
Column
339
45.32
409
54.68
748 (Grand Total)
Totals
The chi-square statistic is 86.1077. The P-Value is < 0.00001. The result is significant at p < 0.05.
*Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell].
Table 8: Users' Stay Vs Awareness of DRS
Table 8 shows cross tabulation of users' stay and awareness of DRS. Users staying in campus are well aware of
DRS when comparing with the off-campus days-scholars. There is a need for providing and educating users to
access and avail the digital reference services in the academic libraries of the institutions under study.
CONCLUSION AND SUGGESTIONS
The results indicated that there is significant relationship between awareness of DRS and institutions type, users'
education level, users' age, stay. The results also show that there is no significant relationship between
awareness of DRS and gender. Only Institutions type, Users' education level, Users' age and Users' stay were
found to be significant in determining the awareness of DRS. The finding of this study are (i) The awareness of
DRS among users of non-autonomous affiliated institutions is very low, (ii) Users under 21 years old are not
well aware of DRS, (iii) users staying off-campus are also not well aware of DRS in numbers. It is found that
ISBN 1-63102-455-8
233
A Study On Determining The User Awareness To Evaluate The Effectiveness of Digital Reference Services Provided By
Academic Library Of Engineering And Technology Institutions In Tamil Nadu
most of the engineering and technology colleges are not providing dedicated website for libraries, remote login
to users. The suggestion for improvement is, it would be efficient DRS if the academic libraries of all
engineering and technology colleges provide dedicated website and remote login to every members. There is a
good expectation from the users to avail the digital reference services from their academic libraries beyond the
office hours through the use of remote login facility to access the digital library to avail the digital services.
Anna University is proving affiliation to all the engineering and technology colleges in Tamilnadu. Anna
University can insist all its affiliated institutions to provide digital reference services through dedicated website
for their libraries and remote login facilities.
REFERENCE
[1] Archana Saxena and Dr. T. N. Dubey, 2014, "Impact of Digital Technology on Academic Libraries of India:
Problems and Prospects", International Journal of Application or Innovation in Engineering & Management
(IJAIEM), Vol. 3, Iss 3, pp 308-325.
[2] Dollah, W. A. K. W. (2006). Digital reference services in selected public academic libraries in Malaysia: A case
study. In C. Khoo, D. Singh & A.S. Chaudhry (Eds.), Proceedings of the Asia-Pacific Conference on Library &
Information Education & Practice 2006 (A-LIEP 2006), Singapore, 3-6 April 2006 (pp.122-135).
[3] M.Magamma, (2013), ''Digital reference service in enginerring college Libraries: a case study of visakhapatnam'',
e-Library Science Research Journal, Vol.1,Issue.10/Aug. 2013 ISSN : 2319-8435
[4] Neeraj Kumar Singh, (2012), ''Digital Reference Service in University Libraries: A Case Study of The Northern
India'', International Journal of Library and Information Studies ISSN: 2231-4911, Vol.2(4), Oct-Dec, 2012
[5] Salma Khan, J. Dominic, (2012), ''A Study Of Use Of Information Communication Technology Tools At Dental,
Engineering And Management College Libraries Of Moradabad , International Journal of Information
Dissemination Technology, Vol 1, No 1.
[6] Wan Ab. Kadir Wan Dollah and Diljit Singh, (2010), "Determining the Effectiveness of Digital Reference
Services in Malaysian Academic Libraries", The Reference Librarian, Taylor & Francis Group, LLC, 51:329–354
234
ISBN 1-63102-455-8
THE IMPACT OF INFORMATION COMMUNICATION
TECHNOLOGY ACT IN COMMUNICATION STUDIES
Richa Chandi | Research Scholar | MCRPSV | Bhopal | chandi_richa@yahoo.com
Rana khan | Research Scholar | MCRPSV | Bhopal
Abstract: With the invention of Information and Communication Technology, libraries now use
various types of technologies to aid the services they render. Everyday new technological
advances affect the way information is handled in libraries and information centres. The impacts
of new technologies are felt by libraries in every aspect. Computing technology, communication
technology and mass storage technology are some of the areas of continuous development that
reshape the way that libraries access, retrieve, store, manipulate and disseminate information to
users.
Keywords: Information and Communication Technology, Information Centres, Mass Storage Technology,
retrieve
INTRODUCTION
Over the past twenty seven years, academic libraries have been affected by changes in information and
communication technology. The rate of changes is still accelerating in this area. The introduction of various
information technology (ICT) trends has lead to reorganization, change in work patterns, and demand for new
skills, job retraining and reclassification positions. ICT holds the key to the success of modernizing information
services. Applications of ICT are numerous but mainly it is used in converting the existing paper-print records
in the entire process of storage, retrieval and dissemination.
ICT presents an opportunity to provide value-added information services and access to a wide variety of digital
based information resources to their clients. Furthermore mass communication field is using modern ICTs to
automate their core functions, implement efficient and effective library cooperation and resource sharing
networks, implement management information systems, develop institutional repositories of digital local
contents, and digital libraries: and initiate ICT based capacity building programmes for library users.
Information and Communication Technology (ICT) has brought unprecedented changes and transformation to
communication and information services, reference services, bibliographic services, current awareness services,
Document delivery, Audio visual services and customer relations can be provided more efficiently and
effectively using ICT, as they offer convenient time, place, cost effectiveness, faster and most-up-to-date
dissemination and end users. The impact of ICT characterized on information services by changes in format,
contents and method of production and contents and method of production and delivery of information products.
Emergence of internet as the largest repository of information and knowledge, changed role of information
professionals from intermediary to facilitator, new tools for dissemination of information and shift from physical
to virtual services environment and extinction of some conventional information services and emergence of new
and innovation web based.
STATEMENT OF THE PROBLEM
Considering the enormous benefits that are experienced in the impact of ICT in the field of communication the
academicians still experience some obstacles or hindrances in the effective and efficient use of the ICT
resources in the communication field(mass media). Today, ICT acquisition and implementation is facing a lot of
problems. This research work is focus to expose some of the inhibiting factors that are hindering the impact of
ICT.
OBJECTIVES OF THE STUDY
1.
2.
To ascertain the level of computerization/automation of communication Libraries.
To determine the usefulness of ICT resources in libraries related to communication studies.
ISBN 1-63102-455-8
235
The Impact Of Information Communication Technology Act in Communication Studies
3.
4.
To determine the changes that has occurred with the coming of ICT in the education sector.
To determine the challenges associated with the application of ICT.
1.
To what extent has information and communication technology been employed in the communication
field?
What are the changes in the field of education after the adoption of ICT?
Do the people of the Libraries have the required knowledge and skills in using ICT resources?
What are the factors militating against the application of ICT ?
RESEARCH QUESTIONS
2.
3.
4.
PURPOSE OF THE STUDY
The purpose of the study is to ascertain the impact of ICT on media studies related academic libraries. The
research work highlights the advantages or merit associated with ICT.
SCOPE OF THE STUDY
This research work is on the impact of ICT on media studies related libraries as a descriptive study.
SIGNIFICANCE OF THE STUDY
1.
2.
3.
This study is expected to provide a basis for comprehensive information on information and
communication technology procurement and application.
The study will established the existing gaps in the adoption of information and communication
technology in the operations.
The output of this study will serve as a blueprint for information managers/information scientists,
researchers, lecturers, students, and teachers to chart the right course of action for the use of
information and communication technology in furthering education through implementation.
METHODOLOGY
Research Design
The choice of the descriptive analysis as the research design for the project was necessitated by the nature of the
study. This research is a descriptive research that gathered data from different sources in order to determine the
current status of the issue under study from the respective institutions.
FINDINGS AND DISCUSSIONS
Communication facilities are the basic requirements of every organization. In the age of ICT email, fax, etc are
the common tools for fast a and smooth dissemination of the information.
Automated communication facilities
All the libraries related to communication field have all the
facilities which are mentioned above. they all are using the
technologies but with a varied degree of usage.
Reason for the use of ICT resource
1. To acquire information
2. To process information
3. To store information
4. To retrieve information
5. To disseminate information
Communication tools
Email address
World wide web(university website)
Fax facility
Telephone
Percent
100
100
100
100
Factors militating against the application of ICT
1. Inadequate funding
2. Automation at infancy level
3. No power supply
4. Technical know-how
5. Lack of search skills
236
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Trends in the media studies due to adoption of ICT
Digitization of Books (E-Text Books) There is an increased trend towards creation of a digital repository of
books to create a digital learning environment for students. The digital version of the books embedded with text,
pictures along with video, simulations and visualizations help students learn the concepts in an interactive way.
The National mission on Education through ICT plans to generate new online course content for UG, PG and
Doctoral education.
Content Delivery using IT is purely a content driven play where educational content is delivered through
innovative use of ICT. There is an increased trend in higher education institutes to render content through Radio,
TV and Satellite.
Open Education Resources Many Indian universities are contemplating Technology enabled free access of
education resources. AICTE – Indian National Digital Library in Engineering & Technology (AICTE –
INDEST) is a consortium set up by the Ministry of Human Resource to enhance greater access and generate
annual savings in access of bibliographic databases. UGC has also launched its Digital Library Consortium to
provide access to peer reviewed journals and bibliographic databases covering subjects such as arts, humanities,
technology and sciences.
Mobility With the proliferation of mobile phones on campus, colleges everywhere are compelled to capitalize
on feature-rich phones that are capable of much more than just voice calls. Adoption of the BlackBerry, iPhone
and other smart devices that have Internet access allows students and faculty to perform a wide range of
assignments. Tasks like administration, sharing class notes, downloading lectures, instant messaging, etc., are
possible anywhere cell phone service is available.
The adoption of IT/ICT in higher education facilitates the following:
1.
2.
3.
Improving the access to the system through online education.
Improving the quality of teaching especially across remote locations.
Increasing transparency and strengthening systems, processes and compliance norms.
RECOMMENDATIONS
1.
2.
3.
More generous financial support should be made available to provide the basic ICT infrastructural
facilities.
Since Information and Communication Technology (ICT) has come to stay, people that are not
computer literate should take positive steps to remedy their deficiencies so as to flow along with the
reforms.
Effective and efficient power supply supplemented with standby generators should be provided to
check the menace of frequent electricity power failure.
CONCLUSION
The inevitable conclusion that the researchers have arrived at in this study is that ICT has fulfilled its promise in
the sector, there is remarkable rise in the use of ICT, and many of the activities are now ICT driven. This has led
to the speed on acquisition, processing, storage, retrieval and dissemination operations. ICT has also help to
curb the problem of information explosion in this information era.
REFERENCES
[1] Making the Indian Higher Education System Future Ready – FICCI Higher Education summit 2009 ; An Ernst and
Young Report.
[2] Wikipedia – Role of ICT in India.
[3] A report to the people on Education , Ministry of HRD , Government of India.
[4] ICT IN INDIAN UNIVERSITIES AND COLLEGES ; A report by Neeru Snehi.
[5] National Policy on ICT in Education; Ministry of HRD , Government of India.
[6] Educational Technology, http://en.wikipedia.org/wiki/Education_Technology.
[7] http://www.webpages.uidaho.edu/~mbolin/shariful.htm.
ISBN 1-63102-455-8
237
USE OF SNS BY LIBRARY PROFESSIONALS AND USERS:
AN OVERVIEW
Atika Khursheed | Assistant Librarian | Integral University | Lucknow | khursheedatika@gmail.com
Aslam Ansari | Assistant Librarian | Integral University | Lucknow
Abstract: Libraries, as information and social institutions have always been up-to-date with
modern technological developments. In today’s scenario Social Networking sites are used as
effective media of communication. These SNS terms are new tools to connect people together for
common goal. The SNS allow library professionals to deliver desire information to the users
within a minimum time. Through SNS library users can get personalize service from the library
easily within a short span of time. SNS are one of the new approaches offering libraries the
opportunity to reach out to its members. The use of SNS has affected the operations and service
delivery of libraries and information centers. This study focused on use of SNS by library
professionals, users, their purpose and how SNS are useful to them for improving library services.
Keywords-Libraries, Social Networking Sites, Library services
INTRODUCTION
The use of social networking sites has become a popular and integral part of everyday communication in India.
Young generations are very enthusiastic users and majorities are engaging on a daily basis with social
networking services via a computer or smart phone. Nowadays, the importance of social networking services
has become a major issue in society, as well as a important topic for many researchers. The most important
characteristic of social networking service is that they enable users to make their social networks visible and
build connections among individuals (Huan, & Eric, 2010).
DEFINITION
A social networking site or SNS is a platform to build social networks or social relations among people who
share similar interests, activities, backgrounds and same real connection. Social network sites are web-based that
allow individuals to create a public profile, create a group of users with whom to share connections. Mostly all
social network Sites are web-based and provide means for users to interact over the Internet. Social network
sites are wide-ranging and they include new information and communication tools such as blogging,
photo/video sharing. Online communities are sometimes considered as social network sites. All SNSs authorize
members of the group to share thoughts, ideas, videos, posts, pictures, activities, events, and interests with
populace in their group.
TYPES
The mainly noteworthy Social networking websites frequently used by the public especially by the youngster
are:
MySpace: MySpace are extremely popular social networking sites which primarily have a social function
allowing people to make friends, talk online and share resources.
Facebook: This social networking site was introduced with the purpose of linking friends in Harvard University
in 2004. Thereafter, the company extended to other universities then colleges. Eventually, they invited corporate
communities. Facebook is librarian friendly; Group communication among patrons can be possible in web 2.0.
Ning: Ning is an online platform for people and organizations to create custom social networks, launched in
October 2005. Ning allows users to create their own communities and social networks around specific interests
with their own visual design, choice of features and member data. The central feature of Ning is that anyone can
create their own social network for a particular topic and catering to a specific membership base. Librarian can
use this tool to get connected with students, library associations, and more. Members can also use it to share
information with many people at a time.
238
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
LinkedIn: LinkedIn was founded in 2003 and was one of the first mainstream social networks devoted to
business. Originally, LinkedIn allowed users to post a profile and to interact through private messaging. This
social networking site for professionals is a great way to get library patrons connected with the people that can
help them find information. Whether that's you, faculty, authors, historians, or other sources, they can find them
in your LinkedIn network.
Flickr: Flickr has become a social network in its own right in recent years. They claim to host more than 3.6
billion images as of June 2009. Flickr also has groups, photo pools, and allows users to create profiles, add
friends, and organize images and video.
YouTube: YouTube was the first major video hosting and sharing site, launched in 2005. YouTube now allows
users to upload HD videos and recently launched a service to provide TV shows and movies under license from
their copyright holders
Reddit: Reddit is another social news site founded in 2005. Reddit operates in a similar fashion to other.
Twitter: Twitter was founded in 2006 and gained a lot of popularity during the 2007. Status updates have
become the new norm in social networking. Twitter is a micro blogging application, to keep staff and patrons
updated on daily activities, like frequently updated collections, new arrival, current content services of library.
FriendFeed: Friend Feed launched in 2007 and was recently purchased by Facebook, allow you to integrate
most of your online activities in one place. It’s also a social network in its own right, with the ability to create
friends lists, post and updates.
BharatStudent: Bharatstudent is a social utility that brings together all the young Indians living across the
globe. It is for every Young Indian who is a student or a non-student, fresh graduate, a working professional or
an Entrepreneur, and is focused on providing comprehensive solutions for any personal and professional issues.
Fropper: Fropper is ALL about meeting people, making new friends & having fun with photos, videos, games
& blogs! Come, become a part of the 4 Million strong Fropper communities.
CHARACTERISTICS
SNS is acronym of Social Networking Site which is used to determine any web based navigated pages for their
user to create public profiles within the network can make contacts with other users of the same web based
navigated pages who may able to access their profile. And SNS can be used for community based websites,
online discussion forums, chartrooms and other spaces online. The primary function of any library is to acquire,
store and disseminate the information, in the same way SNS also explores the information variously. SNS helps
students or research scholar to develop practical research skills that they need in a world where knowledge
construction and dissemination make increasing use of online information network. SNS works as a tool to
mobilize library services among younger generation of LIS Professionals. Similarly as to get aware of the users
about new arrivals library have make notices, in the same way SNS also shows new information in the form of
notification. The faculty of Library and Information Science may get share information with their students on
SNS that will help to embark their wide knowledge to the student’s community outside the classroom. SNS can
work as a tool for interaction among the students and teachers. The popularity of social networking sites is
increasing among the educated people especially adult youth in college and universities and by LIS
Professionals
Positivity of SNS
Social networking sites have its own advantages to Librarians and users. Some of the advantages are as follows:
•
•
•
Social networking sites will facilitate collaborations and promote effective communication between
Librarians and their patrons.
It will generate a flow of information excluded from search engines and Library Catalogues.
The critical aim of librarians is to make library resources available to patrons so if social networking
sites will help achieve this goal then it should be pursued vigorously.
ISBN 1-63102-455-8
239
Use Of SNS By Library Professionals And Users: An Overview
•
•
Social networking sites wall linked to a library’s web page has the potential of reaping great results by
attracting and serving Distance Education Students. Watts et al (2002) stress that it is through social
networking sites that any person is capable of communicating and delivering a message to a distant
target person.
It will help Librarians and Libraries to keep pace with technologies and compete effectively with the
developed World (Ayiah and Kumah, 2011)
RISK FACTORS OF USING SNS
Drawbacks to Social Networking Sites s demonstrated above, online social networking by academic libraries
has many possibilities within the realm of student outreach. Some libraries may choose to use several social
networking methods simultaneously while others may only use one preferred option. Yet, using the various
social networking Web sites available does not guarantee success or effectiveness as an outreach method.
Several concerns about the use of social networking have been raised and must be considered by any academic
library currently using social networking Web sites or considering the implementation of social networking
outreach programs. Several of the concerns about social networking by academic libraries center on the lack of
quantitative data to support their effectiveness in student outreach. Most discussions about social networking by
academic libraries are primarily anecdotal (Boxen, 2008). There are very few quantitative studies available
about the broad effectiveness of the approach. This makes it extremely difficult to determine if the social
networking efforts are worth librarian time in competition with other established outreach methods. One of the
primary concerns about social networking is low usage. One article reported that from the messages sent to
1,500 undergraduate and graduate students on Facebook by an academic librarian, only 48 responded (Mathews,
2006). Another study focusing on Wiki use in academic libraries found that six of twenty-one libraries reported
difficulties with low participation rates (Chu, 2009). It is also difficult to determine if patrons using the library’s
social networking tools are new library users or existing patrons (Sekyere, 2009). Thus, each library must decide
upon its definition of success for social networking tools. Is the goal chiefly to draw new users into the library,
or does it also include keeping current users informed and engaged? Though each library can determine its own
measures for success, usage rates should be monitored in social networking programs to determine whether or
not they meet the library’s goals. Another major concern regarding social networking by academic libraries is
whether students are even receptive to the idea. Librarians are seen as authority figures within the university
community, and students may be resistant to friending the library if their personal information is visible to
university officials (Sekyere, 2009). Some librarians advocate actively friending their students, which may only
serve to distance the very students librarians are trying to attract. For example, Brian Mathews advocates
actively following student blogs to look for academic-related keywords, such as library or assignment, and then
encourages librarians to “initiate contact, conduct a reference interview, and provide the necessary support”
(2007a, p. 12). However, some students may see this extremely proactive approach as stalking. A better option is
to mention “one’s Facebook account in library instruction sessions and reference interviews and then [let] the
students find that account” (Connell, 2009, p. 28). Librarians at Pennsylvania State University found that
promoting their Facebook page during library instruction sessions and reference interviews resulted in
“increased research traffic in not only their Facebook message boxes, but also in their institutional email and
even in person” (Mack, Behler, Roberts, & Rimland, 2007). In fact, over a fall semester, 126 of the 441
reference questions fielded by a Penn State librarian were through Facebook. This was the highest percentage of
reference transactions among the various options--email, phone, IM, and in-person interactions (Mack et al,
2007). Thus, allowing students to control their level of participation yielded positive results and increased the
number of students using librarians in their research. Ultimately, librarians using social networking Web sites
must avoid being perceived as invading student space. In addition to student perceptions, another concern
regarding social networking by academic libraries is in regards to how students actually use these technologies.
Students generally use social networking sites to distract themselves from their academic activities (Sekyere,
2009). Even when they use social networking for school-related activities, it is usually in conjunction with a
student organization or a specific class. Essentially, students use social networking to interact with fellow
students. They are not using these services to connect with libraries. Ruth Sara Connell conducted a survey of
Valparaiso University students that discovered that 17.2 percent of students were open to the idea of having the
library as a friend, 57.7 percent would accept a friend request from the library but would not be proactive about
it, and 25.1 percent would not add the library on their Facebook or MySpace page (2009). Thus, while most
240
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
students were receptive to a library presence on the major social networking Web sites, a sizable percentage
were not. Additionally, even those students receptive to social networking by libraries indicated that they did not
want their time wasted with frequent, irrelevant messages (Connell, 2009). Academic librarians must be aware
of student attitudes as constant updates from the library may detract from the libraries outreach attempts and be
considered as intrusive as email spam. Ultimately, social networking by academic libraries can only be effective
if library efforts are not seen as encroaching on student privacy and if they are not perceived as wasting valuable
student time.
Academic librarians must also be in favor of social networking for it to be an effective tool. Librarians at an
academic institution must be proactive in their social networking attempts and must be willing to participate in
the ongoing process. There is little point to creating an account on a social networking platform if it is not going
to be used or updated. For example, a survey of 126 academic librarians by librarians Laurie Charnigo and Paula
Barnett-Ellis (2007) found that 54 percent of the librarians surveyed did not believe that there was an academic
purpose for Facebook. Additionally, most of the librarians felt that Facebook was a student space and that
librarians and other university administrators should not invade this space. Though this attitude many change as
older individuals flock to social networking sites, it cannot be expected that all librarians will be in favor of the
idea. Lack of librarian time is also a concern, particularly with social media games that are frequently laborintensive, expensive, and only allow librarians to provide open-source information (Boxen, 2008). If the
overwhelming majority of librarians are not in favor of social networking, this will not be an effective outreach
strategy. A lack of librarian support for social networking also risks uneven service levels for students enrolled
in different disciplines. If only selective liaisons are proactive in social networking to provide subject support,
subject-based support may become unequal among disciplines. Thus, libraries that only have certain librarians
engaging in social networking with students will need to address this concern to ensure that all departments
receive an equal level of subject support. Ultimately, social networking requires continuous updating,
knowledge of changes to the social tools, and monitoring user comments. Thus, academic librarians must be
willing to dedicate their time to social network-based student outreach for these methods to be successful. In
addition to general support for social networking by librarians, academic librarians engaged in social networking
must also address the consistency and timeliness of the service. Students will expect timely responses to any
inquiries sent through social networking tools. They are unlikely to return to social networking tools for library
assistance if librarians do not respond quickly to inquiries. This also potentially risks the possibility that the
student will not use other library services. Thus, libraries must create guidelines on response time to answer
student questions on social networking platforms as they most often have done with email and virtual reference
services. These guidelines must also address staff absences and vacations so that the social networking services
remain consistent while still allowing librarians to take vacations or attend conferences. Ultimately, academic
libraries engaging in social networking with students must address issues regarding consistent and timely
responses for these new service tools. Lastly, many academic librarians fear losing control over their resources if
they use some of the available social networking tools. Tools that allow students, and even faculty, to edit
content about the library remove a certain amount of control from the librarians themselves. Tools, in particular
folksonomy, that allow users to assign tags to resources that then replace the traditional subject headings
established by librarians can result in a lack of synonym control, lack of precision in subject terms, a lack of
hierarchy among categories, and a lower recall ability (Kroski, 2007a). Ultimately, there is legitimate concern
that permitting increased user participation through social tools will remove librarian control over resources and
inhibit a librarian’s ability to use the very resources they are trying to make more accessible among academic
library users
USE OF SNS IN LIBRARY
Dickson A (2010) define the term Social networking as '”communication with people who share your interests
using a website or other service on the internet”. But Aiyah & Kumah (2012) find in her study entitled “Social
Networking: a tool to use for service delivery to clients by African Libraries” the Social networking can be
referred to as a web platform where people from different cultural settings can connect and interact with each
other. Suraveera, Namali & et.al.,(2011) defined at the level of terminological base 'social networking refers as
a process of build up a relationship among a group of people, who have a common interest and also grouping of
individuals in specific groups. According to Boyd & Ellison (2007), the social network can be defined as a web
ISBN 1-63102-455-8
241
Use Of SNS By Library Professionals And Users: An Overview
based network, which use for construction of a profile within a bounded system to articulate a list of members,
group to share their views, connection, and list of connection, and those made by other in the system. Social
Networking has some technological terminology, these helps to content activity for user, Redmond, Fiena
(2010) examine as the concept behind the networking technology is an online location for user to create profile
and build up a group (personal network) for connecting to other group or users and a study by Chu and
Meulemans (2008) states that Social networking sites are very popular among the students. They highlight that
MySpace, Facebook; these two widely adopted social networking sites can be used in the university libraries for
imparting library instruction, references and outreach. Naushia Parveen (2011) believes that it is most LIS
professionals who are connected to each other on social network them to share their experiences, views and
anticipatory awareness.
Charnigo and Barnett-Ellis (2007) find in her study that, the use of Social Network is a feasible way to deliver
library and information services and is a good medium to communicate to their user. A survey of Connell
(2009), students have negative feelings about the librarians using Social Networking tools to outreach since it
may infringe on their sense of personal privacy. So Connell survey suggests that, “a library would want to use
social network sites effectively, librarians should be cautious in establishing communications and relationships
with their student friends and avoid “mass friending”.
SUGGESTIONS
Suggestions based on personnel and staffs of the library, the following recommendations are suggested for
adoption in an effort to improve library services by the libraries patrons.
•
•
•
•
Librarians should formulate policies on the use of social networking sites. Such a policy should be
designed in a way to include: a designated member of staff at a senior management level, with
appropriate professional qualifications, to be responsible for the planning, implementation, operation
and monitoring of services of the social network site of the library.
It is recommended education and publicize of this tool to librarians and their clientele.
Expertise should be sought from International Universities for assistance in the design for the
University Libraries.
Periodic evaluation of the social networking sites should be carried out to determine areas requiring
attention. Evaluation is important because it helps to match objectives of the social networking sites
with performance.
CONCLUSIONS
Conclusion From the above discussions and analyses it has been established that access to Internet connectivity
and computers are on the increase. University of Education, Winneba has moved on with the introduction of
wireless facility on their campuses given students and the university community access to Internet in the
comfort of their hall of residence and homes. It is understandable that Twenty-First century student is not
interested in printed work; for librarians to make libraries interesting innovations such as social networking site
should be introduced to attract them to the library environment. Social networking sites would help establish a
cordial relationship between librarians and patrons; market the library’s services; announce library programmes
on the wall and so on. This technology provides the enabling platform that goes beyond the traditional service
delivery by allowing patrons to interact in real time with librarians in the comfort of their hall of residence or
homes. Librarians must acquire the necessary skills in information technology to meet the challenging demands
of social networking sites. This technology provides the enabling platform that goes beyond the traditional
service delivery by allowing patrons to interact in real time with librarians in the comfort of their hall of
residence or homes. Librarians must acquire the necessary skills in information technology to meet the
challenging demands of social networking sites.
REFERENCES
[1]
[2]
[3]
242
Dickson, A. & Holley , R . P . (2010). Social networking in academic libraries: The possibilities and the concerns.
New Library World, 111(11/12), 468-479. doi: 10.1108/03074801011094840.
Boyd & Ellison, N. B. (2008). Social Network Sites: Definition, History & Scholarship. Journal of ComputerMediated Communication 13, 210-230.
Dakers, H. (2003). The BL reaches out library and information. Update, 2(10),46-47.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
Huan, C., & Eric, H. (2010). The lived meanings of Chinese social network sites (SNSs) among urban white-collar
professionals: A story of the happy network. Journal of Interactive Advertising, 11(1), 11-26.
List
of
social
networking
websites
(2015).
Accessed
from:
http://en.wikipedia.org/wiki/
List_of_social_networking_websites.
Ramsey, T. P. (2008). Social Networking Services: Library Collaboration 2.0? Accessed from:
https://cdr.lib.unc.edu/record?id=uuid%3a01d677d2-e9bb-49ea-858d-0e9dee3be2ad
Roberts, S. and Rowley, J. (2004). Managing Information Services. London, Facet
Bell, S.J. (2007). Building better academic libraries with Web 2.0 technology tools. Library Issues, 28(2), p. 1 - 4
Byers, Peggy Y. Wilcox, James R. (1991) Focus Groups: A Qualitative Opportunity for Researchers, The Journal
of Business Communication 28:l: Winter 1991.
Dadzie, Perpetua S. (2007) Information Literacy: assessing the readiness of Ghanaian Universities, Information
Development; vol 23( 4). p 265-277.
Denscombe, M. (1998) The good research guide for small – scale social research project; Buckingham, Open
University Press. p 87-106.
Maness, J. (2006). Library 2.0 Theory: Web 2.0 and its implications for libraries. Webology. 3 (2).
http://en.wikipedia.org/wiki/Social_networking_and_British_libraries.
O’Brien, J. (1996) Management information systems: managing information technology in the networked
enterprise.
Powell, Juliette (2009) 33 million People in the Room: how to create, influence, and run a successful Business
with Social networking. Pearson Education, Inc https://idv.sagapub.com/cgi/content/abstract/23/4/266.
Raskin, R (2006) Facebook faces its future, Young consumers, Vol. 7 No. 2, p. 56-58.
Scale, Mark-Shane (2008) Facebook as a social search engine and the implications for libraries in the twenty-first
century. 26(4).p. 540-556.
Seufert, Andreas, Von Krogh Georg and Bach Andrea (1999) Towards knowledge networking. Journal of
Knowledge Management .3(3).p 180-190.
Social Network. (n.d.). The Free On-line Dictionary of Computing. fromDictionary.com
website:http://dictionary.reference.com/browse/social network.
Watts, D. J., Dodds, P.S. and Newman, M.E.J. (2002), identity and search in social networks’ Science, 296(5571),
p. 1302.
Parveen. Noushia, Use of social networking site (facebook) in making awareness among the library and
information science professionals of university libraries of u.p: a case study,International Journal of Digital Library
Services, 1(1).p. 9-17.
Sahu. Mahendra, Information disseminating through using social networking sites among library professional in
the engineering colleges of odisha: a survey, International Journal of Digital Library Services.3(1).p. 45-54.
Boyd. D, and Ellison. N, Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated
Communication. 13(1).
Ayiah. Efua Mansa, and Kumah. Cynthia Henewaa, Social Networking: a tool to use for effective service delivery
to clients by African Libraries. (http://conference.ifla.org/ifla77).p. 1-15.
Chu. Samuel Kai-Wah, and Du. Helen, Social Networking Tools for Academic Libraries. Journal of Librarianship
& Information Science.45(1).p. 64-75.
Ahmad Ateeq (2011). A Short Description of Social Networking Websites And Its Uses. International Journal of
Advanced Computer Science and Applications. 2(2).p 124-128.
ISBN 1-63102-455-8
243
ROLE OF MOBILE COMMUNICATION IN RURAL
DEVELOPMENT: A STUDY OF KARALA VILLAGE
Nidhi Chaudhry | Assistant Professor | BJMC | MAIMS | Rohini Sec – 22 | Delhi | nidhichaudhry@ymail.com
Dr. Nisha Singh | Assistant Professor | BJMC | MAIMS | Rohini Sec – 22 | Delhi | ratrinisha@gmail.com
Abstract: The paper examines the role of mobile communication in rural development.
Communication plays an important role in the process of rural development. The communication
bridges the gap between public institutions, rural organizations and people generate the
opportunities to ensure share of knowledge and experience needed for rural development. The
mobile industry have realised the significance of mobile communication and its effects in rural
areas hence they are coming up with low cost smart phones and low tariff internet packages and
schemes like EMI, etc. The innovations in mobile industry are oriented towards rural community
like mobile applications in regional or local languages. The policymakers in developing countries
has taken this into consideration very seriously and hence they channeling their efforts and
resources towards rural development. The study made use of frequency counts and simple
percentages to analyse the data collected. The study revealed that communication is essential in
fostering rural development; that with good communication strategies, rural people would take
ownership of development initiatives in their hands and that good and effective communication
would foster rural development. The study concluded that communication is important in rural
development and that it must be fostered for people to participate actively in the process of
development.
Keywords: Development, Rural Development, Mobile Communication,
INTRODUCTION
Development refers to the sustained, concerted actions of communities and policymakers that improve the
standard of living and economic health of a specific locality, thereby leading to the general progress and welfare
of its people. ‘Development’ is a broad term which calls for overall and comprehensive development of the
entire society or nation, if any section of the society is left out or does not develop than that society or nation
cannot be categorized as developed. Hence ‘development’ is always comprehensive thus the rural areas cannot
be left out. Especially in a country like India which is an agricultural economic and 70 percent of its population
resides in rural areas.
Rural development is a process of action with economic, political, cultural and social dimensions. To put it
differently, agricultural development is a process whereby the farmers possess modern knowledge and
information. It is essential for the farmers to have and accept the necessary technologies, innovations and
knowledge for the rural development.
Therefore, communication plays an important role in the process of rural development. The communication
bridges the gap between public institutions, rural organizations and people generate the opportunities to ensure
share of knowledge and experience needed for rural development. The policymakers in developing countries has
taken this into consideration very seriously and hence they channeling their efforts and resources towards rural
development.
To bring about social change among the marginalized and vulnerable population groups, participation must be
fostered through communication; as such will lead to the transformation of the community. This is to say that
communication is a central or the mediating factor facilitating and contributing to collective change process
(Sarvaes and Liu 2007).
“Collective action is built on personal interactions and trust, but today’s communications technologies and
social networks also hold potential for extending the scope of social and political communities across borders.
244
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Mobile phone use is almost universal, with 6.8 billion subscriptions, and Internet use is on the rise, with average
annual growth in Africa leading the way at 27 percent. Communications technology can also increase the voices
of the vulnerable—encouraging the political and social participation of groups that have historically been
excluded from, or minimally represented in, public discourse, including the poor, women, minorities and other
vulnerable groups.” The United Nations Development Program (UNDP)’s Human Development Report 2014
(www.undp.org).
The United Nations Development Program (UNDP)’s Human Development Report 2014 stresses that the
strategic communication works and information communication technologies play vital role in the elimination
of poverty and ensuring public access to information in rural development, creation of employment and other
similar fields (www.undp.org).
In communication for development, rural people are at the centre of any given development initiative and so
communication is used in this sense for people’s participation and community mobilization, decision making
and action, confidence building for raising awareness, sharing knowledge and changing attitudes, behaviour and
lifestyles (FAO 2006).
Mobile phone is another means of communication. Its use is increasing day by day. It is an example of
convergence. It converts various media in to a single media. Today you can talk face to face. You can connect
with whole world. The development of telecommunication technology converts world in to Global Village.
Mobile communication can affect rural people in the spheres of – trade & commerce, education, information,
healthcare and governance and it is important for the mobile industry to work at these levels to achieve
significant development.
India is the second largest Country of the world in which 96, 051, 9472 mobile phone users are using mobile
phone. Six million new mobile subscriptions are added each month. Many of these new "mobile citizens" are
belong to rural areas.
The mobile industry have realised the significance of mobile communication and its effects in rural areas hence
they are coming up with low cost smart phones and low tariff internet packages and schemes like EMI, etc. The
innovations in mobile industry are oriented towards rural community like mobile applications in regional or
local languages.
Cooperation (DAC), Ministry of Agriculture, Govt. of India launched Kissan Call Centers on January 21st, 2004
across the country to deliver extension services to the farming community. Government and private players are
increasingly tapping into this widely available medium. Kissan Call Centre Services and number of mobile
values added services such as free daily voice messages on marketing prices for their produce, farming
technology, weather forecasts, dairy farming, fertilizers availability, plant protection etc. The purpose of these
call centers is to respond to issues raised by farmers, instantly, in the local language. Kiosks are meant for
access to basic browsing and various types of commercial values added services including entertainment,
Information, tele-education and telemedicine.
The Indian government has launched Sanchar Shakti Mobile VAS scheme for providing information and
training to rural women, providing them with information on health, social issues, government schemes, as well
as livelihood related inputs training, for women self help groups in rural India.
REVIEW OF LITERATURE
Ajay Kumar Pandey, G.P. Pandey, K.M. Pandey (2001) concludes that the rural poor community, friends
and market place are the major source of communication. There is a need to give electricity to all villages in
Garhwa district. The rural people largely contribute to promote agriculture, forest through this promotion or
contribution they will develop the nation. Rural District of Garhwa district is not developed and healthy areas so
developmental policies must apply to control poverty illiteracy and aware about development. The
developmental work is not properly run due to illiteracy, crime, bandh, etc.
ISBN 1-63102-455-8
245
Role Of Mobile Communication in Rural Development: A Study of Karala Village
Prof. T.P. Rama Rao (2004) observes that the information and Communication Technologies have facilitated
the design of solutions to deliver government services for social development at the door step of rural people.
Successful ICT projects involved, in the design process, all stakeholders such as government officials,
legislators, regulatory agencies, citizens, voluntary organizations, technology consultants and vendors,
academics, researchers, funding agencies, and media. Some projects could not retain private entrepreneurs due
to poor revenue realization and inadequate quality of responses by the government departments offering the
services.
Dr. J.S. Giri Rao, Dr. S.N. Pattnaik (2006) conclude that as telephone gets cheaper and widely accessible
across the country, the real life of rural people of the country would definitely undergo a tremendous
transformation, providing the needed momentum for development. There is much to do with regard to
improvement in the field of telecommunication’s participation in rural development in India. Increasing access
of telephone in rural areas is especially critical given that most of poor people cannot afford their own telephone
service. Access to the means of telecommunications, transformation and dissemination of information is crucial
for human development especially with reference to knowledge based society and globalised competitive
economic environment.
Jonathan Donner (2007) concludes that as far as the technology is concerned, there are innumerable interesting
topics for exploration in the developing world, where the distinct forces of cultural variability and economic
constraint will enrich our understanding of mobile use for years to come. It can be difficult to be mindful of all
the variability, but cultural, economic, and regulatory factors all play a role in structuring the use of a billion (or
more) handsets in the developing world.
Jayanta Banerjee (2011) observes that telecommunication has become a vital part of our life; maintain social
contact, emergency relief, health and education. There are many noteworthy challenges to rural
telecommunication. Rural network infrastructure is difficult to maintain as access to power, transport and road
communication is poor. Government of India needs to ensure that all obstacles are removed in licensing,
spectrum allocation, technology acquisition, so that small 'niche' operators who are unable to make a mark in the
highly competitive urban market.
Christine Zhenwei Qiang, Siou Chew Kuek, et al., (2011) concludes that Mobile applications for agricultural
and rural development (m-ARD apps) offer innovative, dynamic, interdisciplinary services. These new services
could raise incomes and create more opportunities for people in rural and underserved communities in
developing countries as well as stakeholders throughout the ecosystem for m-ARD apps.
Abdul Razaque Chhachhar, Har Bakhsh Makhijani, et al., (2011) concludes that information and
communication technologies are growing rapidly in developing countries and most of the countries are getting
benefit from these technologies in different sectors of development. Still there is lack of infrastructure and
facilities in rural areas have no given appropriate development in agriculture and education sectors. By using
computer labs farmers directly can contact buyers and sellers for sell their goods and services lack of awareness
and illiteracy also a problem among farmers most of them cannot use technologies. There is need for education
of farmers regarding information and communication technologies and its uses that farmers can get information
about market, weather pesticides and seed.
Richard Duncombe (2014) provides a systematic review of the potential and limitations of mobile phones in
the delivery of rural services for agricultural and rural development in developing countries. Giving greater
mobility and portability, such devices and applications will offer greater processing power through cloud
connections, open source development, and possibly greater affordability, speed to market, new opportunities
for micro-revenue generation and financial sustainability.
Saravanan, R., Suchiradipta Bhattacharjee (2015) conclude that along with incredible opportunities,
implementation of mobile applications also poses a lot of challenges in India due to lack of mobile friendly and
locally relevant digital content, rural mobile infrastructure limitations illiteracy, large number of local languages
246
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
and tribal dialects. All that is needed is to learn from the success and failures alike and make mobiles an integral
part of agricultural extension as it has become an integral part of the life of the people.
OBJECTIVE OF THE STUDY
To know that Uttar Pradesh rural public believes that mobile communication is really beneficial.
To study that Mobile communication has changed lifestyle of Uttar Pradesh rural public.
To evaluate that people are aware about govt. policies regarding mobile communication.
To verify that people are get benefit from using Kisan Call Centre Services and SMS portal Rural
Broadband and NeGP Rural telephony Telecom Service.
RESEARCH DESIGN
Research Method:
To meet above objective survey method is adopted. In this survey village people are target respondents.
Sample Size:
150 respondents were selected for survey.
Sample Selection:
To meet above objective village Abdullah pure is selected by convince sampling.
Research Analysis:
Out of 150 respondents, 142 questionnaires were found to be good for analysis.
Male= 96 and Female= 46 respondents. Out of 142 respondents, 58 respondents were 0 to 10 th class educated,
28 were done 12th , 12 respondents were graduate, 8 were post graduate and 2 were M.Phil.
RESULTS AND FINDINGS:
Table 1: Respondent’s those have mobile phone
During the survey it was found that almost ever
respondent have one mobile phone at their home. A
good number a 93 male respondents have their
personal phone. But 31female respondents did not
have their personal mobile phone they were using
family phone. 84 respondents said that it is not at all
difficult to use a mobile phone. On the other hand
25 respondents replied that it was not at all easy
to use a mobile phone. 92 respondents said that
they were spend 1 to 2 hrs on mobile phone.
Only 16 internet users were found. Especially
youth like to use internet on mobile phone. 103
Table 2: Respondent’s perception about how easy to use
Table 3: Respondents those have internet connection on their
mobile phone
mobile phone
respondents were never used internet on mobile
phone.130 respondents said that they were not
aware about video calling from phone. 28
respondents said that they tried video calling
and they faced difficulty to use video calling.
12 respondents replied that it was not so
difficult to use video calling. They liked to use
video calling. They also said that it is a good feature of
mobile phone that anybody can talk and watch somebody in
same time.
Almost every 140 respondents replied that they were listen
radio on mobile phone. 56 respondents said that they used
ISBN 1-63102-455-8
Table 4: Internet used by respondents on mobile
phone
247
Role Of Mobile Communication in Rural Development: A Study of Karala Village
mobile phone for all purpose. They said that mobile phone is a good infotainment medium. Mobile
communication had made communication very easy said by almost ever respondent. 45 respondents said that
they used mobile phone only for communication. They said that cost of mobile phone is not so much affecting
their purchasing behaviour.
Every
respondent
said
that
mobile
communication has made communication
process easy. They also said that with mobile
phone they can talk to anybody in very less
time and less money. With the help of mobile
communication 28 respondents said that they
got profit with using mobile phone.
Table 6: Mobile phone has changed respondent’s life
style
Table 5: Respondents purpose to used mobile phone
Respondents replied that they can order material
which want to use. There is no need to visit shop to
shop. Just call them and they send material to their
home. Their business is increasing because of
mobile phone. They also said that mobile has made
their life so easy and comfortable. It is very
difficult to live without mobile phone. Their
education level also has improved said by 7
respondents.
48 Farmer said that they got information about
weather, seeds and govt. policy with use of mobile
phone. Yes village people lifestyle has changed but
normally said by 29 respondents. 85 respondents
said that there is no change has found in their
lifestyle. 52 respondents said that yes they got
Table 7: Awareness of respondents towards government
policies regarding mobile technology
profit through mobile phone and 67 respondents
said that through mobile communication they got
less profit. Government policy regarding mobile communication, has known by 56 respondents. They were
aware about govt. policy like Kisan Call Centre and they were called in Kisan call centre.
38 respondents replied that they were satisfied with
kisan call centre mobile services. 70 respondents
were not replied anything they were neutral on this
question. 40 respondents said that they were not
satisfied with Kisan Call Centre services. 82
respondents didn’t want to see any change in it. On
the other hand 48 respondents said that they want
Table 8: Satisfaction level of respondent’s toward kissan
call centre mobile service
that govt. create awareness among village people so
that they should know that how to use of kisan call
centre services. Everyone should have kisan call centre mobile phone no.
12 respondents said that they want to change
language of the mobile phone. They said that it
should be local language so that they can
understand and easily operate it. With the help of
mobile communication rural development is
possible replied by 102 respondents. 20 respondents
were quite on this question they were not replied
anything. Only 12 respondents said that rural
248
Table 9: Respondent’s perception towards rural
development through mobile phone
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
development through mobile phone is difficult.
56 respondents said that mobile technology is quite difficult for them and they wanted that mobile technology
should be easy for them. 105 respondents said that mobile phone should be cheap so that they can purchase
more. Only one helpline can’t do any help in rural development govt. should increase more development
program. They didn’t know how to use internet on mobile phone. Govt. should organized seminar and workshop
to create awareness among village people.
CONCLUSION
The research was carried out to find out the extent to which mobile communication would help in the rural
development. The study made use of frequency counts and simple percentages to analyse the data collected. The
study revealed that communication is essential in fostering rural development; that with good communication
strategies, rural people would take ownership of development initiatives in their hands and that good and
effective communication would foster rural development. The study concluded that communication is important
in rural development and that it must be fostered for people to participate actively in the process of
development.
RECOMMENDATIONS
To this end, the following recommendations are made: Members of each community should be made to realize
the importance of communication in the process of community development. In realization of this, community
members should be made to see the importance of choosing the right words for use in the right context so that
ideas and opinions on community development, as expressed by each community member would be understood
and eventually lead to collaborative efforts. Community leaders should endeavour to engage in clear
communication so as to enlist the participation of everybody in the process of community development.
Community leaders or community development agents should ensure effective circulation of information among
different participants by using communication tools and channels appropriate to the groups involved.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
Adedokun M.O. 2008. A Handbook of Community Development. Ado-Ekiti: Balfak Publisher.
Adepoju Tunji 2000. Introduction to Mass Communication. Ibadan: The Gift Communications.
Akinpelu J.A. 2002. Philosophy and Adult Education. Ibadan: Stirling-Horden Publishers. Anyanwu C.N. 1999.
Introduction to Community Development. Ibadan: Gabesther Educational Publishers.
Braimoh Dele 1988. The process and effects of distortion. In Human Communication and its Implication for
Educators. Nigerian Journal of Curriculum, 5(1): 83- 95.
Communication and Community Development From http://www.communicationforsocialchange.org/ maziarticles.php?id = 272.
Communication for Development
J. Sarvaes, Liu S. (Eds.) 2007. New Approaches in Communication and Community Development. Moving
Targets: Mapping the Paths Between Communication, Technology and Social Change in Communities. Penang,
Malaysia: Southbound.
Alamgir M. 1989. Participatory Development: The IFAD Experience. In: WP Lineberry (Ed.): Assessing
Participatory Development: Rhetoric versus Reality. Boulder: West View Press, pp. 115-125.
Manyozo Y. 2006. Manifesto for development communication: Nora C. Quebral and the Los Banos School of
Development Communication. Asian Journal of Communication, 16(1): 77-79.
Quebral N. C. 1973. What do we mean by development Communication. International Development Review,
15(2): 25-28.
Thussu D. K. 2000. International Communication: Continuity and Change. London: Arnold.
Udoakah N. 1998. Development Communication. Ibadan: Sterling-Horden Publishers.
United Nations Development Program (UNDP)’s Human Development Report 2014 (www.undp.org). (Accessed
on 26th July, 2015)
ISBN 1-63102-455-8
249
A COMPARATIVE STUDY ON TOTAL QUALITY
MANAGEMENT OF LIBRARY SERVICES IN TAMIL NADU
UNIVERSITY LIBRARIES
Dr. I. Ravi Kumar Kennedy | St. John’s College | Palayamkottai | Tirunelveli | i.r.k.kennedy1996@gmail.com
Abstract: The Total Quality Management mainly rely on recognizing library user’s and discovery
of their needs, setting standards that an consistent with library users requirements, empowerment
of people at all levels in the organization to act for quality improvement. Quality services means
resources and services, which satisfy user’s expectations and perceptions. It is very clear that
librarians must use management tools to run the library Services. The tools such as TQM,
SERQUAL, SERVPERF, LibQUAL help them to assess services, to make decisions, to improve
services and to achieve a better quality. The main idea of the present study describes the
commitment to quality and meeting the library user’s requirements, communication of the quality
message and recognition of the need to create total quality.
Keywords: Information Services, Library Services, Total Quality Management, University Libraries, Users
satisfaction.
INTRODUCTION
The very existence of libraries are dependent on user’s satisfaction in the present digital information era, the
librarians are more than a custodians to provide the right documents, information and the services to its users.
The main objective of this paper is to describe and identify the issues of meritorious attention by the library
professionals to gear up the library product and services, so that the user communities to get satisfied for coming
to library.
Total Quality Management (TQM) is an integrative philosophy of management for continuously improving
the quality of products and processes. The quality of products and processes is the responsibility of everyone
involved with the creation or consumption of the products or services offered by an organization. In other
words, TQM capitalizes on the involvement of management, workforce, suppliers, and even customers, in order
to meet or exceed customer expectations. Cua, McKone, and Schroeder (2001) identified the nine common
TQM practices as cross-functional product design, process management, supplier quality management, customer
involvement, information and feedback, committed leadership, strategic planning, cross-functional training, and
employee involvement.
Quality Management in University Libraries
The emergence of knowledge society has necessitated exploring more innovative and insightful measures of
modernization. The Present study makes an effort to study, assess and evaluate the quality management in the
university libraries in Tamil Nadu.
Three main components of Quality Management are:
a) Quality Control,
b) Quality Assurance, and
c) Quality Improvement and Enhancement
SIGNIFICANCE OF THE STUDY
1.
2.
3.
4.
5.
250
To analyze the demographic characteristics of library users gender wise and status.
To analyze the time spent by students and academic users in university libraries.
To analyze the different methods adopted for providing quality library services by the university
library.
To analyze the availability of study materials for teaching and research.
To evaluate the modernization inputs and to work out the growth rate trend in key variables in libraries
of higher education.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
6.
7.
8.
To examine the views and opinions of users and staff and to apply a simple SWOT model to assess the
quality management in university library services and facilities available.
To assess the problems faced by all those concerned with library quality and standards.
To offer suggestions for better performance of university libraries.
A Structured Questionnaire was designed after completing the pilot survey. Different university library records
were referred for secondary data and were collected using suitable schedules. Appropriate statistical tools were
employed considering their utility and plausibility in this research study. A simple SWOT model was used. This
survey covered all the profiles of 15 university Libraries in Tamil Nadu with a randomly selected a samples of
500. Materials, facilities, services offered and the staff and users were considered for the study.
FINDINGS OF THE STUDY
The following are the major findings of the present study:
Gender
Particulars
Male
Female
Total
No.of Respondents
256
244
500
Percentage
51.2
48.8
100
Table 1: Demographic characteristics of Library users – Gender
Table 1 showed the Demographic characteristics of Library users that 51.2% of the respondents belong to the
male category whereas 48.8% of the respondents belong to the female category.
Status
Faculty Member
M.Phil Scholar
Ph.D Scholar
First year Students
Second year Students
Total
28
93
70
147
162
500
Table 2: Demographic characteristics of Library users – Status
5.6
18.6
14.0
29.4
32.4
100
Source: Primary data
Table 2 showed that among the overall 500 library users, twenty-eight respondents (5.6%) are faculty members,
18.6% are M.Phil research scholars, 14% of the respondents are Ph.D research scholars, 29.4% are first-year PG
students and 32.4% are second year PG students respectively. Hence more than three-fifths of the respondents
belong to the category of PG Students who use the university library services.
Table 3: Status of users and frequency of visits to the library
S. No.
1.
2.
3.
4.
5
Status of the
users
Faculty
Members
M. Phil
Research
Scholars
Ph. D Research
Scholars
P.G. First year
Students
P.G.
Second
year Students
Total
Total
Frequency of visit the library
Every day
13
(46.43%)
57
(61.9%)
25
(35.71%)
78
(53.06%)
80
(49.38%)
253
Once in
two days
9
(9.68%)
Once in
three days
6
(21.43%)
2
(2.15%)
14
(20%)
5
(3.40%)
13
(8.02%)
41
4
(5.71%)
12
(8.18%)
19
(11.73%)
43
Weekly
Monthly
Occasionally
-
3
(10.71%)
4
(4.30%)
28
14
(15.05%)
6
(21.43%)
7
(7.53%)
21
(30%)
40
(27.22%)
32
(19.75%)
107
4
(5.71%)
6
(4.08%)
8
(4.94%)
31
2
(2.86%)
6
(4.08%)
10
(6.17%)
25
70
93
147
162
500
Table 3 showed the status of the library users and their frequency of visiting the library. Among the faculty
members, 46.43% visit the library every day, 21.43% visit once in three days and 21.43% visit monthly. Hence
ISBN 1-63102-455-8
251
A Comparative Study On Total Quality Management of Library Services in Tamil Nadu University Libraries
nearly half of the faculty members visit the university library daily. Among the M.Phil research scholars,
61.29% visit every day, 9.68% visit once in two days, 2.15% visit once in three days, 15.05% visit weekly,
7.53% visit monthly and 4.30% visit occasionally. Therefore three-fourths of the M.Phil research scholars visit
the university library daily. Among the Ph.D research scholars, 35.71% visit every day, 20% visit once in two
days, 5.71% visit once in three days, 30% visit weekly, 5.71% monthly and 2.86% visit occasionally. Hence
more than one-third of the Ph.D research scholars visit the university library daily. Among the Post-graduate
first-year students, 53.06% visit every day, 3.40% visit once in two days, 8.18% visit once in three days, 27.22%
visit weekly, 4.08% visit monthly and 4.08% visit occasionally. Hence more than half of the Post-Graduate firstyear students visit the university library daily. Among the Post-graduate second-year students, 49.38% visit
every day, 8.08% visit once in two days, 11.73% visit once in three days, 19.75% visit weekly, 4.94% visit
monthly and 6.17% visit occasionally. Hence nearly half of the post-graduate second year students’ visit the
university library daily.
S.No.
Purpose
No. of Respondents
Percentage
1.
2.
3.
4.
5.
To know the latest arrivals in the library in your subject
Academic improvement
Reading newspaper
Prepare competitive Examination
To gain current and general information
146
188
162
154
156
29.2
37.6
32.4
30.8
31.2
6.
7.
8.
Reading Journals and magazines
For leisure reading
Preparation of class notes/ assignments/seminar papers
148
100
114
29.6
20.0
22.8
9.
Employment news
Total N=500
8
1.6
Table 4: Purpose of Visit to the Library by the users
Source: Primary data
Table 4 elicited the purpose of visit to the University Libraries by the respondents in the study, 188 respondents
visit the library for their academic improvement, 162 visit for reading newspapers. This is followed by 156
respondents to get current and general information, 154 respondents visit the library to prepare competitive
examinations, 148 respondents visit the library for Reading journals and magazines, 148 respondents use the
university library to know the latest arrivals in the library in their subject, 114 for Preparation of class notes/
assignments/ seminar papers, 100 respondents visit the library for leisure reading, 8 respondents visit the library
for employment news respectively. Hence most of the respondents visit the library for the academic
improvement and It is suggested that the library authority should consider the needs of the users who prepare for
competitive examinations and encourage the use of library for preparing class notes/assignments/seminar
papers.
S.No.
1.
2.
3.
4.
5.
6.
7.
Type of materials
Reference Books
Newspapers
Employment newspaper
Journals/ Magazines
Text Books
Theses and Dissertations
E-Resources
Total N=500
No.of Respondents
236
208
75
135
179
104
55
Table 5: Library users’ preference of seeking information sources
Percentage
47.2
41.6
15.0
27.0
35.8
20.8
11.0
Source: Primary Data
Table 5 discussed that 47.2% of the respondents preferred to seek reference books, whereas 41.6% of the
respondents newspapers. This is followed by, 35.8% seek text books, 27% of the respondents seek Journals/
Magazines, 20.8% seek theses and dissertations, 15% of the respondents preferred to seek the employment
252
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
news, and 11% of the respondents seek e-resources. Hence most of the library users preferred to seek the
information from reference books and newspapers.
Sl.
No
Opinions on
Very %
Good
Good
1
Seeking Infmn. thro’
Books
Seeking Infmn. thro’
Jls / magazines
furnishing of Reading
Room
Cleanliness and
working space of
Library
Ventilation and
lighting of reading
and stack rooms
116
23.2
330
109
21.8
176
2.
3.
4.
5.
%
66.0
Less
satisfied/
Satisfactor
y
40
341
68.2
34
6.8
35.2
180
36.0
124
158
31.6
214
42.8
111
22.2
215
43.0
8.0
Not
satisfied/
Dissatisfied
14
%
Total %
2.8 500
100
16
3.2 500
100
24.8
20
4.0 500
100
103
20.6
25
5.0 500
100
157
31.6
16
3.2 500
100
Table 6: Opinions on the level of satisfaction on book collection, journals and magazines and about furnishing of reading
room, cleanliness and ventilation and lighting of the Library Source: Primary data
6.1 users seeking information through books: Table 6 showed that 23.2% of the respondents report that
satisfactory level was Very Good for seeking Information through books , 66% report as Good, 8% report as
satisfactory and 2.8% report that Not satisfactory respectively. Hence 89.2% of the respondents are satisfied as
Good in seeking information through books.
6.2 users seeking information through Journal/Magazine/Periodicals: Table 6 showed that 21.8% of the
respondents reported the Level of satisfaction of seeking Information through Journal/Magazine/Periodicals are
Very Good, 68.2% as Good, 6.8% as satisfactory and 3.2% are Not satisfactory respectively. Hence 90% of the
respondents are satisfied with the level of satisfaction of seeking information through
Journal/Magazine/Periodicals as Good.
6.3 users’ opinion on the Furnishing of Reading Room: Table 6 showed that 35.2% of the respondents report
that furnishing of Reading Room is very good, 36% of the respondents report that good, 24.8% of the
respondents report that satisfactory and 4% of the respondents report that not satisfactory respectively. Hence
most of the respondents are satisfied Good with the Furnishing of Reading Room at the university library.
6.4 users’ opinion on the cleanliness and working space of the Library: Table 6 showed that. 31.6% of the
respondents report that Cleanliness and working space of the Library is very good, 42.8% of the respondents
report that good, 20.6% of the respondents report that satisfactory and 5% of the respondents report that not
satisfactory respectively. Hence most of the respondents are satisfied with the cleanliness and working space of
the Library. In this study, five per cent of the library users are not satisfied with cleanliness and working space
of the library and the university library should engage some menial worker to keep the library Clean and also
provide sufficient working space of the Library in order to encourage users for spending more hours and
utilizing the library.
6.5 users’ opinion on Ventilation and lighting of Reading and Stack Rooms: Table 6 showed that 43% of
the respondents report that Good, 31.6% of the respondents report that satisfactory,22.2% of the respondents
report that Ventilation and lighting in the Reading and Stack Rooms is very good, and 3.2% of the respondents
report that not satisfactory respectively. Hence most of the users are satisfied with the ventilation and lighting in
the Reading and Stack Rooms.
ISBN 1-63102-455-8
253
A Comparative Study On Total Quality Management of Library Services in Tamil Nadu University Libraries
S.No.
1.
2.
3.
4.
5.
Options
Very Good
Good
Satisfactory
Not Satisfactory
No Comments
Total
No.of Respondents
81
186
128
23
82
500
4
16.2
37.2
25.6
4.6
16.4
100
Table 7: User Friendliness of OPAC Source: Primary data
Table 7 showed that 16.2% of the respondents report that User Friendliness of OPAC was very good, 37.2%
reported it as good, 25.6% reported it as satisfactory and 4.6% reported it as not satisfactory, respectively. In this
study, 16.4% of the respondents did not express any comments. Hence 79% of the users were satisfied with the
User Friendliness of OPAC.
CONCLUSION
TQM is managing the concept of quality with the objective to meet and exceed the customer‘s expectation by
developing leadership-driven forces for providing a product or service with built-in quality. The total quality
should aim at the needs of the library users of present and future. The main requirements may include
availability, delivery, reliability, maintainability and cost effectiveness, among many other features. Now-a-days
the concept of quality has changed from the provider-oriented into customer oriented. Quality is the driving
force of the entire activity cycle from the beginning to the end. TQM in any organization are the organizational
vision, customer -focused, management by fact, total involvement and system support.
REFERENCES
[1] American
Society
for
Quality.
“Total
Quality
Management
(TQM)”.
Available
at:
<http://en.wikipedia/wiki/total_quality_management/overview//overview.html>
[2] Hashmi, Khurram (2010). “Introduction and Implementation of Total Quality management (TQM)”. Retrieved
28.04.2012, from http://www.isixsigma.com/ methodology/total-quality-management-tqm/introduction-andimplementation-total-quality-management-tqm/
[3] Jaafar,
S.
B.
(1998).
“Total
Quality
for
Libraries”.
Retrieved
May
05,
2004,
from<http://www.voctech.org.bn/Virtual_lib/Programme/Regular/Library98/TQM%20for%20Libraries.pdf>
[4] John, Paul and Yohannan, Sherin (2012). Total Quality Management in M.G. University Library, Kottayam: A
Case Study. In: National Seminar on digital Library Era: Expectations of Librarians and Library Users. Ed by A.
Thirumagal, P. Balasubramanian and K. Kannan. Tirunelveli: Manonmaniam Sundaranar University,2012: 136 –
140.
[5] Jurow, S. & Barnard, S. B. (1993). Introduction: TQM fundamentals and overview of contents. "Journal of Library
Administration," 18(1/2), 1-13. (EJ 469 099)
[6] Jurow, S. & Barnard, S. B. (Eds.) (1993). "Integrating total quality management in a library setting." Binghamton,
NY: Haworth Press.
[7] Kumbar, Rajashekhar D. “The Importance of Marketing and Total Quality Management in Libraries”. Electronic
Journal of Academic and Special Librarianship. v.5 no.2-3 (Fall 2004). Retrieved May 01, 2004, from
http://southernlibrarianship.icaap.org/content/v05n02/kumbar_r01.htm
254
ISBN 1-63102-455-8
A PARADIGM OF KNOWLEDGE MANAGEMENT IN
ACADEMIC LIBRARY: SOME INNOVATIVE
EXPERIMENTS
R. R. Kuralkar | Librarian | Adarsha Science, J. B. Arts & Birla Commerce Mahavidyalay | Amravati (MS) |
rkuralkar@rediffmail.com
Abstract: The process of managing the knowledge is being done since the period early human
beings. However, with the inception of new and modern technologies the very concept of
managing the knowledge in an organization and out of organization has been changed. The
human brains are starving to identify the new techniques to manage the knowledge for the rapid
progress in the concerned field of enterprises. The research has mentioned some innovative
experiences here with the library which is situated in the rural area of Maharashtra state in India.
In the era of automation of libraries some of the libraries have a facility of searching the library
databases. Perhaps, comparing the rural student community with the urban student community,
the rural students are lacking behind in respect of use of information and communication
technologies. When the OPAC is made available to all the students of higher secondary and
undergraduate students along with the proper user education, most of the students are found
reluctant to use that mechanism to find out their required information. On the other hand they
were approaching to the circulation desk to have their information particularly about the
textbooks of their syllabi. The researcher made an experiment that he prepared an Offline Public
Access Catalog. The details of the same are described in the article.
Another innovative endeavor is made to provide online anticipated immensely needed information
to the students. In this case it was found that most of the students were approaching to the help
desk in the reading room to have their syllabi, old examination question papers and college
magazine. Eventually, the library was having the lack of manpower. Therefore the researcher has
decided to start online and 24x7 anticipated service with the cloud environment. The author got a
drastic success in both the experiments which is narrated in the article.
Keywords: Knowledge management, Knowledge sharing, anticipated intensive care library services, cloud
computing and libraries, online library services.
INTRODUCTION
In the present age of information technology (IT) both information and knowledge have become essential
components due to multi-dimensional use and application in the society. They have also been playing a crucial
role to change and improve the current society for future vision. Knowledge Management is an emerging field,
much hooted or advertised since late 1990s. Knowledge Management is a complex process, which deals with
creations, acquisitions, packaging and utilization of knowledge. It is the methodical, unequivocal and
premeditated building renewal and utilization of knowledge related to effectiveness and returns from its
knowledge assets. Library & Information Science professionals and Knowledge Managers have realized the
importance of knowledge management.
The attention being paid to knowledge management (KM) has been growing very fast. Business magazines,
books, and journals are publishing countless theories and business cases on knowledge management and related
topics, and the number of conferences organized all over the world is growing exponentially. But why is this
concept generating so much hype? And what are its major drivers? The importance of intellectual capital and the
management of knowledge are strongly emerging themes in today’s organisational world (Chase, 1997). Many
authors and practitioners (Quinn, et al., 1996, Matinez, 1998, Numri, 1998, Albert and Bradly, 1997) note that
the emerging patterns are that intellectual capital will replace natural resources, commodities, finance,
technology and production processes as the key factor influencing competitive advantage. This is because, with
the exception of intellectual capital, everything else (IT, materials, end technical information) is available to
ISBN 1-63102-455-8
255
A Paradigm Of Knowledge Management In Academic Library: Some Innovative Experiments
everyone on more or less the same terms. “Knowledge is now a crucial factor underpinning economic growth.
Producing goods and services with high value-added is at the core of improving economic performance and
international competitiveness, increasing intangible investment, which is difficult to measure, and has become a
major issue for enterprises and governments” Former Secretary General, OECD (quoted in Skyrme, 1998).
IMPORTANCE OF KM IN LIBRARIES
There are many firm reasons why organizations should pay attentions in knowledge management. The three
types of benefits:
Efficiencies in information and knowledge processes, for example by reducing duplication
Internal organizational benefits, such as sharing of best practices
External benefits, such as faster problem solving.
Many KM programs are start exclusively with a focus on the first group of benefits. Although important - and it
is where an audit of knowledge and information can help very much, more important is that a KM initiative
should be well beached in the core strategies and plans of the organization. Therefore, I consider some typical
strategic priorities which act as drivers for KM and also some factors that trigger the initiation of a KM
initiative.
DRIVERS THAT STIMULATES KM
An essential starting point in developing a KM program is to consider the needs of the library. In our consulting
work this typically involves reviewing the corporate strategy, departmental plans and current challenges and
applying to them a KM perspective. Some people call this process "developing the KM narrative". Below we
give a sample of some aspirations commonly seen in corporate strategies followed by a comment on how KM
can contribute.
256
Improving the levels of clientele service: through knowledge aggregation, KM can provide better
knowledge of users problems and how they are solved
Improving service quality: by linking disparate sources of information and using KM techniques,
such as sharing best practices in design and framing, knowledge from performance in practice can be
fed back into improved service designs and service rendering processes
Moving away from simply services into value-added services: much of the value-added comes from
knowledge - of product applications, of know-how delivered as training or as consultancy; KM can
provide knowledge structures and repositories, either that customers can access directly or via
consultants
Achieving faster times from service development to delivery: KM's networking and communities of
practice bring together knowledge from people working at all phases of the design-to-delivery cycle
across all sections of libraries, thus anticipating potential problems, bringing historic knowledge to bear
and condensing time frames; in addition, well structure work-in-progress repositories, such as project
wikis, can ensure that documentation is up to date, continually reviewed and accurate
Retaining and motivating our best clientele: evidence from several sources suggests that
professionals are more likely to be loyal to firms that give them the best tools of the trade; in
knowledge intensive organizations this includes intranet portals, collaborative technologies and
networked specialist communities; in addition a good KM programme will put in place mechanisms to
capture key knowledge so that when experienced staff retire or leave, all theit knowledge does not
leave with them
Reducing unneeded: in a knowledge intensive organization, wasted time comes from duplicating
work done elsewhere and taking time to find information; good KM systems can ensure that knowledge
repositories are well structured and that information can be searched and accessed efficiently
Increasing flexibility and adaptability in an uncertain environment: KM can provide mechansisms
for better external environment sensing and organizing market intelligence
Ensuring compliance with external regulations: better records and information management are the
key to providing authorities with reliable information and confidence
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Minimizing risk in our libraries: KM can been used to capture expert knowledge of risk assessor, and
also draw on 'lessons learned' from similar situations that have been encountered previously
Every situation is different, but a skilled KM analyst should be able to dissect strategic statements and identify
potentially useful KM techniques and how much they could contribute to making an improvement.
TRIGGERS FOR ACCOMPLISHMENT
Our research shows that it usually takes one or more of the following events to stimulate an organization into
initiating a KM programme
Poor performance - investigation often reveals inadequate information flow or lack of knowledge of
demand forces the dawn of realization by senior management that knowledge is indeed a source of
competitive advantage
A change of senior management - where incoming managers have come from a more KM-mature
business or can see that poor information or knowledge flows are hampering the organization
The need to be more responsive to external trends and events, thus requiring better knowledge sensing
and analysis capabilities
Recognition of the need for a coherent KM effort to overcome the plethora of various projects (not all
having a KM label)
The need for significant investment in new IT systems, where it is important to balance investment in
technology with that of content
A recommendation from a consultant's study that started with another focus, such as customer
relationship management
New external regulatory or compliance requirements - Freedom of Information in the public sector
is one example.
ORIGIN OF THE IDEAS
These experiments are made in the college library which is belonging to higher secondary and undergraduate
students and situated in the rural part of Maharashtra state in India. In fact an OPAC was made available to the
students and faculty for searching library databases and the college library was lacking sufficient numbers of
computers in proportionate to the students and faculty. This resulted into the growing reluctance in the users to
search the database. One another fact is that the students from rural areas were not have the sufficient
knowledge to handle the computers. In the regular observation it is found that the students were placing their
demand on the help desk and books circulation counter. This behavior hunted the mind of the researcher who is
the librarian of this college. The researcher deeply thought over the issues and decided to provide Offline Public
Access to the clientele. The detailed story is narrated in the next point.
It was found that most of the students were visiting the help desk for some particular needs like syllabus, old
examination question papers etc. Due to the shortfall of employees it was difficult to serve the students and
hence some students were lying unfulfilled. The librarian seriously thought over the issue to solve it in the given
environment and available facilities. The concerned syllabus and question papers were made available to the
students for 24x7 using no cost mechanism. The real story of this is explained below.
PRACTICING AND IMPLEMENTATION OF THE IDEAS
To accomplish this task the researcher conducted meeting with the faculty to know which books are needed as
per the syllabi of their subjects. Some those books are traced out which were already issued by the students. A
subject wise, faculty wise and class wise inventory of books with the tile, author and registration number was
prepared. This inventory is printed in a bold format and display near to the circulation desk. The precaution is
been taken that the display of this inventory is most accessible and noticeable to all the clientele. The fact was
brought into the notice of all the clientele that they can access their books regarding their needs through this
inventory.
One new endeavor is made to solve the problem of the students regarding the frequent needs of syllabus and old
exam question papers. The required material is scanned and stored it on the cloud in drive the link of the drive is
ISBN 1-63102-455-8
257
A Paradigm Of Knowledge Management In Academic Library: Some Innovative Experiments
provided in the email of the library by setting a return email setup. It resulted into a drastically fantastic output.
The notice is announced for the students that if they are in need of syllabus and old exam question papers they
have to send a email on the given email that is the email of our library and then open their inbox they will get
the syllabus and other material instantly. As a result of it the clientele rush on the help desk is reduce and user
got served. It became possible to us to provide the library service in available least manpower. On the other
hand ours students who are from rural areas becoming aware about the information and communication
technology and ultimately they became happy.
CONCLUSION
In a nutshell these experiments resulted into fruitful. The knowledge management of available resources in the
library as per requirement of the clientele could be done. Considering the existing situation of the library in
respect of staff, IT infrastructure what was possible to prove the users is successfully done. The use of available
resources for the sake of user within the required time span is made.
REFERENCES
Chase, R. (1997) The knowledge-based organisation: An international survey. Journal of Knowledge
Management, 1, 1, pp. 38-49
[2] Quinn, J.; Andersen, P.; and Finkelstein, S. (1996) Managing Professional Intellect: Making the most of the best.
Harvard Business Review. March-April.
[3] Skyrme, D. (1998) Measuring the value of knowledge. Business Intelligence report. Business Intelligence Limited:
London.
[1]
258
ISBN 1-63102-455-8
ACADEMIC LIBRARIES WITH RFID
Anil K. Mishra | Senior Lib. Information Asstt. | P.K.Kelkar Library (Central Library) | Indian
Institute of Technology | Kanpur | mishraak@iitk.ac.in | dearanielkumar@gmail.com
Jyoti Verma | Senior Lib. Information Asstt. | P.K.Kelkar Library (Central Library) | Indian Institute of
Technology | Kanpur | jyotiv@iitk.ac.in,
Abstract: In this paper described about the importance of RFID technology in academic
libraries. Libraries using fast growing application RFID; this technology promises to relieve
repetitive strain injury and make possible comprehensive inventory and by implementing this
technology in academic libraries, the manpower, energy, time, duplication of efforts can be saved
and reciprocate these saved resources can be used for betterment of the libraries in other wing.
This article focused on the role of RFID in different type of functions of the library as security
checking, shelf management, check-in and check-out etc.
Keywords : RFID, Radio Frequency Identification
INTRODUCTION
RFID is a set of technologies that enables tracking and monitoring activities to be carried out using invisible
radio waves over distances that range from less than a centimeter to many hundreds of meters. RFID
applications in library require item-level tagging, because RFIDs are used to manage each books in a library
collection. Thus, RFID in library applications may be the first major deployment of item-level tagging. This
provides an interesting opportunity to study the privacy implications of item-level RFID tagging in a concrete,
real-world setting. Generally, Radio Frequency Identification (RFID) is a means of identifying a person or
object using a radio frequency transmission; these may be 125kHz (Low Frequency), 13.56 MHz (High
Frequency) or 800-900MHz (Ultra High Frequency). RFID has been in existence for more than 20 years, and it
is also used in other areas such as toll collection, access control, ticketing, and security concerns.
RFID IN LIBRARIES
RFID (Radio Frequency Identification) in library provides
solutions on cost-effective basis. As name implies all functions
are based on radio waves, short and long waves (125kHz-Low
Frequency, 13.56 MHz-High Frequency or 800-900MHz-Ultra
High Frequency) used in RFID as required according to
distance of objects(books), RFID systems have been in
existence within libraries for more than a decade. Through this
technology stock verification at any level becomes very easy
and can be performed in short span of time without disturbing
any kind of library service. As the increasing of the amount of
collections in library it becomes more difficulty to gather and
search books, which would cause a series of problems, such
RFID tags used in libraries: square book tag,
as, putting books on the wrong or disordered frame, readers
round CD/DVD tag and rectangular VHS tag
keeping books of their own privately, and difficult to count
and classify etc. Bar coding technique cannot meet the requirements any more. It was new challenge to improve
the level of book management and service by applying the advanced information technology. It is a new
challenge to improve the level of book management and service by applying the advanced technology. This
system makes the readers seek what they want easily, and decreases the possibility of putting the books at the
wrong place and bringing them out of library. Radio Frequency Identification can track and position all of the
bibliographies that labeled RFID tags. RFID is an automatic identification technology thus automatic
identification of objects using RF signal and special coupling (inductor or electromagnetic coupling) or the
transmission properties by radar reflection. The beneficial side are quick scanning of books (RFID reader device
can identify multiple RFID labels simultaneously); reading without barriers; shape of diversification; being of
ISBN 1-63102-455-8
259
Academic Libraries With RFID
strong durability and reusability of books; due to being of large data memory; the safety of library collection is
also become strong.
Use of RFID through smart cards for circulation of materials becomes very convenient for the library readers for
check-in and check-out of documents(these smart cards has RFID chips), user can also perform self check-in
and checkout, user identification can be done easily by these smart cards. A centralized database of the library
readers can be prepared to speedup information between user and librarians.
Library Inventory Reading can be performed by handheld RFID reader which consists of a long light weight
handle with a flexible end part i.e. RFID antenna that rotates to identify the items on all shelves where hard to
reach. The reader offers highest reading performance enabling instant data capture when passed near the items
in a continuous movement. RFID reader can do fast and accurate inventory checks and also search specific
documents i.e. re-shelving, weeding of books, on-hold management by connecting to the pocket PC which can
stores and displays the documents data. This data can be transferred to the Library database via pocket PC
through a wireless connection. Further no modification to the Library database is required. The inventory reader
is unique and a convenient tool for the library staff as it is helpful in no. of ways as documents are identified on
upper and lower shelves more comfortably without removing books from the shelves, inventory checks can be
performed with minimal staff and within short time period. By using such type of Inventory Reader, stock
verification no longer remains a tedious operation. Using RFID when required any kind of information
regarding library collection can download from the pocket PC memory or central server.
RFID Security at main exit (Gate) this security system allows to perform simultaneous reading/writing into the
chip and activation and de-activation of the antitheft function. Library main gate are ultimately collection keeper
of library and they run the most modern detection algorithm that constantly detects non de-activated items.
There is installed an audio or visual devices which suddenly prompts when security is violated. The library main
Gate does not require additional equipment to operate. This is a low cost security system as it only requires a
single RFID tag and a single piece of hardware equipment.
RFID ARCHITECTURES FOR LIBRARY
(Radio Frequency) communication occurs by the transference of
data over electromagnetic waves. RFID is mainly consist of labels,
reader, antenna and a set of system transmitting and processing data.
. Practically in RFID technology, an electronic label is attached to
the book, when the book with electronic label is goes through the
readable area of reader, a wireless communication link established
between the label and the reader, when label send information to the
reader then reader receives and decode it; than these information is
transmitted to the computer running back to complete the whole
information process. Thus, RFID System can be summarized as the
sum of the following three components:
Small RFID chips, here it is compared to
a grain of rice.
1. RFID tag or transponder
It is composed of an antenna, a wireless transducer and an
encapsulating material. These tags can be either active or passive. Where active tags have on-chip power,
passive tags use the power induced by the magnetic field of the RFID reader. Thus passive tags are cheaper but
with lower range.
2. RFID reader or transceiver
It consists of an antenna (transceiver) and decoder, which sends cyclic signals to inquire about any tag in area.
On receiving any signal from a tag it passes on that information to the data processor.
3. Data processing subsystem
The data processing subsystem provides the means of processing and storing the data.
260
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
RFID systems can also be differentiated based on the frequency range it uses. The common ranges are LowFrequency (LF: 125 - 134.2 kHz and 140 - 148.5 kHz), High-Frequency (HF: 13.56 MHz) and Ultra-HighFrequency (UHF: 868 MHz - 928 MHz)
RFID ISSUES FOR LIBRARY
It is sometime also possible to compromise an RFID system by placing two items against one another
so that one tag overlays another, that may cancel out the signals. It can be eradicated by careful
alignment and knowledge of the technology.
Higher cost is the major
disadvantage
of
RFID
technology.
The
hardware
required for RFID setup is costly
which is difficult for the small
library to implement.
The tags pasted on the books can
be easily removed which causes
the problem for the library staff
because then Radio Frequency
device will not trace the
document and then there may be
threat of stealing.
CONCLUSION
A books tracking based on RFID is proposed in this paper in order to solve a series of problems, such as readers
keeping library books of their owns, putting the books on the wrong frames, checking large amount of books,
etc. The system is innovatively blended with RFID technology which replaced library bar coding. In addition,
the virtual routing algorithm is used in the system to realize ID positioning with wireless network technology to
spread the real-time tracking data to PC. Simulating experiments is carried to confirm its viability. This system
not only can detect the position of bibliographies in real-time, but also realizes the wireless short-distance
communication of less power-consuming and lower cost. Further it is certain that the system with a good
developing space is a scheme worthy of studying.
REFERENCES
http://www.loc.gov/
Allied Business Intelligence. (2002). RFID white paper. Oyster Bay, New York.
American Library Association. (2004). Code of Ethics of American Library Association.
http://www.ala.org/ala/oif/statementspols/codeofethics/codeethics.htm
[4] www.tagsys.net
[5] www.Wikipedia.com
[6] https://www.rfidjournal.com
[1]
[2]
[3]
ISBN 1-63102-455-8
261
EMOTIONAL INTELLIGENCE OF TEACHERS IN WORK
PERFORMANCE
S. Jerslin | Research Scholar | Department of Education | GRI-DU | jerslinmartina@gmail.com
Dr. N. Devaki | Assistant Professor | Department of Education | GRI-DU | devakiaries@gmail.com
Abstract: Teachers are the shapers. They shape the future generations of India. An Emotionally
Intelligent teacher can shape an Emotionally Intelligent student community. Thus Emotional
Intelligence plays a main role in teacher’s work performance. Here in this paper, the author
clearly states various measures to enhance the Emotional Intelligence of the teachers. The author
talked about the self motivation (i.e) self efficacy, empathy and spiritual intelligence in this paper.
Self efficacy or self motivation contain two characters namely optimism and flow. The following
article talks about these factors in detail.
Keywords: Emotional Intelligence, Self Motivation, Spiritual Intelligence
INTRODUCTION
Teachers are the friend philosopher and guide to the students community. The present student community is
expecting more from the teachers. Apart from the subject the subject the teacher can play a vital role to promote
her student. Making high mark in the examination alone is not the purpose of a teacher. The teacher should
promote an all round development of the students. That is why the teacher in need of emotional intelligence.
The role of a teacher is crucial in the 21st century. She has to satisfy the authorities the students the parents and
her colleges inside the campus. Outside the campus also she has some work she has to manage her family
members. Unless she posses Emotional intelligence she cannot tackle easily those things. In our present study
we are going to see some of the ways to enhance her emotional intelligence.
EMOTIONAL INTELLIGENCE
Emotional intelligence means the ability to manage one’s own emotions as well as other persons emotions. In
1937, Thorndike used the term “social intelligence” to describe EQ (Thorndike & Stein, 1937) while Wechsler
used the term “non-intellective” to refer to affective, personal and social domains (Wechsler, 1940).However,
the work of these pioneers was largely forgotten or overlooked until 1983when Gardner began to put forward
the theory of “multiple intelligence” (Cherniss,2000). Gardner (1983) conceptualized “emotional intelligence”
as constituting intrapersonal and interpersonal intelligence. Salovey and Mayer (1990) were the first to use the
expression “emotional intelligence”. Goleman (1995; 1998) took one step forward to link the theory to job
performance.
Emotional intelligence is commonly defined as the ability to sense, understand and effectively use the power of
emotions to guide, motivate and even influence others (Salovey & Meyer, 1990). Emotional intelligence in the
form of emotional adaptability and agility is essential to enhance personal and leadership qualities. According to
Goleman (1995) “the rules for work are changing” (p. 1) and performance is rarely judged by one’s ability to
complete a task but by the ability to empower one and others.
OBJECTIVES OF THE STUDY
In this article we are going to see some steps or some ideas to improve the emotional intelligence of the
teachers.
a) Self efficacy
b) Empathy
c) Spiritual intelligence
a)
262
Self Efficacy : Self efficacy is the belief that one has mastery over the events of one’s life and can
meet challenges as they come up. Daniel Goleman points out five ways to improve Emotional
Intelligence. They are self-actualization, self –management, self-motivation, empathy and social
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
interaction. They are known as both interpersonal and intra personal skills. Of the above said five
components I can say the teacher should posses almost all these components to manage the students,
superiors, colleges and parents. Under self efficacy I want to talk about two things that is optimism and
flow. They are come under the category of self-motivation. Of this self-efficacy I want to include two
things. One is optimism and the other is flow.
A) OPTIMISM
Daniel Goleman says that optimism is the power of positive thinking. Before doing anything better we
should have some positive attitude. I can do, I will, I have are some of the self motivating words that a
teacher has to have in her mind while preparing for teaching modules or aids like that. Results showed
that the students and teachers who has positive attitudes are getting passed or doing works twice as that
of others (Seligman).
Optimism is the overall view that the world is a great place and that things will turn out ok. The
optimist believes (for example) that events will turn out for the best, or that people are trustworthy.
Most people are generally optimistic about things that have turned out well for them in the past, or
about things that have good associations for them.
Martin Seligman in his studies he concluded that optimism half of it is genetically acquire and half of it
is environmentally adapted. And also from his experiments he suggests that optimism like other skills
can be taught in schools and colleges. The one who undergo training and practice optimism shows
higher or better results. So as teachers or teacher educators if they practice or posses this optimism they
easily overcome the huddles, barriers and situations that come across them. Having optimism means
that one will not give in to over whelming anxiety, a defeatist attitude or depression in the face of
difficult challenges or setbacks. Indeed, people who are hopeful evidence less depression than others as
they maneuver through life in pursuit of their goals, are less anxious in general, and have fewer
emotional distresses.
Researchers told that optimism has some effects on health also. Optimism significantly predicted rate
of recovery, such that optimists were faster to achieving behavioral milestones, such as sitting up in
bed and walking, than were pessimists, and were rated by staff members as showing a better physical
recovery. At six-month follow-up, optimists continued to have a recovery advantage, reporting that
they were more likely to have resumed vigorous physical exercise, to have returned to work, and to
have resumed normal activities (see also Fitzgerald, Tennen, Affleck, & Pransky, 1993). In a five-year
follow-up, optimists were more likely to be working and, among those experiencing angina, reported
less severe chest pain. A manuscript by Scheier and associates currently under review reports that
optimists are less likely to be rehospitalized for complications arising from the surgery.
B) FLOW
Flow means mastery over the subject. If a teacher has mastery over her/his subjects, then nobody will
question her. A less practiced teacher a less learned scholar will struggle a lot in their work. They have
to afraid for the questions of the students, teachers, fellow workers, parents and superiors. On the other
hand if the teachers educate themselves with all potentials will come out bright in colours. They have
to motivate themselves to mastery over the skills and their subjects. The reluctant teacher cannot
acquire anything. They should show their multi personality to the student community. The present
student community is well known for its technologies. They are using the ICT tools as they like. The
teacher who studied in 90s may not familiar with these new technologies. It is advisable for teachers to
familiar with these technologies by themselves and teach the students. Otherwise the students won’t
respect the teacher. The teacher should equip herself with the following subject areas as for as my
concern.
The teacher should through with1) the subject they teach2) the skills needed for the students and for
herself and 3) the new technologies.
ISBN 1-63102-455-8
263
Emotional Intelligence of Teachers In Work Performance
If they are through with these things then there will be continuous flow from their mouth or from their
body will enhance their self-confidence and bring great respect from the students and others. For this
the teacher needs self motivation which is the third components of emotional intelligence told by
Daniel Goleman.
Everybody lack something in their field. What I want to say is practice gives perfection. Yes through
practice repeated practice with optimistic aim make one mastery over their subjects and make the flow
easily. Channeling emotions towards a productive end is a master aptitude. Whether it be in controlling
impulse and putting off gratification, regulating our moods so they facilitate rather than impede
thinking, motivating ourselves to persists and try, try again in the face of setbacks, or finding ways to
enter flow and so perform more effectively-all be speak the power of emotion to guide effective effort.
b) Empathy: Empathy plays a main role in the field of education. Both the teachers and the superiors
should have empathy. A caring classroom provides more ways and means to the students to study
effectively. Uncared classrooms and uncared teachers create lot of emotional problems. Although
empathy is an interpersonal skill it has a lot of effect in the intra personal skill also. Unless a teacher
has empathy she cannot hear the complaints of her students, know the interests of her students and
provide ways and means of their problems. They will be in the excited state of emotion.
From the childhood the child needs caring hands during the time of distress and anxiety. Empathy will
be very much need for the primary school teachers. While emotional neglects seem to dull empathy,
there is a paradoxical result from intense, sustained emotional abuse, including cruel, sadistic threats,
humiliations, and plain meanness (Goleman).
In case of the synchrony between teachers and students indicates how much report they feel; studies in
classrooms show that the closer the movement coordination between teacher and student, the more they
felt friendly, happy, enthused, interested, and easy going while interacting.
c)
Spiritual Intelligence: Spiritual Intelligence is the upcoming term that has some effect on the
Emotional Intelligence. Spiritual Intelligence means have faith in one’s religion or faith and also
respect all religion. In the time of distress, depression, anxiety, fear, emotional hijacking, accidents,
natural calamities usually people go to the supreme being. They find relaxation from their mental
depression easily without any cost. It is a easy solution for their problems. Today a large number of our
teaching faculties have faith in the supreme being to get ventilation for their emotional problems. It
consumes less money, time, energy and the like.
Recent researchers have begun to argue for the importance of exploring their relationship to workplace
performance. Recent research, for example, has shown a positive relationship between emotional
intelligence and workplace success. Similarly, it appears that spirituality is related to workplace
performance or effectiveness.
CONCLUSION
With this I want to conclude that an emotionally intelligent teacher will bring up an emotionally intelligent
student. The teachers have to equip themselves with self confidence, self motivation, empathy and spiritual
intelligence to produce a nice and pleasant working environment. The above said emotional intelligent
components help the teacher to face the challenging world boldly and will produce a very good work
performance.
REFERENCES
Cary Cherniss, Daniel Goleman,(2001), The Emotionally Intelligent Work place, Published by Jossey-Bass, San
Francisco.
[2] Daniel Goleman (1995), Emotional Intelligence Why it can matter more than IQ, Published by New York Bantam
Books, New York.
[3] Geetu Bharwancy, Reuven Bar-On and Adele Mac Kinlay(2011), EQ an the bottom Line:Emotional Intelligence
Incerases Individual Occupational Performance, Leadership and Organisational Productivity , Published by Ei
World Limited.
[1]
264
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Les Tischler, Jerry Bibert, Robert Mckeage (2002) Linking Emotional Intelligence, Spiritual and work place
performance-Definitions, models and ideas for research, vol.17 Iss; 3, pp 203-218.
[5] Roya Razavi(2014),EFL Teachers’ Emotional Intelligence and their Personality Types: Exploring Possible
Relations, Advances in Language and Literary Studies,Vol.5 No.2.
[4]
Web References
[1]
[2]
Journal of psychology today, Harward University.
Research Network on SES&Health, University of California, San Francisco.
ISBN 1-63102-455-8
265
LIBRARY AUTOMATION: WHAT, WHY AND HOW?
Pankaj K. Bhardwaj | Librarian | R.D.S.P.G. College | Rewari | Haryana | pankajkbhardwaj9@gmail.com
Abstract: Library automation implies a higher degree of mechanization where conventional and
regular works or operations are to be performed by machines with little or no intervention by
human beings. The various advantages of library automation may be like that of easy searching of
information which saves our time and decides it speedily communication, stock verification and
resource sharing are done more effectively. It motivate the library staff a lot. It also helps in
development of human resources. Librarian gain the experience threw training and workshops.
University and other higher institutions in India conducted academic and professional training,
courses may come to great help by producing new batch of library professionals.
Keywords: Automation, Hardware, Software, Computerized.
INTRODUCTION
Library Automation in simple words is the application of computers and utilization of computer based products
and services for carrying out different library operations and functions. Library Automation implies a higher
degree of mechanization where conventional and regular works or operations are to be performed by machines
with little or no intervention by human beings.
OBJECTIVES OF THE LIBRARY AUTOMATION -
The main objective of the Library Automation System is to provide better services at minimum cost, effort and
time. It aims at eliminating extralabor in repetitive and routine activities.
1.
2.
3.
4.
5.
Creation of a well storage and retrieval system.
Improvement of human services.
Time and human power saving with qualitative services.
Improvement of new library services.
Preparation of reports and correspondence.
DEFINITIONS OF LIBRARY AUTOMATION: The use of automatic machines and processing devices in libraries is called Library Automation. The automation
may be applied to library administrative activities, office procedures and delivery of library services to users.
Library Automationmay be defined as the application of computer to perform conventional library housekeeping
activities such as acquisition, circulation, cataloguing, reference services and serial control. Automation is used
to reduce the amount of staff time devoted to repetitive activities.
According of encyclopedia of library and information sciences “Library Automation is the use of automatic and
semiautomatic data processing machines to perform such traditional library activities as acquisitions,
cataloguing and circulation. These activities are not necessarily performed in traditional ways, the activities
themselves are those traditionally associated with libraries; library automation may thus be distinguished from
related fields such as information retrieval fields, automatic indexing and abstracting and automatic textual
analysis” (Kent 1977).
NEED OF LIBRARY AUTOMATION:-
1.
2.
3.
4.
5.
6.
7.
266
Information Explosion.
Availability of information in various formats.
Limitations of library.
Needs of users.
Avoid duplication in housekeeping operation.
To well management and retrieval of information.
Search national and international database.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
8. Increasing numbers of users.
9. Impact to communication technology.
10. To improve the quality, speed and effectiveness of services.
Automated Library Services:Mahapatra (1985) has given the following automated services are:1.
2.
3.
4.
5.
6.
7.
Online search service.
Printed Indexes.
Current awareness services (CAS).
Selective Dissemination of information (SDI).
Inter Library Loan.
Stock Verification.
Reference service.
A BRIEF HISTORY OF LIBRARY AUTOMATION:An automated library is one where a computer system is used to manage one or several of the library’s key
functions such as acquisitions, serial control, cataloging and the public access catalog.
Now a days due the impact of information technology and application of computers a process of great change is
taking place in library work. We hear a lot about Library Automation in libraries and Library Automation is
nothing but application of machines viz. computers to the routine library house-keeping operations such as
acquisition, serial control, cataloguing and circulation. Before proceeding into the depth of Library Automation,
it is necessary to know the historical background of automation. Automation of library has passed through
several of developments, which can be divided into 3 phases:1.
Experimental Phase (1930-1960):- The first application of automatic data processing equipment’s in
libraries can be traced back to 1936 when the University of Taxes adapted a mechanical system for its
circulation function. Library Automation began especially in the U.S.A. after the World War II. During
their period many libraries in North America and in U.K. began to experiment by using computer.
Many techniques were introduced in the Universities and national libraries. Several of these systems
were like tabulators, punch cards were used for circulation, serial control acquisitions and cataloging
etc. (Laxminarayan 1986)
2.
Local System Phase (1960-1970):- This period applied general purpose digital computer for retrieval
of Information. In this period computers were applied offline. During this period many libraries made
use of the computer as a tool in the institution of many library procedures. During the phase OPAC i.e.
online public access catalogue was in an experimental stage in U.S.A. MARC came into in the year
1963 at the library of Congress. U.S.A. for providing standardization in 1967, the Library of Congress
started distribution of records in the new MARC II format. (Tedd 1977)
3.
Co-operative system Phase (1970-):- In the 1970’s there has been an increase in library cooperation
and Resource sharing by libraries. Designing of online system and conversion of batch. System into on
line mode was done. The growth of library network and databases was seen in this phase. During this
period magnetic tapes and floppy disks were used for storage of information. In 1980’s there was an
intensive use of online systems networks, optical disks and CD-ROMs etc. in this period
microcomputer’s come to be used in libraries. Later on through internet and library networks,all
processes of libraries were integrated. (Rajagopalan 1986)
LIBRARY AUTOMATION IN INDIA:-
Indian Statistical Institute Calcutta was first in India to install a computer system in 1955 and to develop an
indigenous computer in 1964. In India computers were used in library work for the first time possible by
INSDOC where they computerized the author and subject indexes of “Indian Science Abstract in 1965. In 1967
INSDOC brought out the “Roster of Indian Scientific and Technical Translators with the help of computers. In
ISBN 1-63102-455-8
267
Library Automation: What, Why And How?
1978 INSDOC initiated SDIservice as a NISSAT Project with Chemical Abstracts and INSPEC data-bases, with
the use of CAN/SDI software of IIT Madras. In 1970’s many libraries ventured in preparing computerized
databases. Many library networks were initiated and are operative through the initiative and financial support of
NISSAT. These networks are CALIBNET, DELNET, and INFLIBNET etc. Among other networks are
NICNET, INDONET, SIRNET etc. are notable.
Now a days many institutions such as DRTC, INSDOC, DESIDOC, NISSAT etc. are engaged in imparting
training for computer application in library work through regular, sponsored and adhoc courses. The price of
computer hardware and software has been considerable reduced. On these factors computers have become
popular with Indian Libraries. (Pandey 1995)
The real improvement in Library Automationbegins from the establishment of INFLIBNET. Before
INFLIBNET separate efforts were done in academic library especially in institution of special characters like
IITS, IIMS etc. INFLIBNET proved a real motivation by providing finance and laying standards. (Singh 2003)
INFLIBNET is an autonomous inter University centre of the “University Grant Commission” in India. It is
major National Programmeinitiated by the UGC in 1991 with its Head Quarters Gujrat University Campus
Ahmedabad. INFLIBNET is involved in modernizing University libraries in India and connecting them. It is set
out to be a major player in promoting scholarly communication among academicians and researchers in India.
The National centre of INFIBNET is located in Gujrat University at Ahmedabad. INFLIBNET aims at
computerizing and networking of University and college libraries. The selected organizations are provided funds
for acquiring computer systems and networking. Application software data entry and additional library uses,
library standards and formats etc. are provided by INFLIBNET to the participating libraries. Resources
development is a vital part of this programme. Training courses for library staff engaged in computerized library
operations have been conducted since 1992-93. Every year, INFLIBNET programme is identifying a number of
University libraries for automation depending on the budget allocation.
ADVANTAGES OF LIBRARY AUTOMATION:-
1.
2.
3.
4.
5.
6.
7.
8.
It is easy searching of information with the help of Library Automation.
Library Automation is time saving.
Speedily Communication. Quickly transfer of library work.
Library Automation is helpful for stock-verification.
Easily working with the help of Library Automation.
Library Automation is helpful in resource sharing and networking.
It motivates the library staff.
Development of human resources.
[1]
It is long term and time consuming process.
Financial Expenses.
In this process continuously staff training are required.
Security problems.
It is totally dependent on electricity.
Untrained users.
Costly Maintenance.
DISADVANTAGES OF LIBRARY AUTOMATION:[2]
[3]
[4]
[5]
[6]
[7]
1.
268
HOW DID LIBRARY AUTOMATION BEGIN:Team Work:-A qualified planner for the system maybe engaged to guide the library in designing the
machine operated system. Thus consultant must have a thorough knowledge and experience of how the
library system work. His work like the planner, would be to turn the general programme into a detailed
system design with the full aid and participation of the library’s own system group.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
2.
3.
4.
Essentials for Library Automation:- Time and money are essential for Library Automation. It
consists to stall, equipment’s and organization with a regular budget and a certain amount by doing a
series of projects. Success depends to a large extend on how wellthese resources are utilized.
Staff:-Without manpower nothing get done. Hence training and holding a qualified staff is the most
important single element in the Library Automation. The number of librarians with training in
computer technology is extremely small. To attract people from the computer field, the authority will
have to pay more than they pay member of library staff. On the other hand, it should not be too difficult
to recruit on qualified librarian with good ability who may be trained in computer.
There are various levels of library system, analysts and programmers and the number and type needed
will depend on the approach and the stage of a particular library’s automation effort. The critical factor
is not numbers but quality. It would be a mistake to under estimate the importance of the role of key
punchers, typists and other machine operators. It is essential that these staff members must feel
responsible. They are responsible for the quality and quantity of the input, output and they can do much
to make or break the system.
Equipment’s:- From my discussions, with a few librarians using computer onshared time basis I am
convinced that a library cannot risk basic vital computer based systems on toequipment over which it
has no control. This view is also being reflected in current literature. This does not necessarily mean
that it needs its own computer however if it plans to depend on equipment under the control of others it
must get thick and binding responsibility for time and must have a voice in supervise the equipment.
Steps of Library Automation:1. Feasibility study of the system:-The aim of feasibility study is to determine if this is achievable, if the
benefits out with the disadvantages and to examine alternative solutions. It is designed to answer these
questions:a.
b.
c.
d.
Is the proposed system realistic?
Is it necessary?
What other options are available?
Is it affordable?
The final output of the feasibility study is a report to be presented to the management. (Large 2006)
2.
Hardware:When automating the library, the hardware to be purchased should also be given an
idea. Today different types of hardware is available in the market and due to new kinds of hardware
available in the market, the earlier ones are getting outdated soon. Also while acquiring the hardware, it
should be seen whether the software which will be implemented will be suitable with the hardware
procured.
3.
Software:-The term software refers to a set of computer programmes procedures and associated
documents that describe the programme and how they are to be used. To be accurate a software is
collection of programmes to upgrade the working capacity of the hardware. Software is a set of
programme written or developed to enable the computer to do desired operations. (Pandey 1995)
It is one of the most important fundamental which should be taken notice of while automation. Today a
number of application software are available in market manufactured by different companies of India
and abroad with distinct feature and hence while selecting software.
Manjunath (2006) has given the following criteria:1.
2.
Who has developed the software? Whether institution or company or an individual?
In such case, first preference should be given for an institution and second preference should be
given for software developed by a company. Software developed by an individual should be as for
as possible avoided because there will be no continuity in the software.
How many times the software has been raised since its first launch?
ISBN 1-63102-455-8
269
Library Automation: What, Why And How?
3.
4.
How many parameters are available for each module?
Whether the software has the facility to import bibliographic data available in ISO 2709 format
and at the same time export data in this format.
5. Whether the software is user friendly and menu driven to facilitate access?
6. Whether training and guidance will be provided after installation?
7. If it will be available to operate on major operating systems and in multi-user environment.
8. Whether it is web interface able and supports data security through password?
9. Whether it can be interfaced with email system of the campus work?
10. How many installations it has got in the country, since when and its major clients?
11. Whether it can offer OPAC and different rights to different logins?
12. Cost of the software has also to be taken into account and compared with different software
available in the market. This is important because if particular software provides good facilities,
but if the cost is very high and other software provides the similar facilities with slightly less cost
then the later will be preferred. Therefore, comparative study of the cost factor of different
software should be done before installation.
SUGGESTIONS
1.
2.
3.
4.
5.
Economically help should be provided by the central, state, local govt. and library authority according
to library and information policy.
Libraries should be conducted training program time to time for the development of library staff.
Librarian should be selected best hardware and software for automation.
All the data or information should be secure with the help of different security tool such as use of
antivirus, firewall and taking a backup of data time to time.
Inverter should be used for power.
CONCLUSION
There is no readymade formula for Library Automation in any academic library. Each library is to decide for
itself which approach seems best suited to its own particular needs and situation. Librarians gain the experience
through training and workshops. Universities and other higher institutions in India conducting academic and
professional training, courses may come to great help by producing new batch of library professionals, who
could take initiative in our new library systems to meet the in-avoidable demand of this automation generation.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
270
Laxminarayan Ishwar, (1986, June) Computer Applications in Libraries. Paper Presented at the seminar of Madras
Library association on Library Automation, Madras 19.
Tedd, LA (1977) “An Introduction to Computer based library systems, “London; Hey International.
Pandey, SK Sharma (1995) Fundamental of Library Automation, New Delhi. ESSESS Publication 131.
Singh Yogendra (2003) Library Automation in Academic Libraries in India; Problems and Prospects.
www.caliberdspace.inflibnet.ac.in/access on 30.06.2010.
PPT of Library Automationby Ratha Bhupendra School of Library and information Science: Devi Ahilya
University, Indore.
Annals of Library and information studies (ALIS) ALIS vol. 16 (1969) September-December 1969 Approaches to
Automated in Large Academic Systems Libraries By Biswas, Subas C.
Large, John Andrew (2006) ICT for Library and information Professionals; A Training Package for developing
countries.http://www.unesdoc.unesco.org/accessed on 02.07.2010.
Manjunath, GK (2006) Library Automation: Why and How?
Rajagopalan, TS (1962, June) Computer Application in Library Works. Paper presented at the seminar of Madras
Library Association of Library Automation. Madras 2.
Kent, Allen., (1977) Encyclopedia of Library and Information Science. New York: Marcel Dekkar. 19.
Mahapatra Piyushkanti (1985) Computer in library services. Calcutta: World Press.
ISBN 1-63102-455-8
A LITERATURE SURVEY OF SIGNATURE
RECOGNITION AND VERIFICATION SYSTEM
Vaibhav Bansal | Associate Professor | BM Group of Institutions | vaibhav.mtech@gmail.com
Abstract: Biometric system is a recognition and verification system which makes use of different
physiological or behavioural characteristics of an individual to label the identity of an individual.
Physiological characteristics include shape of the body. These are also known as vision based
characteristics which include voice face, fingerprint, and palm recognition. Non-vision based is
voice recognition or signature verification which possesses behavioural characteristics of a
person. Signatures are the most natural and unique way to authenticate an individual as well as a
document. According to the definitions of signature, there are two approaches of signature
verification: Off-line or static signature verification and On-line or dynamic signature
verification. This paper gives a brief review of off-line signature verification techniques.
Keywords: Signature verification, Feature extraction, FAR, FRR
INTRODUCTION
Signature is one of the unique and widely known behavioural biometric. Behavioural biometric is related to the
particular pattern of behaviour of a person. In this era where security has been a big issue, signature is an
important attribute to identify whether an individual is authentic or not. Any human physiological or behavioral
characteristic can be used as a biometric characteristic (indicator) to make personal identification as long as it
satisfies the requirements of the biometrics like Universality, Distinctiveness, Permanence, Collectability,
Performance, Acceptability and Circumvention. This technique is largely used in day to day applications such as
e-banking, passport verification system and authenticating any person to label him/her as genuine.
With the evolution of information technology, our society is becoming more and more electronically connected.
Daily transactions between individuals and various organizations are conducted increasingly through highly
interconnected electronic devices. The capability of automatically establishing the identity of individuals, called
as person authentication or person identification is thus essential to the reliability of these transactions.
Traditional personal identification approaches which use something that you know such as Personal
Identification Number (PIN), or something that you have, such as an ID card are not sufficiently reliable to
satisfy the security requirements of electronic transactions because they lack the capability to differentiate
between a genuine individual and impostor who fraudulently acquires the access privilege.
Signature verification not only authenticates a person but also is a way to authorize transactions. A number of
other methods are also available to identify the originality of an individual such as voice, face, gait, palm
recognition but hand written signatures are one unique method because it is easy to scan a signature done with
pen as well as done using any electronic gadget. This method of identification is highly preferred over
traditional methods such as PIN, key cards or passwords because biometric characteristics of an individual are
highly unique and cannot be stolen. The choice of one of the biometric solutions depends on several factors
which include [7]:
User acceptance
Level of security required
Accuracy
Cost and implementation time
Usage of signature as an authentication method is respected since long time. Today also most of our daily works
run across this verification method. A signature of the person is considered to be the “seal of the deal” and is the
most accepted form.
ISBN: 978-16-31024-51-1
271
A Literature Survey of Signature Recognition And Verification System
Thus, Signature recognition and verification system (SRVS) is a system capable of efficiently addressing two
individual but strongly related tasks: [10]
Identification of the signature owner and,
Decision whether the signature is genuine or forger. [10]
Types of Signature Verification
Based on the definitions of signature, it can lead to two approaches [12]:
Off-line or Static Signature Verification Technique: This technique is based on static characteristics which
do not change or are invariant. In this type of method, a scanner or a camera is used to trace the signature.
On-line or Dynamic Signature Verification Technique: This approach makes use of dynamic characteristics
of a signature. Dynamic features includes the number of order of the strokes, the overall speed of the
signature and the pen pressure at each point that make the signature more unique and more difficult to
forge.[7]
SIGNATURE VERIFICATION PROCESS
The method of signature recognition and verification involves a number of concepts which are as follows:
Forgeries
Feature selection
Performance evaluation parameters or error
Rates
a) Types of Forgeries
Forgery is the process of making, adapting, or imitating objects with the intent to deceive people.
Three basic types of forgery are:
Random Forgery: As the name suggests, is random in nature i.e. the forger has no idea about the signature
style and name of the person.
Simple Forgery: In this the forger knows the shape of the original signature.
Skilled Forgery: This type of forgery is done by those who have had access to a genuine signature for practice
[7].
b) Feature Selection
Feature selection is categorized in two categories:
Global Features: Global features are those features which are taken from the whole signature image. Global
features include- signature area, signature height to width ratio, centre of gravity etc. [6]
Local Features: Local features are taken from the small portion of an image. These include- local pixel density,
slant features, critical points etc. [6]
c) Error Rate
False Acceptance Rate(FAR)
False Rejection Rate(FRR)
Type I error or FRR, which means an authentic signature is rejected, and Type II error or FAR, which means a
forgery is accepted. [2]
Proposed Methodology for Signature Verification:
In order to identify an individual’s originality, a particular method has to be adopted. This method follows the
following steps which are:
272
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Fig. 1: Static or off-line signature verification system
Image Acquisition: The image to be processed is acquired first either by an optical pad or a scanner.
Pre-Processing: This stage is necessary because the processed image, after this, would be subjected to
feature extraction process. Various algorithms are used at this stage such as Background elimination,
noise reduction, width normalization, skeletonization, thinning, Binarization, Denoising etc. [10]
Feature Extraction: The efficiency of a signature verification system mainly depends on Feature
extraction stage. [6] Selected features are extracted at this stage on the basis of three categories global,
local and geometric features.
Verification: This stage is the final stage which verifies whether the signature is original or forged.
LITERATURE SURVEY
A Bharadi and H B Kekre [1], discusses system designed using cluster based global features. A multi
algorithmic signature recognition system is designed by the author. Hadamard transform to the horizontal pixel
distribution and vertical distribution points is used because it is easy to calculate. A codeword histogram for
signature is generated. Grid and texture information features is used to consider size. As a result, an accuracy of
95.08% is achieved. A total of 353 tests are performed for verification method and 257 tests are performed for
recognition method. The system is having decision threshold of 60% for both methods. In verification mode,
FAR of the system is 2.5% and EER is 3.29% which gives an accuracy of 95.08%. In recognition mode
accuracy of 93.08% is achieved and EER is 6%.
Juan Hu and Youbin Chen [2], discussed a method for writer-independent off-line handwritten signature
verification based on grey level feature extraction. Real Adaboost algorithm is also proposed. In this paper two
experimental databases are used and both the databases contained samples from 300 individuals. This research
shows that the performance of Adaboost classifier is better than LS-SVM classifier. The proposed method
achieved the FRR of 5.64% and FAR of 5.37%.
Suhail M. Odeh and Manal Khalil [3], introduced an approach to decide whether a signature is original or forged
using neural networks. “GPDS300 signature database” is used for the research purpose. Proposed methodology
consists of various stages: image pre-processing, feature extraction, pattern recognition through neural network
& recognition of signature. For security purpose, 4 features are used in the feature extraction stage termed as:
Eccentricity, Skewness, Kurtosis and Orientation and are applied to all the tested samples. As a result, accuracy
rate is 64% and error rate is 36% during training stage. During testing period, accuracy rate achieved is 78.85
and error rate is 21.2%.
Srikanta Pal, Umapada Pal and Michael Blumenstein [4], proposed a method for identification of scripts from
bi-lingual off line signatures. In this English and Chinese test samples are considered. This paper identifies
whether a signature belongs from English signature group or Chinese. Foreground and background features are
extracted using gradient-based method.SVM is used as a classifier for signature identification. 1120 samples are
used for training purpose out of which 640 are English and 480 are Chinese and 560 samples are used for testing
the system out of which 320 are English and 240 are Chinese. An accuracy of 97.70% is achieved in this
proposed system.
ISBN 1-63102-455-8
273
A Literature Survey of Signature Recognition And Verification System
Ravi J, Sundernag Hosamani andK B Raja [5], proposed a model for off-line signature identification using
Discrete Wavelet Transform (DWT) and Spatial Domain Features (OSIDS) method. “GPDS database” is used
which consists of 160 signers with 300 dpi resolution. The main aim of proposed algorithm is to increase
success rate and decrease False Acceptance Rate (FAR). In this method an increase in the value of FRR from
0% to 36.67% is seen and a decrease in TSR from 100% to 63.34% is observed but the value of FAR decreases
to 6.67%.
Vitthal K. Bhosale and Dr. Anil R. Karwankar [6], proposed a review on the approaches that are used in static
signature verification process. Performance evaluation parameters are discussed for different methods.
According to the author of this paper more research is required in the field of signature recognition and
verification process.
Pradeep Kumar, Shekhar Singh, Ashwani Garg and Nishant Prabhat [7], proposed off-line signature recognition
& verification technique using neural network. The methodology followed included image pre-processing,
feature extraction, neural network training. The results in this paper are obtained using the” Grupo de Procesado
Digital de Senales” (GPDS) signature database. 2000 signatures are tested and verified in this process giving the
82.66%, the correct classification rate of the system in generalization. A two layer feed forward neural network
using Error Back Propagation Algorithm (EPBTA) is used to preserve the efficiency of the network.
Ankit Arora and Aakanksha S. Choubey [9], discussed various features of off-line signature recognition and
verification process. A comparison of existing techniques and various methods of feature extraction are
proposed. Various performance metrics are compared and signature verification system based on Hough
transform is giving the accurate results.
CONCLUSION
As we grow towards electronic era, there is a great need of security and reliability. Thus, signature recognition
and verification is a method which is highly secure and trust worthy. Various approaches can be used to
implement this method such as neural network, support vector machine etc. which makes the result more
accurate. A lot is still to be done in this area in order to avoid any kind of forgery.
ACKNOWLEDGMENT
Thanks to my family, my guide Er. Navdeep Kaur (AP, CSE Department), Er. Harpreet Kaur (AP & HOD, CSE
Department), Bahra Group of Institute, Bhedpura, Patiala for having faith in me and allowing me to work with
all terms and conditions and advising me time to time about this survey paper.
REFERENCES
[1] V. A. Bharadi, H. B. Kekre, “Off-line Signature Recognition Systems”, International Journal of Computer
Applications, Volume 1-No. 27, 2010
[2] Juan Hu, Youbin Chen, “Fusion of Features and Classifiers for Off-line Handwritten Signature Verification”, 978-14577-0121-4/11/2011 IEEE
[3] Suhail M. Odeh, Manal Khalil, “Off-line signature verification and recognition: Neural Network Approach”,978-161284-922-5/11/2011 IEEE
[4] Srikanta Pal, Umapada Pal, Michael Blumenstein, “Off-line English and Chinese Signature Identification Using
Foreground and Background Features”, WCCI June 2012 IEEE
[5] Ravi J, Sundernag Hosamani, K B Raja “Off-line Signature Identification Based on DWT and Spatial Domain
Features”, IEEE ICCCNT, July 2012
[6] Vitthal K. Bhosale, Dr. Anil R. Karwankar, “Automatic Static Signature Verification Systems”, International Journal
of Computer Engineering Research, Vol. 3, Issue 2, February 2013
[7] Pradeep Kumar, Shekhar Singh, Ashwani Garg, Nishant Prabhat, “ Hand Written Recognition &Verification using
Neural Network”, International Journal of Advanced Research in Computer Science and Software Engineering,
Volume 3, Issue 3, March 2013
[8] Imran Hussain, Vikash Shrivastava, Vivek Kr. Shrivastava, “Review on offline signature verification methods based
on artificial intelligence technique”, International Journal of Advancements in Research & Technology, Volume 2,
Issue 5, May 2013,
274
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
[9] Ankit Arora, Aakanksha S. Choubey “Comparative Analysis of Off-line Signature Recognition”, International Journal
of Science and Research (IJSR), Volume 2, Issue 7, July 2013
[10] Kanawade M. V., Katariya S. S, “Review of offline signature verification and recognition system”, International
Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 7, July 2013
[11] Prathiba M.K., Dr. L. Basavaraj, “Online handwritten signature verification system: A Review” International Journal
of Emerging Trends & Technology in Computer Science, Volume 3, Issue 2, March-April 2014
[12] Sameera Khan, Avinash Dhole, “A Review on Offline Signature Recognition and Verification Techniques”,
International Journal of Advanced Research In Computer and Communication Engineering, Vol. 3, Issue 6, June 2014
[13] Rapanjot Kaur, Gagangeet Singh Aujla, “Review on: Enhanced offline signature recognition using neural network and
SVM”, International Journal of Computer Science and Information Technologies”, Volume5 (3), 2014
ISBN 1-63102-455-8
275
DEVELOPING OF DIGITAL LIBRARY THROUGH GSDL:
AN EXPERIENCE AT GITAM
Pushp Lata | Library Assistant | Ganga Institute of Technology and Management | Jhajjar, Haryana- India |
pushplata.lib@gmail.com
Abstract: The methods of accessing and retrieving knowledge are changing in the present
scenario for all the users. This paper presents a study regarding creation the digital library
assimilate and disseminate the information using the famous OSS GSDL. The methodology
followed the study of the software related documents and practical approach during creation of
digital library at GITAM.
Keywords: Open Source Software, Information Dissemination, GSDL
INTRODUCTION
With the impact of IT the world is converting in a global village. In the present scenario the role of libraries and
librarian are also changed. In India the concept of digital library is in developing stage. There are a lot of
libraries which are not automated. The demand and behavior of users are changing rapidly with compare to the
libraries. Users want the information at their smart phones or PCs. The digital library is the demand of time and
in the context of digital library, the role of library professionals is also changed.
Definition-A digital library is a large database for the people who are working on hypertext environment which
supports the life cycle of creation, storage, preservation, dissemination and use of data, information and
knowledge.
A digital library is an organized collection of digitized material which can be accessible by the users on a
computer or smart phone through the network by using TCP/IP or other protocol.
NEED OF DIGITALIZATION
For the modern users the time is major factor. Digitization of libraries is the solution of this factor. Digital
libraries are needed to provide quality-based service at the user doorstep. In general digital libraries are needed
for the following reason.
Easy to understand
Shifting of the environment
Information explosion
Multiple function of same information
Specific Information retrieval
Distance learning
To procure online publication
RESOURCES
All the material either print or electronic/digital material which can be stored, organized, transmitted and
displayed by the computer without any intervening conversion process, are the resources of a digital library. For
a digital library there are two types of resources:
On line resources:
276
E-book, v-book, electronic tax, map, image, sound, video, and multimedia etc.
E-journal
Local database of traditional books in machine-readable form.
LAN, MAN, WAN for web browsing, e- mail etc.
Well trained manpower for online help
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Off line resources:
CD-ROM etc.
Audio visual aid etc.
The digital material may be of multimedia types or any other i.e. only digital audio, video, full text information,
photograph, drawing, digitized sound, e-book, v-book, electronic tax, map, image, 3D representation etc.
including structured /unstructured text, scanned images, graphic audios, video recording etc.
BASIC NEEDS FOR DIGITAL LIBRARIES
For the development and operation of a digital library, the technological environment is provided by the Internet
and World Wide Web. The web provides tools and technique for publishing the information over Internet while
the Internet provides the TCP/IP and or its associated protocol for accessing the information. To store the
information output of the region as well as information from outside the country in the digital environment,
there is a strong need to create a central back up or archive at the national level. Some of the basic requirements
for a digital library are:
Computer
Software
Storage devices
Scanner
Network
Audio visual
Printer
GSDL
Greenstone is a suite of software tools for building and distributing digital library collections on
the Internet or CD-ROM. It is open-source, multilingual software, issued under the terms of the GNU General
Public License. Greenstone is produced by the New Zealand Digital Library Project at the University of
Waikato, and has been developed and distributed in cooperation with UNESCO and the Human Info NGO in
Belgium.
In order to construction and presentation of information collection in form of digital library in GITAM, we
thought of opting for Greenstone digital library software, which is an open-source system. It builds collections
with effective full-text searching and metadata-based browsing facilities that are attractive and easy to use.
Moreover, they are easy to maintain. Collections of information comprise large numbers of documents
(typically several thousand to several million), and a uniform interface is provided to them. It is used
internationally. Greenstone supports collections in many different languages. Greenstone CD-ROMs have been
published by the United Nations and other humanitarian agencies for distribution in developing countries.
Digital libraries are radically reforming how information is disseminated and acquired in UNESCO's partner
communities and institutions in the fields of education, science and culture around the world, and particularly in
developing countries. We hope that this software will encourage the effective deployment of digital libraries to
share information and place it in the public domain.
HISTORICAL DEVELOPMENT
In 1995, the journey of development was started from the establishment of New Zealand digital Library Project.
In the beginning 50,000 computer science technical reports are included in the collection downloaded from the
internet. The history of Greenstone releases are as:
ISBN 1-63102-455-8
277
Developing Of Digital Library Through Gsdl: An Experience At GITAM
Year
Month
Version Year Month Version
2014
Nov
3.06
2002 Jan
2.38
2006
Dec
2.72
2001 Oct
2.37
Oct
2.71
Jun
2.36
Mar
2.70
May
2.35
Jan
2.63
Apr
2.33
Jun
2.62
Feb
2.31
Apr
2.60
Feb
2.30
Mar
2.53
2000 Dec
2.30
Oct
2.52
Sep
2.27
Jun
2.51
Jul
2.25
Feb
2.50
Jun
2.23
Dec
2.41
Jun
2.22
Jun
2.40
Apr
2.21
Mar
2.39
Feb
2.12
2005
2004
2003
1995 The new Zealand
Digital Library Project
was established
FEATURES OF GSDL
We close with a brief summary of Greenstone facilities:
Accessible via Web browsers
Runs on Windows and Unix.
Full-text and fielded search.
Flexible browsing facilities.
Creates access structures automatically.
Makes use of available metadata.
Plugins and classifiers extend the system’s capabilities
Multiple-language documents.
Multiple-language user interface
Multimedia collections.
Classifiers allow hierarchical browsing.
Designed for multi-gigabyte collections.
New collections appear dynamically.
Collections can be published on CD-ROM.
Distributed collections are supported
What you see—you can get!
LIBRARIAN INTERFACE
Tool for collecting and marking up documents, then building digital library collections, Librarian Interface tool
is used in GSDL which provides access to the software's functionality from a graphical point.
The following steps are taken in creation of digital collection:
Creation of New Collection: To create a new collection open the 'file' menu and choose 'New', then the
following screen will appear.
278
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
(Figure 1)
Selection of Metadata: Software provided different type of metadata.
Gathering: Gather area to select what files to include in the collection you are building. Files can be
copied into the collection by dragging and dropping.
(Figure 2)
Enrich: Having gathered several files into the collection, now enrich them with additional information
called 'metadata'. This section explains how metadata is created, edited, assigned and retrieved, and how
to use external metadata sources.
(Figure 3)
Design: Once the files are marked up with metadata, you next decide how it should appear to users as a
Greenstone collection. What kind of information is searchable? What ways are provided to browse
through the documents? What languages are supported? Where do the buttons appear on the page? These
things can be customized.
ISBN 1-63102-455-8
279
Developing Of Digital Library Through Gsdl: An Experience At GITAM
Document Plugins: Through user selected plugins, Greenstone can import digital documents in formats
including text, html, jpg, tiff, MP3, PDF, video, and Word, among others. The text, PDF, HTML and
similar documents are converted into Greenstone Archive Format (GAF) which is an XML equivalent
format. Plugin help the users to see the file without having software at the destination or using device.
Search Type: Here you can add search type. If you want to add advance search please enable advance
search option.
Search Index: Here you can add search the names of the fields on which you want to build the indexes.
Browsing Classifier: Indexes specify what parts of the collection are searchable this section help to add
and remove indexes, and set a default index.
(Figure 4)
Create The first two entries in the list on the left are 'Import' and 'Build', which give settings that apply to
the import and build scripts respectively.
(Figure 5)
Format: This option is used to customized the GSDL i.e general information, search, formatting and
translation text features on the web interface.
(Figure 6)
280
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Web Interface: End users may access the digital library web page at any device having browser e.g. PC,
laptop, mobile phone etc. The screen shoot of Digital Library of GITAM is shown in figure 7.
(Figure 7)
DIGITAL LIBRARY AT GITAM
The Digital Library is an essential infrastructure of information dissemination and empowerment of user. It is a
very powerful tool that can serve as an engine of information transfer. The Digital Library contains old question
papers, syllabus, journal articles, lecture notes, News clippings, etc. It can be accessed at LAN in the campus on
any web browser by using the address- http://gitamlibrary:8383/greenstone3/library
CONCLUSION
Due to the fund limitation the libraries have to stop the different projects. To avoid this problem the Open
source softwares are the best solution. The GSDL is the most suitable software for digital library management
due to its content management, full text searching, CD-ROM publishing. This is the only software that can be
published on CD-ROM. It is very helpful for those areas in which internet connectivity is not available and users
can get information without internet connectivity.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
Biswas, Gautam, Institutional repository: Special reference to D space and greenstone digital library( International
Journal of Library and Information Science Vol. 2(1) pp. 001-010, February, 2010 Available online
http://www.academicjournals.org/ijlis ©2010 Academic Journals)Department of Computer Science
Ian H. Witten, David Bainbridge, and Stefan J. Boddie,Greenstone: OpenSource Digital Library Softwarewith End-User Collection Building
http://eprints.rclis.org/13172/1/Open_Source_Software_and_Libraries.pdf
http://Greenstone.org , access on 26.05.2015
http://wiki.greenstone.org/doku.php?id=en:beginner:overview_of_greenstone
ISBN 1-63102-455-8
281
REVIEW ON WSN APPLICATIONS WITH SOME ISSUES
Prachi Arora | M.Tech Computer Sc.(Mobile Computing) | Central University Jharlkhand | Ranchi, India |
prachiarora.128@ gmail.com
Abstract—The area of wireless sensor network is one of the emerging and fast growing field in
the world but there are some key issues in WSN such as maximizing the network lifetime. Network
lifetime is important in sensor node when the sensor node, distributed typically in remote area is
powered by finite energy batteries. Likewise many more issues and problems in WSN are going to
be discussed in this paper.
Keywords: WSN, network lifetime sensor node.
INTRODUCTION
WSN consists of distributed self-governing sensors to monitor physical or environmental conditions. WSN
consist of an collection of sensor. Each sensor network node has typically following parts: a radio, transceiver,
antenna and microcontroller A Base station links the sensor network to another network to broadcast the data
sensed for future processing.[1] .
Sensing, processing and communication are three basic elements whose combination in one tiny device gives
rise to a large number of applications. Sensor networks provide endless opportunities, but at the same time pose
alarming challenges, such as the fact that energy is a scarce and usually non-renewable resource.[2]
In most applications, sensor nodes are constrained in energy supply and communication bandwidth. Thus,
innovative techniques to eliminate energy inefficiencies that shorten the lifetime of the network and efficient use
of the limited bandwidth are required. Such constraints combined with a typical deployment of large number of
sensor nodes pose many challenges to the design and management of WSNs and impose energy-awareness at all
Layers of the networking protocol stack [3].
This paper was organised as introduction of WSN in current section, next section discusses application of WSN.
After that, different issues of WSN and finally conclusion of the article has been summarized
Fig 1: WSN(Wireless Sensor Network)
CHARACTERISTICS OF WSN
Compact Size: Since many sensor nodes (Hundreds or thousands) are deployed in area for sensing data size
become impact.
Physical Security: Physical security for sensor nodes of the network become an important characteristics of
WSN
Power: Power is an important characteristic of WSN. As sensor nodes uses battery and need low power
consumption for their processing.
Memory space: Sensor Nodes are tiny elements and may not have enough memory to collect and store data. A
centralized data base is needed to store the sensed data by sensor nodes.
Bandwidth: As Sensor nodes need to transmit sensed data to base station frequently in regular interval and
282
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
therefore high bandwidth is needed.
Unreliable communications: Communication between nodes and base station should be reliable. Due to life
time and energy constraints communication become unreliable .To solve this problem many routing techniques
are going to developed.[1]
APPLICATIONS OF WSN
Sensor nodes can be put for continuous sensing, location sensing, motion-sensing and event detection. The idea
of micro-sensing and wireless connection of these sensor nodes assures many new application areas.
Environmental applications: Environmental applications take account of the monitoring of atmospheric
parameters, tracking of the movements of birds and animals, forest fire detection, habitat surveillance etc.
Greenhouse Monitoring: To ensure that the automation system in a greenhouse works properly, it is
necessary to measure the local climate parameters at various points of observation in different parts of the
big greenhouse. A WSN based application for this purpose using many small size sensor nodes can be
equipped with radio for a cost effective solution.
Habitat Surveillance: WSNs find extensive application in habitat surveillance compared to other
monitoring methods due to high deployment density and self-organisation of the sensor nodes. The
advantage with WSN is that the invisible placement of sensor nodes in the habitat does affect the
behaviour pattern of the inhabitants.
Health applications: WSNs are efficient enough in supporting various day-to-day applications. WSN based
technologies have revolutionized home and elderly healthcare applications. Physiological parameters of patients
can be monitored remotely by physicians and caretakers without affecting the patient’’ activities. These
technologies have significantly minimised human errors, allowed better understanding into origin of diseases
and has helped in devising methods for rehabilitation, recovery and the impacts of drug therapy. The recent
developments in the application of WSN in healthcare are being presented.
Industrial applications: The industrial applications based on WSN are built on distributed architectures and
they are required to be inexpensive, flexible and dependable. The system’s performance can be improved by
interfacing sensors and actuators directly to the industrial communication network, as data and diagnostics can
be made accessible to many systems and also shared on the web. Many such applications for different industries
with different technologies were proposed.
Military applications: WSNs play a vital role in military Command, Control, Communications, Computing,
Intelligence, Surveillance, Reconnaissance and Targeting (C4ISRT) systems. WSNs have found application in
very critical applications such as object detection and tracking. These applications require high detection
probability, low false alarm rate and bounded detection delay. In the battlefield, the WSNs are prone to the
attacks, where either the data or corrupting control devices are attacked, leading to large amount of energy
consumption and finally to the exit of nodes from work.
Biological applications: The WSN based applications have made tremendous impact for biological problems.
Some of these include biological task mapping and scheduling, biomedical signal monitoring etc.
Biological Task Mapping: WSNs find general applications in the area of biological sensing. Specifically,
there is recent research going on in the concept of “labs on a chip”, supported by latest technologies like
nano-techniques. The use of WSNs for biological applications have been accelerated due to the
advancements in Micro Electro-Mechanical Systems (MEMS), embedded systems, microcontrollers and
various wireless communication technologies.
Biomedical Signal Monitoring: WSNs have revolutionized the field of medicine in many ways.
Telemedicine is the field which involves the treatment and care of patients from a distance and also aids
in biomedical diagnosis. The application of WSNs has significantly improved this field. To develop
ISBN 1-63102-455-8
283
Review On WSN Applications With Some Issues
modern equipments for monitoring patients in remote places using wireless technologies, the network
topology, sensors specific signal reception and analysis has been considered.
Commercial applications: Some of the commercial applications of WSN include vehicular monitoring, cultural
property protection, event detection and structural health monitoring. These applications have a profound impact
on ordinary day-to-day life.
Smart Parking: WSNs are widely used in the applications like intelligent for the purposes such as
effective usage of existing parking lots instead of making expensive investments in new installations and
to make provisions for coupling with cheap sensor nodes which can track the vehicles effectively.
Existing solution for parking application uses magnetometers and video cameras.
Event Detection: Tracking is a typical characteristic of wireless sensor networks, especially for instant
tracking of events. Much work has been done in WSN, with sensor nodes having identical sensing
units.[4]
Other applications: Sensor networks now find huge application in our day-to-day appliances like vacuum
cleaners, micro-wave ovens, VCRs and refrigerators. Other commercial applications includes constructing smart
oce spaces, monitoring product quality, managing inventory, factory instrumentation and many more.[1].
Fig 2: Applications of WSN
284
ISSUES IN APPLICATIONS
Data analysis, DSP based control solutions and more complex network setups are the areas yet to be
explored in green house monitoring.
A WSN based application that will never affect the biological behaviour of the inhabitant species is very
important, and hence challenges are open for research.
The main research issue to be addressed is to increase the degree of awareness of home assistants,
caregivers, primary healthcare centres, to understand the patients’ health and activity status to quickly
discern and decide on the required action in health monitoring applications.
Design of complex underwater acoustic sensor networks that can be used in deep waters is an area yet to
be addressed as an issue in industrial applications like water quality measuring and monitoring system.
The energy efficiency of sensor nodes and the correct modelling of energy consumption are the research
issues yet to be explored.
The issue with biological application, the simulation model that was built was applicable only if the
nodes in the WSN were separated with a distance up to 150m, for medium distance only.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Issue with smart parking , the detections of magnetometers used for this are not very accurate as they are
influenced by environmental factors and in a parking lot, apart from entry and exit of vehicles there may
be other moving objects, which is a great challenge.
The issues with event detection application, solutions to sensor node deployment, data dissemination
routing in Wireless Heterogeneous Sensor Networks (WHSNs) are the yet to be addressed. [4]
SECURITY ISSUES
The requisite of security not only affects the operation of the network, but also is highly important in
maintaining the availability of the whole network .It is necessary to know and understand these security needs
first before implementing security scheme for WSN.WSN should take the following major security needs which
are basic needs for any network into consideration of secure mechanism:
DATA INTEGRITY
A. Data Integrity:
Data integrity in sensor networks is needed to ensure the reliability of the data . It ensures that data packets
received by destination is exactly the same with transferred by the sender and any one in the middle cannot alter
that packet. The techniques like message digest and MAC are applied to maintain integrity of the data. By
providing data integrity we are able to solve the Data integrity attacks. Data integrity is achieved by means of
authentication the data content.
B. Data Confidentiality:
Confidentiality is to protect data during communication in a network to be understood other then intended
recipient. Cryptography techniques are used to provide confidentiality. Data confidentiality is the most
important issue in all network security. Every network with any security focus will typically address this
problem first Data confidentiality of the network means that data transfer between sender and receiver will be
totally secure and no third person can access it(neither read nor write) .Confidentiality can be achieved by using
cryptography: symmetric or asymmetric key can be used to protect the data.
C. Data Availability:
Availability ensures that the services are always available in the network even under the attack such as Denial of
Service attack (Dos). The researchers proposed different mechanisms to achieve this goal. Availability is of
primary importance for maintaining an operational network. Data Availability determines whether a node has
the ability to use the resources and whether the network is available for the messages to communicate.
Availability ensures that sensor nodes are active in the network to fulfil the functionality of the network.
D. Data Authentication:
Data Authentication of a sensor node ensures the receiver that the data has not been modified during the
transmission. Data authentication is achieved through symmetric or asymmetric mechanisms where sending and
receiving nodes share secret keys. In asymmetric cryptographic communication digital signatures are used to
check the authentication of any message or user while in symmetric key, MAC (Message Authentication Code)
are used for authentication purpose .
E. Data Freshness:
Data freshness is very important in wireless sensor networks. Because an attacker can send an expire packet to
waste the network resources and decrease in network lifetime. Freshness ensures that the data received by the
receiver is he recent and fresh data and no adversary can replay the old data. The freshness is achieved by using
mechanisms like nonce or timestamp should add to each data packet.[1]
CONCLUSION
In this paper a brief introduction of WSN, characteristics of WSN were described. WSN applications with
application issues were also described. It also explains the security issues of WSN.
ISBN 1-63102-455-8
285
Review On WSN Applications With Some Issues
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
286
Himani Chawla “Some issues and challenges of Wireless Sensor Networks” IJARCSSE ISSN: 2277 128X Volume
4, Issue 7, July 2014
Daniele Puccinelli and Martin Haenggi “Wireless Sensor Networks:
Applications and Challenges of Ubiquitous Sensing” IEEE Circuits and
System Magazine .third quarter 2005
Jamal N. Al-Karaki, Ahmed E. Kamal” Routing Techniques In Wireless Sensor Networks: A Survey” IEEE
Wireless Communications Dec. 2014
Edwin Prem Kumar Gilbert, Baskaran Kaliaperumal, and Elijah Blessing Rajsingh “Research Issues in Wireless
Sensor Network Applications: A Survey”, IJIEE, Vol. 2, No. 5, September 2012
ISBN 1-63102-455-8
POTENTIALITY OF CLOUD COMPUTING IN LIBRARY
STORAGE, ACCESS AND RETRIEVAL: A CRITICAL
ANALYSIS
Medha Ray | Student of Five Year Integrated MLIS Course | Department of Library & Information Science |
University of Calcutta | medharay1994@gmail.com
Souvik Koner | Student of MLIS | Department of Library & Information Science | University of Calcutta |
souvikkoner89@gmail.com
Abstract: Technology is changing rapidly and is forming a layer that is touching every sphere of
human life like power grids, traffic control, medical and health care, water supply, food and energy
and all the financial transaction of the world. So, latest technological developments have brought a
dynamic change in every field and library science is not an exception to it, for collection, Storage,
organization, processing, and analysis of information. Although the use of the cloud in the business
environment has already transformed the concept of data storage and resource management, its use in
the field of libraries and information centers is somewhat less widespread .At present libraries are
moving in advanced level called cloud computing. Through this technology, the users can access the
information from any part of the world. Now, libraries are required to focus and avail the advantages
of cloud computing to offer user centered multi-level services to enable them to become self supportive
in seeking their information with greater level of confidence as well as satisfaction. This paper
emphasizes the basic concept of newly develop area known as cloud computing. The use of cloud
computing in libraries and especially how cloud computing actually works is explained in the area of
storage and retrieval of the documents.
Keywords: Academic Libraries, Cloud computing, , Cloud Deployment Model, Information Technology, Storage &
Retrieval.
INTRODUCTION
Information is the key power of the society. Library is a cornerstone to meet the information requirements of a
nation. In the field of Library & Information Science, information Technology has a great impact on different
application within the library housekeeping operation. The rapid progression of IT helps to discover new advanced
dimension of technology throughout the world. After mainframe, distributed computing and utility computing we
have to familiar to the extension ofgrid computing, i.e. cloud computing. The cloud computing consist of two words,
one is cloud that means a virtual platform of complete application and the second one is computing means a process
of utilizing computer technology to complete a task. It is a computing paradigm based on client server
architecture.This cloud platform allows organization to split their operations into few components which can
perform separately or across a distributed network widely.
There are various definition are available of cloud computing. Some of them are as follows.Buyya defined it as
'Cloud computing is a parallel and distributedcomputing system consisting of a collection of inter-connectedand
virtualized computers that are dynamically provisioned andpresented as one or more unified computing resources
based onService Level Agreements (SLA) established through negotiationbetween the service provider and
consumers.'
“Cloud Computing is the paradigm in which information is permanently stored in servers on the Internet and cached
temporarily on clients that include desktops, entertainment centers, table computers, notebooks, wall computers,
handhelds, etc.” (IEEE Computer Society). ‘Cloud computing is a model for enabling ubiquitous, convenient onISBN 1-63102-455-8
287
Potentiality Of Cloud Computing In Library Storage, Access And Retrieval: A Critical Analysis
demand network access to ashared pool of configurable computing resources (e.g., networks, servers, storage,
applications, andservices) that can be rapidly provisioned and released with minimal management effort or service
provider interaction. Cloud computing is a model for delivery of resources as a service’ (NISAT, 2009).
Figure 1: Cloud computing at a glance
In short it can be said that cloud computing service is a highly scalable web enabled platform and pay per use model
capable to provide hardware, software and dynamic infrastructure on demand to manage, evaluate and access the
information by expert or non-expert users.
HISTORY & DEVELOPMENT
The term “cloud” has been coined as a symbol for the internet. It was used for the purpose of common
representation in network diagrams as an outline of a cloud, used to represent the transfer of data from one point to
the other side of the cloud. This concept came in 1961 when professor John McCarthyrecommended that computer
time sharing technology will be pioneering leader of the future where computing power and even specific
applications might be sold through a utility-type business model. This idea becomes very popular in the late 1960s,
but by the mid-1970s the idea became clear that the IT related technologies of the day were unable to sustain such a
futuristic computing model.
CHARACTERISTICS OF CLOUD COMPUTING
288
Major characteristics of cloud computing are On demand self- service – It means a user can access the resources when he wishes, from any place, any time
without human interaction with each service’s provider.
Rapid Elasticity - Cloud Computing ensure quick operation of necessary resources in a dynamic method.
Broad network access - It means a huge capacities which is accessed through the wide range of network with
the help of desktop computers, mobile phone, Smart phone, PDAs, tablet etc.
Measured service - Depending on the users demand, measured service is a cloud based system which is
automatically control and optimizes necessary resources on the basic of financial influence.
Resource pooling –Resource pooling is one of the characteristics of cloud computing. Resources are pooled
or controlled here, the computer providing resources are controlled or pool to supply multiple consumers with
different physical and virtual resources dynamically assigned and reassigned according to users request.
Dynamic computing infrastructure – Generally, Dynamic computing infrastructure is the basic feature of
cloud computing where dynamic computing standardized, scalability, and secure physical infrastructure
required.
StandardizedInterface - It shows how two applications or data source can communicate with each other for
processing with the help of easily link cloud service having some standardized APIs.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Usage Priced – It deals with cloud-based infrastructure services, the pricing model is according to use basic
for bandwidth, storage and CPU. There is also the scope for monthly basic and subscription basic.
DEPLOYMENT MODEL OF CLOUD SERVICE
Figure 2: Model of cloud computing
TYPES OF CLOUD
Public cloud - In this computing, services are provided to the public by third party on payment basic with the
help of hardware and software. Free e- mail service is the best example for public cloud.
Private cloud - In private cloud, cloud services will not be available to the general public and it is meant for
the private, i.e. internal data center.
Hybrid cloud - it is more useful and flexible because of maximum use of the resources with the
conglomeration of more than one cloud.
Community cloud - As the same signifies. Community cloud is meant for specific group of people or
organizations. In this method, several community or organization can interact with each other and establish
cloud service.
Figure 3: Relational Diagram of the cloud types
Cloud computing usage in libraries: Library possesses a major area where clod services can be applied to increase
the benefit of the library to its users and as well as society. Cloud is being used to host library website, increasing
storage capacity, resource sharing, and content searching as well as in the area of library automation and so on. We
have discussed on the area of storage and retrieval of the digital documents of the library using cloud computing in
this paper.
Deployment model of cloud Services within the library:
ISBN 1-63102-455-8
289
Potentiality Of Cloud Computing In Library Storage, Access And Retrieval: A Critical Analysis
Infrastructure as a service (IaaS): Infrastructure as a service is one of the popular cloud computing service
model called as utility computing and sometimes it is also known as hardware as a service. This is a crucial
area of storage of the library, part of a cloud service, and materials in digital format. IaaS providers provide
computers, infrastructure, storage, communication technologies, as well as hardware and related components
to the library on the basis of virtual reality and operating software for utilizing it smoothly. This deployment
model helps information storage/hosting and archiving also. Storage capacity of server, communication
technologies, platform, hardware cost /implementation etc. is not a matter of worseness of a librarian. The
only job of a librarian is uploading the library’s digital documents over the web and for that he should be pay
a pre-determined cost to the company providing this service. A pioneer example of this is Amazon which
provides virtual infrastructure, maintenance, storage, communication technology and computation as an
innovative procedure/service. Amazon’s Elastic computer cloud one of the popular examples of IaaS.
Platform as a service (PaaS): This deployment model provides the software and the programming languages
to the users of the library. In PaaS model, service providers provide also operating system, hardware,
database, framework, web server etc. to facilitate the easy storage and retrieval of the information of the
library through the internet. It is a platform of computing for the software developer to run a new application
or working with existing ones on the cloud platform without a huge cost of implementing hardware &
software. The broad application of PaaS in the field of library are maintaining integrated management system
of collection development and resource sharing, developing archiving management software for valuable and
rare digital resources of library, hosting initial website application etc. Amazon, Microsoft, Google etc. are
the common and popular PaaS Vendors.
Software as a service (SaaS): This is another important service model of cloud computing. In SaaS, a
complete and compact application is provided to the user by the service provider. Often librarians or library
staffs face the problem of installation and run the new software and upgrading the existing one without a
strong technical background. In this service model, cloud vendors are totally responsible to maintain and
make available an application to the cloud user extended on their demand. Librarian and staff can work with
the software offered for them from anytime and anywhere where there is an internet connection. It may be on
pay per use or rental basis. It offers email application, free services etc. in the era of library. But which is very
important is that it allows a limitless storage of the documents of the library and beside this their provision of
access or retrieves them through the help of internet. Google, Microsoft, SQL Azures etc. are the common
Saas provider companies throughout the world.
Figure 4: Service model
290
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Need of cloud computing in the era of digital resources of the library:
Document storage and retrieval: se cloud computing technologies in the area of document storage and
retrieval is one of major application part of the cloud computing technology in the libraries. At present a
library whether it is traditional or hybrid possesses more or less digital documents. In case of digital library,
the library has a huge collection of digital resources which are stored on the library server. Basically
librarians are responsible to store their data or information on the server and it is their duty to maintain the
server to work out which cause a headache sometimes to the librarian and beside this many technical problem
arises to host the server properly. This makes obstructto provide the service and job of the librarians. Using
cloud computing technology librarian stores all data/information which are digitally available into the library
wall without any hindrance of manage the server. Thus this technology helps to build a digital library and
institutional repositories effectively. In the context of retrieval, access of the stored data is easy and
convenient way to the users at anytime from anywhere where there is a internet connection without physically
present in the library.
Figure 5: Data storage application
To build an institutional repository cloud computing technology usesDura spacecloud and it have two
software Dspace and fedora. Dspace is most common software using in digital library. To access the stored
information cloud computing facilitates Google Doc, Sky Drive, Drop Box, Flicker,and Jungle Disk and so
on. By providing LOCKSS (Lots of copies keeps stuff safe), CLOCKSS (Controlled LOCKSS), and Portico
Tool it helps to digitally preserve and conserve the library materials over the cloud platform. For the librarian
he/she is able to update or put information on the cloud throughout the world via internet.
Collection development and resource sharing: Collection development through collaboration of number of
libraries using cloud computing techniques and sharing of resources within these libraries is important
application of cloudcomputing. OCLC is one of best example of cloud computing service throughout the
world. Worldcat sevice of resource sharing is popular service of OCLC. This aspect is devided into two broad
categories.
E-Resources- collection: In the era of tchnological advancement the demand of e-resources like e-book ,
e-journal and so on are increasing in a high rate. Beside this it is not possible to acquire all the eresources for their users because of financial construction. Though to take a facility of cloud comuting
servicelibrarian is to bound up to pay for the complete application but it is cheaper to compare than
installation of hardware and software in the library and duplication and efforts cost of the e-resource
development.
Content searching: It allows the web OPAC, Federated searching for content seraching via internet with
the help of any device. In case of Scholarary content searching Kimbus which is a popular research
ISBN 1-63102-455-8
291
Potentiality Of Cloud Computing In Library Storage, Access And Retrieval: A Critical Analysis
platform based on cloud environment to retrieve scholary content available on the cloud. Kimbus,meant
for knowledge discovery, was lunchde in 2010,initaitive taken by Rahul Ararwalla and Tarun Arora to
meet the scholary interest of the researchers from multiple sources. Through this platform researchers are
able to searching content, make a collaboration,discuss with peers group and enrich the platform by
dedicating their intellectual and innovative ideas,thoughts and so on. At present Kimbus is consist of 600
academic institution, research labs,50000 scholars throughout the world. Kimbus offers the library to
make a search available through dyanamic and single point search interface. Presently Information and
Library Network makes a collaboration with Kimbus in order to provide a more effective and efficient
search & retrieval to the users and professionals under the UGCINFONET digital Library Consortium
project.
Cloud Computing Initiatives for Libraries: The services are designed through different ways like forums,
discussion room, web repository, bibliographical services etc. These are as follows
Drupal for content management: It is free and open source content management software, initially released on
January, 2011. Drupal is written on PHP and 0n 17th June, 2015 it was available on stable format.
Dura space’sDura Cloud – Repository solutions like Dspace , Fedora: Dura Space provides cloud based
services, developed by the Dura Cloud, to support to preserve and access the documents by academic
libraries, research institutions, and other cultural and heritage organizations. It is a non -profit organization
from 2011, offering cloud storage by “Dura Storage” across multiple commercial & non -commercial
organization and as well as libraries.
Ex-Libris Cloud: This provides the cloud based service and a cloud environment based on future technologies
and open for business and communication.
Moodle for Library Management Software: This is developed by an Australian Company with the help of 30
developers, supported by 60 companies. It provides a platform for educators, administrators, and learners with
a secure and integrated system and learning environment.
OCLC Web scale: Libraries at Web Scale – it is an OCLC report which explores the impact of the web on our
rapidly changing information era and presents an overview of opportunities in changing environment.
Open source software like Koha, Dspace, Green stone: It is a “source code” modified by anyone and also it is
the part of software that most computer users do not oversee.
Reed Elsevier: Reed Elsevier is an Anglo- Dutch multinational publishing and information company from
1992-2015 and renames as RELX Group in February, 2015. It provides information in the field of Science,
Medical, Marketing, Financial, Risk, Legal and Business Sectors.
Library Thing: The creator of Library Thing, launched 29 August, 2005, is Tim Spalding. It is a social
cataloguing web application.
Chronopolis Project: It is a project of university of California in associated with San Diego Super computer
Centre. It is based on data grid framework.
Advantages:
Service oriented architecture- Cloud computing services are based on service oriented architecture. The cloud
provides the servicesto the library which is controlled by remotely located data centers.
Pay per use model service– Being a demand based service it allows pay per use model based on license
agreement to the third party with the library. Library should only pay for the service, platform, and
application it uses.
Cost effective -This is more cost effective and cheaper method rather than traditional method. Sharing of
infrastructure, platform, software, hardware among the different libraries is an advantage to reduce the
implementation cost of them.
Portability –From any part of the world, anyone can browse the web anytime to get his/her service via
internet using any device.
292
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Eco-friendly – It is very helpful for green computing because of low consumption of electricity.
Adjustable storage-Cloud computing provides the adjustable storage capacity depending on the requirement
of the library.
Flexible and innovative – In cloud computing we use modern technology, so it is more flexible and also very
innovative.
WEB OPAC – If the catalogue of the institute make available through cloud, it will be more benefitted to the
users to find out the availability of material all over the world.
Challenges of cloud computing: The major challenges that a library may face are as follows.
Security: Library and Information centers have deal with huge amount of information. So data security or
data protection is a great challenge to the cloud provider. In case of cloud computing vendors are totally
responsible to provide the data security and fire wall is used to protect sensitive data of library.
Reliability: The arena of cloud computing required huge responsibility as user satisfaction in involved here.
Data back up: IPR (Intellectual Property Rights) are different type of problem in which cloud providers have
to be much careful.
Data recovery and availability: Data recovery and availability is also a concerned fact of cloud computing.
Regulatory and compliance restrictions: As anyone can access this service, and then there must be restricted
with some rules and regulations.
Management capabilities: The management of cloud computing prove insufficiency then in create
dissatisfaction.
Currents trends and present situation of the libraries in India:
Cloud computing is the advanced level of information technology and it is an upgraded version of grid computing
and distributed computing. As a developing country India is trying to switch over in this technology gradually.
Library has performing a great job of procuring, disseminating and retrieving a huge number of documents. At the
same time as a service oriented institution Library can adopt cloud computing services to fulfill its objectives .But
the present scenario of the Indian libraries shows that there is a lack of cloud service providers, deficiency of
technical skill and knowledge among the library professionals, unwillingness of technological improvementetc. for
which libraries cannot grow up efficiently in compare than technological advancement day to day. Though some
services like digital library using Dura space, web documentation, library website, web OPAC, web 2.0 etc. are
adapted to the academic libraries of India. In a nut shell still now cloud computing techniques are not fully accepted
in the libraries of India.
Cloud service providing libraries: Though many libraries of foreign countries are providing cloud based services
but in respect of our country result is very poor. Only pioneer libraries are providing this. In international scenario
(a) OCLC (b) Columbia Public Library (c) Exlibris (d) Library of Congress ( LC) (e) Polaris (f) Scribd (g) Encore.
In national scenario
INFERENCE
In the epoch of technological advancement cloud computing has become a buzzword over the last few years. It is a
shift towards a new paradigm of technological development.In spite of being some negative aspects it plays an
important and effective role in utilization of data which can be stored and shared among the different academic
libraries. But still now Indian libraries are situated in a developing phases to adopt and adapt cloud computing
techniques within the library. To build a cloud environment motivation of library professional for using this
technology is necessary done by the different commercial cloud providers in India like INFOSYS, Bangalore, TCS,
and Wipro etc.
ISBN 1-63102-455-8
293
Potentiality Of Cloud Computing In Library Storage, Access And Retrieval: A Critical Analysis
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
294
A.Suthar, A. (2013, June 1). An overview of Using Cloud Computing in Libraries.Retrieved July 12, 2015, from
http://www.theglobaljournals.com/ijar/file.php?val=June_2013_1370077205_6654a_101.pdf,
accessed
on
12.07.2015,15.48
Anna, K., & Kumar, A. (2013, December 23). Application of Cloud Computing in Libraries. Retrieved July 29, 2015.
Baniwal, R. (2013, September 1). Application of Cloud Computing in Different Areas. Retrieved July 29, 2015, from
http://www.csjournals.com/IJCSC/PDF4-2/5c.pdf,accessed on 15.07.2015,11.43
Bhattacharya, N., & Das Purkayastha, S. (n.d.). Cloud computing and its applications in libraries. Retrieved July 29,
2015.
Chand Goyal, L., & Kumar Jatav, P. (2012, September 1). Cloud Computing :an overview and its Impact on libraries.
Retrieved July 29, 2015,from http://ijngca.com/Papers/IJNGCA08092012.pdf,accessed on 11.07.2013,22.10
Managai, G., Ganesan, P., & Kumar.D, K. (n.d.). A PERSPECTIVE STUDY OF CLOUD COMPUTING IN
LIBRARY SERVICES. Retrieved July 29, 2015, from http://www.liscom.org/postContent/fullPaper/pdf/paper
presented/O 13 A PERSPECTIVE STUDY OF CLOUD COMPUTING IN LIBRARY SERVICES (1).pdf,accessed on
12.07.2015
Sanchati, R., & Kulkarni, G. (2011). Cloud Computing in Digital and University Libraries. Retrieved July 29, 2015,
from https://globaljournals.org/GJCST_Volume11/6-Cloud-Computing-in-Digital-and-University.pdf
Teregowda, P., Urgonkar, B., & Lee. Giles, C. (n.d.). Cloud Computing: A Digital Libraries Perspective. Retrieved
July
29,
2015,from
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5558004&abstractAccess=no&userType=inst,accessed
on
13.07.2015,22.45
Yuvaraj, M. (n.d.). Cloud Computing Application In Indian Central University Libraries: A Study of Librarians' Use.
Retrieved July 29, 2015.
ISBN 1-63102-455-8
USE OF LIBRARY MANAGEMENT SOFTWARE BY
SELECTED UNIVERSITY LIBRARIES OF DELHI: A STUDY
Jitendra Kumar | Assistant Librarian (I/C Library) | National Institute of Tuberculosis and Respiratory
Diseases | Ministry of Health & Family Welfare | Govt. of India | jitendra3682@gmail.com
Tanuja Kumari | Research Scholar | Deptt. of Library & Information Science | University of Delhi, Delhi
Abstract: This study presents a assessment of the library management software packages used in
University Libraries of Delhi. It focuses on the evaluation of software on the basis of certain
important checkpoints. It also highlights the importance of library management, library activities
and services in libraries. Today, the single most important issue for university libraries is
managing change without losing their identity. Change is nothing but a transformation of today’s
requirements to tomorrow’s performance. It is the only thing that has made possible the journey of
libraries from storehouses to the stage of information centres.
Keywords: Automation, Libsys, CDS/ISIS, Sanjay, Libman, SOUL.
INTRODUCTION
Software is a term used in contrast to hardware to refer to all programs (set of instructions for solving a given
problem by computer) which can be used to perform specified tasks. That is, the term software is used to
describe program set, needed to operate an information processing system. These programs give life to the
circuitry of computer hardware. It consists of a sequence of instructions and decision rules that directs the
computer in executing the given task.
Software is a set of programs or procedures or rules and associated documentation pertaining to the operation of
a computer system and that are stored in read/write memory, “The market for software is expected to expand.”
Software is an application package, which enables you to perform certain tasks, which manipulates any number
of variables, hardware or data.
LIBRARY SOFTWARE
Library software is a set of programs which helps in housekeeping functions (operations) of Library. These
software also called Library Automation Software, it contain all the functions related with library like,
Acquisition, Cataloguing, Circulation, Serial Control, OPAC, Administration etc.
Library Software is an Integrated Library System (ILS), also known as a Library Management System (LMS), is
an enterprise resource planning system for a library, used to track items owned, orders made, bill paid, and
patrons who have borrowed.
LIBRARY MANAGEMENT SOFTWARE
The World is going digital. Libraries are no expectations. In fact, librarians are one of the most enthusiastic user
groups of information technology in general and computer softwares in particular. A software may be viewed as
a digital version of human knowledge. Library Management Softwares (LMSs) are now established as an
essential tool in the support of effective customer service, stock management and management of services
offered by libraries. These are based on knowledge and experience of library professionals over the centuries.
Library Management Software is a set of programs which helps in housekeeping functions (operations) of
Library. These software also called Library Automation Software, it contain all the functions related with library
like, Acquisition, Cataloguing, Circulation, Serial Control, OPAC, Administration etc.
296
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Fig. 1 Library Management Software in Library
Library Software is an Integrated Library System (ILS), also known as a Library Management System (LMS), is
an enterprise resource planning system for a library, used to track items owned, orders made, bill paid, and
patrons who have borrowed.
The rapid growth in utility of hardware, software & connectivity and reduced costs gives the development of
LMS a vital breakthrough to achieve a remarkable height. Current LMSs are integrated systems, based on
relational database architecture. In such systems files are interlinked so that deletion, additions and other
changes in one file automatically activate appropriate changes in related files. The market place for LMSs is
now a mature one in India. Almost all special libraries and larger academic libraries in India have adopted a
computer-based system.
NEED AND IMPORTANCE OF LIBRARY MANAGEMENT SOFTWARE
Today, the single most important issue for university libraries is managing change without losing their identity.
Change is nothing but a transformation of today’s requirements to tomorrow’s performance. It is the only thing
that has made possible the journey of libraries from storehouses to the stage of information centres. Today
technology, marketing, quality, and costs are the major change elements. These change agents disturb and upset
all balances and equilibrium in the market.
Out of the four elements, quality, which is easy to recognize, but difficult to define is very dynamic. IT plays
key role in achieving total quality (i.e., satisfaction of users, staff, librarian, and institution) in the libraries. In
TQM framework the user (king) is at the top of the organizational pyramid, staff is next to serve the user and
management is there to support the staff. To please the king (user) libraries are expected to arrange all their
activities and processes around the needs and expectations of him and also desired to remain ahead of the users
in all aspects. The ability of a computer to put items rapidly in order and to do so in a variety of sequences or by
a number of different access points all derived from a single record, is undoubtedly one of its alluring attributes
to a librarian. Besides time saving benefits, it helps in library automation in many ways. It increases
productivity, reduces unit cost, and ensures consistency and reliability. Library software helps in managing
diverse library resources and provides better and wider access to resources.
OBJECTIVE OF THE STUDY
To know the Library Management softwares available in India.
To study the Library Management softwares being used by selected university libraries.
To study the modules, usefulness & backup facility the Library Management Softwares used by selected
universities.
To know the hardware & infrastructure requirements necessary for these softwares.
ISBN 1-63102-455-8
297
Use Of Library Management Software By Selected University Libraries Of Delhi: A Study
To formulate a criteria for evaluation of Library Management Software Packages.
To know the librarians satisfaction and problem faced by them regarding software used in respective
libraries.
NEED OF THE STUDY
In todays environment no library can functions manually to provide better and effective services to users
community. Every library has to purchase & use a Library Management Software to enhance effectiveness &
services. There are so many Library Management Softwares available in the market and some softwares are also
designed & developed by government organizations. These Library Management Softwares available at
different cost or at zero cost. It is very difficult to select good software with all necessary modules. This study
will emphasize on all the aspects related to library software like price, modules, budget, designing agencies and
success rates etc. I want to check out the different Library Management Softwares being used by different
universities in Delhi and whether they are successful or not.
LIMITATIONS
The aim of this research is to study the various kinds of library management softwares which are used by
libraries of different universities in Delhi but i have selected only three university libraries named as Delhi
University, Jawahar Lal Nehru University and Indra Gandhi National Open University.
LITERATURE REVIEW
A comprehensive survey of the works published in a particular field of the study or the line of research, usually
over a specific period of time, the form of in depth, critical bibliographic essay or annotated list in which
attention is drown to the most significant works. An annual review is a type of serial denoted to the publication
of literature review. Literature review is an evaluative report of information found in the literature related to the
subject area of the study. The review describes summaries, evaluate and clarify the literature available on the
related topic. It gives the theoretical base for the research and to determine the nature of the research.
In scholarly journals, particularly those publishing original research in the physical and social, the first section
of each article, devoted to a review of the previously published on the subject, with reference in text to footnotes
or to list of work cited at the end. Literature review can be just a smile summary of the source, but it usually has
an organization pattern and combines both summary and synthesis. A summary is a group of the important
information of the source, but a synthesis is a re-organized or a reshuffling, of the information. It must give a
new interpretation of the old material.
According to cooper “A literature review uses as its database reports of primary or original scholarship a does
not report new primary scholarship itself .The primary report used in the literature may be verbal but in the vast
majority of cause reports are written in document. The types of scholarship may be empirical, theoretical critical
analytic, or methodological in nature. Second as literature review seeks to describe, summaries, evaluate, clarify
and /integrate the content of primary report.”
METHODOLOGY
There are three research techniques and tool available for data collection.
1.
2.
298
Interview Method
Structured Interview
Unstructured Interview
Observation Method
Structured Observation Method
Unstructured Observation Method
Participant Observations
Non Participant Observations
Direct Observations
Indirect Observation
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
3.
Simple Observation
Systematic Observation
Questionnaire
Closed ended question
Open- ended questions
AREAS OF LIBRARY MANAGEMENT
Ranganathan’s five law of library science stipulates that documents of the library should have the maximum
number of users. With the application of ICT in the area of libraries there has been tremendous improvement in
the library services offered to the users by the libraries. Following are the main areas of library management:
Library management.
Library house keeping operation, and
Information Retrieval System.
Generations Of LMSs Over The Years:
Sl.No.
Features
1st Generation
2nd Generation
3rd Generation
4th Generation
1
Low level
Language
In house
COBOL,
PASCAL, C
Vendor Specific
4 GL
OOPS
2
Programming
Language
Operating System
UNIX, MSDOS
UNIX, Windows
3
DBMS
Non-standard
4
Import/Export
None
Hierarchical and
Network model
Limited
Entity Relation
model
Standard
5
Communication
Limited
Some interface
Standard
6
Portability
Machine
dependent and
hardware specific
Machine
independent but
Platform
dependent
Multi-vendor
Object oriented
model
Fully integrated
and seamless
Full connectivity
across the Internet
Multi-vendor and
Platform
independent
7
Reports
Fixed format and
limited fields
Fixed format and
unlimited fields
Customized
report
generation
8
Colour
None
None
Available
9
Limited
Improved
Unlimited
10
11
Capacity of record
holding
Module Integration
Architecture
Customized
report generation
with e mail
interface
Fully available
with Multimedia
Unlimited
None
Stand-alone
Bridges
Shared
Seamless
Distributed
Seamless
Client-server
12
Interface
Command driven
(CUI)
Menu driven
(CUI)
Icon driven
(GUI)
13
User Support
Single user
14
Multi-lingual
support/ UNICODE
None
Limited number
of users
Limited (through
Hardware
support)
Unlimited
number of users
Standard
Icon driven with
Web and
Multimedia (GUI)
Unlimited
number of users
UNICODE base
Table: 1 Generation of Library Management Softwares
Library Management Softwares in India: There are so many Library Management Softwares available in the
market and some softwares are also designed & developed by government organizations. These Library
Management Softwares available at different cost or at zero cost.
ISBN 1-63102-455-8
299
Use Of Library Management Software By Selected University Libraries Of Delhi: A Study
CDS/ISIS: CDS/ISIS stands for Computerized Documentation Services/lntegrated Set of lnformation Systems.
CDS/ISIS is an advanced non-numerical information storage and retrieval software developed by UNESCO
since 1985 to satisfy the need expressed by many institutions, especially in developing countries, to be able to
streamline their information processing activities by using modern (and relatively inexpensive) technologies.
The software was originally based on the Mainframe version of CDS/ISIS started in the late '60s, thus taking
advantage of several years of experience acquired in database management software development.
SOUL (Software for University Libraries): INFLIBNET Center of the UGC has developed a Windows-based
library management software, SOUL, which provides a total solution for the automation of university libraries
in India. SOUL is designed using client-server architecture, which imparts extra strength to storage capacity,
multiple access to a single database, various levels of security, back up and storage facilities, etc. It has MSSQL (Structured Query Language) Server 6.5 RDBMS (relational database management system) as the back
end. Now new version of SOUL 2.0 has come. This user-friendly software is quite easy to work with. The
software comprises various modules like acquisition, catalogue, circulation, OPAC, serials control and
administration.
E-Granthalaya: E-Granthalaya is library automation software from National Informatics Centre, Department of
Information Technology, Ministry of Communications and Information Technology, Government of India. The
software has been designed by a team of experts from software as well as Library and Information Science
discipline. Using this software the libraries can automate in-house activities as well as user services. The
software can be implemented either in stand-alone or in client-server mode where database and Web OPAC are
installed on the server PC while the data entry program is installed on client PCs.
Alice for Windows: Alice for Windows (AfW) is very popular, integrated library automation software designed
and developed by a leading Australian company, Softlink. The package is available in three versions, for school
libraries, academic libraries, special libraries and public libraries.
Standard Modules are required for a library to function from day to day. These are: Management, Reports and
Utilities, Circulation and Inquiry (OPAC). Advance Modules extend the usability of the automated library.
LIBSYS: Libsys is fully integrated library management software designed to run on a number of platforms.
LibSys has been developed by LibSys Corporation, New Delhi. It supports UNIX, Windows NT, and Novell
Netware in client-server architecture. It can run on many servers such as Windows NT, SCO Unix, Linux,
Unixware, Novell, Sun Solaris, Alpha OSF/1, etc. On the client side, a library may have any version of
windows. Besides, the software is also compatible with Java-enabled thin client. Significantly, Libsys does not
need any relational database management system (RDBMS) as it uses proprietary database. However, ORACLE
as backend or SQL server is the available options of Libsys. Libsys has the largest installations base in India
with more than one thousand libraries using the software.
DELMARC and DELPLUS: DELPLUS (formerly DELSIS), an integrated modular package, was developed
on Basis plus by DELNET to support complex cataloguing and union catalogue functions under network
environment. The software provides interface to CDSIISIS and supports creation of bibliographic records in 13
Indian languages (using GIST card). It facilitates duplicate checking, online help and interlibrary loan. Currently
it supports all the DELNET databases catering to all the network users.
SANJAY: SANJAY is a library automation software package which has been designed and developed by
DESIDOC (Defence Scientific Information and Documentation Centre), Delhi, with the support of NISSAT, by
augmenting CDS/ISIS (ver 2.3) to cater to the need of library management. CDS/ISIS lacks programs for
housekeeping activities such as circulation, serials control, etc.
DELSIS: Delsis, the networking software, is an integrated modular package developed on Basisplus by
DELNET to undertake complex cataloguing and union cataloguing functions in the libraries, library networks
and information centres. Some of its special features include: Enquiries through OPAC by author/title/
subject/call no./series/keyword, etc., Boolean enquiries, Full text search retrieval, Display records in AACR II
300
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
format, Data import – export, Automatic index generation, Input format: Common Communication Format
(CCF) developed by UNESCO, Duplicate checking of records, Creation of bibliographic records in Indian
languages for 13 languages ( using GlSTcard), Interface to CDS/ISIS, All DELNl3 databases and online interlibrary loan facility, etc., are functioning on this software presently.
Virtua ILS: Virtua Integrated Library System is a comprehensive, integrated library software package from
VTLS Inc, Virginia, USA. It has the modules of Acquisition and Fund Management, Circulation, Cataloging,
Serials Control etc. There are several features that are unique to VTLS Virtua ILS (Vyasamurthy, 2001).
TROODON: Troodon is an integrated package linking all the relevant functions in the library. It has been
designed to suit the library procedures and financial rules of the government of India and so is ideally suitable
for government libraries. Troodon 5.0 is user-friendly, multi-user, multi-lingual and multitasking. The package
is developed to work on Windows 95/Windows NT. It can be operated by library staff without much prior
knowledge of computer operations. It is web enabled to work perfectly on both Intranets and the Internet, is
GUI-based and is compatible with barcode technology and multimedia. It is a multi-user library software
package in Windows NT/Novell Netware Server. It is CCF (Common Communication Format) based for
import/export of data. The Standard package has installed the following modules: Acquisition, Circulation,
OPAC, Serials Control, Maintenance, Backup and Setup. The software also provides customization as per local
needs.
Troodon provides powerful, yet affordable library automation solution for the libraries of all types and sizes.
Troodon is designed as an integrated package linking all the relevant functions in the library.
STATEMENT OF THE PROBLEM
There are so many library management softwares available in India like open source softwares & commercial
softwares but I want to check out which software is best in terms of modules, services, backup facility, price,
future addition options, data storage capacity, software & hardware requirements of the software etc. I want to
select only three university libraries named as Delhi University, Jawahar Lal Nehru University and Indra Gandhi
National Open University.
CONCLUSION
On the basis of different criteria for library management software and software package used by Central
Reference Library (DU), Central Library (JNU) & Library & Documentation Division (IGNOU) Library find
that these university libraries are using different software and they satisfied with their performance. After
analysis of the functionality of these software draws some findings that there is no end of satisfaction in human
nature, every user wants more & more facilities in minimum charges, so that selection of software is done very
carefully. Qualities of good software is to offer the complete satisfaction of users and perform the above
mentioned library activities and functions, we must select a competent and suitable software which can meet out
users requirements.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
"LIBSYS 7." LIBSYS. Libsys Ltd., 2010. Web. 6 Mar. 2015. <http://www.libsys.co.in/offerings-libsys7.html>.
"NewGenlib." NewGenLib / Best Open Source Integrated Library System. Verus Solutions Pvt Ltd, 2010. Web. 6
Mar. 2015. <http://www.verussolutions.biz/>.
"SoftLink Asia-Alice." Softlinkasia.com: Softlink Asia, Library Automation Software, Alice, Liberty, Library
Software in India. Softlinkasia, 2007. Web. 04 Mar. 2015. <http://www.softlinkasia.com/Alice.htm>.
"SOUL, Software for University Libraries, INFLIBNET Centre Ahmedabad." Information and Library Network
Centre. INFLIBNET Centre, 18 Mar. 2009. Web. 04 Mar. 2015. <http://www.inflibnet.ac.in/soul/about.htm>.
"Troodon 5.0." Comtek Services Pvt. Ltd. Web. 6 Mar. 2015. <http://www.comtek-services.in/Documents
/Troodon5Broacher.pdf>.
Gupta, Atul. "Software." Information Technology. Delhi: Rathore Institute, 2008. 45-58. Print.
Information Development 19.1 (2003): 50-55. Print.
Malwad, NM. "Selection Criteria for Library Automation Software." DESIDOC Bulletin of Information
Technology 15.2 (March,1995): 17-26. Print.
Mukhopadhyay, Partha Sarathi. "Progress of Library Management Softwares: an Indian Scenario." Documentation
Research and Training Centre. Web. 20 Feb. 2015.
ISBN 1-63102-455-8
301
Use Of Library Management Software By Selected University Libraries Of Delhi: A Study
[10]
[11]
302
Mukhopadhyay, Partha Sarathi. "Progress of Library Management Softwares: an Indian Scenario." Documentation
Research and Training Centre. Web. 20 Feb. 2015.
<https://drtc.isibang.ac.in/bitstream/handle/1849/189/lmss2a.PDF?sequence=2>.
Ratnakar, K.V., ed. "Library Management Software." Indian Council of Medical Research:ICMR Libary Bulletin
4.4 (2007): 4-9. Print.
ISBN 1-63102-455-8
CLOUD COMPUTING IN COLLEGE LIBRARIES
Ram Nath (Maurya) | Librarian | Axis Colleges Hathipur | Rooma | Kanpur | ramnathmaurya10@gmail.com
Jai Prakash | Librarian | Jan Nayak Choudhary Devi Lal Memorial College | Sirsa | Haryana |
jpsonepura@gmail.com
Abstract: In digital era library must soon be building and managing own data centers. In this
study libraries maintain more control over the applications that contain sensitive, private
information about sponsor. Libraries have been using some cloud computing services for one
decade. For example- It we can access databases online, they called cloud applications. In this
paper, discuss overview of this technology, Infrastructures, digitization and cloud computing are
only choice, new features, usage, purpose of cloud computing in college libraries, present status
of user services in college libraries. In this paper details discuss of the cloud computing security
issues and challenges.
Keywords: Cloud computing, Digital Libraries, College Libraries, Web world.
INTRODUCTION
Cloud computing is a new technology model for IT services which many businesses and organizations are
adopting. It allows them to avoid locally hosting multiple servers and equipment and constantly dealing with
hardware failure, software installs, upgrades and compatibility issues. For many organizations, cloud computing
can simplify processes and save time and money. Cloud computing is changing the way that organizations
manage their data, due to its flexible, user-demand, economical Characteristics. Cloud is a many group of
mutual interconnected computer that extends exceeding an organization.
Cloud computing, where all files are hosted on a “Cloud” consisting of thousands of computers and servers, all
linked tighter and accessible via the internet. With cloud computing everything you do is now web based instead
of being desktop based. You can access all your programs and documents from any computer that’s connected
to the internet.
Present scenario and now too many colleges’ libraries computers to work alone inside a library by investing on
hardware, software and maintenance. Introducing of information technology, the scenario has totally changed as
today they can provide information, around the world in twenty four hours/ round o’clock. This is possible only
the use of computers and networking. In this regard multi-level services their different modules i.e. World Wide
Web (WWW) file transfer protocol (FTP), bulletin board services BBS), an e-mail. So many libraries are using
or entering in a new era technology for example cloud computing. Cloud computing known as so many names
i.e. ‘on-demand computing, information utilities, software as a services and the internet as a platform. Cloud
computing is making tasks distributed in large numbers of distributed computers but not in LAN. Cloud
computing is capable of integrating them and
putting on the public cloud are networks. Example
-like internet.
What is Cloud Computing?
Cloud computing is not a new technology that
suddenly appeared on the web but it is a new form
of computing. Cloud computing is a kind of
computing technology which facilitates in sharing
the resources and services over the internet rather
than having these services and resources on local
servers/ nodes or personal devices. The
combination of servers, networks, connection,
Fig. 1: Cloud Computing
applications and resources is defined as 'cloud'.
Cloud computing is acting as a resources pooling technology for accessing infinite computing services and
ISBN 1-63102-455-8
303
Cloud Computing In College Libraries
resources as per demand of users and can be compare with models of pay as you use or utility model same as
used for mobile services usages and electricity consumption.
Wikipedia claimed that the concept of cloud computing was emerged back to the 1960s, when John McCarthy
opined that computation may someday be organized as a public utility. Chellappa gave the first academic
definition of the term Cloud Computing in 1997 and later on, in the year 2007 the term cloud computing came
into popularity and firstly was used in this context when Kevin Kelly opined that eventually we will have the
inter-cloud, the cloud of clouds.
Diffusion of Cloud Computing in College Libraries: A model of cloud implementation in college libraries.
We proposed model identified the stakeholders in a college education who internet with the digital division of
the college. We have named the digital division as the digital libraries.
Book requisition
Inter library loan
Library Portal
Remote Access and maintains of e-resource
Circular
Fig.2: Library Portal
What are the implications for College: Colleges are expected to provide a wide array of technology services,
some of which are highly specialized to individual’s campuses, whereas others simply need to be available.
Operating in a cloud environment requires information technology experts and staff to develop different skills.
Such as libraries services in library and off campus services.
Features of Cloud Computing: Following important effects of cloud computing will probably impact of
college libraries.
Fig. 3: Features of Cloud Computing
a)
b)
c)
d)
e)
f)
g)
h)
i)
304
Cost saving
User friendly
Sustainability
Versatility
Scalability
Resource Optimization
Better mobility
Highly automated
Easy maintenance
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Model of Cloud: Cloud expand model helpful efficient in developing of economic, extensible and
representative symmetry. These are following types of development model of cloud.
A) Private cloud
B) Public cloud
C) Hybrid cloud
Fig. 4: Model of Cloud
A) Private Cloud: The public cloud substructure is available for public use substitute for a huge industry
class and is retain by an organization marketing cloud services.
B) Public Cloud: Public cloud computing climate are open for use to anyone who wants to sign up and
use them. These are run by peddler and applications from distant users are likely to be compound
conjointly on the cloud’s services, storage systems and networks. Example- Google’s App Engine and
Amazon web services.
C) Hybrid Cloud: Hybrid cloud provides digital solutions through a combine both private and public
cloud models. Hybrid cloud is a private linked to one or many extraneous cloud services. Centrally
supervise, provisioned as a single unit, and restrict by a fixed network.
Cloud Computing and Library Services: following library services are given below1.
2.
3.
4.
5.
6.
7.
8.
Online search services (OSS)
Bulletin board service (BBS) and e-mail
Electronic Document Delivery Services (EDDS)
Full text Information (FTI)
File Transfer (FT)
E-learning
Really simple syndication (RSS)
www services
Fig. 5: Cloud Computing in library Services
Applications of Cloud Computing In Libraries
Libraries are shifting their services with the attachment of cloud and networking with the facilities to access
these services anywhere and anytime. In the libraries, the following possible areas were identified where cloud
computing services and applications may be applied.
Building Digital Library/Repositories
ISBN 1-63102-455-8
305
Cloud Computing In College Libraries
In the present situation, every library needs a digital library to make their resources, information and services at
an efficient level to ensure access via the network. Therefore, every library is having a digital library that
developed by using any digital library software. In connection to cloud based digital library software, Duraspace
is having two softwares namely Dspace and Fedora Commons but Dspace is widely used for building digital
libraries/ repositories relative to Fedora Commons. Dura cloud provides complete solutions for developing
digital libraries/ repositories with standard interfaces and open source codes for the both software.
CONCLUSION
Libraries have the opportunity to improve their services and relevance in today’s information society. Cloud
computing is one avenue for this move into the future. It can bring several benefits for libraries and give them a
different future. Cloud computing is the most important action in modern library. Digital era, libraries must soon
be building and managing own data centers. Information Communication Technology (ICT), Infrastructures,
digitization and cloud computing are only choice, new features, usage, purpose of cloud computing in college
libraries, present status of user services in college libraries.
REFERENCE
[1] Miller, Michael, “Cloud Computing, Pearson, Noida,(2011) pp.01
[2] http://www.slideshare.net/Vasanthrz/can-cloud-computing-help-for-government-colleges-to-automate-theirlibraries-a-point-of-view
[3] http://www.csjournals.com/IJITKM/PDF%205-2/30_Rajni_Bala.pdf
[4] http://berkeleycollege.libguides.com/content.php?pid=478746&sid=3977499
[5] http://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=1006&context=aiken_gregg_graniteville_library_facpu
b
[6] http://www.ijodls.in/uploads/3/6/0/3/3603729/vol._2_july_-_sept._2012_part-2.pdf
[7] http://www.alatechsource.org/techset-issue-11-cloud-computing-for-libraries-by-marshall-breeding
[8] http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-winds-of-change-paper.pdf
[9] http://www.ijidt.com/index.php/ijidt/article/viewFile/3.4.9/pdf
[10] http://www.facetpublishing.co.uk/title.php?id=048477&category_code=#.VcxEncVmKf4
306
ISBN 1-63102-455-8
WEB BASED CUSTOMIZED INFORMATION SYSTEM: A
MODEL CONCEPT
Shyamanta Boro | Assistant Librarian | University of Science & Technology, Meghalaya |
shyamantalis@gmail.com
Abstract: The evolution of lead generation and the increasing demand of information by the
information user create a growing need of specialized information. It is because of sustainable
development of information or resource by the information builder as well as publisher, author. It
being is motivated to the user to adopt high cost of information until and unless advent of new era
of customized information disseminations through like online shopping. For the tremendous
growth of information and over explosion of information its price has been increasing since for
the for disseminating of information in different way either it may be Documents (Electronic +
Print), Journal (Electronic + Print), and Consortia and due to the increasing price resources or
packaging of information under different group (Consortia) it is very difficult to handling of
particular information by single handled. Thus information users are motivating towards the
customized information where each and every user can handle required information by minimum
cost.
In this article it explore the importance of overcoming the global information explosion with high
cost (particularly among lower socioeconomic groups) to take up the targets to provide
customized information service. We also look at some intervention options that may assist in
improving the affordability of web based services among lower socioeconomic groups or
individual
Keywords: Online, Information, Shopping, Internet, Web Based
INTRODUCTION
Since the invention of Internet and WWW more people felt comfortable with the services of modern ICT for
information shopping. It’s a global phenomenon to satisfy the each and every information seeker to getting
things done in an appropriate manner of information rate. The globalization of Information Communication
Technology creates visualization of information product in global World Wide Web. Special values and free
shipping of customized information incentivized them to fulfill their need for basics and their reading habit
apparel online. What will happen in the future as even more if information are found to be your desktop shift to
online as a customized manner with paying less money for the required item or information. As because we are
living in the 21st century, where it is depend on wheel. It is the age of technology and technology converge the
society in to a global village of information and knowledge. Book sellers are still selling but not satisfactory to
the user as well as reader community because you have to pay high for a volume. But due to the high race or
professional competitions for achieving the academic goal creates information explosion and information
repeating again and again. For that reason user or readers are suffering to find out right information and to
solving that kind of problem there is a provision to introduce “Web Based Customized Information Service”
where each and every user will get customized, content based electronic information retrieval to user door step
or Desktop, Tablet, Smartphone via connecting internet by subscribing of particular information or content by
paying minimum cost. If the online content information shopping trend will lead to many book stores as well as
high rate public private companies of consortia, databases will have to minimize their business. Yes of course
there is may be big problem for providing of customized information due to copyright and memorandum of
understanding with the Author, Publishers. I could see that in the next five years some private companies will
introduce “Web Based Customized Information Service” with understanding of Memorandum information
builders and as well as publisher to put forwarded monetizing their business of information delivering to their
clients.
ISBN 1-63102-455-8
307
Web Based Customized Information System: A Model Concept
OBJECTIVES OF THE STUDY
Information technology has brought the key change in all field of life and the roles of technologies play in our
lives are rapidly expanding. To look at light and shadows of this new dawn of social and moral implications
deeply connected, analyzed and informed with global ICT. The activities of obtaining information resources
relevant to information need from a collection of information resources. Searches of information can be based
on metadata or on full texts which are used to reduce low income groups in affordable with a target group
towards which interventions can be targeted. As we are getting paid for our productivities and relative to others
with the socially expected level of information productivity in each and every user’s personal lives. It has
significant consequences that the more efficient process of Internet marketing is one of the most effective ways
to bring a business to exciting new levels of success i.e. Web Based Customized Information Service. To
provide best quality service and to succeed in the online web based information service, there are some basic
objectives of study are put forwarded
Reduce the high cost of information to minimum level
To satisfy the user by providing customized item or information
Global information retrieval & green revolution
Importance of Web Based Customized Information Service: Cloud is emerging as a cost effective solution to
provide customized information services in the computing world and the capacity of data storage on cloud gone
up to a zettabyte from gigabyte. The need to store and retrieve written information became increasingly
important over centuries especially with inventions like paper and the printing press. Soon after computers were
invented, people realized that they could be used for storing and mechanically retrieving large amounts of
information and the practice of archiving written information into a digitally readable can be traced back to
around. For thousands of years people have realized the importance of archiving and finding information
globally by one touch computer mouse. As it is known fact that the competition of money making business by
the information builders as well as publisher makes information explosion and quality of publication is
decreasing. Yes of course there are number of good quality journal publications having high impact factor. So
for that quality based information each & every user or customer must spend maximum price. So here the
concept of “Web Based Customized Information System” is introduced for each and every user or common
people as like “Online Shopping” where each and every user can check and can read content information,
summery of particular book, abstract of Journal etc. Here any one can browse and check whether that
information is available or not? If not then he or she can ask & send request, so that administrator of that
WBCIS will arranged that the required information to your desktop as well as tablets, smart phone. It is being
targeted to global perspective that means “Reaching to not reachable”. Finding useful information from such
collections became a necessity in the field of Information Retrieval.
There are some importances of Web Based Customized Information Service
Repackaged information
Green revolution and paper less society
Saving money & Time
It reaches to not reachable
Pay Online & get information online via mail
Information on pocket
Customized Information Services: Cloud Computing are the virtual pool of computing resources that provides
an online pool of resources for computing, where the computing is performed by efficient sharing of resources
or disseminating of information to a particular Desktop, Laptop, Tablets, Smartphone via internet connectivity.
Cloud relies on its resources for handling the application in the local and personal devices by developing
Smartphone Google Apps of “Web Based Customized Information System” (WBCIS). There are some proposed
customized information services which are as
308
Content based: Content-based information is part of information retrieval where content wise
information and data are arranged automatically via content management software used. So to full fill the
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
customer needs in global information era the web based customized information system targets to provide
content with chapter in a customized mode
Abstracting Information: An abstracting service is a service of summary of a particular topic or
article that provides abstracts of publications, often on a subject or group of related subjects, usually on
a subscription basis. It gives full view of the topic or details of the topic.
Bibliographic information:User can read bibliographic details and contents as well as abstract those
who are closed access otherwise open access are given links
SMS Alert (Short Message Service): Short Message Service (SMS) is a text messaging
service component of phone, Web, or mobile communication systems. It uses standardized
communications to the user as well customer for getting update information of relevant topic or subject.
Email Alert: The concept of information at home and for general help from the web administrator
customer support service will communicate via email. More over each and every registered member
will get email notification regarding updating of product & services
RSS feed (Rich Site Summary): RSS feeds also benefit users who want to receive timely updates
from web based customized information system or to aggregate data from many sites. It gives
frequently updated information on Web Based Customized Information system (WBCIS). RSS feeds
enable publishers to syndicate data automatically
OPAC: As it is the Online Public Access Catalog gives databases that are available in a WBCIS
Knowledge Bank and Bibliography details, Users can search in a web based a information catalog
principally to locate information and data (Books, Journals, Audio, Video Etc) and other material
available at a knowledge bank.
Miscellaneous Services:By giving the name of miscellaneous services it includes different links of
information resources through hyperlinks of various sources for making information more productive
and accessible to each and every user or customer.
Proposed Model of Web Based CIS:
Advantages & Disadvantages of WBCIS:
Advantages:
Multi user can subscribe beyond the boundary
Individual user’s are benefitted from that information system
ISBN 1-63102-455-8
309
Web Based Customized Information System: A Model Concept
Information on your desktop and it saves time
No need of physical space only need computer memory
Instant messaging service / Remainder / Newsletter
Ne need of shipping agent
It creates green revolution
Disadvantages of WBCIS
Online payment may occur problem
Mostly depend on technology
Information overload
Special Nature of Web Based Customized Information System (WBCIS)
Communication: For making customized information service more popular over the World Wide Web
it is necessary to communicate with users as well as customer of different information seeker.
Communication must be done via Email. Short Message Service, feedback notification of current
arrival. For making communication and interaction with users or customer there must always available
on particular address so that each and every one can ask related information
Organization: Proper administration for large team can create the successful nature of web based
customized information service. Distribution of job among the human resources is the main tools to set
up from many search engine optimization and online information marketing. Consultant of resources
allows us to deliver exemplary services to a number of clients, without ever sacrificing individual
quality.
Accountability: It is a one of the major part of successful business on proposed model. Accountability
is must in age of ICT where internet marketing and social media plays various roles to provide right
information to the respective clients or user. It will be absolute transparency in web based customized
marketing services. The complete understanding of every step of regularly and updated reports will be
able to see and measure.
Consistency: Every user or client regardless of web based customized information, will receive the
same level online information marketing services.
Integrity: Above all else, at online information marketing company need integrity. In the web based
customized information marketing services strongly believe to work. It takes only clients or user so that
we can help be successful and If we cannot help you meet your goals, if our online information
marketing services are not right for you.
CONCLUSION
The tremendous technological convergences of ICT and WWW have forced the mankind to adopt the
revolutionary changes of globalized information. Though libraries are growing with print or electronic as well as
digital form and that are also important element but we can’t denied making online circulation services of
content based, summery based, bibliographies to the end user as because of time bound for searching of that
particular information and physical presence in the library. We people need readymade information of particular
topic so that time of users will save (According to the fourth law of Library Science) the information that
included under closed consortia or packaged information of different information builders as well as publisher.
As is targeting to serve the individual user, common people, socially and economically low, private institutions,
or distant people those who are beyond the institutional campus will be benefitted from that customized
information services. Though it has various negative impacts on certain copyright declaration but there have lots
more opportunities for providing better support or a completely outsourced solution. Knowledge Marketing
provides an entire circulation solution that supports your needs and the appropriate solution will make societies
more needful “Web Based Customized Information Services”.
310
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
I do hope that very soon memorandum of understanding with certain publisher or authors will make agree for
providing that kind information circulation services.
RECOMMENDATIONS
For making successful “Web Based Customized Information Services” there are some Recommendations of
marketers, publishers and media companies, being in control of your web content creation is essential.
Responsibility: We approach responsibility to our clients with the same passion as if it was our own
business or as we do not believe in cutting corners, shortcuts, or unethical marketing practices. We
believe in responsibility as an organization, within our local and global communities
Integrity: We make recommendations, yet we also respect our clients’ knowledge and the fact they are
the final decision makers. We approach our client relationships as partnerships and we do everything to
make our partnerships successful. We believe in discretion and in protecting our clients’ information
and data.
Freedom to Innovate: Our teams have the creative freedom they need to design the most successful
campaigns possible. We believe that a free culture helps encourage and facilitate personal and
professional growth. We believe in open doors, providing help when you need it from any of our
knowledgeable ninjas. Any task can be accomplished with the right minds.
Fun: We believe that a fun work environment stimulates the mind and creates a positive attitude and
good morale, and that these qualities are reflected in our work and in the relationships we build with
clients
Plagiarism: It is a major issue for disseminating of information through proposed “Web Based
Customized Information System” because of copyright violation where it is very difficult to make
understanding of authors or information builders as well publisher. The way technology are changing
and ever increasing of information and the high cost information product and services I hope
difficulties will arise for arranging such kind of services.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
S. Ajay, Pratap. And Y. Mayank , (2013). Information Communication and Society. New Delhi, Ess Ess
Publications.
B. Badan (2012). Library and Information Science: UGC Net Guide. Guwahati, DVS Publisher.
A. Jagdish, C. A. S., S. Mukesh.,C . Prem., H. H.G., and C. Rajesh. (2010). Re-Engineering of Library and
Information Services in Digital Era. 7th Convention PLANNER 2010, Tezpur.
K. P.S.G. (2008). Fundamentals of Information Science. New Delhi, Indraprastha Books & Periodicals.
S. Mukesh and E. Monawwer (2013). E- Resource Management in Libraries: Issues and Challenges. Guwahati, K
K publications.
Wikipedia https://en.wikipedia.org/wiki/Indexing_and_abstracting_service (20/07/2015).
Wikipedia https://en.wikipedia.org/wiki/Content-based_image_retrieval (20/07/2015).
F. Joaquim, S. Boris, H. Markus, and M, Leszek. (2008). Software and Data Technologies: Second International
Conference. New Delhi, Springer Science & Business Media.
K. Tom, S. Christine and U. Peter (2014). Library3.0: Intelligent Libraries and Apomediation. New York, Elsevier.
(https://books.google.co.in/books?id=QvOiAgAAQBAJ&dq=Content+based+library+service&source=gbs_navlin
ks_s ) 20/07/2015.
S, Amit. (2001)Modern Information Retrieval: A Brief Overview. Bulletin of the IEEE Computer Society
Technical Committee on Data Engineering.
Anvil Media http://www.anvilmediainc.com/marketing-resources (22/07/2015).
ISBN 1-63102-455-8
311
PKP AND ITS OPEN JOURNAL SYSTEM: AN INITIATIVE IN
OPEN ACCESS SCHOLARLY ENVIRONMENT
Satish Kumar | Information Scientist | ARIES | Nainital | sklisc@gmail.com
Anil Kumar Mishra | Senior Technical Assistant ‘B’ | CVRDE | DRDO | Chennai | anilmlis@gmail.com
Abstract: Commercial publishers are increasing the subscription prices of journals, the libraries attached to
universities, colleges and R&D institutions are finding it very difficult to subscribe the core journals to cater to
the knowledge requirements of their stakeholders. The Open Journal System helps us to publish and manage the
entire publishing process of a journal; the Academic institutions can do this without any additional funding.
This paper describes about an initiative; started by the Public Knowledge Project.
Keywords: Commercial, Open Journal System Public Knowledge Project.
INTRODUCTION
When scholarly publishing was in trouble due to so many reasons such as high printing cost, limited
circulations, scanty funding resources, time consuming peer review process, etc. the advent of electronic
publishing technology came as a panacea and changed the face of scholarly publishing. Evolution of Open
Source Softwares for Journal publishing and management has opened new doors to the academic and research
community for production, storage and access to research literature in the networked digital environment. The
introduction of open journal management systems like 'Open Journal System' (OJS) of the Public Knowledge
Project (PKP), 'DPubs' of Cornell University, 'ePubTK' of Edgewall Software, GAPworks of German Research
Foundation, 'Ambra' of PLOS, 'SOAPS' of SciX, 'Scholarly Exchange', etc. paved the way for scholarly
publishing by academic and research community with zero budget 1. Now, we are fortunate by this environment
which has given freedom to the scholarly community to more focus on their research rather than worrying about
the fund problem for publishing their research. In these initiatives, a major system has been started by Public
Knowledge Project (PKP) through its Open Journal System.
WHAT IS PKP
The Public Knowledge Project (PKP) is a non-profit research initiative that is centered on the importance of
getting the results of publicly funded research freely available through open access policies, and on producing
strategies for making it possible including software solutions. It is a partnership between the Faculty of
Education at the University of British Columbia, the Canadian Centre for Studies in Publishing at Simon Fraser
University, the University of Pittsburgh, Ontario Council of University Libraries, the California Digital Library
and the School of Education at Stanford University. It tries to improve the scholarly and public character of
academic research through the growth of innovative online environments 3.
“PKP is a multi-university initiative developing (free) open source software and
Conducting research to improve the quality and reach of scholarly publishing”
HISTORY
The PKP founded in 1998 by Dr. John Willinsky in the Department of Language and Literacy Education at the
Faculty of Education at the University of British Columbia, in Vancouver, British Columbia, Canada, based on
his research in teaching and publishing. Dr. Willinsky is a leading promoter of open access publishing, and has
written extensively on the value of public inquiry.
The PKP’s initial focus was on increasing access to scholarly research and output beyond the traditional
academic environments. This soon led to a related interest in scholarly communication and publishing, and
especially on ways to establish it more cost effective and less reliant on commercial enterprises and their
generally restricted access models. PKP has developed free, open source software for the management,
publishing, and indexing of journals, conferences, and monographs 4.
312
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
The PKP has collaborated with a broad scope of collaborators concerned in doing research publicly available,
including the Scholarly Publishing and Academic Resources Coalition (SPARC), the Brazilian Institute for
Information Science and Technology (IBICT), and the International Network for the Availability of Scientific
Publications (INASP). Together with INASP, the PKP is working with publishers, librarians, and faculty
members in the evolution of scholarly research portals in the developing world, including African Journals
OnLine (AJOL) and Asia Journals Online.
As of 2008, the PKP has joined the Synergies Canada initiative, contributing their technical expertise in
integrating work being performed within a five-party consortium to make a decentralized national platform for
social sciences and humanities research communication in Canada.
Growth of PKP (2005 to 2009)
The Public Knowledge Project grew between 2005 and 2009. In 2006, there were approximately 400 journals
using Open Journal Systems (OJS), 50 conferences using Open Conference Systems (OCS), 4 organizations
using the Harvester, and 350 members registered on the online support forum. In 2009, over 5000 journals were
used OJS, more than 500 conferences were using OCS, at least 10 organizations are using the Harvester, and
there were over 2400 members on the support forum.
Since 2005, there were major releases (version 2) of three software modules (OJS, OCS, Harvester), as
considerably as the addition of Lemon8-XML, with a rising number of downloads being recorded every month
for all of the software. From June 12, 2009 to December 21, 2009, there were 28,451 downloads of OJS, 6,329
of OCS, 1,255 of the Harvester, and 1,096 of Lemon8-XML. A new module, Open Monograph Press (a
publication management system for monographs) has also been started.
The PKP also witnessed increased community programming contributions, including new plug-in and features,
such as the subscription module, allowing OJS to support full open access, delayed open access, or full
subscription-only approach. A growing number of translations have been contributed by community members,
with Croatian, English, French, German, Italian, Japanese, Portuguese, Russian, Spanish, Turkish, and
Vietnamese versions of OJS completed, and several others in production4.
PKP Conferences:PKP holds a biannual conference. The First PKP Scholarly Publishing Conference was held in Vancouver,
British Columbia, Canada on July 11–13, 2007 and the Second PKP Scholarly Publishing Conference was also
arrested in Vancouver on July 8–10, 2009. The Third PKP Scholarly Publishing Conference was held in Berlin,
Germany during 26-28 September 2011. The fourth PKP Scholarly Publishing Conference was held in Mexico
City, Mexico in August 19-21, 2013. Notes on the presentations were recorded on a scholarly publishing blog
for both the 2007 and 2009 conferences, and selected papers from the 2007 conference were published in a
special issue of the online journal First Monday. Papers from the 2009 conference are available in the inaugural
issue of the journal Scholarly and Research Communication5.
PKP SOFTWARE
The PKP's suite of software includes four separate, but interrelated applications to demonstrate the feasibility of
open access: the Open Journal Systems, the Open Conference Systems, the PKP Open Archives Harvester, and
Open Monograph Press. PKP briefly experimented with a fifth application, Lemon8-XML, but has since opted
to integrate the XML functionality into the existing applications. All of the products are open source and freely
available to anyone concerned in employing them. They share similar technical requirements (PHP, MySQL,
Apache or Microsoft IIS 6, and a Linux, BSD, Solaris, Mac OS X, or Windows operating system) and
necessitate only a minimum degree of technical expertise to fetch up and moving. In summation, the software is
well supported with a free, online support forum and a producing body of publications and documentation is
available on the project web site.
Increasingly, institutions are combining the PKP software, using the OJS to publish their research results, OCS
to organize their conferences and publish the transactions, and the OAI Harvester to organize and get the
metadata from these publications searchable. Together with other open source software applications such
ISBN 1-63102-455-8
313
PKP And Its Open Journal System: An Initiative In Open Access Scholarly Environment
as DSpace (for creating institutional research repositories), institutions are creating their own infrastructure for
sharing their research output6.
OPEN JOURNAL SYSTEMS (OJS)
Open Journal Systems (OJS) is open-source software for the management of peer-reviewed academic journals,
produced by the Public Knowledge Project, published under the GNU General Public License. OJS are a journal
management and publishing scheme that have been produced by the Public Knowledge Project (PKP) through
its federally funded efforts to extend and improve access to research.
The origins of OJS- The arrangement was first published in 2002 as a research and development initiative of
the Public Knowledge Project at the University of British Columbia, with the support of the Social Sciences and
Humanities Research Council of Canada, Max Bell Foundation, the Pacific Press Endowment, and the
MacArthur Foundation. Its continuing development is presently managed by a partnership between UBC's
Public Knowledge Project, the Canadian Center for Studies in Publishing and the Simon Fraser University
Library9.
OJS Features: OJS is installed locally and locally controlled.
Editors configure requirements, sections, review process, etc.
Online submission and management of all content.
Subscription module with delayed open access choices.
Comprehensive indexing of content region of planetary organization.
Understanding Tools for content, based on field and editors’ choice.
E-mail notification and commenting ability for readers.
Complete context-sensitive online Help documentation.
OJS assists with every phase of the refereed publishing process, from submissions through to online publishing
and indexing. Through its management systems, it has finely grained indexing of research, and the context it
supplies for research, OJS seeks to better both the scholarly and public quality of refereed research.
OJS is open source software made freely available to journals worldwide for the use of making open access
publishing a viable selection for more journals, as open access can increase a journal’s readership as well as its
contribution to the public good on a global scale.
Design of OJS:OJS was designed to ease the growth of open admission, peer-reviewed publication, providing the technical
infrastructure not only for the online presentation of journal articles, but also an entire editorial management
workflow, including article submission, multiple cycles of peer-review, and indexing. OJS relies upon
individuals fulfilling different roles, such as the Journal manager, editor, reviewer, author, reader, etc. It has a
module that supports subscription journals.
The software holds’plug-in' architecture, similar to other community-established projects, such as WordPress,
allowing new features to be easily integrated without the demand to convert the entire core code base. Some of
the plugins contributed to OJS include tools to facilitate indexing in Google Scholar and PubMed Central, a feed
plugin providing RSS/Atom web syndication feeds, a COUNTER plugin, allowing COUNTER statistics and
reporting, and more. Open Journal Systems is also LOCKSS-compliant, helping to ensure permanent archiving
for ongoing access to the content of the diary.
To improve reader's engagement, PKP has developed a series of Reading Tools, which provide admission to
related works, media accounts, government policies, etc. in open access databases.
This journal utilizes the Open Journals Systems software for management and publication documentation. OJS
is an open source solution to managing and publishing scholarly journals online. OJS is a highly flexible editoperated journal management and publishing system that can be downloaded for free and installed on a local
314
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Web server. It has been designed to reduce the time and energy devoted to the clerical and managerial tasks
associated with editing a journal, while improving the recordkeeping and efficiency of editorial processes. It
tries to improve the scholarly and public quality of journal publishing through a number of inventions, from
making journal policies more transparent to improving indexing 6.
OJS SYSTEM BACKGROUND
OJS is a journal and website management and publishing system. OJS covers all facets of online journal
publishing, from setting up a journal website to operational tasks such as the author's submission process, peer
critique, editing, publication, archiving, and indexing of the diary. OJS also help to manage the people aspects
of organizing a journal, including keeping track of the work of editors, reviewers, and authors, notifying readers,
and assisting with the correspondence.
OJS is flexible and scalable. A single installation of OJS can support the performance of many diaries. Each
diary has its own unique URL as well as its own expression and feel. OJS can enable a single editor to oversee
all facets of a journal and the journal's website, or OJS will support an international squad of editors with
diverse responsibilities for a journal's multiple sections.
OJS supports the principle of widening access. This system is not intended only to assist with journal
publishing, but to demonstrate how the costs of journal publishing can be reduced to the point where providing
readers with "open access" to the contents of the journal may be a viable option. The case for open access is
spelled out over a wide series of articles stemming from this project, which are freely available under
Publications at the University of British Columbia Public Knowledge Project website.
OJS MANAGEMENT STRUCTURE
Editorial Process
OJS moves submissions to the journal through five steps in the editorial process, which can be handled by one
or more of the editors.
Unassigned Queue: Items begin here and are delegated to one or more editors.
Submit Review: Items undergo peer review and editorial decision.
Submission Editing: Items undergo copy editing, layout, and proofing. The submission is assigned to
an issue for publication.
Table of Contents: Items are ordered for publication and are published.
7.2 Editorial Roles
(Assigned in Academic Journal Management)
Journal Manager: Sets up the journal and staffs editorial roles (can also
serve as an Editor and other roles).
Editor: Oversees editorial process; can assign submissions to Section. Editors to see through the
Submission Review and Submission Editing; Undertakes scheduling of content and publishing of
journal.
Section Editor: Oversees Submission Review and possibly Submission, Editing for assigned
submissions.
Copyeditor: Works with submissions to improve grammar and clarity, poses questions to author on
possible errors, and ensures strict adherence to journal's bibliographic and textual style.
Layout Editor: Transforms copyedited submissions into galleys in HTML, PDF, and/or PS files in the
proper format for electronic publishing.
Proofreader: Reads galleys for typographic and formatting errors.
ISBN 1-63102-455-8
315
PKP And Its Open Journal System: An Initiative In Open Access Scholarly Environment
Figure.1
Support:A support forum and bug reporting system for technical issues can be accessed via the PKP web site. Users who
have questions about interacting with a particular journal site using OJS or that journal's policies are encouraged
to contact the journal's principal or support, listed on the PKP web site10.
CONCLUSION
When the commercial publishers are increasing the subscription prices of journals, the libraries attached to
universities, colleges and R&D institutions are finding it very difficult to subscribe the core journals to cater to
the knowledge requirements of their stakeholders. Though some e-journal consortia are in operation in India,
still access to scholarly knowledge has so many issues. In this context, it is suggested that at least one electronic
journal may be published by each university in India without duplication in subjects so that a least about 400
electronic journals can be published at this country. Since the Open Journal System helps us to publish and
manage the entire publishing process of a journal, the Academic institutions can do this without any additional
funding. The UGC, ICAR, MCI, AICTE and other higher education, regulatory bodies in India should come
forward to take up this task and insist all academic and research institutes to bring open access journals so that
the knowledge generated by the publicly funded organizations can be made available in the public web which
316
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
will bring visibility to the research findings . Further, open access journals may also bring good citations to the
research papers since it is available in the public web.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
Rathinasabapathy, G., Rajendran, L., & Arumugam, J. (2012). Electronic Journal Publishing and Open Journal
Systems: An Overview. International Conference on Eletronic Publications, 1-2 March 2012, pp.198-203.
Willinsky, J. (2006). The Access Principle: The Case for Open Access to Research and Scholarship.
Public Knowledge Project available at http://pkp.sfu.ca. (Accessed on 25/05/2015).
Wikipedia. http://en.wikipedia.org/wiki/Public_Knowledge_Project (Accessed on 25/05/2015).
Muthayan, S. (2003). Open Access Research and the public domain in South African Universities: The Public
Knowledge Project's Open Journal Systems. Paper presented at the International Symposium on Open Access and
the Public Domain in Digital Data and information for Science, UNESCO, Paris.
Willinsky, J. (2005). Open Journal Systems: An Example Of Open Source Software for Journal Management and
Publishing. Library Hi-Tech, 23(4), 504-519p.
Rathinasabapathy, G. (2011). Public Knowledge Project (PKP) and its role in Open Access Initiatives. Asian
Journal of Library and Information Science, 3(1-2), 43-50p.
German Academic Publishing (Accessed on 25/05/2015).
Fonseca, RMS. (2004). Open Journal Systems. Paper presented at ICCC 8th International Conference on
Electronic Publishing, Brasilia.
Current Science. http://www.currentscience.ac.in/csojs/index.php/index/help/view/intro/topic/000000 (Accessed
on 25/05/2015).
ISBN 1-63102-455-8
317
SURFACING A NEW PLATFORM IN MLIS: A PATHWAY OF
GEN-NEXT LIBRARY SYSTEM
Dr. Dharmendra Harit | Librarian | NIEC | Delhi | dkharit10@gmail.com
Mr. Nasim Ali | Lecture | GIMT | Noida
Mrs. Lalita Rani | Asst. Librarian | IPS | Meerut | lalita.rani@gmail.com
Abstract: Marketing management has been expansively implemented in manufacturing &
service industry for over a decade. Now a day’s marketing as an apparatus is becoming prolific
for every library & service to accomplish required goals and objectives. As we all know
marketing isused to create users, to gratify the users and to retain the user. It is the“science
of strategy” and its main objective is to make user satisfied, so it is obligatory forthe librarians
to act passionately on marketing applications. This can be done in LIS (Library & Information
Services) by using service marketing. Marketing of services in LIS can be done through
online as well as offline platform in different institutions & organizations. Telecommunications,
Information Technologies and Database Technologies have been acting as key elements in
service marketing.
Marketing of LIS plays an essential role in today’s era because of users need & demand which
can be fulfilled either by online services or reprographic services. To enhance the
marketing services in LIS at different Institutions and organizations, it is important to have
services onsubscription basis & priced publication basis.
In this paper we are trying to find out the practical solutions provided on how to employ
themarketing strategy in LIS to provide a quality based services in different libraries across
thenation. It helps to establish a positive image for the library in the community, and determine
the best way to provide a quality services to users. It also shows the relationship between
promotinglibrary services and raising the silhouette of the library.
Keywords: Service marketing, MLIS, Library Environment.
INTRODUCTION
Marketing is an incorporated progression through which organizations create values for customers and build
strong customer relationship in order to capture value from customer in return. Thus the quintessence of
marketing involves finding out what the users want, then setting out to meet those needs & wants. The
role of the librarians is to help in assessing the user’s needs and then trying to accomplish them. In order to
do this effectively librarians need to squeeze the total marketing function involving service planning and
promotion. MLIS (marketing of library and information services) is the way of planning, organizing,
promoting and distributing library products & services to create smooth connections that satisfy the library
and the users. MLIS is the process which determines the decisions and actions involved in meeting the
needs of the customers. MLIS requires watchful planning and begins with understanding the mission of the
library.
OBJECTIVE OF THE STUDY
To take an outline of Marketing of Library and Information Services(MLIS)
To study the stumbling block of MLIS
Suggesting practical solution to implement marketing strategy in LIS
RESEARCH METHODOLOGY
This is an empirical paper in which the data is collected from secondary sources such as Journals, Magazines,
Newspapers, Case studies, Hypertext etc.
318
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Marketing as a driver
In the last few years, the products and services provided by librarians have changed considerably. The
challenges to library services from changes in educational approaches, the impact of technology, new
methods for information provision and declining budgets have meant that marketing is now so basic that it
cannot be considered a separate function. It is the whole business seen from its final results that is from the
customers’ perspective. In determining new approaches, many librarians have come to appreciate the
Contribution of an application of marketing concepts, tools & techniques. Any library using marketing plan, the
4 P’s have become central to libraries. Any library using marketing techniques to develop its operations focuses
on its products or services, the price paid which may be in terms of money, time or energy. Service marketing in
particular reflecting the mutual interests of libraries and the customers they serve is being seen as a concept of
libraries to embrace. In developing and maintaining a healthy relationship, it is essential that all the users are
identified and their needs understood.
Product marketing versus service marketing
Many Organizations/Institutions know how to market products, but it is trickier to market services. Here are
some points which are necessary to understand about the differences between products and service marketing.
a) When any organization or institution is marketing a service, they are really marketing relationship and
value. This relationship and value needs to be marketed differently than if they are marketing actual
products.
b) When a buyer purchases a service, the buyer is purchasing something that is intangible.
c) Consumer’s concept of a service if often times based on just the reputation of only one single person.
Instead of building a reputation based on the quality of a number of different products, a service is
built on how well a particular person delivers on a service, such as how well a stock advisor does with
your stock portfolio.
d) It is pretty easy to compare the quality of different products. However, it is much more difficult to
compare the quality of similar services that are provided.
How to market services
Generally speaking marketing a product requires what are known as the 4 P’s – product, price, place and
promotion. Marketing a service adds three more P’s to the traditional 4 P’s – people, physical evidence and
process. Service marketing also includes marketing what is known as the service escape, which is the aesthetics
of your work place: the Outside of your work building, the inside of you work building, and the way that the
users look.
Call for MLIS
In a good library major share of the stock/facilities are kept unutilized within an organization/institution. Side by
side the views facility and the modern technology for an effective library services needs capital investments and
year to year recurring expenditure as well as capital expenditure in library. This in turns demands an effective
utilization of resources within and marketing its surplus facilities to the prospective users/buyers to compensate
the expenditure/earning. As such marketing of library services is an elite type of marketing and needs to be
handled sophisticated.
Why there is a need for MLIS?
Users eminence based requirements Dearth of necessary resources such as Infrastructure, Volumes of Text
Books, Foreign publications, Journals, Case Studies, Research Papers etc.
Maintaining relevant study materials Visibility Rising anticipation of the users in terms of quality at reasonable
prices Advantageous to library picture
Is publicity of information diverse?
There are different types of library services such as public libraries, academic libraries, workplace information
centre, advisory services, business consultancy services etc. MLIS based products and services refers to sources
of Information and knowledge contents that are available in reprographic forms or in electronic forms such as
ISBN 1-63102-455-8
319
Surfacing A New Platform In Mlis: A Pathway Of Gen-Next Library System
CD’s, e-journals, audio digital products, online publishing which is available through Internet and other private
network providers.
Stumbling Block to MLIS
Librarians from various Management & Technical Institutions do not know how to market the products of their
library in a smooth way, since they don’t know how to do it well through the use of MLIS. The following are the
points which create hurdle in promoting library and information service products.
a) Paucity of training and education: Many librarians do not promote library services well due to the lack of
training and knowledge of marketing tools and techniques. The librarians should know how to deal with the
marketing tools and techniques only then they can handle the situation.
b) Complexity: Marketing of services is a thorny problem for librarians because of their extensive range of
products and services from text books to Internet access. It becomes also very complicated because of an
enormous diverse audience that ranges from children to seniors, public officials to business tycoons,
students to faculty and many more.
c)
Scarcity of funds: Scarcity of funds is often used as a rationale not to market the library services. However,
marketing library services is not merely a matter of spending finances, promoting and advertising. It is a
subject of improving the customer’s experience of library services.
MILS & Marketing Mix
Figure1: Marketing Chakra for library and information service
The marketing mix is a muddle of 7 P’s – product, place, price, promotion, process, people & physical
evidence. The enlargement of an effective marketing strategy requires the specification of marketing mix. MLIS
requires a decisive analysis of the marketing mix to identify the nature, features, benefits and value of the
products to the users. Good library marketing will also yield by probing products offered and assessing the value
of the products to the users.
The above figure depicts a marketing chakra for Library and Information Service wherein the information
should be made available to the library and then a concrete & quality based service is provided by the library
personnel. The above information can be utilized by various Engineering & Management Institutions,
Government Officials, Research and Development officials etc.
320
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
7 P’s in Marketing Mix
7 P’s
Product
Price
Place
Promotion
People
Process
Physical Evidence
Description
The product or services in library is of course the information, reference and
ancillary services that add value such as referral services, online data base
searches, document delivery and inter library loan or subscription.
The pricing in library services involves such as journals, foreign publications,
and research papers etc. which are very costly in terms of price and not
affordable for many users. Pricing should in accordance with the quality of
the material. Patent search should be also of high cost.
Infrastructure or the place of service is essential in order to identify users and
their discrete information needs and wants. This location has an effect upon
how the library can best access their product offerings. For expansion of the
service space, library must have branches, reprographic services, online
services or electronic access, fax etc.
Promotion includes: publicity, personal representative, public relations,
advertising and sales promotion. On the basis of this promotion includes
utilizing information about general information services, and communicating
this information to the potential users.
All the users such as children to seniors, public officials to business people,
students to faculty and so on who plays a vital role in reference and
information service delivery, namely the library’s personnel
The mechanisms, procedures and flow of activities by which the reference and
information services are acquired.
The environment in which the reference and information services are
delivered that facilitates the performance and communication of the service.
SWOT Analysis
STRENGTH
Facility are available and we can think only it is
surplus for the physical stock. Reprographic/ejournal/searching/case studies/foreign publication
and expert guidance
OPPORTUNITY
There is a huge opportunity of MLIS inside the
geographical boundaries as well as outside the
geographical boundaries through the use of
Internet facility.
WEAKNESS
The market of MLIS is unexploded. There is risk
in marketing of Library and Information service.
Cost of implementation and availability of experts
in library service and managing information
technology is also very high such as patent search.
THREAT
There is a little bit threat in MLIS because IIM’s,
IIT’s, XLRI & Nirma are already marketing their
library services.
SOLUTION TO STUMBLING BLOCK
Problems in marketing of services are more critical than marketing of products because of its characteristics
such as intangibility, heterogeneity, perishability and inseparability. The problem of service in MLIS can be sort
out by creating awareness about LIS in various institutions:
MLIS will benefit the Institutes or organizations that do not have an adequate or moderate library resource for
their Institutions.
By providing quality based training to the external librarians and make them aware about the library operations
and about the handling of sophisticated information system.
CONCLUSION
As librarians we should be actively marketing and promoting our library services in Institutions. The basic aim
ISBN 1-63102-455-8
321
Surfacing A New Platform In Mlis: A Pathway Of Gen-Next Library System
of marketing is to know and understand the user’s needs and demands in order that the library is able to gratify
in an effective way. Libraries will be utilizing the web to provide services to an increasingly classy and
demanding computer user by providing admittance to the world’s wide information that users and institutions
need in a timely, expedient and evenhanded manner.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
322
“Library Services for the Disadvantaged” by H.Guruswamy Naidu, an ess ess Publication, New Delhi, India.
“Management of libraries in 21 st century” by M.Bavakutty, M. Parmeswaran, an ess ess Publication, New Delhi,
India.
“Marketing and Promotion of Library Services” by Julie Nicholas, Institute of Astronomy, University of
Cambridge, Cambridge, UK.
“Marketing Management” by Philip Kotler, Kevinlane, Keller & Mithileshwar Jha, 12 th Edition, Pearsons Prentice
Hall.
“Marketing Management” by Czinkota, Michael R, Thomson South and western, 2007 edition.
“Services Marketing-Integrating customer focus acro ss the firm” by Valarie A Zeithaml, Mary Jo Bitner, Ajay
Pandit, 4th Edition 2008, The McGraw-Hill Companies.
“Service Sector Management-an Indian Perspective” by C.Bhattacharjee. (2nd
Edition).
“Service Marketing” by Srinivasan .R, Prentice Hall of India, New Delhi, 2007 edition.
“Unlocking the library: Marketing library services” a case study approach by Janine Schmidt, University Librarian,
Australia.
ISBN 1-63102-455-8
MODELS OF INFORMATION SEEKING BEHAVIOR
Sarita Mohan | Research Scholar | Mewar University | Rajasthan | narendramohan2210@gmail.com
Dr. C. K. Sharma | Research Supervisor | Mewar University | Rajasthan | drcksharma05@yahoo.com
Abstract: The aim of this paper is to review the status of models of information behavior to
discover how they may relate one to another and, perhaps, propose an integration of the models
into a more general framework. To this end, this paper offers a view of the existing research as a
set of 'nested' models bound together by a dependency upon one another and by an increasing
concern, as we move to deeper levels, with finer and finer details of human information seeking
and searching behavior. By information behavior is meant those activities a person may engage in
when identifying their own needs for information, searching for such information in any way, and
using or transferring that information.
Keywords: Model of Information Seeking Behaviors, Wilson Model, Ervin Model, Ellis Model
INTRODUCTION
Research in information behavior has occupied information scientists, since before the term information science
was coined. We can take its origins back to the Royal Society Scientific Information Conference of 1948, when
a number of papers on the information behavior of scientists and technologists were presented. Of course, the
term information behavior was not used in the papers, which were generally about document and library use, but
the origins are clearly there. This was seven years before Hanson (of Aslib) coined the term information science
and nine years before the establishment of the Institute of Information Scientists in the U.K. the first
professional society devoted to the field.
Over the intervening period since the Royal Society conference literally thousands of papers and research
reports have been produced on user needs, information needs, and information-seeking behavior (see, for
example:. Throughout the period the one constant complaint of commentators has been that researchers have not
built upon prior research in such a way as to cumulate a body of theory and empirical findings that may serve as
a starting point for further research.
MOEL OF INFORMATION SEEKING
A number of reasons can be advanced for this situation: first, in the positivist tradition, quantitative research
methods were adopted that were inappropriate to the study of human behavior. Many things were counted, from
the number of visits to libraries, to the number of personal subscriptions to journals and the number of items
cited in papers. Very little of this counting revealed insights of value for the development of theory or, indeed,
of practice. Secondly, researchers in the field of information science seem generally to have ignored allied work
in related areas that might offer more robust theoretical models of human behavior (see Wilson for a review of
such research). Thirdly, general models of information behavior have only begun to emerge, and attract much
attention, in the past ten to fifteen years.
“Information-seeking is a special case of problem solving. It includes recognizing and interpreting the
information problem, establishing a plan of search, conducting the search, evaluating the results, and if
necessary, iterating through the process again.”
Wilson Model, 1981: Wilson's second model of 1981 is based upon two main propositions: first, that
information need is not a primary need, but a secondary need that arises out of needs of a more basic kind; and
second, that in the effort to discover information to satisfy a need, the enquirer is likely to meet with barriers of
different kinds. Drawing upon definitions in psychology Wilson proposes that the basic needs can be defined as
physiological, cognitive or affective. He goes on to note that the context of any one of these needs may be the
person him- or herself, or the role demands of the person's work or life, or the environments (political,
economic, technological, etc.) within which that life or work takes place. He then suggests that the barriers that
impede the search for information will arise out of the same set of contexts.
ISBN 1-63102-455-8
323
Models of Information Seeking Behavior
This model is shown in a simplified version (which also shows the search behaviors defined by Ellisin Figure 1 ,
below. Wilson's model is clearly what may be described as a macro-model or a model of the gross informationseeking behavior and it suggests how information needs arise and what may prevent (and, by implication, aid)
the actual search for information. It also embodies, implicitly, a set of hypotheses about information behavior
that are testable: for example, the proposition that information needs in different work roles will be different, or
that personal traits may inhibit or assist information seeking. Thus, the model can be regarded as a source of
hypotheses, which is a general function of models of this kind.
Figure 1: Wilson's information-seeking behavior model
Dervin Model 1983, 1996: Dervin's sense-making theory has developed over a number of years, and cannot be
seen simply as a model of information-seeking behavior: it is, rather, as she say '…a set of assumptions, a
theoretic perspective, a methodological approach, a set of research methods, and a practice.' designed to cope
with information perceived as, '…a human tool designed for making sense of a reality assumed to be both
chaotic and orderly.'
However, it may be preferable to use the bridge metaphor more directly and present the model as figure 2
below:
Figure 2 : Dervin's 'sense-making' model re-drawn
324
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
The strength of Dervin's model lies partly in its methodological consequences, since, in relation to information
behavior, it can lead to a way of questioning that can reveal the nature of a problematic situation, the extent to
which information serves to bridge the gap of uncertainty, confusion, or whatever, and the nature of the
outcomes from the use of information. Applied consistently in 'micro-moment, time-line interviews' such
questioning leads to genuine insights that can influence information service design and delivery.
Ellis, 1989 Cox & Hall, 1993 Model: Ellis notes that, '...the detailed interrelation or interaction of the features
in any individual information seeking pattern will depend on the unique circumstances of the information
seeking activities of the person concerned at that particular point in time' .However, it is clear that Starting must
initiate a process and that Ending must end it. It also seems reasonable to suggest that Verifying is a penultimate
stage in a process and that Extracting must follow on from specific search behavior such as Browsing. Indeed,
drawing attention to this fact, leads to the conclusion that Extracting is not information behavior of the same
kind as Browsing, or Chaining or Monitoring. It further suggests that Differentiating is also a different kind of
behavior: browsing, chaining and monitoring are search procedures, whereas differentiating is a filtering process
and extracting may be seen as an action performed on the information sources.
If these points are accepted, it is then possible to suggest a diagrammatic presentation of the model, as in Figure
3:
Figure 3: A process model based on Ellis's 'characteristics'
Thus, the models of Wilson and of Ellis are intended to function at different levels of the overall process of
information seeking and this fact is demonstrated by the ability to nest one within the other.
CONCLUSION
Ellis's work suggests that an IR system ought to provide more navigational routes for the user, providing not
only Boolean or best-match search strategies, but also the capacity to chain through citations in texts both
backwards and forwards in time, and with intelligent agents to monitor additions to the database according to,
say, the user's last search or an established profile.
Similarly, given that virtually all studies of information-seeking behavior show the importance of personal
networks, IR systems could well embody routines that would enable users to indicate their willingness to be put
in contact with others interested in the same research areas. By doing so, IR systems could become genuine
tools for collaborative work, not only within but across disciplines: the potential for this has been made real by
the development of the Internet and by modern software tools that allow the 'desk-top' to act as the interface to
the Internet and World Wide Web.
It also defined the notion of information need and summarized research on inferring the user's information need
from records of their queries, and presented the major query intent taxonomies that are in common use today.
These taxonomies are not comprehensive; they do not, for example, distinguish between ad hoc queries (spur of
the moment, or one-time) and standing queries (an information need that a user is continually interested in), but
they are referred to heavily in the literature and have helped shape thinking about query intent.
REFERENCES
[1]
[2]
[3]
325
Aguilar, Francis J. 1967. Scanning the Business Environment. New York, NY: Macmillan Co.
Aguilar, Francis J. 1988. General Managers in Action. New York, NY: Oxford University Press.
Chang, Shan-Ju and Ronald E. Rice. 1993. Browsing: A Multidimensional Framework. In Annual Review of
Information Science and Technology, ed. Martha E. Williams. Medford, NJ: Learned Information.
ISBN 1-63102-455-8
Models of Information Seeking Behavior
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
326
Choo, Chun Wei. 1998. Information Management for the Intelligent Organization: The Art of Scanning the
Environment. Second ed. Medford, NJ: Information Today, Inc.
Daft, Richard L. and Karl E. Weick. 1984. toward a Model of Organizations as Interpretation Systems. Academy
of Management Review 9, no. 2: 284-295.
Ellis, David and Merete Haugan. 1997. Modeling the Information Seeking Patterns of Engineers and Research
Scientists in an Industrial Environment. Journal of Documentation 53, no. 4: 384-403.
Ellis, David, D. Cox, and K. Hall. 1993. A Comparison of the Information Seeking Patterns of Researchers in the
Physical and Social Sciences. Journal of Documentation 49, no. 4: 356-369.
Ellis, David. 1989. A Behavioural Model for Information Retrieval System Design. Journal of Information Science
15, no. 4/5: 237-247.
Etzioni, Amitai. 1967. Mixed-Scanning: A "Third" Approach to Decision-Making. Public Administration Review
27, no. 5:385-392.
Kuhlthau, C.C., inside the search process: information seeking from the user's perspective. Journal of the
American Society for Information Science, 1991. 42: 361-371.
Kwasnik, B.H., The importance of factors that are not document attributes in the organisation of personal
documents. Journal of Documentation, 1991. 47: p. 389-398.
Pirolli, Peter and Stuart Card. 1995. Information Foraging in Information Access Environments. In Proceedings of
Conference on Human Factors in Computer Systems, CHI-95 held in Denver, Colorado, USA, p. 51-58. ACM
Press.
Paisley, W.J.I., Information needs and uses. Annual Review of Information Science and Technology, 1968. 3: 130.
Report and proceedings. In Royal Society Conference on Scientific Information. 1948. London: Royal Society,
1948
Sandstrom, Pamela Effrein. 1994. An Optimal Foraging Approach to Information Seeking and Use. Library
Quarterly 64, no. 4: 414-449.
Weick, Karl E. and Richard L. Daft. 1983. The Effectiveness of Interpretation Systems. In Organizational
Effectiveness: A Comparison of Multiple Models, ed. Kim S. Cameron and David A. Whetten, 71-93. New York,
NY: Academic Press.
ISBN 1-63102-455-8
ELEMENTS OF COLLECTION DEVELOPMENT: A
PERSPECTIVE
Madhuri Gangal | PhD, Research Scholar | Mewar University | Rajasthan | madhurigarg.09@gmail.com
Dr. S. P. Singh | Research Supervisor | Mewar University | Rajasthan | dr.satyaprakash31@yahoo.com
Abstract: The term "collection development" refers to the process of systematically building
library collections to serve study, teaching, research, recreational, and other needs of library
users. The process includes selection and de selection of current and retrospective materials, the
planning of strategies for continuing acquisition, and evaluation of collections to determine how
well they serve user needs. Overall, collection development encompasses many library operations
ranging from the selection of individual titles for purchase to the withdrawal of expendable
materials.
Keywords: Collection development, Elements of collection development, Budget.
INTRODUCTION
Collection development includes everything that goes into acquiring materials, including selection, ordering,
and payment. It is a chain of events that includes planning, administration, and control. Collection development
serves as a foundation upon which other library services are built.
A collection development policy establishes ground rules for planning, budgeting, selecting, and acquiring
library materials. These documents provide a framework for coordinated collection development program me
throughout the university libraries. In addition, these policies help the library serve the academic community.
They assist bibliographers in making not only routine selections, but also approval plan profiles and gift
acceptance decisions. With common terminology and collecting standards, bibliographers can work with greater
consistency towards defined goals.
ELEMENTS OF COLLECTION DEVELOPMENT
In order to develop, maintain and improve upon a school library media collection, the LIBRARY
MANAGEMENT COMMITTEE must be aware of the importance of the six elements of collection
development and how to implement each portion. These elements of collection development are:
Community analysis,
Policies,
Selection,
Acquisition,
Weeding,
And Evaluation.
The Library management committee is responsible for providing the community with an unbiased, objective
collection that is stimulating, learning oriented, and age appropriate. The LIBRARY MANAGEMENT
COMMITTEE must support the needs of the community as well as the direct needs of the students and staff.
COMMUNITY ANALYSIS
Library management committee should always be aware of the state of the community. Staying abreast of
current political and social issues within the community will assist the LIBRARY MANAGEMENT
COMMITTEE when addressing the changing dynamics of the population as well as adapting the collection
accordingly. Understanding the location, income level and diversity will allow the LIBRARY MANAGEMENT
COMMITTEE to focus on collection areas that may be weak or need to be weeded. Community analysis also
allows the LIBRARY MANAGEMENT COMMITTEE to connect with the students on a more personal level as
ISBN 1-63102-455-8
327
Elements of Collection Development: A Perspective
well as show the parents in the community the dedication and commitment on the part of the Specialist.
Community analysis is an on-going process.
POLICY IMPLEMENTATION, EVALUATION, AND REVISION
These policies will support and justify the development of the collection and must be approved legally through
the Board. In addition to establishing a connection with the community, establishing a policy for selection,
acquisition and evaluation is also necessary. The committee must develop policies that include what sources are
appropriate for selection, when and how much to weed, the “official stance” on intellectual freedom, censorship,
copyright issues, and Internet use. These policies should be reevaluated yearly to maintain the accuracy and
dependability of the collection. At the same time, these policies must remain accessible to the community and
administration for perusal and if necessary, adjustment.
State specifically who will review and update the policy and when it is to be done.
The last item on the policy should be the official record of implementation.
SELECTION
The selection process in collection development will be supported by the Library Management Committee
policies, but the procedures must also be created and adhered to. The Library Management Committee is
responsible for developing, maintaining, and improving upon the collection for the benefit of the learning
community. It is necessary to be objective and provide materials that reinforce Intellectual Freedom. Selection is
not always a “one woman” job. By developing positive relationships with the staff, students and community, the
Library Management Committee will be able to benefit from the expertise of teachers, the needs of the
curriculum and the wants of the students. The selection process includes from where the items will be selected,
what is the criteria for selection, how the items will conform to intellectual freedom, the objectives of the school
and school library, and the reevaluation of materials.
ACQUISITION
After selecting age appropriate, positively reviewed items for a collection, must acquire these items into the
collection. This step in the process is limited by budget restraints and possibly state or county level policies. In
some cases, bulk book orders may be placed through a specific book jobber who processes the materials, saving
time and money. In some counties, these orders are requested to be compiled by a certain point in the school
year, ideally in time for the students of the current year to use the materials. Again, based upon budget, funds
from fundraising and small accounts, materials can be purchased throughout the year directly from acquisition
sources such as individual catalogs, Amazon, and Barnes & Noble. If possible, when teachers make requests,
sometimes it is possible to purchase these items immediately to reinforce the efficiency and commitment of the
library. It is also important, if not available through the county, to purchase supplies for processing books within
the media center. In many cases, however, the county will have a consistent, standardized manner in which to
process books and link to the circulation system.
Collection Development In Relation To Selection And Acquistion: Ifidon (1996) opines that a focused,
positive, and consistent collection development strategy is a necessity for any meaningful library development.
Librarians engaged in selection must answer the following questions:
Who are the library's patrons?
Is the library to serve only those who actually come to it today or should the librarian attempt to provide
for all those who may come some day?
The librarian must also ensure that no race, nationality, profession, trade, religion, school of thought, or
local customer is overlooked during selection. The collection is built according to the policy, and patrons’
demands must also be considered.
Materials should meet high standards of quality in content, expression, and format. On the other hand, the
selector should not hesitate to acquire a mediocre book that will be read in preference to a superior book that
will not be read. The quality of materials must be related to the other two basic standards of selection , which are
purpose and need. The library performs a variety of roles, which in turn demands a variety of materials.
328
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
WEEDING
Collection development also includes the “deconstruction” of the media. That is, it is necessary to remove items
from the collection that are no longer needed, up to date, worn out, smelly or just not used. Due to limited time,
space and budget, weeding could be a process to follow throughout the year but better yet, after inventory.
Keeping track of circulation and curriculum needs, it is possible to remove items that are no longer used or
needed. At the same time, items will not circulate if they are not appealing in look and smell. In general, a
collection can be weeded of 5% of the total collection. This may not seem like much when faced with an
outdated collection, but the shelves cannot be bare. An individual who is aware of the use and circulation of the
items as well as the needs of the students/staff should complete weeding. The public and staff do not need to be
made aware of the weeding process, necessarily. The committee should, however, maintain a weeding policy
including criteria and procedures. This policy may state that the circulates collection areas and focuses on one
section at a time. In some scenarios, however, spot-checking areas will keep the collection looking new and
appealing.
EVALUATION
Evaluating the items in the media center is important to maintaining a collection that will be inviting and useful.
The learning community must have confidence in the collection and depend upon it. If the selection process is
not developed with the assistance of the staff and students, there is a risk that the items may not be as
appropriate or valuable as the LIBRARY MANAGEMENT COMMITTEE intends. Establishing an evaluation
process once the items are introduced into the collection is an important step in maintaining an effective
collection. The process may include requesting the staff and students to fill out evaluation forms. In all likely
hoods, monitoring the circulation and being aware of the interest in the items will provide the most feedback.
Mission statement: This may include the mission of the parent organization as well as that of the library.
A vision statement may also be included along with long- and short-term goals and any relevant
objectives related to information resources.
Audiences and purposes of the policy: The purpose should discuss library management, planning,
accountability, and consistency. To who is the policy addressed? Staff? Board? Users? Community
officials and politicians? Administration? All of these? Be specific about the primary audience as well as
identifying other possible readers of the policy.
Community and user groups defined: What are the characteristics of the library's user community?
What are the educational levels? Use demographic and other factual and statistical information to define
the library's community or institution. Which groups do or do not use the library? For what purposes do
they use the library? What are their occupations or disciplines of interest?
Description of the types of programs or patron's needs: What educational, recreational, social, or
research needs must be met by the library? Are there programs or distinct requirements for special needs
populations?
Brief general description of the collections and information resources: In general, provide a
description of the collections: their size, primary formats, languages, and reading or information level. At
what rate are they growing or are they being maintained at a stable size?
Cooperative or collaborative collection development issues: Make a statement with regard to other
libraries and access to remotely held information resources in electronic, print, or other formats. Do
interlibrary loans, Internet access, or patron direct accesses to other collections have an effect upon the
collection management of the library? If the library participates in specific collaborative activities,
interlibrary loan services or other consortia arrangements, these should be addressed here.
If the library committee is aware of and implements the six elements of collection development, the learning
community will be assured of the dependability and quality of the media center materials. By providing the
community with accessible and effective materials, will also be able to promote reading and information literacy
due to the established positive relationships within the community and administration. Collection development,
although only one role of the committee, is quite possibly the anchor to developing a worthwhile media
program.
ISBN 1-63102-455-8
329
Elements of Collection Development: A Perspective
BUDGETING AND COLLECTION DEVELOPMENT
For a budget to be successful, it must be directive. It must be based on a plan so that there is value for the money
spent. Money available for collection development is always very limited. The collection development policy
considers the focus of the library, the clientele, and the organization it serves. The reverse is the case where
acquisitions are at the mercy of the institutional director, or the founder, in the case of a private institution. In
order for the collection development librarian to defend expenditures for library materials, there must be a guide
to assist his decision making process. Human and material resources must not be wasted; hence, the collection
development policy also serves as a training manual for new library staff. Determining why scarce resources
should be spent on item"A" instead of "B" is not an easy task. A collection development policy can help bring
order out of chaos.
CONCLUSION
Collection development is a planned, continuous, and cost effective acquisition of quality, relevant materials to
meet the needs of users and the objectives of the library. Collection development is not only growth in volumes
and titles but in the quality of acquired materials in enhancing effective information delivery. It is only from this
perspective that the word "development" could be meaningful in relation to collection development.
REFERENCE
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
330
Buckland, John E. (1963). Planning the University Library Building: a summary of discussions by Librarians. New
York: Columbia University.
Carter, M. Duncan (1974).Building Library Collections. 4th Ed. Princeton, New Jersey: Princeton University
Press.
Cutter, Charles A. (1978) Rules for a Dictionary Catalogue. 4th Ed. Washington: Government Printing Office. p.
43.
Gardner, Richard K. Library Collections: Their Origin, Selection and Development. New York: McGraw-Hill
Book Company, 1981. Quoted in Gorman, G.E. and B.R.
Howes. Collection Development for Libraries. Topics in Library and Information Studies. London; New York:
Bowker-Saur, 1989.
Mount, Ellis. Special Libraries and Information Centers: An Introductory Text, 3rd ed. Washington, DC: Special
Libraries Association, 1995.
Organization of Collection Development. Systems and Procedures Exchange Center, Kit 207. Washington, DC:
Association of Research Libraries, April 1995.
Ochai, A. (2001). Collection Development in Nigeria Libraries: Problems and Prospectsin Olanlokun, S. O. and
Salisu, T. M. Libraries and Librarianship in Nigeria : A Festschrift for Ezekiel Bejide Bankole, Lagos, Ikofa Press,
2001, p. 62
Stephanie Greene/SLM 506/ July 2004
ISBN 1-63102-455-8
EXCHANGE OF META DATA: A CONCEPT TOWARDS
FUTURE
Bikramaditya Barman | University of science and technology | Meghalaya |
barmanbikramaditya215@gmail.com
Abstract: In the technological age information explosion, formation of subjects makes the world
more complex. Change is the law of nature. Meta data is the way of understanding information
.Generally speaking; Meta data is data about data. The main purpose of metadata are Asset
portrayal, Data recovery ,Administration of data ,Rights administration, proprietorship and
genuineness Interoperability and e-trade .This paper will explained about purpose of metadata,
Responsibility of metadata, Three Principles of Meta data, Structuring Metadata, Creation Tools
of Meta data, Metadata Quality Control, Interoperability and Exchange of Metadata, Future
Directions of Meta data.
Keywords: Meta data, Dublin Core, WWW.
INTRODUCTION
As per the first very broad definition, the metadata is such information, which portrays other information or
gives data about this information. Thus, for instance, letters or characters in content are information. The
quantity of letters in content is the metadata, which can be likewise portrayed as the extra data about the
"source" information.
In the event that a narrower sense is inferred and the term is utilized as a part of association with document
sorts, the metadata implies, for instance, such data as the name and the title of a record, its creator, decisive
words to the substance of a document or the date of the sparing. At that point metadata or meta-data can be
described in such a route, to the point that it is spared in a record, however when in doubt is not obvious at the
first sight when somebody opens the document in application programming. Likewise at the printing of record
substance (for instance, of an archive) on paper most metadata gets to be lost. As this ordinarily does not happen
at the exchange of the records, they can go on more data than their creator really needs to uncover.
Then again, an undeniable beneficial outcome of metadata in records is: they permit indexing and perusing of
information clusters as per certain general criteria in a less difficult and more exact way.
PURPOSE OF META DATA
Planning of address notes for the postgraduate understudies at City University a day or two ago got me to
pondering the reasons of metadata. When I composed Metadata for Information Management and Retrieval a
couple of years prior, I thought of five reasons of metadata. However as far back as 1998 Gilliland-Swetland
discussed "metadata identifying with the organization, accessioning, safeguarding, and utilization of
accumulations". She had concentrated on the reasons of metadata. The option is to order metadata components
as indicated by what they are about as opposed to what they are utilized for. The reasons methodology considers
numerous reasons of metadata and can apply to measures (e.g. Dublin Core and PREMIS) or to individual
information components (e.g. dc.identifier and dc.rights). The five reasons of Metadata are:
Asset portrayal
Data recovery
Administration of data
Rights administration, proprietorship and genuineness
Interoperability and e-trade
These reasons for existing were in light of a comprehension of the fundamental courses in which metadata was
being a couple of years back and suspecting the ascent in e-business and e-government.
Around then the greater part of the examination about Web 2.0 was centered around the semantic web. From
that point forward the dialog has proceeded onward to interpersonal interaction, with the ascent of
ISBN 1-63102-455-8
331
Exchange Of Meta Data: A Concept Towards Future
administrations, for example, FaceBook, Twitter and LinkedIn. This requires a reevaluate of the reasons of
metadata and the accompanying altered rundown speaks to my present considering:
Resource Depiction and Distinguishing Proof: the structure and presence of data assets. Incorporates
identifiers and utilized as a part of utilizations, for example, lists, RFID codes, book and article
numbering (DOIs and ISBNs). Legitimacy of things may likewise be built up with this sort of metadata
Retrieval and Dissemination: the most natural reason for metadata to make an asset discoverable.
Ordinarily incorporates indexing and categorisation (characterization) information. Principles, for
example, Dublin Core concentrate principally on this reason as does a ton of the metadata utilized by
institutional stores. Can likewise be utilized proactively to disperse or spread data to target groups of
onlookers.
Preservation and Retention: any material or data asset in an accumulation whether it be physical or
electronic needs to be saved and held in a controlled manner on the off chance that it is to be accessible
and usable by its target group. Some metadata principles, for example, PREMIS are about safeguarding
of electronic assets, while in different guidelines, particular information components are utilized to
manage protection issues.
Users and Specialists: this is metadata about clients (e.g. gathering of people), and dealing with the use
of an asset –e.g. credit of materials by a library (flow control). This can likewise be utilized for figuring
out who has admittance to an asset – where security or classifiedness are contemplations
Ownership and Rights: responsibility for property rights is vital for business frameworks, for example,
iTunes where electronic assets are made accessible for an expense. This gives a method for guaranteeing
that all components in the production network get paid. It is additionally utilized for catching rights
articulations, for example, protected inn
RESPONSIBILITY OF METADATA
A vital explanation behind making elucidating metadata is to encourage revelation of applicable data.
Notwithstanding asset disclosure, metadata can help arrange electronic assets, encourage interoperability and
legacy asset mix, and give advanced recognizable proof, and bolster documenting and conservation.
Asset Discovery: Metadata serves the same capacities in asset revelation as great recording does by
permitting assets to be found by pertinent criteria;
distinguishing assets;
uniting comparative assets;
recognizing divergent assets; and
giving location information.
Organizing Electronic Resources: As the quantity of Web-based assets develops exponentially, total locales or
entryways are progressively valuable in sorting out connections to assets taking into account crowd or point.
332
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Such records can be assembled as static website pages, with the names and areas of the assets "hardcoded" in
the HTML. Notwithstanding, it is more proficient and progressively more normal to manufacture these pages
powerfully from metadata put away in databases. Different programming apparatuses can be utilized to naturally
separate and reformat the data for Web applications.
Interoperability: Depicting an asset with metadata permits it to be seen by both people and machines in ways
that advance interoperability. Interoperability is the capacity of numerous frameworks with distinctive
equipment and programming stages, information structures, and interfaces to trade information with negligible
loss of substance and usefulness. Utilizing characterized metadata plans, imparted exchange conventions, and
crosswalks between plans, assets over the system can be sought all the more consistently.
Two ways to deal with interoperability are cross-framework pursuit and metadata gathering. TheZ39.50
convention is generally utilized for cross-framework look. Z39.50 implementers don't impart metadata yet
outline own pursuit abilities to a typical arrangement of hunt traits. A differentiating methodology taken by the
Open Archives Initiative is for all information suppliers to make an interpretation of their local metadata to a
typical centre arrangement of components and uncover this for gathering. A pursuit administration supplier then
assembles the metadata into a predictable focal record to permit cross-store looking paying little mind to the
metadata configurations utilized by taking part archives.
Digital Identification: Most metadata plans incorporate components, for example, standard numbers to
interestingly recognize the work or article to which the metadata alludes. The area of an advanced item might
likewise be given utilizing a record name, URL (Uniform Resource Locator), or some more persevering
identifier, for example, a PURL (Persistent URL) or DOI (Digital Object Identifier). Relentless identifiers are
favoured because object areas regularly change, making the standard URL (and hence the metadata record)
invalid. Notwithstanding the real components that indicate the article, the metadata can be joined to act as an
arrangement of recognizing information, separating one item from another for approval purposes.
Archiving and Preservation: Most present metadata endeavours base on the revelation of as of late made
assets. Then again, there is a developing worry that advanced assets won't make due in usable structure into
what's to come. Computerized data is delicate; it can be debased or adjusted, deliberately or accidentally. It may
get to be unusable as capacity media and equipment and programming advancements change. Group movement
and maybe imitating of current equipment and programming conduct in future equipment and programming
stages are systems for defeating these difficulties.
Metadata is vital to guaranteeing that assets will survive and keep on being open into what's to come.
Chronicling and safeguarding oblige exceptional components to track the ancestry of an advanced article (where
it originated from and how it has changed over the long run), to detail its physical attributes, and to report its
conduct keeping in mind the end goal to imitate it on future innovations.
Numerous associations globally have dealt with characterizing metadata plans for advanced protection,
including the National Library of Australia, the British Cedars Project (CURL Exemplars in Digital Archives),
and a joint Working Group of OCLC and the Research Libraries Group (RLG) .
The recent gathering built up a structure laying out sorts of presentation metadata. A subsequent gathering,
PREMIS (Preservation Metadata: Implementation Strategies)— additionally supported by OCLC and RLG—is
building up a situated of centre components and techniques for the encoding, stockpiling, and administration of
safeguarding metadata inside a computerized conservation framework.
Large portions of these activities are taking into account or perfect with the ISO Reference Model for an Open
Archival Information System (OAIS).
Several Types: Notwithstanding the content archives, metadata can be additionally contained, for instance, in
music records, feature documents, photographs or html pages. In music documents, among the rest, it is the data
about a craftsman and a title or unique labels. In features it incorporates, for instance, record time, size and
picture rate. In photographs metadata is frequently spared as picture data in Ex if or IPTC position. Metadata in
ISBN 1-63102-455-8
333
Exchange Of Meta Data: A Concept Towards Future
HTML pages (page title, watchwords to the page contents etc.) is utilized to demonstrate pages in the outcome
arrangements of web crawlers.
The accompanying diagram concerns just the utilization of metadata in Microsoft Office records and in PDF
archives. At that the three Office applications – Word, Excel and PowerPoint will be considered.
Three Principles of Meta data
There are three principle sorts of metadata:
Descriptive metadata portrays an asset for purposes, for example, disclosure and distinguishing proof. It
can incorporate components, for example, title, dynamic, creator, and keywords.
Structural metadata demonstrates how compound items are assembled, for instance, how pages are
requested to shape parts.
Administrative metadata gives data to help deal with an asset, for example, when and how it was made,
record sort and other specialized data, and who can get to it.
STRUCTURING METADATA
Metadata plans (additionally called pattern) are sets of metadata components intended for a particular reason, for
example, depicting a specific kind of data asset. The definition or importance of the components themselves is
known as the semantics of the scheme. The qualities given to metadata components are the substance. Metadata
plots by and large determine names of components and their semantics. Alternatively, they may indicate
substance rules for how content must be planned (for instance, how to distinguish the fundamental title),
representation rules for substance (for instance, capitalization rules), and passable substance values (for
instance, terms must be utilized from a predetermined controlled vocabulary).
There may likewise be language structure rules for how the components and their substance ought to be
encoded. A metadata plan with no recommended punctuation standards is called linguistic structure free.
Metadata can be encoded in any perceptible punctuation. Numerous present metadata plans use SGML
(Standard Generalized Mark-up Language) or XML (Extensible Mark-up Language). XML, grew by the World
Wide Web Consortium (W3C), is an expanded type of HTML that takes into account provincially characterized
label sets and the simple trade of organized. data. SGML is a superset of both HTML and XML and considers
the wealthiest imprint up of an archive. Helpful XML instruments are getting to be broadly accessible as XML
assumes an inexorably vital part in the trading of a mixed bag of information on the Web.
Metadata Schemes and Element Sets: A wide range of metadata plans are being produced in a mixed bag of
client situations and orders. The absolute most basic ones are examined in this area
Dublin Core: The Dublin Core Metadata Element Set emerged from examinations at a 1995 workshop
supported by OCLC and the National Centre for Supercomputing Applications (NCSA). As the workshop was
held in Dublin, Ohio, the component set was named the Dublin Core. The proceeding with advancement of the
Dublin Core and related determinations is overseen by the Dublin Core Metadata Initiative (DCMI).
The first goal of the Dublin Core was to characterize a situated of components that could be utilized by creators
to portray their own particular Web assets. Confronted with an expansion of electronic assets and the failure of
the library calling to inventory every one of these assets, the objective was to characterize a couple of
components and some basic decides that could be connected by non cataloguers. The first 13 centre components
were later expanded to 15: Title, Creator, Subject, Description, Publisher, Contributor, Date, Type, Format,
Identifier, Source, Language, Relation, Coverage, and Rights.
The Dublin Core was created to be straightforward and brief, and to portray Web-based records. Then again,
Dublin Core has been utilized with different sorts of materials and in applications requesting some
unpredictability.
334
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
CREATING METADATA
The response to this differs by order, the asset being depicted, the apparatuses accessible, and the normal result,
yet it is quite often a helpful exertion.
Much essential auxiliary and managerial metadata is supplied by the specialized staff who at first digitize or
generally make the advanced question, or is created through a computerized methodology. For graphic
metadata, it is best in a few circumstances if the originator of the asset gives the data. This is especially valid in
the documentation of investigative datasets where the originator has critical comprehension of the reason for the
dataset and the uses to which it could be put, and for which there is little if any text based data from which an
indexer could work.
In any case, numerous tasks have discovered that it is more effective to have indexers or other data experts make
the elucidating metadata, in light of the fact that the creators or inventors of the information don't have sufficient
energy or the abilities. In different cases, a blend of analyst and data expert is utilized. The specialist may make
a skeleton, finishing the components that can be supplied most promptly. At that point results may be
supplemented or assessed by the data master for consistency and agreeability with the mapping punctuation and
nearby rules.
Creation Tools of Meta data: Numerous metadata venture activities have created apparatuses and made them
accessible to others, sometimes free of charge. A developing number of business programming instruments are
additionally getting to be available. Creation apparatuses fall into a few classes:
Templates permit a client to enter the metadata values into preset fields that match the component set
being utilized. The layout will then produce a designed arrangement of the component properties and
their relating qualities
Mark-up instruments will structure the metadata qualities and qualities into the predetermined outline
dialect. The vast majority of these instruments produce XML or SGML Document Type Definitions
(DTD). A few formats incorporate such an imprint up as a major aspect of their last interpretation of the
metadata.
Extraction apparatuses will naturally make metadata from an investigation of the advanced asset. These
apparatuses are for the most part restricted to printed assets. The nature of the metadata separated can
differ essentially taking into account the apparatus' calculations and in addition the substance and
structure of the source content. These apparatuses ought to be considered as a guide to making metadata.
The subsequent metadata ought to dependably be physically checked on and altered.
Conversion apparatuses will make an interpretation of one metadata organization to another. The
similitude of components in the source and target arrangements will influence how much extra altering
and manual information of metadata may be needed.
Metadata apparatuses are by and large created to bolster particular metadata compositions or component sets.
The sites for the specific construction will regularly have connections to imp
METADATA QUALITY CONTROL
The production of metadata consequently or by data originators who are not acquainted with classifying,
indexing, or vocabulary control can make quality issues. Compulsory components may be missing or utilized
inaccurately. Outline punctuation may have slips that keep the metadata from being prepared accurately.
Metadata content phrasing may be conflicting, making it hard to find important data.
The Framework of Guidance for Building Good Digital Collections, accessible on the NISO site, verbalizes six
standards applying to great metadata:
Good metadata ought to be suitable to the materials in the accumulation, clients of the gathering, and
planned, present and likely utilization of the advanced article.
Good metadata underpins interoperability.
Good metadata utilizes standard controlled vocabularies to mirror the what, where, when and who of the
substance.
ISBN 1-63102-455-8
335
Exchange Of Meta Data: A Concept Towards Future
Good metadata incorporates a reasonable articulation on the conditions and terms of utilization for the
advanced item.
Good metadata records are items themselves and in this way ought to have the characteristics of
achievability, diligence, special ID, and so forth. Great metadata ought to be legitimate and obvious.
Good metadata bolsters the long haul administration of items in accumulations. There are various
continuous endeavours for managing the metadata quality test:
Metadata creation instruments are being enhanced with so many highlights as formats, pick records that
utmost the determination in a specific field, and enhanced acceptance rules.
Software interoperability programs that can robotize the "crosswalk" between distinctive outlines are
consistently being produced and refined.
Content originators are by and large formally prepared in comprehension metadata and controlled
vocabulary ideas and in the utilization of metadata-related programming instruments.
Existing controlled vocabularies that may have at first been intended for a particular utilization or a
restricted group of onlookers are getting more extensive utilization and mindfulness. For instance, the
Content Types and Subtypes initially characterized for MIME email trade are ordinarily utilized as the
controlled rundown for the Dublin Core Format component.
Communities of clients are creating and refining gathering of people particular metadata patterns,
application profiles, controlled vocabularies, and client rules.
INTEROPERABILITY AND EXCHANGE OF METADATA
A few individuals ask: Do we require such a large number of metadata measures? With all the metadata
standards, initiatives, augmentations, and profiles, in what manner can interoperability be guaranteed? It is
essential to recall that diverse plans serve particular needs and crowds. Reciprocal plans can be utilized to
portray the same asset for numerous reasons and to serve various client bunches. For instance, a specialized
report could have a MARC metadata set in a library's online list, a FGDC portrayal as a feature of the National
Spatial Data Infrastructure. C l e a r i n g h o u s e Mechanism, and an implanted arrangement of Dublin Core
components. The Resource D e s c r i p t i o n Framework (RDF), grew by the World Wide Web Consortium
(W3C), is an information model for the depiction of assets on the Web that gives an instrument to incorporating
different metadata plans. In RDF a namespace is characterized by a URL indicating a Web asset that portrays
the metadata conspire that is utilized as a part of the portrayal. Various namespaces can be characterized,
permitting components from distinctive plans to be joined in a solitary asset depiction. Various depictions, made
at distinctive times for diverse purposes, can likewise be connected to one another. RDF is by and large
communicated in XML.
FUTURE DIRECTIONS OF META DATA AND CONCLUSION
Most early metadata principles have concentrated on the clear components required for revelation, ID, and
recovery. As metadata activities created, managerial metadata, particularly in the rights and safeguarding
regions was further stressed. Specialized metadata is one territory that still does not get much consideration in
metadata patterns. The successful trade also, utilization of the advanced items depicted by the metadata
regularly obliges information of particular specialized parts of the items past its filename and sort. More up to
date benchmarks are starting to address this need. The NISO/AIIM standard, Z39.87, Data Dictionary—
Technical Metadata for Digital Still Images, concentrates exclusively on the specialized information expected to
encourage advanced picture documents. The metadata components characterized in the standard spread essential
picture parameters, for example, pressure and shading profile, data about the hardware and settings utilization to
make the picture, and execution appraisal information, for example, examining recurrence and shading maps.
Metadata work is continuous over various models advancement associations. In the Worldwide Organization for
Standardization (ISO), a subcommittee of Technical Committee (TC) 46 (Information and documentation), is
tending to metadata advancement for bibliographic applications. ISO TC 211 (Geographic data/ Geomatics) is
creating metadata principles for applications in geographic data frameworks. The Data administration and trade
subcommittee of ISO-IEC JTC1 (Information innovation) is creating principles for the determination and
336
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
administration of metadata and has as of late issued a specialized provide details regarding Procedures for
accomplishing metadata registry content consistency (ISO/IEC 20943).
Numerous associations that created metadata details outside the formal models group are trying to have their
particulars transformed into worldwide measures. The Dublin Center is an illustration of this methodology. It
was initially grown in 1995 at a workshop supported by OCLC and the National Center for Supercomputing
Applications. In 2001, it turned into an authority ANSI/NISO standard (Z39.85) and in 2003 Dublin Core was
issued as a global standard (ISO 15836).
The World Wide Web Consortium's (W3C) metadata movement has been consolidated into the Semantic Web,
their drive to "give a typical system that permits information to be imparted and reused crosswise over
application, venture, and group limits." The RDF system is one of the key empowering measures. The Semantic
Web endeavours are coordinated to guidelines that expand the interoperability of metadata, instead of particular
metadata constructions.
The World Wide Web has made an upset in the availability of data. The advancement and use of metadata
speaks to a significant change in the way data can be found and utilized. New advances, measures, and best
practices are consistently progressing the applications for metadata. The assets in the accompanying area will
issue you a head begin in following improvements and contain connections to more data on the undertaking
talked about all through this record.
REFERENCE
[1]
[2]
[3]
[4]
[5]
Bedard, Y.Merret, T., Han, J, (2001) .Fundamentals Of Spatial Data Warehousing for Geographic Knowledge
Discover.Geographic.Taylor & Franeis, pp 53-73.
Damiani, M., Spaccapietra, S, (2006) .Spatial Data Warehouse Modeling. Processing and Managing Complex data
for decision support. Idea group, pp 21-27.
Bazhrer R, A.N.M &Anwar H(2012) .Challenging issues of Spatiotemporal data mining. Journal of Computer
Engineering and Intelligent Systems, pp 1-10.
Haritha Genel Komutanligi, Kartrgvafya Dairesi, (2002).Design of Spatial Data Warehouse based on an Integrated
Non-Spatial Database and Geo Spatial Information. International Symposium on
Nipen G &Surabhi M,(2011).Spatial Data warehouses-A survey wwwusers.cs.umn.edu.
ISBN 1-63102-455-8
337
TOTAL QUALITY MANAGEMENT IN ACADEMIC
LIBRARY
Kanupriya | Assistant Librarian | Lingaya’s LDIMS | Delhi | kanupriya275@gmail.com
Khurshid Anwar | Librarian | Lingaya’s LDIMS | Delhi | anvarkhurshid@gmail.com
Dalip Singh | Sr. Technical Writer | Birlasoft India Ltd | dalip.singh@birlasoft.com
Abstract: Total quality management is an approach that an organization takes for improving its
performance on systematic and continuous basis. This is achieved by involving all employees
throughout the organization in satisfying all requirements of every customer, whoever the
customer may be either external or internal. Quality Management is the basis for library
management in general. Such principles of TQM as meeting the Customer needs, exact
assessment, continuous improvement, team work and enthusiasm of the leaders are typically for
library services. This paper focused on TQM in academic library and information centre.
Keywords: TQM, Academic library, ISO, Management, Quality.
INTRODUCTION
The academic library has been described as the “heart” of the learning community, providing a place for
students and faculty to do their research and advance their knowledge. The librarians and library staff provide
numerous services to these users, addressing their diverse needs, characteristics and interests. However, with the
advent of online catalogs, CD-ROMs, online databases, other electronic resources, new methods of document
delivery, and access to information, the role of the academic library has begun to change. Students do not have
to be physically present in the library in order to access the library’s resources. With the internet and the
availability of new technologies and numerous indexes, abstracts and database, the range of services that
academic libraries can provide has increased dramatically. Users can access the libraries resources, without
stepping into the library building. They can also very easily access other libraries resources, such as online
catalogs and unrestricted databases. The internet has opened the resources of libraries to students and faculty
worldwide.
QUALITY
Quality is often used synonymously with excellence. However, for proper quality Management, defining quality
and its measurement are essential. Quality has been defined variedly in different contexts. There is wide range
of definitions or Approaches to quality, describing the relative nature of the concept in the context of higher
education.
Some of the definitions are discussed here Green and Harvey (1993) identified five different approaches to
quality in higher education. These are, quality:
In terms of exceptional (high standards);
In terms of consistency;
As fitness for purpose (meeting stated purposes);
As value for money; and
As transformative (transformation of the participant).
Libraries have always been committed to provide a high quality of services to its users. In the past, consuming
more resources, buying more books, and moving to large premises are considered as improving quality. But that
approach is not valid today. One of the good solutions to improve quality is to provide right information to a
right user at right time. This requires a through change in the approach – an approach based on user
requirements and user satisfaction. It is believed that this can be achieved by implementing TQM. Thus, TQM
approach is slowly getting popular in today's libraries
338
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
What is quality: Meaning of quality is the satisfaction of the customer through product or by providing
services. The customers in the academic library are the user like scholars, researcher and regular students. Here
the customer is the part of the academic community. India’s University Grants Commission (UGC) has setup
NAAC (National Accreditation and Assessment Council). NAAC conducts audits and inspections on the quality
of service provided by educational institutions, and the library service including part of it. Sanctions of grants
are dependent an outcomes of these assessments. In light of this, academic libraries must develop its work
culture, philosophies and strategies for enhancing quality.
The primary function of an academic library is to support the teaching, research and other academic programs
of its parent organization. An academic library is the part to serve an organization which delivers products in
person to its clients.
Managing Quality in an Academic Library: - In a service organization like and academic library, customer
satisfaction means fulfilling expectations. Librarians must find out what readers want and they should
concentrate upon providing it. Designing an appropriate service means asking
Who are the customers?
What do they want?
What can the organization provide?
In a library there are basically two types of customers those who are in hurry and those who want to kill time.
An academic library has to identify these and search them accordingly.
ISO 9000 series steps towards TQM academic library: ISO 9000 has an internationally accepted certificate
that accredits an organization for its quality management systems and procedures. ISO 9004-2:1992 has
guidelines for services and was issued ISO to establish and implement a quality system within a service
organization such as an educational institution.
TQM In Libraries: Among the service industries such as Airlines, Banking institutions, Insurance companies
and Health care providers, Libraries are the last to adopt TQM practices. For a long time, Librarians saw
themselves as keepers of knowledge rather than active agents in information transfer. Though the main
aim/objective of libraries is to satisfy the users, the library professionals often forget that. But today's libraries
are pushed to a position where they have to provide quality services to its users, to justify their existence. So,
now libraries are also started adopting TQM practices following other kinds of service industries.
Quality Concept in Library Services: The library is an organization to offer reference and information
services to its users. Library service is the combination of the services- process and its delivery? In a library, the
service offered from Acquisition section, technical section, maintenance section etc. are the processes carried
out There and thereafter delivered to the users. The quality should start from the acquisition section, which
should be carried uniformly to circulation section? Auser who had an unpleasant experience from the library
will tell it to many people, but a good experience will be told to very few. Therefore it is very necessary for
librarian to understand the users, what they want, how they want, and when they want the documents and
information.
The quality of a library may be determined on the basis of resources, capability and utilization, whereas value is
determined on the basis of utilization and beneficial effect. In Orr’s 1973 opinion ‘effectiveness’ and ‘benefits’
were closer in meaning to the ‘quality’ and ‘value’ respectively but in literature effectiveness and benefits were
having wide connotations. De Prospo 1973 described library effectiveness as a measure of library collections,
facilities and staff.
He defined four measures: 1) Benefit, 2) Effectiveness, 3) Cost Effectiveness & 4) Cost benefits.
TQM involves the management of at least five major quality check point:
ISBN 1-63102-455-8
339
Total Quality Management In Academic Library
Selection of suppliers, Vendors, Customers (Internal & External) development & maintenance of
standards, specification & communication channels with the parent organization,
Input & quality assurance,
Efficiency & effectiveness of value adding process,
Quality, cost & delivery of products & services,
the proactive assurance that your organization is meeting or exceeding customer’s needs, requirements &
wants. If any library able to manage quality of inputs, process, outputs & customers then will manage
quality into.
The system components provide the framework for formulation the definition of quality and TQM. In other
words, quality is the ability or capability of library services, products & consultation to meet the requirement of
users. Quality management is defining the library user (customer), understanding his requirements, finding out
library’s capability and in case of mismatch changing either the customer definition or capability of library
&specifying library’s requirements to university, authorities, external vendors & suppliers & internal staff. For
this measurement of quality or performance is essential.
Characteristics of TQM in Libraries:
The following characteristics can be inferred.
TQM is management philosophy to guide the libraries in meeting the challenges of the time.
TQM starts at the top management of library.
TQM calls for strategic planning based on vision, mission, goals and objectives of academic libraries.
TQM calls for everyone to be skilled and knowledgeable (HR).
TQM requires quality as a strategic priority.
TQM promote team work.
TQM focus on the users.
TQM recognize internal and external users of the library.
TQM aims to instill a “prevention not an inspection” ethic.
TQM is a process and activities based approach.
TQM emphasizes the importance of measurement through the measuring rod of user satisfaction.
TQM reduces total cost of meeting user requirements.
TQM is a disciplined, continuous and system approach.
Benefits of TQM for Academic Libraries:
340
TQM reduces bureaucracy, empower staff and create a team base culture, which is keenly desired and
suited for mechanistic, hierarchical organization structures like university libraries. Librarian’s role
becomes one of support and coaching.
TQM helps in gauging users’ needs and expectations in a proactive way and equip the librarians to
provide more and better services with the same resources efficiently ineffectively, resulting increased
user satisfaction and loyalty.
TQM is an evolutionary process and can easily be incorporated into the already existing management
system of libraries.
Brainstorming exercise helps know what functions are necessary to the efficient operation of a library
and who should perform these, resulting increased employee involvement and dedication.
Reductions in user complaint gain a competitive advantage over other information providers.
TQM help in breaking down intersectional barriers/ status in a library and promotes cooperation and
teamwork instead of competition.
In TQM, quality is a high profile management tools. Its implementation in libraries improves the image
of the library staff and helps in public relation and marketing.
TQM ensures consistent qualitative library and information services to the users and defines user
satisfaction issues.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
TQM ensures a non threatening environment for open debate for problem solving, for change, for
H.R.D., and clearly indicates power, responsibility and accountability of each employee.
Empowered staff members develop a sense of self determination; a sense of meaning; a sense of
competence; a sense of impact and become more effective innovative, transformational and charismatic.
Principles of TQM in Academic Libraries: TQM principles have been explained in details for
conceptualization in the context of academic libraries.
Continuous improvement
Customer force
Process improvement
Employee involvement
Leadership
Empowerment
Defined system
Trust
Commitment
Team building
Education and training
Organizational Learning
Innovation
Communication
Suggestion
Library Service Quality Dimensions: Zeithamal, Parasuraman and Berry (1990) identify ten dimensions of
service quality. These are adapted with changes to illustrate the dimensions or aspects of quality within library
services.
Reliability
Responsiveness
Assurance
Access
Access
Communication
TQM Principles: According to Galyani Moghaddam TQM is the application of a number of activities with
perfect synergy. The following are the most important elements of any total quality management programme:
Customer-driven quality
Top management leadership and commitment
Continuous Improvement
Fast response
Actions based on Facts
Employee Participation
A TQM culture
Continuous Improvement: American society for Quality outlined continuous improvement as ‘Continuous
improvement’ is an ongoing effort to improve products, services and processes. Among the most widely used
tools for continuous improvement is a four-step quality model-the plan-do-check-act (PDCA) cycle, also known
as Deming Cycle or Shewhart Cycle:
Plan: Identify an opportunity and plan for change.
Do: Implement the change on a small scale.
ISBN 1-63102-455-8
341
Total Quality Management In Academic Library
Check: Use data to analyze the results of the change and determine whether it made a difference.
Act: If the change was successful, implement it on a wider scale and continuously assess your results. If
the change did not work, begin the cycle again.
Other widely used methods of continuous improvement- such as six sigma, lean and total quality management
emphasize employee involvement and teamwork; measuring and systematizing process; and reducing variation,
defects and cycle times.
How to improve the quality in Library Services: In this information age it is very easy to make a quality
based library if the parent body or concerned Authority assists financially as well as collectively. It is very
necessary for the librarian and its parent body to look forward for the present and future generation to cope up
with international phenomena. A user must be educated with proper technology to use the library effectively.
He or she should have knowledge of what facilities and services are available in the library and information
centre and how to access those efficiently and effectively. To improve the service quality the user satisfaction
survey is a tool that provides both quantitative and qualitative data. It is an important part of libraries for
process and performance measurement. Main steps to measure users' satisfaction are [2]: I) Conducting sample
survey. II) Data collection. III) Process and analysis of data. IV) Interpret and present the data. V) Finding out
result. With the help of the result the librarian can take new steps for development of library. The regular survey
will enable the library to understand the changes in user's satisfaction and to plan the services accordingly
CONCLUSION
The paper concludes with an idea after perusing various literatures stating that Total Quality Management is a
way wherein it could any management for improving its effectiveness, efficiency, flexibility and
competitiveness among the libraries as a whole by making each and every employee to get involved with an
intention to improve the performance of the organization in all spheres. This eventually keeps the customers
feel happy and highly satisfied with the services offered by the organization. Libraries can also excel in its
performance by maintaining the Quality standards and conformities as prescribed in TQM Principles employing
necessary tools and techniques. In the recent years it was noted that TQM has increasingly being practiced in
libraries of developed countries for last two decades. In effect to the implementation and regular adoption of
TQM, libraries were able to establish a culture of continuous improvement and started to offer quality product
and services. Indian libraries started to practice TQM which is in the nascent stage and still expected to grow in
the years to come. REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
342
BARNARD, SUSAN B. (1998) Total Quality Management. In: Encyclopedia of Library and Information Science.
V 61, p.311- 325.
CARLEY, R. & WALDRON, M.W. (1984) Quality assurance and continuing education. Canadian Journal of
University Continuing Education, 10(1), p.53-67.
COMMONWELATH OF LEARNING (1994) Symposium on Quality Assurance in Higher Education.
Vancouver: Commonwealth Of Learning.
FRAZER, M. (1992) Quality Assurance and Higher Education. In. A.Craft (Ed.), Quality assurance in Higher
Education: Proceedings of an International Conference, Hong Kong, 1991, p.9-25.
GARVIN, D.A. (1988) Managing Quality: The Strategic and Competitive edge. New York:Freepress.
HARVEY L & GREEN D. (1993) Defining `Quality’ In: Assessment & Evaluation in Higher Education,18(1),
p.9-34.
JOHANNSEN GUSTAN CARL (1995) Quality Management Principles and Methods in Library and Information
Science theory and Practice. In: Encyclopedia of Library and Information Science, V 56, p.318-352.
NUNAN,T. & CALVERT,J.(1995) Report of the project to Investigate Quality & Standards in Distance
Education. PETER BROPHY(1993) Quality Management :University approach. Aslib Information21(6), p.246248.
TANNOCK, J.D.T. (1992) A new approach to quality assurance for Higher Education. Higher Education
Quarterly 46(1), p.108-123.
Total quality management in library and information sectors Golnessa Galyani Moghaddam
Department of Library and Information Science, Shahed University, Tehran,
Miller, R.G. and Stearns, B. (1994). Quality Management for Today's academic library, College & Research
Library News, 1994, Vol. 55
ANDALEEB, SYED SAAD, (2001). Usages of Academic Libraries: The Role of Service Quality, Resources, and
User Characteristics. Library Trends
FRAZER, M. (1992) Quality Assurance and Higher Education. In. A.Craft (Ed.), Quality assurance in Higher
Education: Proceedings of An International Conference, Hong Kong, 1991, p.9-25.
ISBN 1-63102-455-8
RADIO FREQUENCY IDENTIFICATION (RFID)
Shyam Bihari Gupta | LIA & PRO (Additional) | Intellectual Property Office | Patent Office |
Ministry of Commerce & Industry | Government of India | New Delhi
| sbiharigupta@gmail.com
Gunjan Gupta | Assistant Librarian | Rameesh Institute of Education | Greater Noida, UP
Abstract: This presentation gives an overview of the current state of the art in the radio frequency
identification (RFID) technology. Then it explores the brief introduction to the principles of the
Radio Frequency Identification technology, current and envisaged fields of application, as well as
advantages, concerns and limitations of use, comparison with the Barcodes Reader. This
presentation concludes that RFID is a viable technology with many possible applications.
However, only some of the impacts on organizations and society can be anticipated at present.
Keywords: RFID, Tag, Security System, Barcode Reader.
INTRODUCTION
RFID is only one of numerous technologies grouped under the term Automatic Identification (Auto ID), such as
bar code, optical character recognition, voice recognition, biometrics etc. Auto ID technologies are a new way
of controlling information and material flow, especially suitable for large production networks. The RFID
technology is a means of gathering data about a certain item without the need of touching or seeing the data
carrier, through the use of inductive coupling or electromagnetic waves. The data carrier is a microchip attached
to an antenna (together called transponder or tag), the latter enabling the chip to transmit information to a reader
(or transceiver) within a given range, which can forward the information to a host computer. The RFID device
serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a
unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the
information, the RFID device must be scanned to retrieve the identifying information.
WORKING METHODOLOGY OF RFID
RFID (Radio Frequency Identification) is a wireless system used to identify tags. The RFID ‘tag’ is essentially a
memory device with a means of revealing and communicating its memory contents, when prompted (scanned)
to do so. The memory consists of a plurality of binary (two state) digits, also known as bits, and the
communication comprises RF reception and transmission means. The binary data (bits) are formed into binary
words comprising typically 8, or 16 or 32 bits that can make up letters and numbers in the same manner as in
computing, the Internet and ‘texting’ on a mobile phone. The ‘tag’ may comprise an electronic circuit (printed
circuit board) with its own power supply–an active device; or be a very low power integrated circuit that is able
to gain enough energy from the scanner/reader RF signal to actually power itself for long enough to transmit the
contents of its memory–a so called passive device. In its passive embodiment RFID tag transmission power is
very low and measured in millionths of a watt i.e. microwatts, μ W. Figure 1, shows diagrammatically one of
the latter style devices, which may be found on products, particularly consumer durables.
Figure 1
ISBN 1-63102-455-8
343
Radio Frequency Identification (RFID)
The typical RFID tag portrayed in Figure 1, comprises a host substrate which is typically, but not exclusively, a
flexible plastic (polymer), with an attached flexible etched aluminum alloy, or conductive ink antenna, plus a
small (few millimeters square) attached integrated circuit connected to the antenna. The whole assembly is
typically 30 millimeters square. The data in the RFID tag memory may be pre-loaded (determined at time of
manufacture) as a Read Only Memory (ROM), or may be dynamically variable (Static Random Access
Memory) and take up the status of the last write/read cycle. The data is always read out serially so that it can be
correctly parsed. The information contained in the RFID tag memory is deliberately kept to a minimum, and
typically, dependent upon the data format (its syntax, numerical format – decimal, hexadecimal etc) requires
translating into a human readable form via a host system. Dependent upon the technology used, and in particular
its radio frequencies, RFID tags can be small enough to be humanely inserted under loose skin of animals as
with cat and dog passports.
Figure 2
COMPARISION WITH BARCODES
Compared to barcode inventory control systems RFID technology has both advantages and disadvantages, many
of which are outside of product manufacture and distribution chain applications.
344
ADVANTAGES VERSUS BARCODES
Not requiring line of sight access to be read.
The tag can trigger security alarm systems if removed from its correct location.
Automatic scanning and data logging is possible without Operator intervention.
With the right technology a plurality of tags can be concurrently read
It can be read only or read-write.
Provides a high degree of security and product authentication – a tag is more difficult to counterfeit than
a barcode.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Since each tag can be unique they can act as a security feature if lost or stolen e.g. a stolen smart travel
card can be cancelled.
The technology could be inserted within a suit so that when it is sent to the cleaners it automatically gets
the right cleaning procedure applied to it.
DISADVANTAGES VERSUS BARCODES
Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond
to simultaneous queries.
Tag collision occurs when many tags are present in a small area.
Are limited to the data printed on them and cannot be updated, other than by replacement or sticking a
label over them.
External influences such as metalwork, material dielectric properties and radio interference can constrain
RFID remote reading.
There is a high cost (long pay-back) for integrating RFID technology into existing inventory control
systems.
Poor performance with RF-opaque and RF-absorbent objects. This is a frequency dependent behavior.
The current technology does not work well with these materials and in some cases, fail completely.
EXAMPLES
Blood Banks: The RFID tag is attached with the blood label itself. The paramedic who transfuses the blood can
scan the bag before transferring. He/She typically enters the patient ID, number, or in a better system the patient
also has a wrist band RFID tag which identifies him/her uniquely. In case the wrong blood bag is scanned, the
reader can throw up a warning like this.
Warning: Blood Mismatch
Your immediate attention is required
The blood bag is for patient
The blood bag is for patient
John Smith
John Smet
Patient ID-JS1002453
Patient ID-JS1003453
Animal Identification: Injectable RFID tags are available for animal identification. They are injected to remain
under the skin of the animal. Delivery is through a special syringe. The advantages is that they are less painful,
also there is no outside identification mark for a malicious person to know where the tag is embedded in order to
remove it as modify it. The RFID chip inside the tag is generally ‘Read-Only’ so that data once recorded can’t
be modified.
The reader is connected to a remote database which correlates the unique RFID tag number on the animal with
other data fields.
Airport Baggage Handling: Bags are tagged with an RFID tag rather than a bar-coded tag so that they can be
tracked by readers throughout their journey. Safety is improved because security information can be associated
with particular tags enabling them to be routed automatically through an explosive detection machine. It will use
secure data encryption and tags with read/write capabilities. E-tags will be applied at curbside check-ins and
allow information to be added during a bag’s journey, giving security personnel a snapshot of the route each bag
traveled. Tagging will also eliminate the need for manual sorting and lifting through the use of conveyor belts
equipped with tag readers.
Electronic Payment: Both Exxon and Phillips 66 have implemented RFID systems that enable customers to
instantly charge their fuel and convenience store purchases without using cash or a credit card. Customers
enrolled in these programs wave a miniature transponder attached to their key chain in front of an electronic
reader at the pump or checkout counter.
ISBN 1-63102-455-8
345
Radio Frequency Identification (RFID)
Postal Services: The Italian postal service now uses e-tags to ensure mail is moved to the correct destination
and to monitor delivery times [Langnau, 2001]. Mail bags are tagged with read/write tags as they arrive at
Italy’s airports. As the bags are loaded on conveyor belts, readers can verify each bag’s destination
automatically and route it appropriately. The service also puts e-tags in envelopes and mail throughout the
country. As these letters arrive at a routing area, their travel time data are recorded. The tags help identify
delivery problems.
CONCLUSION
This presentation provides an overview of RFID technology and tries to give readers some understanding of its
potential applications and implications for business strategy. As with any new technology, it is extremely
difficult to anticipate the full scope of these applications and an implication until it is more widely used.
Furthermore, whole sets of broader possible impacts, e.g., on privacy and security are even less clear at present.
It is hoped that by clarifying some of the early uses of RFID and documenting the road ahead for organizations
as far as we can see, others will find it easier to think through how best to manage and exploit this technology’s
potential, while avoiding some of its negative repercussions.
REFERENCES
[1]
[2]
[3]
[4]
[5]
346
Michael Faraday House (2005) “Radio Frequency Identification Device Technology (RFID)”, Institution of
Electrical Engineers.
Sam Polniak (2007) “The RFID Case Study Book-RFID application stories from around the globe”, Abhisam
software.
Heather Smith (2003) “Developments in Practice X: Radio Frequency Identification (RFID) -An Internet for
Physical Objects”.
www.technovelgy.com.
Radio-frequency identification - Wikipedia, the free encyclopedia.
ISBN 1-63102-455-8
INFORMATION TECHNOLOGY FOR EDUCATION ROLE IN
MODERN EDUCATIONAL PRACTICES
Suman Singh | Librarian | Ghanshyam Urvashi Mahavidhiaya | Baudi, Phoolpur | Allahabad
| suman_singh36@yahoo.com
Abstract: Education Technology is one way or the other has been used in education since times
immemorial. It is said that good teachers have always used visual aids to assist their teaching.
Even the Czech Comenius Suggested teachers to use illustrations and models to increase the
interests of their students. Today education technology is stressing modern audiovisual equipment.
Keywors: Education Technology, Hardware Technology, Software Educational Technology.
INTRODUCTION
Educational technology emerged as a distinct discipline only in the last quarter of the twentieth Century.
Therefore, its concept has not received a uniform educational technology; the educational literature reveals that
there are more than fifty definitions of educational technology.
Information is vital to the success of Academic and Research activity and its flow is a two-way process. On the
one hand, specialized, up dated information is constantly needed by users to keep them informed of the latest
developments and updates in their fields of interest.
Leith (1967) : Education Technology is application of scientific knowledge about learning and the conditions of
learning to improve the effectiveness and efficiency of teaching and learning National council of Educational
Technology, U.K. (1967): Educational technology is the development, Application and Evolution of systems,
techniques and aids to improve the process of human learning.
OPERATION OF EDUCATIONAL TECHNOLOGY
The Educational technology is a scientific and systematic approach to design and evaluate learning and teaching
methods and to the application and explanation of media and the current knowledge of communication
Techniques is education took formal and information.
NATURE OF EDUCATIONAL TECHNOLOGY
A review of the above mentioned definitions of educational definitions of educational Technology paints out the
following characteristics of educational Technology.
Educational technology is not confined to the use of the electronic media in education .
Educational technology involves input, output and process aspect of education.
Educational technology is the application of scientific principles to education.
Educational technology is an important medium of communication.
Educational technology lays stress on the development of methods and techniques for effective teaching
learning.
Educational technology stresses the organization of learning situations for the effective realization of the
goals of education.
Educational technology facilitates learning by controlling internment media and methods.
Educational technology emphastses the designing and measuring instruments for testing learning
outcomes.
HARDWARE TECHNOLOGY IN EDUCATION
Hardware technology of education means the use of mechanical equipment and material to the teaching learning
process. Hardware Technology of the following types is used in educational an
Audio: Audio tape, Audio cassettes, Records.
ISBN 1-63102-455-8
347
Information Technology For Education Role In Modern Educational Practices
Video: Television broadcast, cable, Television, Video, tape Video-cassettes, video-disc telecast, VideoText.
Computer: Computer Assisted instruction (CAI), simulation and gaming.
Graphics: Charts, graphs, maps, overhead transparencies.
Photographic: Motion pictures, filmstrips, slides print.
Print: Hard copy (Paper), Micro film, Micro fiche. Davis (1971) is of the view that the hardware
approach is based on the application of physical Science to the education and training system which
Mechanises the process of teaching gradually so that teachers would beable to deal with more students,
resulting in less costs and economy in finances.
Nickson- Educational technology deals with the application of many fields of science to the educational
needs of the individual as well as of the equipment.
SOFTWARE EDUCATIONAL TECHNOLOGY
The hardware approach originated from the physical Sciences and applied engineering and the software
approach owes its origin to the behavioral sciences and their applied aspects concerned psychology of learning
It originated from the pioneering efforts of skinner & other behaviorists. Leith has also observed, educational
technology is the application of scientific knowledge about learning and the conditions of learning to improve
the effectiveness and efficiency of teaching and learning. “This software view of educational Technology is
closely associated with modern principles of Programmed learning and is characterized by task analysis, writing
precise objectives, selection of appropriate learning strategies, reinforcement to correct responses and constant
evaluation”
Software technology includes the following:
Analysis of instructional problems.
Selection of strategies to btain the desired results from the teaching learning process.
Teacher behavior
Programmed learning
System Analyses.
Selection of instruments of evaluation.
The software technology is sometimes referred to as instructional Technology teaching technology and
behavioral technology.
Hardware technology Vs. software Technology: In hardware approach, we concerned with the use of
audiovisual aids material and sophisticated instrument, gadgets and mass media to assist the teacher and the
learner to achieve belter results. In software we try to make use of psychology of learning for the production and
utilisation of software techniques and materials in terms of learning materials, teaching learning strategies tools
of evaluation and other devices of soften and smoothen the task of teaching learning.
Complement and supplementary Nature of the use of Hardware Technology and software Technology in
Education.
The hardware and software approaches are interlinked to plan the seed of educational technology which is
developing with other essentials ingredients of other varieties like system engineering, educational planning and
management.
Hardware technology and software technology in Education:
348
Both types of technology carter to individual differences of students.
Both contributes to the economy of energy, resources and time of teachers as well of students.
They assist in bringing about clarity and vividness in the teaching learning material.
They help in developing motivation among students.
They make the subject-matter easy to comprehend.
They make the subject-matter interesting.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
They bring the replicas of various object and scenes the class room.
MISSION
The mission is to integrate ICT-enabled with pedagogical and management processes is self sustaining manner
to develop a world-class globally competitive flexible and value based open and distance education system that
has the scope to provide quality life to all citizens, and meet the developmental needs of the country.
Role of teacher/counselor- Teachers play an important role in development of qualities among students.
Teachers themselves be committed words their students Teachers themselves should be committed towards their
profession. Only then can we expected quality among students as well as school. A teacher can bring about
qualitative result when he or she is able to pay attention to individual students. Empirical researches and
innovative development in this area's.
The National Policy on Education 1986 and as modified in 1992 envisaged the role of media and educational
technology as : Modern communication technologies have the potential to bypass several stages and sequences
in the process of development encountered in early decades. Both the constraints of time and distance at once
become manageable. In order to avoid structural dualism, modern educational technology must reach out to the
most distant areas and the most deprived sections of beneficiaries simultaneously with the areas of comparative
affluence and ready availability. Educational technology needs to be employed in the spread of useful
information, the training and retraining of teachers, to improve quality, sharpen awareness of art and culture, to
include abiding values etc., both in the formal and non-formal and non-formal sectors. In the villages without
electricity, batteries or solar packs need to be used to run the programme.
Educational technology has great potential for improving the teaching-learning processes. It is needed to
education for the following purposes :
Individualised Instruction: Educational technology is very helpful in individualising instruction by
enabling us to make use of self-instructional programmes.
Improvement in the quality of Teaching: Educational technology assists in the improvement of the
teaching-learning process by enabling us to use more varied, rich and motivational programmes through
TV and other media.
Meeting the Problem of Mass Education: Educational technology helps in using programmes
developed by experts for a population of students with the use of computers and TV etc.
Equalising Educational Opportunity: Educational technology assists us in making efforts for
equalising educational opportunities irrespective of economic, social and geographical status of the
learners.
Providing Continuing Education: TV lessons and self-instructional programmed material sent to the
learners or to in-service personnel and vocational workers help them to keep themselves abreast of the
latest material.
Three Views of Scope of Educational Technology: Educational Technology First (ET 1). It refers to the
application of physical science and engineering technology to provide mechanical or electromechanical tools,
instrumentation or 'hardware' which can be used 'for instructional purposes. This is the view of James O. Finn
and others (1960). In this sense, the reference is generally to the use of equipment for presenting instructional
material such as still and motion picture projectors (silent and sound), tape-recorders (including language
laboratory), television, teaching machines and computer-based teaching.
Educational Technology Second (ET 2). It referts to the application of scientific principles to instruction. This is
the view of Skinner, Gangne and others. Here psychological principles of learning are stressed.
Educational Technology Third (ET 3). Described by Davis and Hartley (1972), it incorporates both ET 1 and ET
2, through application of a 'system approach' to education and training. According to this view, education should
be considered a system in which machines, materials, media, men and methods are interrelated parts and are
organised in such a way as they work together for the fulfillment of specific educational objectives. Educational
ISBN 1-63102-455-8
349
Information Technology For Education Role In Modern Educational Practices
technology, in education according to scientific principles so as to best achieve the educational objectives. It is
the modern view of educational technology.
In fact scope of educational technology is as wide as education itself. Its scope ranges from the concrete
educational process to the most abstract and subtle ones. It includes the use of hardware and software and
systems analysis in various educational operations. The possibility of using educational technology in almost all
areas of education has been and is being explored.
There are three major areas in education has been and is being explored. these are : (1) Technology related to
general educational administration and management, (2) Technology related to general educational testing, (3)
Technology related to the instructional process.
A very remarkable trend in the field of education towards the end of the 20th century in the advanced countries
had been the tremendous use of educational technology in making education more productive, relating it to the
individual, providing instruction on more scientific bases, making learning more powerful and lasting making
up the cultural handicaps of certain categories of pupils and for extending educational services in the remote
areas.
Technology of Education: Technology of education's inherent in the planning and implementation of the
teaching learning process in general technology of education includes the following internists.
Selection of Instruments for evaluation.
Analysis of instructional problems.
Selection of strategies to obtain desired result from the teaching learning process.
Teacher Behaviour.
System Analysis.
Programmed learning.
Technology in Education : Bradley speaking, technology in education in plies the use of implements, tools and
machines in-education in the some manners as we use these for the development of agriculture and gardening
and industry and in fact our everyday life to reap the fruit of scientific and technological development.
We include electronic media as
Projector, Tape Recorder
Film
Radio
TV teaching machine, OHP.
Computers and Interned etc.
Movie or motion picture projector
Record player disc.
Video Disc.
Uses of Record Disc Player in the Teaching learning Process :
350
Records are good for training in speaking, singing and recitation.
Certain portions can be played back at will to highlight specific points.
Records can be useful for teaching phonetics.
Records can arouse positive emotion by specific sound effects and dramatisation.
Records provide learning with enjoyment.
The record player suplements a lesson.
Records are good for teaching music and dance.
Record player can be used for an appreciation lesson in music.
Record player can be used for physical exercises accompanied with music.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Record player has a repeat value and can be played over and again for practice and drill.
Uses of Video Disc:
It increases learner's productivity
It makes pros sidle extensive collection of learning material.
Effective Television Education.
Role of the teacher in school/TV teacher should be associated with each stage in one way or the other
Planning
Production
Presentation
Utilisation
Evaluation
Importance of Internet in Education: There is no doubt that the internet offers the unique opportunity of
providing education of a fast pace.
Internet has varied educational uses. Even a well-established traditional library can hardly match the resources
available on the Net. This is not to say that the Internet can take the place of the library. But the simple fact is
that no library on earth has the financial resources to buy the latest international books on everything under the
sun. This is where the Net comes handy for students, teachers, researchers as well as for those preparing for
several examinations including Civil Service Examination.
Collecting reports from different sources for projects and research reports is such a hassle-wasting valuable
hours traveling to varous libraries all over the country to find out whether they are available. Now it is available
at the click of a mouse.
Name any branch of study- the Net provides the requisite information- whether it is to keep abreast of the latest
scientific discoveries or to further skills.
The Net helps in enriching classroom discussions.
Following are the important uses of internet in education:
Internet can be used to provide information and education to the wider population located in every nook
and corner of the globe.
Internet is an important tool to disseminate large qualities of information, to propel the masses forward on
path of prosperity in the shortest possible time with minimum resources.
Internet technology can be very useful in removing adversities of nature or the adversities faced by
human because of their caste or creeds.
Internet makes learning process interesting and interactive.
The students have a great opportunity to be creative.
The use of the Internet provides wider access to good quality education at low cost.
Internet has information on most of the advanced research topics in highly technical or scientific areas
besides information on very petty topics.
As a matter of fact all use of Internet is educative as it involves access to information and contains huge
quantities of data on numerous topics.
The internet use would remove the limitation of
(i) classroom size
(ii) fixed timing of imparting education
(iii) restrictions on learner's pace of learning.
ISBN 1-63102-455-8
351
Information Technology For Education Role In Modern Educational Practices
Meaning of E-mail- Email or electronic mail is the means of sending messages from one place to another
through the use of one computer to another. We can send messages through computers on a local area network
or through computers on the internet. E-mail is a very important component of the internet.
Operation of E-mail : For using E-mail the user types his message among with the E-mail address of the person
whom E-mail is being sent. The computer converts the message into an electronic format. Thereafter, the
electronic format of the message is sent to its destination.
For long distances, E-mail message are transferred along communication links such as telephone lines through
internet.
Merits of Using E-mail:
E-mail reaches its destination in a few seconds.
Where internet is available, messages can be sent and received anywhere in the world.
We can send E-mail message to a group of people just as easily as we can send to just one person.
For confirmation from the sender registered E-mail can be sent.
E-mail is cheaper than any other type of mail through post.
We can send files, photographs, computer files and video-clips with an E-mail.
Limitations of Using E-mail
People can send junk mail.
Computer viruses often sent by E-mail can damage our computer.
When mail box is full, we cannot receive any message.
learner's ability to afford quality education at the best school, college or university anywhere in the world.
Internet gives the following benefits also :
Exploring libraries
Browsing the Web
Visiting educational institutions, museums, publishers and universities, etc.
Reading the news.
Reading the articles
Getting software
On-line shopping
playing games
Getting degrees
Discussing
Watching video
Reading programmes on other computers
Chatting
Exchanging messages
On line banking
Teleconferencing at university or college level. University based private audio- teleconferencing costs are
moderate when the local telephone system has the following facilities.
352
Telephone line is relatively quiet.
There is ready accessibility
Local and long distance rates are acceptable.
Computer teleconferencing.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
In the teaching learning process, a variety of modern technologies are called into pay which determine the
interrelationships of the teacher and the learner.
The communication technologies available intoday's world are radio, TV audio and video cassettes, computer
based managements (CBM) (CAI) talking computer and educational telephone Networks etc. A number of
products based on digital technology, such as, the compact disc (CP) digital audiotape (DAT) Digital TGV are
coming up. They one create favourable conditions for teaching process, and they provide the teacher with an
efficient tool with which to manage the creaming process they serve as a vehicle to implement the curriculum
content.
Verpal Communication
Written Communication
Oral Communication
Non-Verbal Communication
Non Verbal Sound.
Body Language
Symbols & Sign.
Colours, Printed Media, Non Printed Media.
Audio Media, Visual Media Audio Visual Media
CONCLUSION
Managing teaching is a broad concept which includes teaching. earning process all the steps a teacher who
related as the manager in the knowledge based economy large sections of the society would certainly need
access to information to address issues and problems related to knowledge creation, knowledge application or
knowledge utilization. Evaluation may be defined as a process by means of which changes in behaviour of
learners are studied and guided towards predetermined objects, It is a process for improving the product, the
process and even the goals also.
REFERENCES
[1]
[2]
[3]
[4]
Aggarwal R.K. (2002) Essentials of Education technology management, Mark book. Anshah Pb. House, Delhi.
Shukla,s Satish Prakas, Information and Agrawal Pb. Agra communication technology in teacher education.
Jena, S. Sitansu, agaral Kuldeep,: Quality in School Education, Issues and concerns, National Institute of open
Schooling, SHIPRA, Delhi.
IGNOU online B.Ed. course book (2008) teacher training New Delhi, IGNOU.
ISBN 1-63102-455-8
353
E-RESOURCE MANAGEMENT IN DIGITAL LIBRARY
Shalini | Librarian | Chhotu Ram Institute of Law | Rohtak | crillibrarian83@gmail.com
ABSTRACT: With the advent of information and communication technology and explosion of
knowledge, the demands of digital information by the users are increasing on their desktop day by
day. In the modern era of 21st centaury libraries has turned into the repository of e-resources. This
paper presents an overview of e-resources (internet based electronic resources), management &
their impact on library and information science. E-resources provide feasible solution to the
library problems such as easy access, preservation, high storage and minimum space with
multimedia documents and remote access to information collection. E-resources are resources in
which information is stored electronically and it can be accessible through electronic systems and
network environment. This paper present deals the need and role of Electronic Resource
Management.
KEYWORDS: E-Resources, Electronic Resource Management (ERM), ICT, Digital Library.
INTRODUCTION
Libraries are the integral part of the human society. Library is a knowledge centre which has rich information
resources stored in different ways both in print and electronic form. In the modern era of information explosion
electronic resources play a prominent role in facilitating access to accurate, timely and relevant information to
the users. The main reason of accepting e-resources because of their many advantages such as easy accessibility,
search facilities, simultaneous access to many users. Electronic Resource Management has become essential for
the librarians for proper and best utilization of e-resources.
What are E-Resources?
Normally we can define e-resources as the resources or information gathered in electronic format. According to
Library of Congress “An electronic resource” is defined as any work encoded and made available for access
through the use of a computer. It includes electronic data available by (1) remote access and (2) direct access
(fixed media). “ A collection of on-line publications giving author, title, date, place of publication, publisher,
details of edition, pagination, series and some idea of contents etc.” In other words: Remote access refers to the
use of electronic resources via computer network”.
What is Electronic Resource Management?
Electronic resource management (ERM) is the practices and software systems used by libraries to keep track of
important information about electronic information resources, especially internet-based resources such as
electronic journals, databases- papers-magazine and electronic books. The development of ERM became
necessary in the early 2000s as it became clear that traditional library catalogs and integrated library systems
were not designed to handle metadata for resources as mutable as many online products are. So that ERM
should offer an integrated environment that supports both management and access, without maintaining
duplicating system. The idea of developing electronic resource management emerged in 2001-2002, growing out
of research by Tim Jewell at the University of Washington. The ERM place a key role in the coordination and
management of content supplied by over 500 producers as well as freely available content. Even after two
decades of digital presence in libraries and proliferation of electronic resources in term of production,
acquisition and usage the management of e-resources remains a cumbersome process. In order to cope with the
present development in IT, modern libraries are now adapting various electronic resources for its collection
development to fulfill the requirements of the different users in a better way. For better management of global
information, there is a need to develop and restructure the state of art of traditional library services to e-based
services.
CHARACTERISTIC OF ERM
The ERM have following characteristic and function for development of digital libraries :
354
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Notify appropriate staff before licenses expire.
Supporting acquisition and management of licensed e-resources
Maintain current vendor contact information.
Integrated into other library system modules or may be standalone system for eliminate data entry
duplication.
May have a public interface, either separate or integrated into the OPAC.
Providing descriptions of resources at the package (database) level and relate package contents (e.g. ejournals) to the package record.
Encoding and perhaps publicly displaying licensed rights such as e-reserves, course packs, and
interlibrary loan.
Tracking electronic resources from point of order through licensing and final access.
Providing information about the data providers, consortia arrangements, access platform
Providing contact information for all content providers.
Logging problems with resources and providers.
Providing customizable e-mail alerting systems (e.g. notices to managers when actions are expected or
required).
Linking license documents to resource records.
Easily availability of funds to purchase resources.
Update in real time.
Why to adopt E-Resource Management for Digital Library?
In a digital library, the location, identification and detaching information would be easier than manual system.
Librarians are finding themselves a discouraging challenge of managing the ever growing collection of eresources of their libraries in addition to all other responsibility. The main problem arises in its exhaustive
collection of information and user wants to search very specific information among the entire collection. So we
need or require ERM. It is the library without walls. It allows to locate and search any library collection on
network system irrespective of time, space or and social barriers. As the importance of e-resources to library
collections grows, the skills needed to create, develop, grow and manage them have become increasingly
valuable to modern information services and professionals. This practical step-by-step toolkit gives you a
thorough grounding in all aspects of e-resource management including selection of content, developing
workflows and knowledge bases, technologies, resource discovery, analysis and trouble shooting. The libraries
are still trying to grapple with the issues of copyright, licensing, system compatibility, access speed and time,
downloading, book marking etc. numerical. graphical or time based, as a Each of these issues are complex and
at the same commercially available title that has been time interdependent. To avoid ambiguities, it would be
necessary to have proper planning and management mechanisms. So we need ERM for digital library.
The ERM Librarian has primary responsibility for the management of all aspects of our acquired electronic
information resources are electronic resources, providing support for collecting activities including the
identification of potential new products and coordinating the Library's trial program. Provides license support
including initial negotiation and technical review to ensure that the licenses conform to University and Library
requirements. Manages the ordering of new products and with other units, coordinates the cataloging activities
related to e-resources. The ERM Librarian also supervises the ERM Manager and ERM Assistants.
ERM systems for collection-development decision making: One of the great advantages of an e-resource
management system-and indeed one of the goals of Verde-is to provide tools to assist librarians in the decision
making surrounding collection development. Such tools include a global knowledge base, from which libraries
can select resources; overlap-analysis reports; cost-usage analysis reports; and more. In a consortia environment,
the system can also provide valuable information about the collections of member institutions, which should
ideally be able to see what their fellow institutions have acquired or are considering acquiring and to share
resources when relevant.
The global knowledge base: Librarian who want to acquire a resource must learn which of many diverse
355
ISBN 1-63102-455-8
E-Resource Management In Digital Library
sources will enable them to acquire it-and, clearly, a librarian cannot always be aware of all the available
options. An ERM system can facilitate this process by providing a global picture of the e-resource world, a
comprehensive knowledge base that describes what is available, including information about the packages,
interfaces, and providers.
Statistics: Increasingly, information vendors are making statistical data available to their customers in
accordance with the Project COUNTER Code of Practice. Today, an ERM system can store user names,
passwords, URLs and other information about access to the statistics hosted at the vendor's site. In the future,
when such statistics are available in a standard XML schema, librarians will be able to download the statistics to
an ERM system to use in cost-usage analysis reports. With the global e-resource offerings described in the
universal e-resource knowledge base, the library's e-resource collection described in the local Verde database,
and the library's expenditures expressed in the cost and usage entities, librarians can find new e-resources of
interest; take advantage of information already available in the system when adding local information; and,
when deciding whether to acquire, renew, or cancel an e-resource, use existing information related to that eresource and others. or, as Raschke and Weiner put it, "Imagine a resource management system with a
sophisticated reports module where librarians could consult everything from cost per full-text article download
to faculty retention requests over the last three years to average annual inflation rate. Our professional judgment
about materials would be more informed and efficient while easily accessible usable data would enhance
negotiation with users" (Raschke and Weiner, 2004). i
ISSUES AND CHALLENGE
There are many issues are still remaining unsorted for the point of view of management of Technology,
sociological, legal issues. The issue covered wide range of aspects like acquisition, access restriction,
authentication, copyright, preservation, software and other user interface. Management is not only about
managing the process of selection, collection, processing, controlling and dissemination of information but also
effective use of information and knowledge store in print and electronic format . Some of management issue like
User interface and accessibility, Change in IP address, network connectivity and accessibility, lack of
standardized format or web presentation, renewal policy, number of issues, funding, duration of agreement, etc.
The challenge of e-resources management has provided us an opportunity to improve the value of holdings of
our libraries and enable librarians to increase the visibility of parent institution. It has made possible to come out
of traditional roles, made to work on developing local solution to manage e-resources.
CONCLUSION
Libraries in India are facing great challenges due to budget cut, reduced staff, and devaluation of rupee and
increase in cost of publication. Due to these factors academic libraries are finding it difficult to buy required
number of books and periodicals, and other resources which has resulted into the adverse impact on the research
and development programmes. Users use digital library and e-resources as it reduces their physical strain and
save their time. It minimizes expenses, keep accuracy and with minimum storage capacity etc .We know in the
digital environment managing electronic resource is not an easy task. So to overcome this problem library
professionals need to equip themselves with skills and techniques required for managing the changing needs of
library users. For increasing the effectiveness and efficiency of the library services, it is necessary for library
professionals to accept ERM and implement all new technologies in the libraries.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
356
Sharat Kaushik, Shesh Narayan, “E-Resources and its effects on Library and Information Science”.
“Library Automation Issues and Remedies In Present Scenario” .P-89.
https://en.wikipedia.org/wiki/Electronic_resource_management.
Natasha Kaushik,” E-Resources management for digital library”. “Library Automation Issues and
Remedies in Present Scenario” .P-106-107.
www.exlibrisgroup.com
http://Wikipedia
Jewell Tim (2004) E-Resources management ://www.diglib.org
Shilpi Goyal,,”E-Resources management for digital library”. “Library Automation Issues and
Remedies in Present Scenario” .P-252.
ISBN 1-63102-455-8
BIBLIOGRAPHIC INFORMATION SERVICE USING
ZOTERO
Dr. Jyoti Bhabal | Assistant Professor | SHPT School of Library Science |
SNDT Women’s University | Mumbai | jyotibhabal@gmail.com
Abstract: Zotero has been much explored by the researcher to manage their reference and cite
the same in the standard citation styles. However, libraries may explore this software and use its
features intelligently to start bibliographic information service in most effective manner. This
paper brings library’s attention to the procedure for the same.
INTRODUCTION
The world of Information is blooming minute by minute; thousands of databases, journals are giving access to
millions of articles. Researchers are continuously adding in the quantity of information as well as they are
craving for information. In academic set up, research is carried out at Master Degree Programmes, at PhD level,
and at post doctoral level. The students as well as faculty members are getting more and more involved in
research and publication. Nowadays research and publication is very essential in the academic fraternity.
Academic libraries are always part of library users’ research work. The most essential library service for
researcher is ‘Literature Search’. Libraries may provide this service at mass level in the form of Current
Awareness services (CAS) or at individual level in the form of Selective Dissemination of Information (SDI). In
both the cases bibliographic information about new books, articles, audio or video are shared with the users.
Though library users are provided with the access to different types of information sources, many users lack the
precision in their retrieval. Traditionally, libraries were preparing ‘List of Additions’, ‘Subject Bibliographies’
to provide ready references on a given topic. Many times such list of references incites curiosity among the
readers about the new subject and made them to access those references. In 1990s this was quite popular service
offered by the libraries. Today, the advent of Web 2.0 and Web 3.0 allows libraries and its user to collaborate
and share information on digital platform. Many open source software are available that can be explored by the
libraries to provide effective and efficient services to the library users. This paper will discuss use of Zotero,
open source software for providing literature search services. Zotero’s features discussed below are also useful
for teachers for sharing references with the students.
ZOTERO: CITATION MANAGEMENT TOOL
“The name ‘Zotero’ is loosely based on the Albanian (yes, Albanian) word zotëroj, meaning ‘to acquire, to
master,’ as in learning”.Zotero is a bibliographic management tool.It is developed by the Center for History and
New Media of George Mason University (GMU). Zotero is a free, easy-to-use tool to collect, organizes, cite,
and share research sources. It works on Windows, Linux, and Machintosh(“Zotero | Home,” n.d.).Zotero's core
functionality enables libraries (users) to easily record the relevant citation information from online items and
store them in a flexible personal database that can then be used to generate internal citations and/or
bibliographies. Zotero is particularly well suited to record information from online sources (Fernandez, 2011)
This tool is generally used by the researchers, students, faculty to manage their citations which they use for
academic purpose. However, library too can use this tool to provide an innovative service to its patron. Teachers
as well as students are getting more engaged in their research work. According to new curriculum pattern,
students need to do lots of assignments, project work, dissertations, presentations, etc. In this scholarly
environment, libraries may play its role by providing current awareness services to academic patrons. On one
hand libraries may conduct literacy programmes on Zotero to teach how to use this application for citation
management for their study, but on the other hand libraries can make use of this application for creating ready
bibliographies for the researchers by forming specific groups on Zotero site. This would save tremendous time
of researcher that they invest in literature search.
ISBN 1-63102-455-8
357
Bibliographic Information Service Using Zotero
ZOTERO GROUP TYPES
Private Groups:
Private groups provide a means of collaboration among group members without creating any public face
for the group online.
Only group members and users invited to join the group are able to see the group’s page.
Private groups are completely hidden from group searches. They are not shown on members’ public
profile pages and will not appear in search engine results.
If administrators enable file sharing, group members can access and share files in addition to references.
Public, Closed Membership:
Closed-membership groups are useful for creating a controlled group environment with a public presence.
This allows a group to publicly present its work and sources, or develop new membership in a controlled
fashion.
Anyone can view the group page, but the only way to join the group is by invitation or by requesting an
invitation.
If the group has a library, administrators can choose to show or hide the library from non-members.
If administrators enable file sharing, group members can access and share files in addition to references.
Public, Open Membership:
Open public groups are useful for the broadest discussion and collaboration.
The group page is public, and anyone who wants to can join instantly.
If the group has a library, administrators can choose to show or hide the library from non-members.
Open public groups do not allow file sharing.(“Groups [Zotero Documentation],” n.d.)
Amongst the above groups, Private group or public group with closed membership would be ideal for a library
to create a library of references. Library would need administrative control to share scholarly references
amongst the library users.
Procedure to start Current Content service using Zotero:
Download Zotero from http://www.mozilla.org/firefox . It works with few web browser namely Firefox,
Google Crome and Safari.
Figure 1: Zotero Home Page
The Zotero icon will appear in the address bar only on sites supported by a Zotero translator. To save
citation from other sites, right-click and select "Save Page to Zotero."
There are number of videos and documentation available on how to use zotero for referencing and citation
management. Library staff must read those first to get familiar with this tool.
358
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
To explore advance features of Zotero, library needs to create its account in Zotero by registering itself on
Zotero site. Once the account is created library can synchronize all its searched references to save it all on
cloud. (See Figure 2) Furtherby signing in Zoterowith library username and password, library may create
groups according to its need i.e. Subject wise or user wise (See Figure 3). It will allow library to send
invitation to concerned library users to join the group. Users would in turn accept invitation and will get
register themselves to Zotero. As an administrator library may set up a group where only library staff can
add reference or each member of the group may have rights to add new reference to the collection.
Figure 2: Zotero Window showing list of articles saved in the zotero library
The above figure 2 shows various options and parts of Zotero available for users. They are:
Button to create subfolders to organize collection of references. Relevant references from the main library
are dragged into concerned folders.
Button to create new group. Subfolders are created under the group and then relevant references from the
main library are dragged into concerned folders.
Display of subfolders
Display of different groups created
List of references saved in Zotero library
Bibliographic details of individual reference
Button to synchronize library virtually
ISBN 1-63102-455-8
359
Bibliographic Information Service Using Zotero
Figure 3 : Web page showing groups created by the Zotero user
Figure 4: Display of Group Library
Once groups are created, library staff can periodically add latest reference on the topic. Zotero is compatible to
several databases, few of them are EBSCO, American Chemical Society (ACS) Publications, Cambridge
Scientific Abstracts, EBSCOhost , Emerald, InfoTrac, JSTOR, LexisNexis, Medline, PubMed, ScienceDirect,
Amazon.com, Chronicle of Higher Education, The Economist, Google Books, Google Scholar. A library staff
may decide a day in a week to search across all the available online resources and may add more and more in
reference library. Group members can view newly added references in the group library according to the date of
addition. The collection of the references will remain for future use till the group exists. Member of the group
may select required reference and read full text or generate bibliography. Library needs to conduct information
literacy on use of Zotero, this would help user to manage citation and cite reference in their work.
This “Groups” feature would be useful to teachers’ community also. Similar to the library, teacher may create
groups for students and share latest references with students or colleagues.
360
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
CONCLUSION
In conclusion, libraries must utilize open source software wisely to reshape library services. “Group” feature of
Zotero can be explored more by the library which was initially introduced to provide opportunity for a
researcher to create/ join group, follow other researchers’ group and build research network. As an
administrator, library would manage its ‘Group Libraries’ on Zoteroas well as would archive references for
future use. Additionally library would assist its user to form their research network.
REFERENCES
[1]
[2]
[3]
Fernandez, P. (2011). Zotero: information management software 2.0. Library Hi Tech News, 28(4), 5–7.
http://doi.org/10.1108/07419051111154758
Groups [Zotero Documentation]. (n.d.). Retrieved July 30, 2015, from https://www.zotero.org/support/groups
Zotero | Home. (n.d.). Retrieved June 30, 2015, from https://www.zotero.org/
ISBN 1-63102-455-8
361
INFLUENCE OF INTERNET AND DIGITAL MEDIA ON
LIBRARY SERVICE
Jyoti Verma | Senior Library & Information Assistant | PK Kelkar Library | Indian Institute of Technology |
Kanpur (IITK) | jyotiv@iitk.ac.in
Abstract: The paper aims to understand the influence of the internet and digital media as an
information source as well as tools by libraries and services. The internet has been described as
the opportunity to a world of apparently endless information resources and a valuable information
tool to the library and information centres. . The internet and digital media like PDA, Laptop,
Tablet etc. provides strategic leadership in technology services in library. It maintains an
evolving, robust and flexible technological infrastructure and provides responsive user support.
Keywords: Internet, Digital media, Library
INTRODUCTION
21st century set example of emerging technologies in libraries which are rich in both variety and quantity. The
role of the library within and the services is rapidly changing. With the rise of online resources and latest
technologies, libraries are enhancing user services and providing unmediated and independent access to library
services. With new technology it’s started creating online community. Internet access has become a sign of a
country’s socio-economic status in the Information Society. Consequently, the Web, the most popular part of the
Internet, has become everywhere in reference services. Internet has become an integral part of library and
information centres that helps in meeting the information requirements of the users in a timely manner 1. It’s
allowed libraries to provide a better service to users by offering simple access to what, when and how they want
it. To provide access to and market the optimal 24/7 content and service delivery, libraries are creating virtual
communities through social software such as blogs, RSS feeds, Instant Messaging (IM), wikis and web
conferencing. Library services are converting towards digital which encouraged the emergence of new LIS
disciplines that have various titles such as digital librarianship or emerging technologies librarianship2. It
required technological skills and experience, an understanding of metadata, and an ability to create and manage
digital content. Digital Services and the Emerging Technologies are closed to each other. The Digital Services
focuses on the technical and usability aspects of building digital platforms for users.
The effect of internet: use on library:
There are little technological advancement that has had as much impact on the dissemination of information as
the internet, and especially the World Wide Web. It is not surprising then that this tool is also changing the way
of readingor studied, taught and practiced today. This impressive infrastructure enables us to teach and study in
an entirely different way. The web provides users with access to continuing education, and unparalleled
communication between colleagues via e-mail regarding enhancing better library services. The educational web
site may be used as a dynamic newspaper or bulletin board to disseminate information internally among the
faculty as well as to the outside world. In addition, the web allows user access to related literature, applications
and other resources depots. The internet is being used extensively in schools across the world. The use of the
World Wide Web ranges from the simple to the spectacular. The Internet provides a means of communication at
a distance for those people who have not facility of library.
Influence of internet on libraries and its services:
Internet is a great information source towards the academic and research area and also a great information tool
to the library and information centres to addition their information support to the users. No other recent advance
has impacted the library profession to such a great extent as Internet. It has changed the roles, paradigms, and
organizational culture of libraries and librarians as well, which created impact on Library services by offering
new modes of information delivery and a vast information source. Internet has been treated as an integral part of
library activities and services and can be used successfully in house-keeping operations, extending Internet/Email facilities and, providing information services such as Computer aided reference services, electronic
document delivery, Message alert service etc.
362
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
There is a continuation of the roles and functions of libraries and librarians, which appears to parallel the growth
of acceptance and use of the Internet by library professionals. The innovative use of Internet technologies make
possible us to reach both local and far-away users much more easily and effectively. Vast collection of
information are available on the Internet. It has become difficult to say, what is not available on the Internet.
Since the libraries are involved in acquiring, organizing and delivering the information to their end users, they
have to fall in line with the changing mode of publishing and needs of users. Technologies such as email and
Web provides tremendous opportunities for library professional to deliver the information to the desktops of our
users. Web offers significant advantage by integrate different library & information services with a common
user interface offered by Web browsers. Realising the potentials, many libraries are rushing to getting the
connectivity.
The effect of digital media: use on library:
Now, we are finding the use of technologies and libraries are not exception for that. The single force that has
brought innovative changes in functioning of libraries is Information Communication Technology (ICT). The
introduction and application of these modern means have changed the value of library such as introduction of
computer hardware, tablet, PC has developed interest in electronic texts or e-books, as they are most commonly
called. This new hybrid of laptop computer and PDA (personal digital assistant), which a kind of writing tablet
and offers convincing advantages for reading and writing texts.
Following are some digital media which effect library services on large scale.
Laptop: Physical portability allows that a laptop can be used in many places— not only at home and at
the office, but also during commuting and flights, in coffee shops, in lecture halls and libraries, at clients'
location or at a meeting room, etc. The portability feature offers many distinct advantages.
Palmtop/Personal Digital Assistant (PDA): A small computer that literally fits in your palm. Compared
to full-size computers, palmtops are severely limited, but they are practical for certain functions such as
phone books and calendars. Palmtops that use a pen rather than a keyboard for input are often
called hand-held computers.
Mobile: Mobile provides wireless coverage and seamless transactions which works as catalyst for eusers. Today mobile is very common and popular device in amongst peoples due to easily access. As we
know Mobile is portable device, user can retrieve the information through their mobile at any time. Most
of people prefer to mobile for accessing the information.4
ISBN 1-63102-455-8
363
Influence Of Internet And Digital Media On Library Service
CONCLUSION
Libraries accept the significance of Internet in library activities and services. The librarians have to boost
themselves, think creatively and adopt the new technology to generate services and resources where skills of
structuring and organizing resources are put to its best use. Libraries tended to offer both end-user and
intermediary searching to online databases. The libraries are making use of Internet services mainly WWW and
e-mail and efforts have to be made to understand and utilize the significance of newsgroups, discussion forum,
and chatting service etc. for the benefit of library activities and services. Libraries develop electronic reference
as a core service, and that librarians increase their Internet and online instruction efforts by using e-mail, Web
tutorials and virtual classrooms to reach users. Further, skills and techniques for internet use should be learnt by
undergoing training and constant use of internet so that, the library activities can be used better in the interest of
the institutional goals. Internet is not going to replace traditional libraries but supplements the library activities
and services.
REFERENCES
[1]
[2]
[3]
[4]
[5]
364
Jange, S., & Sami, L. K. (2006). Influence of Internet on library and information centres of National
Institutes of Technology in India. Annals of library and information studies, 53(4), 184. Available at:
http://nopr.niscair.res.in/bitstream/123456789/7483/1/ALIS%2053(4)%20184-197.pdf
Kajewski, M. (2007). Emerging technologies changing our service delivery models. The Electronic
Library, 25(4), 420-429. Available on
http://www.emeraldinsight.com/doi/full/10.1108/02640470710779835
Naqvi, S. H. (2007). Impact of internet on library and information services. Library Herald, 45(1), 5160. Available on : http://ir.inflibnet.ac.in/bitstream/1944/279/1/Inf_5.pdf
Verma, J., & Sonkar, S. K. (2013). Impact of E-Resources and Web Technology on Reading
Habits. Challenges of Academic Library Management in Developing Countries, 68.
Libraries and Internet. ERIC Digest Available on : http://www.ericdigests.org/1995-2/libraries.htm
ISBN 1-63102-455-8
MOBILE PHONE BASED LIBRARY SERVICES
Dr. Anil Kumar Dhiman | Information Scientist | Gurukul Kangri University
| Haridwar | akvishvakarma@rediffmail.com
Abstract: The first one and half decade of 21st century has witnessed great changes in acquiring,
storing and dissenting of information. Internet and World Wide Web has completely changed the
whole scenario. Nowadays, we have mobile phones through which people communicate and
organize information effectively. Various opportunities exist for library and information centers to
provide effective services to their users through mobile technology. This paper discusses about the
mobile phones and their possible usage in providing library services.
Key Words: ICT, Mobile phones, SMS and WAP.
INTRODUCTION
Information & communication technology or ICT that is the combination of information and communication
technologies (Dhiman, 2003; Dhiman and Rani, 2012) has brought major changes in every body’s life. It has
also changed the way of storing, retrieving and disseminating the information. The libraries in ancient times
were “collected and organized clay tablets but today’s libraries seek to support the rapidly growing computer
tablet ownership within our community and must respond to new circumstances with new services” (Schmidt,
2013). Therefore, ICT has collapsed barriers and promoted fast communication and interactions across the
boundaries.
Internet and the proliferation of mobile phones have lead to a change in the way individuals communicate – and
how reference queries are communicated in libraries. For a number of years, libraries have received queries in
person, via telephone conversations, and (over the last decade) through the use of email and online Web-based
forms (Giles and Grey-Smith, 2005). But now information is becoming intertwined with our lives more
profoundly through mobile connectivity than is the case when we sit down at a desktop or even with a laptop
computer. Further, the use of mobile phones is increasing day by day. According to Taylor and Starling (2004),
around a third of a million new subscribers join the world’s mobile phone services every day.
So, mobile technology is altering and extending the ways we communicate, teach, learn, entertain ourselves and
make decisions. Khare (2009) mentions– our librarians are in move to determine how these mobile devices are
affecting information access and ensure that they are communicating with patrons and providing web content in
the most appropriate and effective ways.
MOBILE PHONES
A mobile phone or mobile that is also called cellphone and handphone can be defined as “an electronic device
used for mobile telecommunications (mobile telephone, text messaging or data transmission) over a cellular
network of specialized base stations known as cell sites” (http://en.wikipedia.org/wiki/Mobile_phone).
Although “mobile devices have been in popular use for some time, but today’s mobile devices boast large color
displays, high resolution, multi-touch capabilities, significant computational horsepower, and high-speed
connectivity. In combination, these features dramatically alter the possibilities and experience of mobile
information access today in comparison to even just a few years ago. The rich developer tools available for
today’s mobile devices also make it easier than ever to build and deploy mobile applications” (Broussard et al.,
2010).
Today’s smartphones, are similar to mobile phones but they offer advanced capabilities like computers
functioning. They run complete operating system software providing a standardized interface and platform for
application developers. In other words, they may be called as miniature computers which have phone
capabilities. Now, bluetooth, accelerometers, and multitouch screens, as well as text messaging, smartphone
software applications, mobile websites, global positioning systems (GPS), wi-fi, and media creation and capture
tools, are all part of the mobile environment. Most of the browsers of today’s mobile phones allows browsing
ISBN 1-63102-455-8
365
Mobile Phone Based Library Services
sites online and helps the user to search information from all the access points. Though, they can differ greatly
in terms of their operating systems supported but they can display most websites and offer page zoom and
keyboard shortcuts. 3G and 4G mobile phones display very rich contents of websites fastly.
Due to popularity and easy availability of mobile phones, many libraries have started to optimize their web sites
for mobile devices. There are various advantages of using mobile phones for library services. One of the major
advantages is that the users of the library can access 24x7 services from anywhere. Like the desktops and the
laptops, there is no problem of charging mobile phones, they can last over for many hours. Besides, portable
power banks are also coming which recharge mobile phones comparatively for long duration.
Mobile – Phone Based Services for Libraries: Mobile phone is one of the tools that may hold some answers
to some of the challenges faced by librarians in terms of meeting the information needs of their users (Kakana,
2009). Thus, seeing the future and popularity of mobile phones, libraries are switching over to provide mobile
phone based services to their users.
Many types of library services can be provided using mobile phones. They can better serve their users by
“embracing the growing capabilities of mobile technology. They can promote and expand their existing services
by offering mobile access to their websites and online public access catalogues; by supplying on-the-go mobile
reference services; and by providing mobile access to e-books, journals, video, audio books, and multimedia
content” (Kroski, 2008).
“Mobile devices and services therefore provide tremendous flexibility for those who wish to take advantage of
library services. With a simple 3G connection, a user lying on a beach can access e-books and multimedia
content via his or her local library” (Vollmer, 2010). However, broadly saying, SMS and WAP services are two
basic services which can easily be delivered through mobile phones. Based on Khare (2009) and Ye (2010),
these two are detailed out below.
SMS (Short Message Service): Short Message Service or SMS is the most basic and much used facility of
mobile phones. It is a technology that enables the sending and receiving of messages between mobile phones.
As this service is a mature technology with full functions and strong two-way quality, libraries can apply the
SMS for following operations:
SMS Notification: Library system does daily check circulation database of readers in regular, if any
book is about to expire or has extended, then the system will send reminder messages to users’ preestablished phone number. Libraries may send the recent book titles as per the different needs of readers
for increasing reader's attention in collection via SMS. Announcement of public information to readers
can also be sent so that readers can understand the library services.
SMS Query: Readers can make queries and reservations via SMS. Readers may edit messages with
personal information, sending to the library server and the server will judge whether the input library
information is correct or not, while send query results of the appropriate bibliographic information to
readers. Readers may also be informed by SMS query to renew books or make an appointment of books,
and to realize reservation operation, by sending SMS commands to renew or make an appointment, then
the system returns replies via SMS.
SMS Consultation: Readers can send consultation request via SMS, the library SMS management
system will automatically send format answers back to users. It may also be sent to readers in the form of
SMS by reference librarians.
There are also many free SMS messaging services available in World Wide Web. Google SMS enables you to
send queries as text massage over your mobile phone or device and easily get precise answers to our questions,
No Links, No web pages, just text and information in seconds. Merriam Webster (online) is mobile subscription
facility, and just by putting the mobile number we get the word information just by messaging. Besides, many
366
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
social network sites, for example, the Twitter and Peekamo and instant messenger services, like Yahoo and
Rediff allow sending and receiving of free SMS between web and mobile phone.
Library OPAC system is now mobilized by facility of text message to check the availability and other details of
books. An example of mobile OPAC is shown in figure 1. The publishers may also send the extracts from books
out via SMS. Besides, the websites are now giving the option of sending contents via SMS. That is why some
libraries have begun to offer customized mobile applications for their online public access catalogues (OPACs).
But little research has investigated the relative costs and benefits associated with developing such applications.
Figure 1: An Example of OPAC on Mobile Phone
(Source: http://lib.de.us/mobile-app/)
WAP (Wireless Application Protocol) Services: Wireless Application Protocol or WAP technology allows
users to use wireless devices like mobile phones online, through the small screen to access various websites.
WAP-based mobile phone library offers more services than SMS. Using the structure of WAP mobile phone
platform, libraries generally use its following applications:
User Management: It includes user registration, cancellation, and library cards report of loss.
WAP Information: It refers to a number of static information published by library. Here, the readers can
browse according to their need, such as the general situation of library, library rankings, opinions and
suggestions, information and appointments etc.
Knowledge Service of Users: It means that readers need to develop a personalized interactive service,
such as due notice, book reminder, library announcements and consulting services.
Figure 2: An Integrated Approach for Social Media on Mobile Phones
(Source: www.smartcities.info)
ISBN 1-63102-455-8
367
Mobile Phone Based Library Services
Some libraries are offering “text-a-librarian” services ideal for simple questions that can be answered with a
brief response. Various “apps” which are the computer program or the set of software that the end user
perceives as a single entity as a tool for a well-defined purpose, are available on mobile sites. They can be used
for library services. Besides, social networking sites can also be accessed using mobile phones and instruction
for various library services that can be routed through them. An example for integrated approach for social
media on mobile phones is shown in figure 2.
Some other services are also on the move to be provided over the mobile phones. Important of them based on
Jharotia (2015) are listed below:
Academic affairs administration that is meant for latest news and notices from any university/specific
organization. Users can select a menu and can see the results which are designed specifically for mobile
viewing of email notices of new books and journal articles.
E-contents access can also be provided for a variety of databases and digital resources such as the ebooks, theses and dissertations and e-journals etc.
Library guides which gives users the best of library guide information such as library use guide, question
answering services and library statistics delivering rich contents in a way that works best for users.
Mobile based library lending services can also be initiated through mobile phones where libraries can
formulate regulations for using mobiles for circulation or reading materials and maintenance of users’
accounts. ILL/document delivery can be made faster using mobile technology.
Besides, research consultation and instruction that is a kind of customer care service and reference services may
also be provided over mobiles. One step ahead wifi internet access can also be given to the users over mobile
phones.
Issues concerned with the Use of Mobile Phones: Mobile devices and services deliver or interact with digital
content that is more easily tracked and associated with individual users than other forms of information. But as
Vollmer (2010) warns – the change from in-person interaction with patrons and content to increasingly virtual,
digital, and mobile interaction creates unique challenges for libraries.
He says that privacy is one of the most concerned issues in using mobile technology. Libraries have developed
strong privacy protections for their users, especially in relation to borrowing records. When users check out
physical media such as books, magazines or multimedia materials, they can be assured that the library will not
reveal their circulation records or other personal information. But information technology, by contrast, offers
the nearly limitless ability to capture granular information on both users and uses of content, with important
consequences for freedom of inquiry. While most large data networks are relatively secure and most libraries
take care to secure their wi-fi networks, but users communicating from outside of the library may be texting, emailing, or sending/receiving other information via unsecured networks may loss the privacy.
Secondly, the diversity and richness of library resources are on full display within the physical library building.
Users can speak with librarians, browse the stacks, and use desktop computers for an immersive information
search and retrieval experience. But due to the practical considerations—such as connectivity, hardware, and
mobile interface design—the library experience through mobile technology has not yet reached this level of
interactivity and connectedness.
But inspite of above shortcomings, mobile technology holds great promise for enabling libraries to provide
enhanced services in a form users and it is increasingly demanding. Therefore, as suggested by Iwhiwhu et al.
(2010) library management should explore the possibility of providing mobile phone library services while
liaising with mobile phone operators with improved transmitting frequency to avoid network failure at reduced
tariff. Telecommunication infrastructures should be put in place for efficient and effective communication
between library users and staff, which will engender mobile phone library services. Besides, the library users
and staff should be educated on the proper use of mobile phone for library services to eliminate abuse.
368
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
CONCLUSION
It can be said that “with the ubiquity of today’s sophisticated mobile devices, information access has shifted
increasingly away from the desktop and into mobile environments” (Broussard et al., 2010). Thus, mobile
libraries has taken a new mode of information dissemination where at any time and at any place, any person in
any way can read any content of interest become a reality, which not only greatly enrich our world creating a
more diverse network of information dissemination, but also from the popularity of the network is creating a
greater value.
But as Lippincott (2008) highlighted, for the mobile library service to be effective, libraries should “consider
their re-tooling for mobile users and mobile devices, they should examine the consequences of mobility and the
opportunities for innovation in the areas of content, system and tools, services and environment, both physical
and virtual”. Further, the librarians have to understand fully the capabilities and potentials of the mobile
technology and its use in libraries in near future by providing the quality based services matching with the needs
of the user as suggested by Khare (2009).
Thus the paper can be ended by saying, opportunities are existed there but the need is to encash them in the
favour of libraries to provide maximum benefits to their users.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
Broussard, R., Zhou, Y. and Lease, M. (2010). Mobile Phone Search for Library Catalogs. ASIST October 22–27,
2010 held at Pittsburgh, PA, USA. Available at: https://www.ischool.utexas.edu/~ml/papers/broussard-asist10.pdf.
Dhiman, A.K. (2003). Basics of Information Technology for Librarians and Information Scientists. 2 Vols. Ess
Ess Publications, New Delhi.
Dhiman, A.K. and Rani, Yashoda. (2012). Manual of Digital Libraries. 2 Vols. Ess Ess Publications, New Delhi.
Giles,
Nicola
and
Grey-Smith,
Sue
(2005).
Txting
Librarians@Curtin.
Available
at:
conferences.alia.org.au/online2005/papers/a12.pdf.
Iwhiwhu, B. E., Oghenero, R. J. and Aroghene, E. (2010). Mobile Phones for Library Services: Prospects for
Delta State University Library, Abraka. Library Philosophy and Practice (e-journal). Paper 346. Available at:
http://digitalcommons.unl.edu/libphilprac/346.
Jharotia, A.K. (2015). Mobile Applications and Technologies for Libraries: An Overview. In Salek Chand, M.
Natrajan and R.N. Malviya edited “Knowledge Organization in Academic Libraries: Digital India– Digital
Libraries”. Library Professionals Association, New Delhi. Pp. 155-170.
Kakana, F. (2009). Information Provision to Students using Mobile Phones: A Case Study of the University of
Zambia Library. Zambia Library Association Journal. 24 (1-2): 20-28.
Khare, N. (2009). Libraries on Move: Library Mobile Applications. In Jagdish Arora edited `E-Content
Management: Challenges and Strategies (CALIBER-2009 Papers). INFLIBNET, Ahemdabad. Pp. 272-278.
Kroski, Ellyssa (2008). On the Move with the Mobile Web: Libraries and Mobile Technologies. Library
Technology Reports. 44 (5). Available at: http://www.alatechsource.org/ltr/on-the-move-with-the-mobile-weblibraries-and-mobile-technologies.
Lippincott, J.K. (2008). Mobile Technologies, Mobile Users: Implications for Academic Libraries. ARL. 261: 1-4.
Schmidt, J. (2013). LIS: Investigations. INCITE. 34 (3): 14.
Taylor, S. and Starling, A. (2004). A Billion Internet-enabled Mobile Phones. Web Developers Journal. Available
at: http://www.webdevelopersjournal.com/articles/billion_wap.html.
Vollmer, T. (2010). There’s an App for That! Libraries and Mobile Technology: An Introduction to Public Policy
Considerations. ALA Office for Information Technology Policy Brief No. 3. American Library Association,
Washington (USA).
Ye, Chao (2010). Application and Trend of Mobile Digital Library Services. Proceedings of the 2010 International
Conference on Information Technology and Scientific Management. (ICITSM 2010 E-BOOK). Scientific Research
Publishing, USA. Pp. 170-173.
ISBN 1-63102-455-8
369
CHALLENGES IN SETTING UP THE WEB BASED ONLINE
PUBLIC ACCESS CATALOGUE (WEB OPAC) AT LIBRARY
CUM DOCUMENTATION CENTRE OF ICHR: A CASE
STUDY
Ramesh Yernagula | Dy. Director (Doc.) | Indian Council of Historical Research | New Delhi |
ryernagula@gmail.com, dd.doc@ichr.ac.in
Abstract: This paper explains the Challenges encountered in setting up the Web based Online
Public Access Catalogue (Web OPAC) of LibSys 7 in the Linux Server and its integration with
NATTING functionality of Cisco Router 9091 for automation of Library cum Documentation
Centre of Indian Council of Historical Research. LibSys is a commercial library automation
package. The developer has made benchmarking general purpose automation software for the
library housekeeping services. The paper also shares the technicality for hosting the Web Opac
with limited resources and helps the Libraries who are interested to host their LAN OPAC into
WebOpac.
Keywords: WebOpac, Cyberoam, Natting
INTRODUCTION
The Library cum Documentation of ICHR is a premier National Resource Centre for historical collection in the
Country. The collections consisting of books, journals, microfilms, microfiches and rare special reference books
etc. Library automation is the application of Information and Communication Technologies (ICTs) to bring the
automated library operations and services. There are number of modern commercial and open/free source
software's available integrating various features to automate the operation of library and documentation centre
in the profession. Adopting commercial or open/free source software in library automation has some merits and
demerits. Depending on the need of Library cum Documentation centre, we chose the Libsys 7 in terms of
comparative statement prepared among software to select the software for automation.
An OPAC is a mirror of library services. “An OPAC provides the users online access to the library’s catalogue
allowing them to search and retrieve records from the online catalogue and depending on the underlying library
management software, it also offers several other facilities such as online reservation, borrower status checking
and so on” (Ansari and Amita, 2008).
“Library catalogue is a primary source of information for the Library’s key resources whether access to them
via OPAC or the Web” (Kennedy, 2004).
"OPACs are the interfaces and very valuable extensions of the functionality that help user communicate with
the collections of a library. The 3rd generation OPACs incorporates features that are characterized by the
facilities of World Wide Web (WWW)"( Madhusudhan, m 2011). The Web OPAC module of LibSys 7 is one
of the strongest feature for selection of this software.
Main functionality of Libsys 7 Web OPAC:
These features are succinctly briefed here after comprehensive study of Libsys 7.
Online Public Access Catalogue (OPAC) searchable through the Council website.
Having provision to access the federated Search on local as well as external databases for more fruitful
search results.
Has provision to review or rate the title (s) by users in the Webopac.
Having provision can User may give feedback and recommendations through OPAC for purchasing new
books. Helps the librarians to judge the needs of the members and accordingly purchase new titles.
User may give feedback and recommend new titles through webOPAC.
370
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Having provision of Bulletin Board is available in OPAC for sharing any important information related
to Library & Documentation services.
Having provision of RSS Feeds. Online information, advertisements and alerts can be fed into the Web
OPAC to provide live information / updates to users.
Having provision of Z39.50 protocol compliance. software allows catalogue searching which are
available on the Internet.
Retro conversion of books & journals: The Library cum Documentation Centre has been successfully retro
covered more than 50000 records in AACR2 format through Libsys 7. These records are accessible WebOpac
of ICHR.
Libsys Setup at ICHR: The below Table 1 describe our server installation setup against the minimum
recommendation of LibSys developer. The server was acquired in the year 2011.
Table 1: LibSys Sever setup developer recommendation wise setup
System
LibSys Setup at ICHR
Server
Application Server
IBM: CPU: 3 GHz Xeon processor or latest,
RAM: Minimum 6-8 GB, HDD: 160-250 GB
SCSI or SAS HDD R
J-Boss or Tomcat.
RDBMS
MySQL
Operating System
Red Hat Linux 9.0 or above.
Web Server
Apache (Linux)
WebOPAC
Router for ISP
Gateway &
NATTING Issue
Firewall for Anti
Spam .
Clients Configuration
Cicso Router 9091
Cyberoam Cing100
Pentium IV (or higher) work station, 2GB RAM,
300GB Hard Disk Drive, CD-Drive, Network
adapter, Monitor, Preinstalled Windows XP
WebOpac of ICHR Screenshot:
ISBN 1-63102-455-8
371
Challenges in Setting up the Web Based Online Public Access Catalogue (Web OPAC) At Library cum Documentation
Centre of ICHR: A Case Study
Major Challenges: We proposed for the automation for Library cum Documentation Centre in 2011. The
Competent authority were pleased to accept the proposal for Libsys 7 software and did initiate the retro
conversion for books & journals in April 2011. The task was completed in 2012 and made available in Libsys
Server OPAC with the following constraints:
Lack of Technical expertise
Lack of Local area Network (LAN) Server
Lack of internet leased line
Financial constraints
Until we resolve the above problems, it is not possible to access WebOpac, at the same time, we had initiated to
set up to the Local area network (LAN) in T5 category for the entire office and have finished setting to up the
Local Area Network (LAN) and made available to access OPAC across the Council in January, 2013.
Thereafter, proposed for internet leased line for hosting the Opac on Web. We received an immediate support
from the authority to go ahead with limited facilities due to financial constraints i.e 1 mbps speed of internet &
a small modem to configure the IP range to access the WebOpac. Meanwhile, the change of administration, we
got very good moral and financial support to enhance the infrastructure of the same i.e 1 mbps to 4mbps speed
of internet & a modem to Cicso Router and Cyberoam for firewall and Netting Issues.
How to forward IP of WebOpac without LAN Server:
As such our office doesn't have LAN Server. Hence, it is not possible without LAN Server to fix the Public IP
for WebOpac. The Technical expert advised us to fix it in the Router which is using for internet Gateway
services and avail its Netting functionality. It was success for configuring the WebOpac and made available in
the homepage of ICHR. I wanted to say if the institute/organisation having internet leased line and their library
is interested to setup the Web based OPAC subject to availability of their LMS in the server than it is possible
to fix the problem for WebOpac
Router: The Council has acquired Cicso 2911 for actualization of internet bandwidth alongwith Neting
functionality.
Cyberoam Unified Threat Management(UTM): Cyberoam Firewall offers stateful and deep packet
inspection, zero-hour protection by blocking intrusion attempts, against malware, Trojans and The Gateway
Anti-Virus and Anti-Spyware solution.
Screenshot of Netting issue: "Network address translation (NAT) is a function by which IP addresses within a
packet are replaced with different IP addresses. This function is most commonly performed by either routers or
firewalls. This sample chapter from Cisco Press focuses on NAT within routers".( Doyle, J & Carroll, J.2002)
372
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Finally, We successfully implemented with cooperation of the Competent authority of the Council by August
2014.
The OPAC is customised to access users in both home page & tab of Library cum Documentation Centre.
CONCLUSION
Nevertheless, i can state that to facilitate users to access the Web OPAC is the ultimate solution for effective
access of library collections and services.
ACKNOWLEDGEMENT
This work would have not been possible without the continues financial support and moral encouragement of
the institute.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Ansari, Mehtab Alam, and Amita. (2008). Awareness and Use of OPACs in Five Delhi Libraries.The Electronic
Library 26, no.1: 111-29.
Doyle, J & Carroll, J.(2002). Network Address Translation, Cisco Press
Indu Bhushan,etc. (2011). Migration to web-based library management (libsys 7) and its integration with RFID
client software (lsmart),RRI.
Kennedy, M.R. (2004). Dreams of perfect programs: managing the acquisition of electronic resources library
collections, Acquisitions, & Technical Services 28, no.:449-58.
Margam Madhusudhan, (2011). Branding & Marketing, &Strategic Direction, Best Practices & Performance
Evaluation of Special Library Services, ICoASL.
http://www.libsys.oc.in
http://www.ichr.ac.in
ISBN 1-63102-455-8
373
APPLICATION OF RADIO FREQUENCY DENTIFICATION
TECHNOLOGY (RFID) IN LIS MEDIA CENTRE
Vijay Singh | Librarian | (Sushant School of Art & Architecture) | Ansal University | Gurgaon, Haryana |
Vijaylibrary1980@gmail.com
Vijay Singh Chauhan | Chief Librarian | Bhopal Memorial Hospital & Research Centre | Bhopal |
chauhanvijaysingh@rediffmail.com
Devendra Mani Pandey | Deputy Librarian | Madan Mohan Malaviya University of Technology | Gorakhpur |
dmpandey16@gmail.com
Abstract: RFID (Radio Frequency Identification) systems have been used in libraries and LIS
Media centre for multiple purposes. RFID developed for military applications in the 1940s, it had
found its application in many other areas including the libraries. The system components,
standards and protocols for RFID based systems with special reference to library application are
discussed in detail. Also discussed are the advantages and disadvantages of RFID application in
libraries. This paper briefly traces the origins of this technology and its applications in various
sectors.
Keywords: Radio Frequency Identification, RFID, Surveillance Systems, Security, Libraries.
INTRODUCTION
The rapid growth and development of computer and communication technology has changed our society
tremendously. To meet the information explosion and high demand of information the libraries are now
upgraded to digital library from traditional one. Digital Library service can be regarded as a dramatic
improvement of certain aspects of traditional library services. The main purpose of digitization is to overcome
the twin tyrannies of time and space.
Radio-frequency identification is emerging as a good way to improve automation and security in
Library Systems. For more than five years, libraries all over the world have been taking advantage of
radio-frequency identification (RFID) technology. Current market research shows that RFID systems are
now used in about 20 million books worldwide. The driver for today's libraries to adopt RFID is the need
to increase efficiency and reduce cost. Automation and self-service can help libraries of all sizes toward
achieving these aims, and RFID has the added advantage that it can also provide security for the range of
different media on offer in libraries.
OBJECTIVES OF THE STUDY
The main objective of this study was to examine the use of RFID technology in LIS Media Centre for various
purposes. In particular:
To analyze the extent of feasibility of RFID in LIS Media center
To identify the efficacy of digital technology in combating ubiquitous thefts
To identify the problems associated with RFID effectiveness
To develop a synergy between RFID facility and library requisites by their juxtaposition
To find the prospects of RFID in digital libraries
Rfid (Radio Frequency Identification) Technology: RFID is the latest technology to be used in library theft
detection systems. As of late 2005, an estimated 300 libraries were using RFID systems. Unlike EM (ElectroMechanical) and RF (Radio Frequency) systems, which have been used in libraries for decades, RFID-based
systems move beyond security to become tracking systems that combine security with more efficient tracking of
materials throughout the library, including easier and faster charge and discharge, inventorying, and materials
handling.
374
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Figure 1: RFID technology used in library
RFID is a combination of radio-frequency-based technology and microchip technology. The information
contained on microchips in the tags affixed to library materials is read using radio frequency technology
regardless of item orientation or alignment (i.e., the technology does not require line-of-sight or a fixed plane to
read tags as do traditional theft detection systems) and distance from the item is not a critical factor except in the
case of extra-wide exit gates. The corridors at the building exit(s) can be as wide as four feet because the tags
can be read at a distance of up to two feet by each of two parallel exit sensors. (The devices used for circulation
and inventorying are usually called “readers” while the ones used at building exits are usually called “sensors.”)
The tags or targets used in RFID systems can replace both EM or RF theft detection targets and barcodes,
although the system that 3M introduced in 2000 replaced only barcodes in the belief that EM is superior to
RFID for security. [3M did introduce a comprehensive RFID product that replaces both EM and barcodes in
2004].
The Benefits of RFID Technology:
Rapid Charging/Discharging: The use of RFID reduces the amount of time required to perform
circulation operations. The most significant time savings are attributable to the facts that information can
be read from RFID tags much faster than from barcodes and that several items in a stack can be read at
the same time.
The other time savings realized by circulation staff are modest unless the RFID tags replace both the EM
security strips or RF tags of older theft detection systems and the barcodes of the automated library
system—i.e., the system is a comprehensive RFID system that combines
Security and the tracking: It offers very high security. Each tag is identified by a Unique
Identification Number (UIN), which can be either factory or manually programmed and then
password protected. The excellence of this tag is that the data on the chip that uses sophisticated
algorithm techniques cannot be duplicated or manipulated. Hence making it the perfect tool for
Secure Access Control.
Simplified patron self-charging/discharging: For patrons using self-charging, there is a marked
improvement because they do not have to carefully place materials within a designated template and they
can charge several items at the same time. Patron self-discharging, which can be achieved by installing
readers in book drops or with self-discharge stations, shifts work from staff to patrons.
ISBN 1-63102-455-8
375
Application of Radio Frequency Dentification Technology (RFID) in LIS Media Centre
High reliability: The readers are highly reliable. Several vendors of RFID library systems claim an
almost 100 percent detection rate using RFID tags. Anecdotal evidence suggests that is the case whenever
a reader is within 12 to 14 inches of the tags, but there appears to be no statistical data to support the
claims.
High-speed inventorying: A unique advantage of RFID systems is their ability to scan books on the
shelves without tipping them out or removing them. A hand-held inventory reader can be moved rapidly
across a shelf of books to read all of the unique identification information. Using wireless technology, it
is possible not only to update the inventory, but also to identify items, which are out of proper order.
Automated materials handling: Another application of RFID technology is automated materials
handling. This includes conveyor and sorting systems that can move library materials and sort them by
category into separate bins or onto separate carts. This significantly reduces the amount of staff time
required to ready materials for reshelving. Given the high cost of the equipment, this application has not
been widely used. There were approximately 70 systems in use in North America as of the second quarter
of 2005.
Long tag life: Finally, RFID tags last longer than barcodes because nothing comes into contact with
them. Most RFID vendors claim a minimum of 100,000 transactions before a tag may need to be
replaced.
Drawbacks of RFID Technology:
High cost: The major drawback of RFID technology is its cost. While the readers and sensors used to
read the information are comparable in cost to the components of a typical EM or RF theft detection
system.
Vulnerability to compromise: It is possible to compromise an RFID system by wrapping the protected
material in two to three layers of ordinary household foil to block the radio signal. Clearly, bringing
household foil into a library using RFID would represent premeditated theft, just as bringing a magnet
into a library using EM technology would be. It is also possible to compromise an RFID system by
placing two items against one another so that one tag overlays another. That may cancel out the signals.
This requires knowledge of the technology and careful alignment.
Removal of exposed tags: 3M, which recommends EM for security and RFID for tracking, argues that
EM strips are concealed in the spines (30 percent of customers) or the gutters (70 percent of customers)
of books and are, therefore, difficult to find and remove; while RFID tags are typically affixed to the
inside back cover and are exposed for removal. The author found no evidence of removal in the libraries
he visited, nor did any of the library administrators contacted by telephone report a problem. That does
not mean that there won’t be problems when patrons become more familiar with the role of the tags.
If a library wishes, it can insert the RFID tags in the spines of all except thin books, however, not all
RFID tags are flexible enough. A library can also imprint the RFID tags with its logo and make them
appear to be bookplates, or it can put a printed cover label over each tag.
Exit sensor problems: While the short-range readers used for circulation charge and discharge and
inventorying appear to read the tags 100 percent of the time, the performance of the exit sensors is more
problematic. They must read tags at up to twice the distance of the other readers. The author knows of no
library that has done a before and after inventory to determine the loss rate when RFID is used for
security. Lacking data, one can only conjecture that the performance of exist sensors is better when the
antennae on the tags are larger.
Perceived Invasion of Patron Privacy: There is a perception among some that RFID is a threat to patron
privacy. It is argued that the tags contain patron information and/or title information; and that the tags can be
read from a distance after someone has taken the materials to home or office.
376
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
The vast majority of the tags installed in library materials contain only the item ID, usually the same number
that previously has been stored on a barcode. The link between borrower and the borrowed material is
maintained in the circulation module of the automated library system, and—unless a library takes the unusual
step of retaining patron borrowing histories—is broken when the material is returned. When additional
information is stored on the RFID tag, it is limited to information about the item, typically holding location and
call number, but rarely author and/or title.
The RFID tags can only be read from a distance of two feet or less because the tags reflect a signal that comes
from a reader or sensor. It is, therefore, not possible for someone to read tags from the street or an officebuilding hallway. In order to read tags from a distance of more than two feet, it would be necessary to greatly
enlarge the tags or greatly increase the power of the readers. A library has no reason to purchase larger, more
costly tags. An electrical engineer at N.V. Philips in the Netherlands estimated that it would require a truckmounted reader to read the tags used by libraries from a distance of more than ten feet.
Perceptions, even when mistaken, may have real consequences. The Intellectual Freedom Committee of the
American Library Association has responded to concerns about RFID raised by privacy advocates by drafting a
set of principles:
Implement and enforce an up-to-date organizational privacy policy that gives notice and full disclosure as
to the use, terms of use, and any change in the terms of use for data collection via new technologies and
processes, including RFID.
Ensure that no personal information is recorded on RFID tags, which, however, may contain a variety of
transactional data.
Protect data by reasonable security safeguards against interpretation by any unauthorized third part.
Comply with relevant federal, state, and local laws as well as industry best practices and policies.
Ensure that the four principles outlined above must be verifiable by an independent audit.
The Council of the American Library Association adopted these principles on January 19, 2005. The Intellectual
Freedom Committee has continued its work and introduced a set of guidelines for RFID use for discussion at the
2006 ALA Mid-winter Meeting in San Antonio. Among them, the following are the most significant:
Libraries should not use RFID systems to track individual library users Libraries should remove any
personally identifiable information from statistical data collected by RFID system.
Due to the potential for eavesdropping, libraries should use hardwire connections and not wireless
connections for all communications between RFID systems and the ILS involving personally identifiable
information.
Libraries should encrypt information on RFID tags.
Libraries using “smart cards” should use an “opt-in” system that allows library users to choose between
“smart cards” and barcode-enabled cards.
Libraries should be aware that independent researchers have concluded that current RFID technology
cannot preserve user privacy in the library.
The area in which RFID represents the greatest potential threat to patron privacy is the use of the “smart card”
as a patron ID card. A “smart card” is an RFID card with encryption. That would make it possible to have the ID
card also function as a “debit” card, with value added upon pre-payment to the library and value subtracted
when a patron used a photocopier, printer, or other fee-based device, or wished to pay fines or fees. Almost none
of the score of RFPs the author has examined include a mandatory requirement for ‘smart cards.” The few that
do, ask for that as an option. All stipulate encryption to protect patron privacy. The quality of the encryption is
the key to patron privacy.
Because of the attention that has been focused on privacy issues, it is important to educate library staff and
patrons about the RFID technology used in libraries before implementing a program. The best way to do that is
to emphasize that RFID technology is not one technology, but several. E-Z pass is RFID that is meant to be read
from a distance. It would be impractical to affix tags of that size and cost to library materials. The same is true
of the tags used on pallets in warehouses. Further, a library should stress that it does not store patron information
ISBN 1-63102-455-8
377
Application of Radio Frequency Dentification Technology (RFID) in LIS Media Centre
on the tags in library materials that it protects patron privacy by breaking the link between borrower and
material after the material is returned, and it subscribes to the privacy guidelines in the American Library
Association’s Code of Ethics.
Several states are considering legislation that would pose restrictions on the use of RFID by retailers and
libraries. It is, therefore, important to monitor legislative activity and to be prepared to inform legislators about
the differences between retail and library applications, and how libraries protect the privacy of their patrons.
Library administrators should be sure to keep their boards informed.
Components of RFID System in LIS Media Centre:
A complete RFID system is comprised of 3 components:
Figure 2: RFID Components
An RFID Tag, composed of a chip attached to an antenna.
An RFID Reader connected to a computer, which takes the place of a bar code scanner. It can also be
battery powered to allow mobile transactions with RFID tags. The RFID reader is a real time computer,
which handles the communication between the information system and the RFID tag.
An RFID Antenna connected to the reader, which has a size and a structure that is determined by the
distance for communicating and performing at a given stage. This antenna/ reader combination activates
the RFID tag and transfers data by emitting radio-frequency pulses.
An RFID station, composed of the RFID reader and the Antenna. It can read information stored in the
RFID tag and also updates the RFID tag with new information. It generally holds application software
specifically designed for the task to perform at this stage.
RESEARCH DESIGN
The methodology adopted for the study was the use of a survey based on a structured questionnaire including
observation. The other sources of data include minutes of meetings, internal reports, briefings, planning
documents, schedules etc. the interviews were guided by a set of criteria so as to ensure the full scope of
information is extracted.
The research is designed with utmost care to every components of RFID technology in the LIS Media Centre,
the subject of the study. The investigation is aimed at unearthing the challenges faced by the users. The basic
components of RFID from microchips, software & hardware support has thoroughly been looked into to draw
productive conclusion. The most crucial parameter of the investigation is the installation of hardware. It’s
positioning, quality and the compliance to the RFID specifications and quality has been delved into in fine
details.
RESULTS
Major Issues Faced in LIS Media centre:
To improve the services for user community
Increased material handling time
Increasing theft of valuable materials (rare materials and cost materials)
378
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Mis-shelved Materials
Poor inventory accuracy and Lack of security arrangements
Removal of Installed RFID Tags by Users
Initial Activation problem in Tags
EVALUATION
RFID, as a technology has proved to be an effective data capturing method. In LIS, the implementation was
slow but has become a reality. Although the success of the facility has attracted certain concerns. Some of the
findings from this study showed:
RFID technology is very costly and cannot change frequently, thus good quality tags should be used so
that there is no need to remove exposed tags frequently
Self service of RFID may provide reservations, enquiries and integration with management information
and anti-virus protection.
The library may also be provided ‘health safety’ furniture and flexible/adaptable ergonomics.
The library may provide book drop boxes outside the libraries in future. This facility offers
unprecedented flexibility and convenience for returning library items at any time of the day even when
the library is closed. This system will display the return status and print receipt showing that books are
returned.
The library must initiate privacy concerns, inventory control, cost effectiveness, monitoring the
effectiveness of RFID and provide adequate user training.
RFID system is flexible technology that is convenient easy to use and well suited for automatic operation.
Patron satisfaction has become crucial for librarians. Today, many libraries are turning to RFID technology
because it has proven itself in terms of security, convenience and efficiency in collection management and
effective services for user community.
CHALLENGES
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers.
Many solutions have been suggested but almost as many ways have been found to break them. An approach by
Ohkubo, Suzuki and Kinoshita using an internal refreshment mechanism seems to protect privacy well but is not
scalable. We introduce a specific time-memory trade-off that removes the scalability issue of this scheme.
Additionally we prove that the system truly offers privacy and even forward privacy.
The technology can also improve circulation and inventory control, which helps to optimize the allocation of
labor and financial resources. This means that libraries can relieve their professional employees of routine work
and operational tasks. For scientific libraries, this frees up more time for research and other tasks.
Libraries are a fast growing application of RFID; the technology promises to relieve repetitive strain injury,
speed patron self-checkout, and make possible comprehensive inventory. Unlike supply-chain RFID, library
RFID requires item-level tagging, thereby raising immediate patron privacy issues. Current conventional
wisdom suggests that privacy risks are negligible unless an adversary has access to library databases. The
libraries and librarians globally as well as locally are facing various challenges due to the implementation of
ICT, unprecedented growth in printed and electronic resources, recent trends and developments in teaching
learning process. Librarians need to face various challenges for providing efficient, effective and personalized
value added services and products to the stakeholders.
Some of the major challenges faced by librarians are as follows:
Development of Information Infrastructure
Need for Web based Services
Explosive growth of Information
Resource Sharing and Collaboration
Marketing of Library & Information Products
Digital Preservation
ISBN 1-63102-455-8
379
Application of Radio Frequency Dentification Technology (RFID) in LIS Media Centre
Security in Digital Libraries
CONCLUSION
Recent developments in hardware and software for RFID systems have boosted the potential of this technology
in library automation and security. 'Today, the one important result for libraries is the ability to use nonproprietary systems, now that the new generation of RFID-chips with standard ISO 15693 (to be integrated into
ISO 18000-3) is available. 'With this technology, libraries do not have to depend on one single supplier for tags.
As libraries make a long-term investment, which mainly consists of the quantity of tags needed, this is a very
important requirement. Integration of RFID with digital libraries will ensure considerable security and facilitate
the librarians and information scientists to provide more value added services to user’s community for working
comfortably in digital era like LIS Media Centre.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
380
Backhouse, Gaynor. 2006. RFID: Frequency, standards, adoption and innovation, JISC Technology and Standards
Watch. London
Kumar, Rakesh. 2008. Role of RFID in Academic Libraries, International Caliber, Allahabad.
National Information Standards Organization. 2007. RFID in U.S. Libraries Baltimore.
Waddenkeri, Mallikarjun. 2006. RFID TECHNOLOGY IN LIBRARY AND INFORMATION CENTERS:
RELEVANCE AND PROSPECTS, 4th International Convention CALIBER, Gulbarga.
Lindquist, Mats G. 2003. RFID in libraries - introduction to the issues, Berlin
Shahid, Sayed MD, 2005. Use of RFID Technology in Libraries: a New Approach to Circulation, Tracking,
Inventorying, and Security of Library Materials, Library Philosophy and Practice Vol. 8, No. 1
Madhusudhan, Margam. 2010. RFID technology implementation in two libraries in New Delhi, Program:
electronic library and information systems Vol. 44 No.2
M, Dhanalakshmi. 2009, RFID Based Library Management System, Proceedings of ASCNT, pp. 227 – 234, Noida
Das, Raghu. 2002. An Introduction to RFID and Tagging Technologies, IDTechEx Ltd., Cambridge
http://www.eff.org/Privacy/Surveillance/RFID/20031002_sfpl_comments.php.
http://www.jisc.ac.uk/uploaded_documents/jtap-015.doc
Nicholson, S. (1995) Management of the Digital Library: New Techniques for a New Technology. Available
online at http://www.bibliomining.com/nicholson/newvl.html
H.M. Gladney and J.B. Lotspiech, Safeguarding Digital Library Contents and Users: Assuring Convenient
Security and Data Quality, D-Lib Magazine, May 1997.http://dlib.org/dlib/may97/ibm/05gladney.html
http://glossary.ippaper.com/default.asp?req=knowledge/article/489
http://www.electrocom.com.aupdfs/RFID%20vs%20Barcodes.pdf
http://www.srels.org/index.php/sjim/article/view/44623
Bibliotheca RFID Library Systems: http://www.bibliotheca-rfid.com/and http://www.dtechdirect.com/
(distribution partner in the UK and Ireland)
C.L.Borgman. Where is the Librarian in the Digital Library. Communications of the ACM, Vol.44(2001), pp6667.
ISBN 1-63102-455-8
LIBRARY SECURITY RETHINKING: A STUDY
Dr. M. Ananda Murugan | Deputy Librarian | Banaras Hindu University | Varanasi | am9996@yahoo.com
Abstract: The libraries are facing various issues such as stealing materials from library materials
destructions by the users and insects, design in construction of buildings .The users may do
considerable damage to the collection and they may disturb library environment by illegal acts.
University libraries spend more and more money towards the acquisition of reading materials
such as books and journals in print and other electronic materials. Therefore in this paper an
attempt has been made to identify the untoward incidences among the 46 universities in Tamil
Nadu. Nature of damages for library resources is mainly mutilation. It is followed by theft,
deterioration and destruction.
Keywords: Library security, Safety & Security, Library materials
INTRODUCTION
The collection such as books, periodicals, e-resources, equipments and other materials are valuable information
resources in an academic libraries .The information thrust of the users leads increase in collection. National
development in all aspects like social economic, education, research, security etc. highly depend on the
availability of information. The government and private organizations are spending more money towards the
acquisitions of information materials highly depend on the availability of information, the same time every
library is losing resources by theft, mutilation, destruction and deterioration, these problems are regularly
encountered by the materials of libraries. These are not new for libraries it happens from ancient period, the
management of the resources is being part of the library management responsibility.
LIBRARY SECURITY
The problem of theft – and of the mutilation – of books and other materials held in libraries is not new. Chained
in collections provide one mark of the longevity of the problem and indeed. Munn (1935) traces origins back to
ancient Egypt. The management of the theft and mutilation has thus long been part and parcel of the librarian’s
responsibilities, although it has not been a straightforward task in a service. There are indications that the
apparent difference in attitude towards theft and mutilation among the library users is diminishing. Growing
need felt among the librarians for the wider dissemination of information about the nature of security issues
essential for the untoward incidences occurring in the libraries. Therefore in this paper an attempt has been
made to identify the problems and solutions for the untoward incidences.
REVIEW OF LITERATURE
Abifarin (1997), Allen (1997) and Bello (1998) reported high rate of book theft, mutilation and misplacing of
books in Nigerian academic libraries. They suggested measures to reduce the problems, which include
tightening security at library entrances and exits, expulsion of students involved in theft and mutilation,
provision of multiple copies of heavily used text, reducing the cost of photocopying.
Lorenzen (1996) and Holt (2007) identified several such incidents, (i) theft of physical materials; (ii) theft or
alteration of data; and (iii) theft of money as major security crime in libraries. Studies conducted by
Ajegbomogun (2004), Bello (1998) and Holt (2007) identified rare books, manuscripts and special collections as
frequent target of theft and mutilation because of the special demand for in depth studies of such materials. The
above studies indicate that the processes that handle access to collection such as acquisition, technical processes,
circulation, shelving and storage of items in libraries need to be considered from the security perspectives and
assessed by a collection security measurement instrument.
The special collections of libraries are vulnerable to theft and mutilation. Valuable and irreplaceable materials
are usually stored in these collections. As such, these collections are vulnerable to theft from professional
thieves. Otness and Otness (1988) looked at the problem of the theft of older maps from libraries. The two
described what they called going plating which was the theft of valuable plates from old maps and atlases.
ISBN 1-63102-455-8
381
Library Security Rethinking: A Study
Several steps were listed to frustrate thieves. It was speculated that most of the theft of plates was done by
professional thieves. Ragains (1991) also reported on this problem.
Bahr (1989) concentrated on internal theft a library. Not all theft is perpetuated by patrons. Some library
employees take material from the library without properly circulating it. As library employees know how to
defeat the security system, this is, according to Bahr, one of the hardest types of theft to prevent.
Hendrick and Murfin (1974) theorized that academic libraries were the most vulnerable kind of library to
periodical mutilation. They study a large academic research library to determine its periodical mutilation rate
and they discovered that the library had a mutilation rate of 9% for periodicals. It has been mentioned that
installation of an electronic security system enables to drop 23% of vulnerable activities. It was concluded that
the security system was having an influence on student mutilation activity.
Book mutilation was reported by Taylor (1981). He was disturbed by the high incidence of book mutilation and
vandalism. In particular, he was concerned by the prevalence of underlining and highlighting in library books
and by the editorial comments that also were appearing in library books. He compared this damage to putting
scratches on a record. Roberts25 (1994) reported the same problems, concentrating on book abuse as it related to
bookmarks. Interestingly, Roberts believed that the lack of bookmarks can lead to book mutilation.
Lorenzen (1993) did a study of over 100 academic libraries in Ohio to determine the extent of security
problems. He discovered that the periodical mutilation rate for the state was only 2.33%. However, the rate was
higher for university libraries and 62.5% of university libraries considered periodical mutilation to be a large
threat to the library collection. In contrast, not a single seminary library in the state considered this a problem.
O’Neill and Boomgaarden (1995) reported on book deterioration and loss in Ohio libraries. It was discovered
that nearly 12% of books in 100 Ohio libraries were missing. This compared with a little more than 3% that
were unable due to deterioration. Therefore, it appeared that book theft was a bigger problem for libraries than
their book deterioration.
OBJECTIVES OF THE STUDY
The major objectives of the study are
To identify the nature of damage to the collections such as theft, mutilation, destruction and deterioration
of the collections in the university libraries.
To identify the security procedures to be adopted in the libraries for preventing theft, mutilation,
destruction and deterioration
HYPOTHESES
The following hypotheses have been setup for the study.
There is a significant variation in reasons for theft, mutilation and destruction of the collections among
University Libraries.
There is no significant difference in the means to solutions for theft, mutilation and destruction of the
collections in university libraries.
METHODOLOGY
Questionnaire method is used for the study. Out of 58 universities, 7 universities are functioning as examining
bodies and a well established library exists in the remaining 51 universities. Questionnaires were sent to the
librarians of these 51 universities and only 46 questionnaires (90.19%) were responded.
DATA ANALYSIS
Sample: A planned questionnaire was constructed and administered to the librarians of these 51 universities and
that are functioning in Tamil Nadu. Out of 51, only 46 (90.19%) were responded. These 46 respondents were
classified according to domain in which the universities are concentrating. Accordingly 9(19.5%) on arts and
382
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
science, 17(37%) engineering, 4(8.7%) medicine, 8(17.4%) multiple domain and 8(17.4%) belongs to other
different domains. These universities are further grouped based on type of universities. 7 (15.2%) of respondents
are unitary type, 16(34.8%) belongs to affiliated nature, 23(50%) are from private universities.
Nature of Damage: The library collections face majority of damages due to theft, mutilation, destruction and
deterioration. These extents of damages were identified in three point scale such as Low, Medium and High.
The resources were shown in table 1.
Table 1: Nature of Damage
S. No.
1
2
3
4
Description
Low Medium High
M
St
R
14
19
13
Theft
1.9783 0.77428 2
30.4% 41.3% 28.3%
12
15
19
Mutilation
2.1522 0.81561 1
26.1% 32.6% 41.3%
28
18
0
Destruction
1.3913 0.49344 4
60.9% 39.1%
.0%
15
21
10
Deterioration
1.8913 0.73721 3
32.6% 45.7% 21.7%
The mean and standard deviation are calculated for the above factors. The ranks were assigned based on mean
and standard deviation. Among the four factors mutilation has been identified as first and it is followed by theft
and deterioration. Destruction seems to be least among university libraries.
Nature of damage and Type of Universities: The nature of damage has been further evaluated based on the
type of universities and the same is presented in table 2.
Table 2: Nature of Damage Vs Type of Universities
S.
No.
Description
1
Theft
2
Mutilation
3
Destruction
4
Deterioration
Unitary University
L
M
H
4
3
0
57.1% 42.9%
.0%
1
3
3
14.3% 42.9% 42.9%
4
3
0
57.1% 42.9%
.0%
2
3
2
28.6% 42.9% 28.6%
Affiliated University
L
M
H
3
7
6
18.8% 43.8% 37.5%
5
6
5
31.3% 37.5% 31.3%
10
6
0
62.5% 37.5%
.0%
2
10
4
12.5% 62.5% 25.0%
Private University
L
M
H
7
9
7
30.4% 39.1% 30.4%
6
6
11
26.1% 26.1% 47.8%
14
9
0
60.9% 39.1%
.0%
11
8
4
47.8% 34.8% 17.4%
Theft is medium in private universities (9, 39.1%) and affiliated universities (7, 43.8%) where as it is low in
unitary type universities (4, 57.1%). It is high in 7 private universities (30.4%); 6 affiliated universities (37.5%)
and it is low in 7 private universities (30.4%), 3 affiliated universities (18.8%). It seems that the theft in unitary
type universities is nil.
Mutilation is high in private universities (11, 47.8%) and affiliated universities (3, 42.9%) where as it is medium
in unitary type universities (6, 37.5%). It is medium in unitary type universities (3, 42.9%); 6 affiliated
universities (37.5%); private universities (6, 26.1%) and it is low in private universities (6, 26.1%), affiliated
universities (5, 31.3%) and unitary type universities (1, 14.3%).
Destruction is low in all types of universities i.e. 57.1% in unitary type universities, 62.5% in affiliated
universities and 60.9% in private universities.
ISBN 1-63102-455-8
383
Library Security Rethinking: A Study
Deterioration is medium in unitary type universities (3, 42.9%) and affiliated universities (10, 62.5%) where as
it is low in private universities (11, 47.8%).
CONCLUSION
Almost all libraries nowadays open its stack to the users as open access system and users are freely access with
out any restrictions .In security view, the risk factor is high. Books are not items at the risk in libraries, records,
CD, DVD and Video cassettes in common places in many libraries collection for a number of years, and in more
recent times many libraries have began to build up large videos and optical discs, these items frequently
constitute the part of the library collection and their popularity make them attractive targets for theft. The new
acquisition books by well established, popular authors books on popular subjects; demand for such materials
high and so is the incentive for readers to steal them. Library security is not restricted to the reading materials, it
also include safety of staff and users, users behavior ,building safety disaster such as fire, flooding and pest
control. Preventing these problems in libraries is a difficult and complicated to the librarians, it is a real problem
and it is as serious in the present century. Having safety and security measures and procedures to anticipate all
the threats to the entire library is clearly a process in which libraries must participate.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
384
Abifarin, A. 1997. Library stock security: The experience of the University of Agriculture Abeokuta, Nigeria.
Library and Archival Security, Vol.14, no.1: 11-19.
Ajegbomogun, F.O. 2004. Users’ assessment of library security: A Nigerian university case study. Library
Management, Vol.25, no.8/9: 386-390.
Allen, S.M. 1997. Preventing theft in academic libraries and special collections, Library Archives & Security,
Vol.14, no.1: 29-43.
Bahr, A.H. 1989. Thief in our midst. Library and archival security, 9 (3/4): 77-81.
Bello, M.A. 1998. Library security, material theft and mutilation in technological university libraries in Nigeria.
Library Management, Vol.19, no.6: 379-383.
Hendrick, C. & Murfin, M. (1974). Project library ripoff: A study of periodical mutilation in a university library.
College & Research Libraries, 25(6), 402-4.
Holt, G.E. 2007. Theft by library staff. The bottom line: managing library finances, Vol.20,no.2: 85-92.
Lorenzen, M. (1993). Security Problems of Ohic Academic Libraries. ERIC Document Reproduction Servics, no.
ED 367341.
O’Neil, E.T. & Boomgaarden, W.L. (1995). Book deterioration and loss: Magnitude and characteristics in Ohio
libraries. Library Resources & Technical Services, 39(4), 394-408.
Otness, H.M., & Otness, H. (August, 1988). Going plating Stealing maps from libraries. Western Association of
Map Libraries Information Bulletin, 19, 206-10.
Ragains, p. (1991). Availability and mutilation of U.S. Geological Survey publication: An analytic study at
Montana State University. The reference Librarian, no. 32, 247-57.
Roberts, F.X. (March 14, 1994). Bookmarks and the abuse of books. AB Bookman’s Weekly, 93 1125-6.
ISBN 1-63102-455-8
OPEN ACCESS JOURNALS IN THE FIELD OF LIBRARY
SCIENCE AND INFORMATION TECHNOLOGY: AN
ANALYSIS
Dr. Anil Agrawal | Assistant Librarian | Central Library | Banaras Hindu University | Varanasi |
anilagraw@rediffmail.com
Abstract: The paper gives an account of the Open Access Journals in the field of Library Science
and Information Technology. On the basis of data collected from the most authoritative online
directory of open access journals, i.e., Directory of Open Access Journals (DOAJ), it is found that
most of the Open Access journals in the field of Library Science and Information Technology are
published form USA (23) with India (2) having a meager contribution. The study shows that most
of the journals are published in English language and some of the journals are published in more
than one language. The study also reveals that the vast majority of the Open Access journals are
published by the non-profit organizations.
Keywords: Open access journals, Directory of open access journals, DOAJ, Library Science, Information
Technology
INTRODUCTION
It has been man’s quest to be able to identify, locate and have access to all records of knowledge available
anywhere and in any language, which might be of interest to him1. Recent advances in information and
communication technologies, especially the Internet and the web has revolutionized scholarly communication,
leading to innovations in the conduct of research as well as in the conveyance of ideas to readers 2. The open
access sources are playing a vital role in wider dissemination of research works and removing access barriers to
research works. The online dictionary of Library and Information Science defined open access journals as
“Scholarly periodical that makes full text of the articles. It publishes universally and freely available via internet
in easily read format”5.
The open access is the worldwide effort to provide free online access to scientific and scholarly research
literature, especially peer-reviewed journal articles and their preprints. Essentially it means the provision of free
immediate (upon publication), permanent access to research results for anyone to use, download, copy and
distribute. There are two type of open access journals : (1) the journals that are available in electronic version
only and are published at regular intervals on the internet and do not have any print-on-paper counterpart (2) the
journals which are available in both electronic as well as print version4.
OBJECTIVE OF THE STUDY
The study aims to identify the open access journals in the field of Library Science and information Technology
with the following objectives:
To find out the frequency of the open access journals in Library Science and information Technology
To find Year-wise distribution of the open access journals
To identify the leading countries in terms of publishing of Open Access journals in Library Science and
information Technology
To know the current status of open access journals
To identify the leading publishers of Open Access Journals
To find out the Language-wise distribution of Open Access Journals
To identify Publishing Pattern and Modes of availability of Open Access journals
METHODOLOGY
To achieve objectives of the present study, data was collected from the most authoritative online directory of
open access journals (DOAJ: http://www.doaj.org/). The DOAJ is designed, developed and maintained by Lund
University which, as on 22 July 2015, listed 10,434 open access journals of which 70 journals were listed under
ISBN 1-63102-455-8
385
Open Access Journals in the Field of Library Science and Information Technology: An Analysis
the subject heading Library Science and 3 Journals were listed under the heading Information Technology. The
factual data were imported from the website of the DOAJ in Microsoft Excel format for further analysis in
terms of number of journals, year and country of origin, language, formats, etc.
RESULT AND DISCUSSION
Frequency of open access journals: An attempt was made to identify the frequency of Open access Journals in
the field of in Library Science and Information Technology. It may be observed from Table 1, that the
frequency of 22 journals are Bi-Annual, frequency of 19 journals are quarterly, frequency of about one-fourth
journals are not fixed, frequency of 7 journals is annual, frequency of 5 journals is Fortnightly, and the
frequency of 1 journal each is bi-monthly and Tri-Annual. Table 1 shows that frequency of more that 56% of
the journals are Bi-Annual and Quarterly.
Table 1: Frequency of Journals
Periodicity
No. of Journals
Bi-Annual
Quarterly
Not fixed
Annual
Fortnightly
Bi-Monthly
Tri-Annual
22 (30.1%)
19 (26.0%)
18 (24.6%)
7 ( 9.6%)
5 ( 6.9%)
1 ( 1.4%)
1 ( 1.4%)
Total
73
Year-wise distribution of Open Access Journals: The growth in number of Open Access Journal available in
DOAJ for the last 13 years was analyzed. Table 2 shows that the maximum number of Journals (14) was
published in the 2013 and in the year 2014 no journal was published. It is to be noted that, the existence in
DOAJ is not necessarily the year of the founding of the journal, as older journals often have back issues that
have not yet been digitized and placed online. It may be observed from the year-wise analysis of open access
journals that during the year 2003 to 2010 there were 35 open access journals in the Library Science and
Information Technology and from the 2011 to 2015 the number of journals are 38 i.e. number of journals being
published in the last 5 years as open access is more as compare to previous 8 years (i.e. from 2003 to 2010).
Table 2: Number of Journals Year-wise
Year
Number of Journals
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
9
3
7
5
2
1
1
7
8
7
14
Nil
9
Total
73
________________________________________________________________________________________
386
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Country-wise distribution of Open Access Journals: Open access journals in Library Science and
Information Technology are published from 28 different countries. As shown in Table 3, highest number of OA
journals are published from USA (23) followed by Iran (5), Croatia and UK (4), Brazil, Netherland , South
Korea and Taiwan (3), Canada, Spain. India, Greece and France (2). Data presented in the table indicate that 15
journals are published from 15 countries. The Table shows that USA is the single country from which Open
Access Journals are being published much more and no other country comes near USA in terms of publishing of
open access journals in the field of Library Science and Information Technology.
Table 3 : Country-wise distribution of Open access journals
S. No.
Countries
No. of Journals
1
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
USA
Iran
Croatia
UK
Brazil
Netherland
South Korea
Taiwan
Canada
Spain
India
Greece
France
Germany
Australia
Romania
Poland
Chile
Costa Rica
Cuba
Czech Republic
Egypt
Italy
Lithuania
Pakistan
Slovenia
South Africa
Turkey
23
5
4
4
3
3
3
3
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Total
73
Current status of Journals: Table 4 shows the current status of publishing of the open access journals. It is
found that 71 journals are active and two journals have ceased their publications.
Table 4: Current status of Journals
S.No.
STATUS
No. of Journals
1.
2.
Active
Ceased
71
2
TOTAL
ISBN 1-63102-455-8
73
387
Open Access Journals in the Field of Library Science and Information Technology: An Analysis
Leading Publishers of Open Access Journals: The study of the Table 5 reveals that the vast majority of the
open access journals, i.e. more than 93% are published by the non-profit organization. About three-fourth or
74% are published by academic institutions and universities (54 journals); about 19 % are published by
associations and societies (14 journals); 5 journals are published by Independent/commercial publishers. The
table reveals that majority of open access journals in Library Science and Information Technology are published
through Academic institutions, Universities and Associations which are non-profit organization.
Table 5: Publisher wise distribution of open access journals
__________________________________________________________________
Types of publishers
Number of Journals (%)
___________________________________________________________________
Association/societies
14 (19.2 %)
Academic institutions/universities
54 (74.0 %)
Independent/commercial publishers
5 ( 6.8 %)
___________________________________________________________________
Total
73
___________________________________________________________________
Language-wise distribution of Open Access Journals: English is the most prominent language of publishing
Open access journals in Library Science and Information Technology. Table 6 reveals that out of 73 open
access journals, 55 are in English language, followed by Spanish (5), Chinese and Portuguese (4 each), French
and German (3 each) and Castilian (2). 8 other languages are represented in publishing of 73 open access
journals. Language-wise analysis of OA journals shows that some of the journals are published in more than
one language.
Table 6: Language wise distribution of open access journals
Language
No. of Journals
English
Spanish
Chinese
Portuguese
French
German
Castilian
Arabic
Czech Slovak
Spanish
Italian
Farsi
Romanian
Slovene
Korean
55
5
4
4
3
3
2
1
1
1
1
1
1
1
1
Total
84
The number is more than 73 because some of the journals are published in more than one language.
Publishing Pattern of OA Journals: Table 7 shows that 45 journals are being published online and they do not
have their print versions, whereas 28 journals are published online as well as in printed form. While identifying
the modes of delivery of the articles of open access journals, it was observed from Table 8 that 5 journals
provide articles in both HTML and PDF format for reading and downloading purposes. One journal each
388
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
provide article in HTML, ePUB and XML format, whereas majority of the journals (66) provide articles in only
PDF format.
Table 7: Format of open access journal
Format
No. of Journals (%age)
Both print and online
28 (38.3 %)
Only online
45 (62.7 %)
______________________________________________________________________________________
Total
73
Table 8: Modes of availability of Open Access journals
Modes
No. of Journals (%age)
Only PDF
PDF, HTML
PDF, HTML, ePUB
HTML, XML
66 (90.4%)
5 (6.8%)
1 (1.4%)
1 (1.4%)
Total
73
______________________________________________________________________________________
CONCLUSION
The Open Access journals are now clearly recognized as an essential vehicle for scholarship in the digital
world. This is evident from the continuous growth of these journals in different disciplines around the world3.
The Open Access journals in the field of Library Science and Information Technology has become the
important medium for the Library and information professional to carry out their research. From the above
analysis it has been found that most of the Open Access journals in the field of Library Science and Information
Technology are published from USA (23) while India (2) having a meager contribution. It is also found that
most of the journals are published quarterly and are active. At present, most of the Open Access journals in
Library Science & Information Technology are published from academic institutions particularly universities.
So, it is now time for Indian universities to take initiatives in publishing Open Access journals. Some of the
research organizations in India have started providing free access to their journals over the internet. It may be
expected that in the next few years we will see sustainable growth of open access Journals.
REFERENCES
[1]
[2]
[3]
[4]
[5]
Husain S (1984). Universal availability of publications: problems and prospects. Annals of Library Science and
Documentation. 31(1-2), 38 – 43
Chowdhury G G and Chowdhury S (2003). Information Sources and Searching on the World Wide Web. London,
Library Association.
Husain, Shabahat and Mohammad Nazim. (2013). Analysis of Open Access Scholarly Journals in Media &
Communication. . 33(5), 405-411
Khode, Subhash and Choudhary, Archana. (2011). Analysis of open access journals in the area of library and
information science. In Rana, M, S. et.al (Eds.), Benchmark in ICT applications in LIS (pp. 61- 74). Jodhpur :
Scientific.
Available http://lu,com/odlis (Retrieved on 14.06.2015)
ISBN 1-63102-455-8
389
KNOWLEDGE MANAGEMENT IN ACADEMIC LIBRARIES
Dr. Rakhi Tyagi | Assistant Professor | Library | K.L (P.G.) Girls College | Meerut | rakhidhruv@gmail.com
Abstract: “The development of knowledge management in recent years has become the key
concern for librarians and libraries. The Library will be playing a very crucial role in the
extension and modification of knowledge. The growing need for knowledge management has
influenced every component and operation of a library. Knowledge management requires more
effective methods of information handling, speedy transfer of information and linking of
information with individuals and their activities. This paper suggests a pragmatic approach to the
implementation of Knowledge Management for academic libraries; utilizing the existing staffing,
technology, and management structure. This paper also describes the development and use of
information and communication technologies (ICT) in the library and information centres.”
Keywords: Knowledge management, information management, Tacit Knowledge, Explicit Knowledge,
Cultural knowledge.
INTRODUCTION
In the present information and knowledge era, knowledge has become a key resource. Faced with competition
and increasingly dynamic environments, organisations are beginning to realise that there is a vast and largely
untapped asset diffused around in the organisation – knowledge. The conventional function of academic
libraries is to collect, process, disseminate, store and utilise information to provide service to the university
community. However, the environment in which academic libraries operate today is changing.
With the growing interest in knowledge management, many questions have been raised in the minds of
librarians regarding: the difference between information and knowledge; between information management and
knowledge management; who should be in charge of information and knowledge management; would librarians
and information professionals with appropriate education and training in library and information science be
most suitable for the position of “Chief Knowledge Officer” (CKO) in their organizations; and what libraries
can do in implementing knowledge management. Academic libraries are part of the university and its
organisational culture. Whatever affects universities also affects academic libraries. The role of academic
libraries is changing to provide the competitive advantage for the parent university – a factor that is crucial to
both staff and students.
Academic libraries as constituents of the parent university should rethink and explore ways to improve their
services and become learning organisations in which to discover how to capture and share tacit and explicit
knowledge within the library. The changing role of academic librarians as knowledge managers emphasises the
need to constantly update or acquire new skills and knowledge to remain relevant to the today’s library
environment. Academic libraries may need to restructure their functions, expand their roles and responsibilities
to effectively contribute and meet the needs of a large and diverse university community. This article aims to
give an overview of knowledge management and its role in academic libraries.
What Is Knowledge Management?
Colleges, universities, and their libraries are social organizations where workers transform resources for use by
consumers through the functions of teaching, research, and service. Also created is a growing amount of
transactional information in databases, knowledge embedded in processes and documentation as well as explicit
and implicit knowledge in the heads of the workers. As the pace of change increases and people change jobs
more frequently, information and knowledge that used to be concentrated in one person or process increasingly
is being held by multifunctional teams with limited life spans, operating with rapidly changing systems and
environments. Change is the order of the day. Knowledge loss becomes epidemic. Increases in organizational
information and change have created a great need to manage knowledge to ensure effectiveness. And in higher
education, librarians can play a key role in the knowledge management process.
390
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
The rise of Knowledge Management: As early as 1965, Peter Drucker already pointed out that “knowledge”
would replace land, labor, capital, machines, etc. to become the chief source of production. His foresight did not
get much attention back then. It was not until 1991 when Ikujiro Nonaka raised the concept of “tacit”
knowledge and “explicit” knowledge as well as the theory of “spiral of knowledge” in the Harvard Business
Review that the time of “knowledge-based competition” finally came. In his latest book, Building
Organizational Intelligence: a knowledge management Primer, Jay Liebowitz stated
“In today’s movement towards knowledge management, organizations are trying to best leverage their
knowledge internally in the organization and externally to their customers and stakeholders. They are trying to
capitalize on their organizational intelligence to maintain their competitive edge.”
The thrust of knowledge management is to create a process of valuing the organization’s intangible assets in
order to best leverage knowledge internally and externally. Knowledge management, therefore, deals with
creating, securing, capturing, coordinating, combining, retrieving, and distributing knowledge. The idea is to
create a knowledge sharing environment whereby sharing knowledge is power as opposed to the old adage that,
simply, knowledge is power.
Various Knowledge concepts: from data to knowledge: Data are simple, discrete, facts and Figures, such as
names, characteristics and amounts. Data might be a table of circulation statistics, but once those statistics are
arranged, charted, annotated, or organized in a meaningful way to describe say trends in library use, you have
information. Information is a bit more complex, for it organizes data for a meaningful purpose. Marc Porat
states that “Information is data that has been organized and communicated”. Stehen Abram sees the process for
knowledge creation and use as a continuum where data transforms into information, information transforms into
knowledge and knowledge drives and undergoing behaviour and decision making. Information is visible,
independent from action and decision, different in format after processing, physical product, independent from
existing environment, easily transferable and duplicate. Knowledge is invisible, closely related to action and
decision, different in thought after processing, spiritual product, identified with existing environment,
transferable through learning and not duplicate. Knowledge is an intellectual capital when people out of
creation, add value to information. It is generated. Knowledge is classified and modified. It may be indexing. It
is shared. Sharing of knowledge is a core element of knowledge management. IT has provided with number of
possible solutions for sharing via e-mail, intranet etc. Knowledge is much more complex and a working
definition of it was given by Davenport and Prusak in their book on knowledge management entitled Working
Knowledge. According to Davenport and Prusak, “Knowledge is a fluid mix of framed experience, values,
contextual information, and expert insight that provides a framework for evaluating and incorporating new
experience and information. It originates and is applied in the minds of knower. In organizations, it often
becomes embedded not only in documents and repositories but also in organizational routines, processes,
practices and norms.” While data and information are in a sense bound objects, knowledge is much more a
process, a dynamic, or an ability to understand and to share understanding.
Knowledge is classified into three types:
Explicit knowledge
Tacit knowledge
Cultural knowledge.
Explicit knowledge: It is formal and easy to communicate to others. It is the knowledge of rationality. That is,
policies, rules, specifications and formulae. It is also known as declarative knowledge.
Tacit knowledge: It is complex form of knowledge. It has two dimensions namely technical and cognitive. This
is personal knowledge, which is in human mind and difficult to formalize and also difficult to communicate.
Cultural knowledge: B. B. Chand describes the cultural knowledge as knowledge which includes assumptions
and beliefs. It is used to understand, describe and explain the reality as well as conventions. It is also useful to
ISBN 1-63102-455-8
391
Knowledge Management in Academic Libraries
form the framework among organizational members, recognize the new information and evaluate alternative
interpretations and actions.
Dimensions of Knowledge Management: The overall objective is to create value and to leverage, improve,
and refine the firm's competences and knowledge assets to meet organizational goals and targets. Implementing
knowledge management thus has several dimensions including:
KM Strategy: Knowledge management strategy must be dependent on corporate strategy. The objective
is to manage, share, and create relevant knowledge assets that will help meet tactical and strategic
requirements.
Organizational Culture: The organizational culture influences the way people interact, the context
within which knowledge is created, the resistance they will have towards certain changes, and ultimately
the way they share (or the way they do not share) knowledge.
Organizational Processes: The right processes, environments, and systems that enable KM to be
implemented in the organization.
Management & Leadership: KM requires competent and experienced leadership at all levels. There are
a wide variety of KM-related roles that an organization may or may not need to implement, including a
CKO, knowledge managers, knowledge brokers and so on. More on this in the section on KM positions
and roles.
Technology: The systems, tools, and technologies that fit the organization's requirements - properly
designed and implemented.
Politics: The long-term support to implement and sustain initiatives that involve virtually all
organizational functions, which may be costly to implement (both from the perspective of time and
money), and which often do not have a directly visible return on investment.
Principles of Knowledge Management: Thomas H Davenport has formulated ten principles of knowledge
management as listed below:
392
Knowledge Management is expensive
Effective management of knowledge requires hybrid solutions of people and technology
Knowledge Management is highly political
Knowledge Management requires knowledge managers
Knowledge Management benefits more from maps than model, more from markets than from hierarchies
Sharing and using knowledge are often unnatural acts
Knowledge Management means improving knowledge process
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Knowledge access in only the beginning
Knowledge Management never ends
Knowledge Management requires a knowledge contract
Benefits of IT in Knowledge Management: The combination of computers, databases, and
telecommunications, especially the Internet, provide managers with an incredible number of options for
improving the way organisations function. Whenever, IT provides a systematic and professional approach to the
management of Information Technology service provision. Adopting its guidance offers users a huge range of
benefits that include:
Reduced service costs one Save the time of users as well as staffs;
Quality and quantity improvement;
Improved user services;
Improved customer/user satisfaction through a more professional approach to service delivery;
Improved productivity;
Information Technology helps to maximizes the benefits;
Provides confidence to managed and cover risk to achieve the organizational goal;
Faster and easier recovery of data and disseminate the information; and
Reducing risks and errors
Knowledge Management in Academic Libraries: While the business world is changing in the new
knowledge economy and digital age, libraries of all types are undergoing drastic changes also. The new role of
libraries in the 21st century needs to be as a learning and knowledge centre for their users as well as the
intellectual commons for their respective communities where, to borrow the phrase from the keystone
principles, “people and ideas interact in both the real and virtual environments to expand learning and facilitate
the creation of new knowledge.
As a learning organization, libraries should provide a strong leadership in knowledge management. Unlike those
business organizations whose goal for knowledge management is for competitive advantage, most public,
academic, and research libraries, with the exception of company libraries (which may be known or called
corporate libraries, special libraries, or knowledge centers), have a different orientation and value. Instead of
competition, internal use only, and little sharing of knowledge with others outside, the most important mission
of public, academic, and research libraries is to expand the access of knowledge for their users. Charged by this
mission, libraries should aim their knowledge management goal high. Below are examples of what libraries can
do to improve their knowledge management in all of the key areas of library services.
Academic libraries are human organisations, so they are subject to the same sort of influences that many other
organisations must deal with (Budd, 1998). The changing environment of academic life demands new
competencies in academic librarians (Mahmood, 2003). As a result, the knowledge and expertise of academic
librarians needs to be seen as the library’s greatest asset. The following section is divided into three main parts.
The first part highlights a number of important issues facing academic libraries. The second part looks at how
knowledge management practices could be applied in academic libraries. The final 10 part explores the skills
and competencies needed to carry out knowledge management activities within academic libraries.
Changing Environment and issues facing Academic Libraries:
Multiple formats of information: The rapid growth of information and communication technologies
(ICTs) are said to be changing the way academic libraries operate today. Academic library collections are
no longer collections comprised almost entirely of printed materials but collections comprised almost of
materials in multiple formats and media (Budd, 1998). Information technologies such as computers,
multimedia and CD-ROMs are bringing unprecedented abilities to academic libraries in providing
services and resources to the university community. Over the past few years, the Web has had a
tremendous effect on the growth of information and the speed of transmission. The problem with the
ISBN 1-63102-455-8
393
Knowledge Management in Academic Libraries
Web is that, there is no real organisation of information like in the case of libraries. New means to deliver
information over the Web places a challenge to academic librarians in terms of helping students make
sense of information found on websites.
Changing user needs: Academic libraries have to provide information services for users acting in the
changing academic environment. Academic librarians need to liaise with library users, faculties and
schools to support the effective teaching, learning and research in universities. As Parker and Jackson
(1998) explained, liaison is particularly important in a world of resource-based learning where students
are encouraged to carry out more independent work and make wider use of a range of learning resources
(including electronic information resources). The challenges require academic libraries to offer userfriendly ICT oriented facilities (like remote access to information and services), analyse the changing
user needs and give support to users in new academic environments.
Changing role of academic librarians: In an age of great change in information formats, delivery
models and technologies, an important new role emerges for the academic librarian (CETUS, 1999).
Bertnes (2000) argued that knowledge workers will be the most important profession in this century. One
of the major roles of academic librarians in the knowledge economy is that of knowledge managers. It is
evident that academic librarians can no longer meet the information needs of the university community
through the traditional avenue of simply adding to their library collections. Academic librarians need to
go an extra mile. They need to understand the information and knowledge needs of users. They should be
in a position to map internal and external knowledge that would assist them in increasing their efficiency.
In other words, academic librarians should extend their information management roles and enhance their
knowledge management competencies.
Barriers to Knowledge Management in Academic Libraries: Every library professional who works in
academic, public or any special library wants to use the techniques of knowledge management to achieve the
organizational goal and provide better service to its users but due to some following barriers they are not able to
use that:
There is no co-operation between senior and junior staff.
Generally, the junior staff cannot share their knowledge and ideas when they feel there is no benefit of
this in terms of salary increases.
Every library cannot participate in terms of modern technology and its management
Lack of communication skills.
Lack of staff training.
Lack of sufficient budget / funds l Lack of tool and technologies
Lack of Centralised policy for Library Cess
SUGGESTIONS
The IT and knowledge need to work together and focus on getting the right information to the right people at
the right time. The entire librarian and information scientist community should have knowledge management
strategy or framework to use the IT to disseminate the information as demanded or required. The following
points are identified for the better implementation of knowledge management in libraries mostly in Academic
Libraries:
To provide sufficient budget
To provide special fund for the new technologies
To equip library with new technologies with network facility
Inter change of technical staffs among organizations/ libraries
Staff sharing to develop their professional skills
UGC may establish a monitoring centre specially for libraries to monitor the standardisations of library
and provide assistance
Organize a training programme and inter-change of staff for time being on National level (at least once
in every two year for two months)
394
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
CONCLUSION
Knowledge management can be incorporated into many library operations to improve effectiveness. In addition,
it offers the opportunity to expand the role of libraries in the academic community and to result in strengthened
relationships with related units, inside and outside the university. Knowledge Management is a new field
drawing on several disciplines including Library and Information science, knowledge management will require
a strong leadership and vision from the top administration, which can influence the organization's knowledge
sharing efforts in a positive way. Knowledge Management is a new field drawing on several disciplines
including Library and Information Science, In spite of the fact that there are many knowledge base products in
the market, none of them is suited for libraries or flexible with the dynamically changing environment in the IT
era. Libraries, with limited budget and human resources, should utilize the current management structure and
technology to implement Knowledge Management, either bottom up or top-down. With a concerted effort, use
of Information Technology in Knowledge Management will help to increase libraries’ operational efficiency
and cater to the ever-increasing needs of clientele. Knowledge Management helps library and information
professionals in improving the services being rendered to their users. Information technology and systems can
provide effective support in implementing knowledge management. Librarians should train themselves and their
staff to develop the appropriate knowledge management systems and use information technologies to equipped
libraries to provide better, faster and pinpointed services to its clients/ users.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
Abell, A. and Oxbrow, N. (2001). Competing with knowledge: the information Professional in the knowledge
management age. London: Library Association.
Bansal A (2000). Knowledge management: A Review. DESIDOC Bulletin of Inf. Technol. 20(4): 3-9.
Berners L (1998). Semantic Web Road Map.
Drucker, Peter. (1993). Post-capitalism Society. Oxford, Great Britain: Butterworth-Heinemann.
Knowledge Management Primer. Boca Raton, FL: CRC Press. p.1.
Liebowitz, Jay. (2000). Building Organizational Intelligence: A 7.
Nonaka, Ikujiro. (1991). “The Knowledge-Creating Company,” Harvard Business Review (Nov.-Dec. 1991):9699. Also, Nonaka, Ikujiro and Takeuchi, Hirotaka. (1995). The Knowledge-creating Company: How Japanese
Companies Create the Dynamics of Innovation. New York: Oxford University Press.
Probst, G., Raub, S. and Romhardt, K. (2000). Managing knowledge: building blocks
for success. Chichester: John Wiley and Sons.
Technology and Library Users: LITA Experts Identify Trends to Watch,”(Chicago: LITA, 1999). Available online
from http://www.lita.org/committe/toptech/trendsmw99.htm Accessed on 25/07/2015.
Rowley, Jennifer. (1999). “What is Knowledge Management?” Library Management 20,no.8:416-419.
.
ISBN 1-63102-455-8
395
CLOUD COMPUTING AND LIBRARIES
Mrs. Anshu Bansal | Professional Assistant | K.L.(P.G.) Girls College | Meerut | anshubansal82@gmail.com
Abstract: “Cloud computing technology came up as a boon for libraries and is offering various
opportunities for libraries to connect their services with clouds. It is a new technology model for
IT services. Cloud computing offers a new dimension in computing, it changes how we invent,
develop, scale, update, maintain and pay for applications and the infrastructure on which they are
run. In cloud computing data and services reside in massively scalable data centres in the cloud
and can be accessed from a web browser. Cloud computing is a way of providing various services
on virtual machines allocated on top of a large physical pool which reside in the cloud, in other
words cloud computers is capable of collecting large quantity of information and resources stored
in personal computers, mobile phones and other equipment and integrate them and put them on
the cloud for serving users. The paper presents an overview of cloud computing and its possible
applications that can be clubbed with library services on the web based environment. This study
may be helpful in identifying and generating cloud based services for libraries.”
Keywords: Cloud computing, Models of Cloud Computing, , internet computing, libraries.
INTRODUCTION
In present scenario, web enabled technologies developed on virtual platforms and generating large opportunities
and virtual paths to use their services for the various purposes. Nowadays, cloud computing is emerged as one
of the most popular virtual technology for libraries to deliver the services in an effective manner With the
advent of Information technology, libraries have become automated which is the basic need towards
advancement followed by networks and more effort are towards virtual libraries. The emergence of epublications, digital libraries, internet usage, web tools applications for libraries, consortium practices leads to
the further developments in library profession. The latest technology trend in library science is use of cloud
computing for various purposes and for achieving economy in library functions. Since cloud computing is a new
and core area the professionals should be aware of it and also the application of cloud computing in library
science.
The need of cloud computing may occur due to the information explosion, problems in accessing the
information, save the time of the users and staff, resource sharing problems, problems in library resources
management, complex demand of users and attraction of users towards cutting edge technologies. This paper
addresses the various aspects of cloud computing, internet computing and E-library
CLOUD COMPUTING
Cloud computing is not a new technology that suddenly appeared on the web but it is new form of computing.
Cloud computing is a kind of computing technology which facilitates in sharing the resources and services over
the internet rather than having these services and resources on local servers/ nodes or personal devices. The
combination of servers, networks, connection, applications and resources is defined as 'cloud'. Cloud computing
is acting as a resources pooling technology for accessing infinite computing services and resources as per
demand of users and can be compare with models of pay as you use or utility model same as used for mobile
services usages and electricity consumption.
Cloud computing is defined as a type of computing that relies on sharing computing resources rather than
having local servers or personal devices to handle applications. Cloud computing is comparable to grid
computing, a type of computing where unused processing cycles of all computers in a network are harnesses to
solve problems too intensive for any stand-alone machine.
396
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the
phrase cloud computing means "a type of Internet-based computing," where different services — such as
servers, storage and applications — are delivered to an organization's computers and devices through the
Internet.
Characteristic of Cloud Computing: The National Institute of Standards and Technology's definition of cloud
computing identifies "five essential characteristics":
On-Demand self-service: A consumer can unilaterally provision computing capabilities, such as server
time and network storage, as needed automatically without requiring human interaction with each service
provider.
Broad Network Access: Capabilities are available over the network and accessed through standard
mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones,
tablets, laptops, and workstations).
Resource Pooling: The provider's computing resources are pooled to serve multiple consumers using a
multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned
according to consumer demand.
Rapid Elasticity: Capabilities can be elastically provisioned and released, in some cases automatically,
to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities
available for provisioning often appear unlimited and can be appropriated in any quantity at any time.
Measured Service: Cloud systems automatically control and optimize resource use by leveraging a
metering capability at some level of abstraction appropriate to the type of service (e.g., storage,
processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and
reported, providing transparency for both the provider and consumer of the utilized service.
Cloud Computing Models: The umbrella of cloud computing is a big one. Like any technology in the early
stages of adoption, there are competing models, each claiming to be the optimal configuration and each, more
than likely, suited to specific kinds of businesses and specific kinds of business needs. Indeed, the number of
cloud permutations is nearly as diverse as the number of companies using them. Still, over time, there are
ISBN 1-63102-455-8
397
Cloud Computing and Libraries
consistent models that begin to emerge. Here’s a look at some of the top cloud computing models in production
today:
1. Service Models: Though, there are various service models originated on the web but three service models
widely used for delivering the different cloud based services that described below:
Infrastructure as a Service (IaaS): Infrastructure-as-a-Service is the first layer and foundation of cloud
computing. Using this service model, you manage your applications, data, operating system, middleware
and runtime. The service provider manages your virtualization, servers, networking and storage. This
allows you to avoid expenditure on hardware and human capital; reduce your ROI risk; and streamline
and automate scaling.
Platform as a Service (PaaS): This cloud service model could be considered the second layer. You
manage your applications and data and the cloud vendor manages everything else. Benefits for using
Platform-as-a-Service include streamlined version deployment and the ability to change or upgrade and
minimize expenses.
Software as a Service (SaaS): This is the final layer of the cloud services model. This allows your
services to run programs in the cloud where all portions are managed by the cloud vendor. Your users
will have assured compatibility and easier collaboration because all will be using the same software.
Your organization won’t need to pay extra licensing fees and you can easily add new users.
2. Deployment Models: Currently, four types of cloud deployment models have been defined in the cloud
community:
398
Private Cloud. This is, in many ways, the most common type of cloud computing. Private cloud occurs
within a single organization, allowing them to implement virtualization for in-house services. The
premise is that internal infrastructure including server, networks, storage and applications will be
connected and virtualized, which in turn allows it to move things around in such a way as to maximize
efficiency. This is different from a simply virtualized situation in that it allows a higher degree of
automation and even a chargeback capability for the other business units.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Community Cloud. This type of cloud model uses an external service via a cloud provider, and it’s
access by the organization via the Internet. This is probably the most cost-effective way to utilize the
cloud. The big concern with this model, of course, is security. Performance is also a concern, in many
quarters.
Public Cloud: Public cloud is meant for general public use and open to all. This kind of deployment
model of cloud computing is developed by any cloud computing agency and having own policy, value,
and profit, costing, and charging model.
The Hybrid Cloud. This type of cloud made from more than one cloud deployment models that may be
public, private, community and other models also, bound together with by standardized or proprietary
technology that enables data and application portability (e.g., cloud bursting for load-balancing between
clouds). The Hybrid cloud model is widely used by institutions and organizations because this model
provides more facilities and flexibilities in making optimum use of their resources and accomplishing the
tasks.
CLOUD COMPUTING AND LIBRARIES
Cloud computing offers many interesting possibilities for libraries that may help to reduce technology cost and
increase capacity reliability, and performance for some type of automation activities. Cloud computing has
made strong inroads into other commercial sectors and is now beginning to find more application in library
science. The cloud computing pushes hardware to more abs tract levels. Most of us are acquainted with fast
computing power being delivered from systems that we can see and touch. In this technological era, libraries are
improved constantly by adopting many new IT technologies. The theories of conventional libraries have been
changed now a day. Introduction of new and innovative technologies like cloud technology helps libraries to
provide better services to the user community. Though libraries have been using some of cloud computing
services for over a decade like online databases, large union catalogues as cloud applications, the library
community can further adopt the concept of cloud computing to strengthen the power of collaboration or
cooperation and to build a major, fused existence on the worldwide network.
Examples of Cloud Libraries:
Following are some examples of Cloud Libraries:
OCLC
Library of Congress ( LC)
Columbia Public Library
3. Exlibris
ISBN 1-63102-455-8
399
Cloud Computing and Libraries
Polaris
Scribd
Discovery Service
Google Docs / Google Scholar
Worldcat
Applications of Cloud Computing In Libraries: Cloud computing has large potential for libraries. Libraries
may put more and more content into the loud. Using cloud computing user would be able to browse a physical
shelf of books, CDs or DVDs or choose to take out an item or scan a bar code into his mobile device. All
historical and rare documents would be scanned into a comprehensive, easily searchable database and would be
accessible to any researcher. Many libraries already have online catalogues and share bibliographic data with
OCLC. More frequent online catalogues are linked to consortium that share resources.
Building Digital Library/Repositories: In the present situation, every library needs a digital library to
make their resources, information and services at an efficient level to ensure access via the network. In
connection to cloud based digital library software, Duraspace is having two software namely Dspace and
Fedora Commons but Dspace is widely used for building digital libraries/ repositories relative to Fedora
Commons. Dura cloud provides complete solutions for developing digital libraries/ repositories with
standard interfaces and open source codes for the both software.
Searching Library Data Web share management system facilitates to develop an open and collaborative
platform in which each library can share their resources, services, ideas and problems with the library
community on the clouds. On the other hand, the main aim of web- scale services is to provide cloud
based platforms, resources and services with cost benefit and effectiveness to share the data and building
the broaden collaboration in the community. : OCLC is one of the best example for making use of cloud
computing for sharing libraries data for years together.
Website Hosting: Website hosting is one of the earliest adoptions of cloud computing as many
organizations including libraries preferred to host their websites on third party service providers rather
than hosting and maintaining their own servers Google Sites serves as an example of a service for hosting
websites outside of the library's servers and allowing for multiple editors to access the site from varied
locations.
File Storage: To access any files on the internet, cloud computing present number of services such as
Flicker, Dropbox, Jungle Disk, Google Doc, Sky Drive and so on. These services virtually share the files
on the web and provide access to anywhere and anytime without any special software and hardware.
Therefore, libraries can get advantages of such cloud based services for various purposes. For instance,
LOCKSS (Lots of Copies Keeps Stuff Safe), CLOCKSS (Controlled LOCKSS) and Portico tools are
extensively used for digital preservation purpose by libraries and other organizations.
Library Automation: For library automation purpose, Polaris provides variant cloud based services such
as acquisitions, cataloguing, process system, digital contents and provision for inclusion of cutting edge
technologies used in libraries and also supports various standards such as MARC21, XML, Z39.50,
Unicode and so on which directly related to library and information science area.
Advantages of Cloud Computing In Libraries:
Cost saving
User centric
Openness
Transparency
Flexibility and innovation
Representation
Availability anytime anywhere
interoperability
Connect and Converse
Create and collaborate
400
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
CONCLUSION
Cloud computing increases the profitability by improving resource utilization. Costs are driven down by
delivering appropriate resources only for the time those resources are needed. Cloud computing has enabled
teams and organizations to streamline lengthy procurement processes. Cloud computing enables innovation by
alleviating the need of innovators to find resources, to develop, test, and make their innovations available to the
user community. Innovators are free to focus on the innovation rather than the logistics of finding and managing
resources that enable the innovation
Cloud computing is beneficial as it is flexible, scalable, elastic, pay per usage, economy of scale, cost effective
and no maintenance fee for hardware and software etc. The paper attempted how cloud computing helps in
freeing libraries from managing technology so
that they can focus on collection building, improved services and innovation. Cloud computing encourages
libraries and their users to participate in a network and community of
libraries by enabling them to reuse information and socialize around information. The Cloud
Computing techniques and methods applied to libraries, not only can improve the quality of services and
utilization of resources, but also can make more extensive use of cloud computing to our work life.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
Application of Cloud Computing in Libraries. http://www.ijidt.com/index.php/ijidt/article/viewFile/3.4.9/pdf
(retrieved on 20/07/2015)
Cloud Computing https://en.wikipedia.org/wiki/Cloud_computing#Characteristics (retrieved on 20/07/2015)
Cloud Computing and its applications in libraries. http://eprints.rclis.org/22929/1/202.pdf (retrieved on
22/07/2015)
Cloud Computing (the cloud) http://www.webopedia.com/TERM/C/cloud_computing.html (retrieved on
25/07/2015)
Cloud Computing Service Models. http://www.ibm.com/developerworks/cloud/library/cl-cloudservicemodels/
(retrieved on 25/07/2015)
Gupta, Shivani and Abhishek Kumar Maheshwari, and Lokesh Khurana, “Cloud Computing-Virtualization as a
Service.” Vision & Quest: Journal of Science, Technology & management, 3, No.1(2012), pp. 8-14
Murley, D. (2009). Law libraries in the cloud. Law Library Journal, 101(2), pp.249-254.
Top 4 Cloud Computing Model http://www.unitiv.com/it-solutions-blog/bid/51165/Top-4-Cloud-ComputingModels (retrieved on 24/07/2015)
Types of Cloud Service model. http://www.appcore.com/3-types-cloud-service-models/ (retrieved on 22/07/2015)
Use
of
Cloud
Computing
in
Library
and
Information
science
field.
http://www.ijodls.in/uploads/3/6/0/3/3603729/vol._2_july_-_sept._2012_part-2.pdf (retrieved on 20/07/2015)
What Is Cloud Computing? http://in.pcmag.com/networking-communications-software/38970/feature/what-iscloud-computing (retrieved on 25/07/2015)
https://www.google.co.in/search?q=models+of+cloud+computing&biw=1024&bih=639&tbm=isch&tbo=u&sourc
e=univ&sa=X&ved=0CC4QsARqFQoTCLO_yKvL-sYCFc4GjgodYIkNHQ (retrieved on 22/07/2015)
ISBN 1-63102-455-8
401
INTEGRATING ICT IN EDUCATION IS A CATALYST TO
PROMOTE UNIVERSAL DESIGN FOR LEARNING FOR
STUDENTS WITH SPECIAL NEEDS: NEED, CHALLENGES,
AND POSSIBLE SOLUTIONS
Ratan Sarkar | Research Scholar | Ramakrishna Mission Vivekananda University | Faculty of Disability
Management and Special Education | Coimbatore, Tamil Nadu | ratansarkarju@gmail.com
Abstract: Universal design for learning (UDL)is a framework for designing curriculum
through modification, adaptation or alternation of goals, methods, contents, materials,
instructional strategies, and assessments to enable all learners, despite of their different styles
and rates of learning, to gain knowledge, skills, and enthusiasm for learning. The notion of
UDL is premised on the philosophy of educational reform which ensures inclusion, equity,
and need based quality education by providing multiple means and provisions of
representation, action & expression, and engagement. Today the world of education is
undergoing a massive transformation as a result of the digital revolution (Collins &
Halverson, 2009) and its positive effect. ICTs, which cover internet service provision,
telecommunications equipment and services, information technology equipment and services,
media and broadcasting, libraries and documentation centres, commercial information
providers, network-based information services, and other related information and
communication activities, have undoubtedly affected teaching, learning, and research. A
great deal of research has proven the benefits to the quality of education. ICTs have the
potential to innovate, accelerate, enrich, and deepen skills, to motivate and engage students
with special needs, to help relate school experience to work practices, to create economic
viability for tomorrow's workers, as well as in strengthening teaching-learning and helping
schools change. ICT is also used as remedial and compensatory alternative which circumvent
deficits while capitalizing on an individual's strengths. Furthermore, ICT serves as a tool to
curriculum differentiation, providing opportunities for adapting the learning content and
tasks to the needs and capabilities of each individual pupil and by providing tailored
feedback. ICT may fit into a spectrum of instructional approaches, varying from traditional to
innovative. Hence, the need of integration of ICT in education to promote UDL cannot be
denied. The present paper attempts to bring forth the Role of ICT in education to promote
UDL, challenges and possible solutions.
Keywords: Information Communication Technology, Universal Design for Learning, Children with Special
Needs, Compensation and Remediation.
INTRODUCTION
Universal Design for Learning (UDL) is a framework that addresses the primary barrier to fostering expert
learners within instructional environments: inflexible, “one-size-fits-all” curricula. It is inflexible curricula that
raise unintentional barriers to learning. Learners who are “in the margins”, such as learners who are gifted and
talented or have special needs, are particularly vulnerable. However, even learners who are identified as
“average” may not have their learning needs met due to poor curricular design. In learning environments, such
as schools, colleges, and universities, individual variability is the norm, not the exception. When curricula are
designed to meet the needs of an imaginary “average”, they do not address the reality learner variability. They
fail to provide all individuals with fair and equal opportunities to learn by excluding learners with different
abilities, backgrounds, and motivations who do not meet the illusive criteria for “average”. Universal Design for
Learning helps address learner variability by suggesting flexible goals, methods, materials, and assessments that
empower educators to meet these varied needs. Curricula that is created using UDL is designed from the outset
to meet the needs of all learners, making costly, time-consuming, and after-the-fact changes unnecessary. The
Universal Design for Learning framework encourages creating flexible designs from the start that have
402
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
customizable options, which allow all learners to progress from where they are and not where we would have
imagined them to be. The options for accomplishing this are varied and robust enough to provide effective
instruction to all learners irrespective of their difference in styles and rates of leaning. Universal Design for
Learning approach is characterized by three main principles- (1) Multiple means of representation (perception,
language, expressions, symbols, and comprehension), (2) Multiple means of expression (physical action,
expression and communication, and executive functioning), and (3) Multiple means of engagement (recruiting
interest, sustaining effort and persistence, and self regulation) which are based on education, psychology, and
neuroscience research on learning. It should be noted that UDL does not remove academic challenges, it
removes barriers to access.
Definition of Universal Design for Learning: A conceptual definition of Universal Design for Learning was
provided by the Higher Education Opportunity Act of 2008 (HEOA), which stated that the term UNIVERSAL
DESIGN FOR LEARNING means a scientifically valid framework for guiding educational practice that:
Provides flexibility in the ways information is presented, in the ways students respond or demonstrate
knowledge and skills, and in the ways students are engaged; and
Reduces barriers in instruction, provides appropriate accommodations, supports, and challenges, and
maintains high achievement expectations for all students, including students with disabilities and students
who are limited English proficient.
Need of Universal Design for Learning: Universal design for learning (UDL) can be attained by designing
curricula through modification, adaptation or alternation of goals, methods, contents, materials, instructional
strategies, and assessments to enable all learners, despite of their different styles and rates of learning, to gain
knowledge, skills, and enthusiasm for learning. The notion of UDL is premised on the philosophy of educational
reform which ensures inclusion, equity, equality, and need based quality education for one and all. However, the
existing curricula is not conceived, designed, or validated for the use of diverse populations of learners in the
classrooms which create barriers in mastering knowledge and skills. Inflexible and “one size-fits-all” curricula
raise unintentional barriers to learning and the most affected are students with special needs. Many students with
special needs fail to master the learning tasks and learning outcomes and cope up in the general settings as the
curricula designed fails to provide all individuals with fair and equal opportunities to learn. Therefore the need
of UDL cannot be denied as it aims at creating expert learners- learners who can assess their learning needs,
monitor their own progress, and regulate and sustain their interest, effort, and persistence while learning a task.
Information and communication Technology (ICT): A Conceptual Framework: There is a misconception
that ICTs generally refers to ‘computers and computing related activities’. This is fortunately not the case,
although computers and their application play a significant role in modern information management, other
technologies and/or systems also comprise of the phenomenon that is commonly regarded as ICTs. Pelgrum and
Law (2003) state that near the end of the 1980s, the term ‘computers’ was replaced by ‘IT’ (information
technology) signifying a shift of focus from computing technology to the capacity to store and retrieve
information. This was followed by the introduction of the term ‘ICT’ (information and communication
technology) around 1992, when e-mail started to become available to the general public (Pelgrum, W.J. & Law,
N., 2003). According to a United Nations report (1999) that ICTs cover Internet service provision,
telecommunications equipment and services, information technology equipment and services, media and
broadcasting, libraries and documentation centres, commercial information providers, network-based
information services, and other related information and communication activities. According to UNESCO
(2002) information and communication technology (ICT) may be regarded as the combination of ‘Informatics
technology’ with other related technology, specifically communication technology. The various kinds of ICT
products available and having relevance to education, such as teleconferencing, email, audio conferencing,
television lessons, radio broadcasts, interactive radio counseling, interactive voice response system,
audiocassettes and CD ROMs etc. have been used in education for different purposes (Sharma, 2003; Sanyal,
2001; and Bhattacharya & Sharma, 2007). However, the use of ICT in the educative process has been divided
into two broad categories: ICTs for Education and ICTs in Education. ICTs for education refers to the
ISBN 1-63102-455-8
403
Integrating ICT in Education is a Catalyst to Promote Universal Design for learning for Students with Special Needs: Need,
Challenges, and Possible Solutions
development of information and communications technology specifically for teaching/learning purposes, while
the ICTs in education involves the adoption of general components of information and communication
technologies in the teaching learning process.
ICT; A Way-out to Revamp Education: Supportive Reviews: The growth of information and communication
technologies (ICT) has dramatically reshaped teaching and learning processes in education (Pulkkinen, 2007
and Wood, 1995). ICT for education is more critical today than ever before since its growing power and
capabilities are triggering a change in the learning environments available for education (Pajo & Wallace, 2001).
The use of ICTs offer powerful learning environments and can transform the learning and teaching process so
that students can deal with knowledge in an active, self directed and constructive way (Volman & Van Eck,
2001; and De Corte et al., 2003). At present ICT is considered as an important means to promote new methods
of instruction (teaching and learning). It is used to develop students' skills for cooperation, communication,
problem solving and lifelong learning (Plomp et al., 1996; Voogt, 2003). A great deal of research has supported
ICTs for improving the quality of education (Al-Ansari, 2006). ICTs have the potential to innovate, accelerate,
enrich, and deepen skills, to motivate and engage all learners including students with special needs, to help
relate school experience to work practices, to create economic viability for tomorrow's workers, as well as in
strengthening teaching-learning and helping schools change (Davis & Tearle, 1999, cited by Yusuf, 2005). A
report made by the National Institute of Multimedia Education in Japan, proved that an increase in student
exposure to educational ICT through curriculum integration has a significant and positive impact on student
achievement, especially in terms of "Knowledge Comprehension", "Practical skill" and "Presentation skill" in
subject areas such as mathematics, science, and social study (Ciroma, Z. I., 2014). ICT is also used as remedial
and compensatory alternative which circumvents deficits by capitalizing on an individual's strengths while
learning (D. P. Bryant & B.R. Bryant, 1998; Garner & Campbell, 1987; and McGregor & Pachuski, 1996).
The integration of ICT can help revitalize teachers and students. This can help to improve and develop the
quality of education by providing curricular support in difficult subject areas. Contemporary learning theory is
based on the notion that learning is an active process of constructing knowledge rather than acquiring
knowledge. In this domain learning is viewed as the construction of meaning rather than as the memorization of
facts (Lebow, 1993). Learning approaches using contemporary ICTs provide many opportunities for
constructivist learning through their provision and support for resource-based, student centered settings, and by
enabling learning to be related to context and to practice (Berge, 1998).
ICT increases the flexibility of delivery of education so that learners can access knowledge anytime and from
anywhere. This in turn would better prepare the learners for lifelong learning as well as to improve the quality of
learning. In concert with geographical flexibility, technology-facilitated educational programs also remove
many of the temporal constraints that face learners with special needs (Moore & Kearsley, 1996). One of the
most vital contributions of ICT in the field of education is- Easy Access to Learning. This flexibility has
heightened the availability of just-in-time learning and provided learning opportunities for many more learners
who previously were constrained by other commitments (Young, 2002). The demand for education in over
populated developing countries like India has skyrocketed as education is still regarded as an important bridge
of social, economic and political mobility (Amutabi & Oketch, 2003). There exist infrastructure, socioeconomic, linguistic and physical barriers in India for people who wish to access education (Bhattacharya &
Sharma, 2007). There exist drawbacks in general education in India as well as all over the world like lack of
learning materials, teachers, remoteness of education facilities, high dropout rate etc (UNESCO,2002). ICT has
the potential to remove the barriers and it can be used as a tool to overcome the issues of cost, less number of
teachers, and poor quality of education as well as to overcome time and distance barriers (McGorry, 2002).
ICT presents an entirely new learning environment for students, thus requiring a different skill set to be
successful. Critical thinking, research, and evaluation skills are growing in importance as students have
increasing volumes of information from a variety of sources to sort through (New Media Consortium, 2007).
ICT is changing processes of teaching and learning by adding elements of vitality to learning environments
including virtual environments for the purpose. Learning environments need to reflect the potential uses of
knowledge that pupils are expected to master, in order to prevent the acquired knowledge from becoming inert
404
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
(Duffy, 1990). In addition, teachers should stimulate pupils to engage in active knowledge construction. This
calls for open-ended learning environments instead of learning environments which focus on a mere
transmission of facts (Collins, 1996). ICT may contribute to creating powerful learning environments in
numerous ways. ICT may also make complex processes easier to understand through simulations that, again,
contribute to authentic learning environments. Thus, ICT may function as a facilitator of active learning and
higher-order thinking (Jonassen, 1999). The use of ICT may foster co-operative learning and reflection about the
content (Susman, 1998).
ICTs can enhance the quality of education in several ways, by increasing learner motivation and engagement, by
facilitating the acquisition of basic skills, and by enhancing teacher training. Learning approaches using
contemporary ICTs provide many opportunities for constructivist learning through their provision and support
for resource-based, student centered settings and by enabling learning to be related to context and to practice
(Berge, 1998).The teachers could make their lecture more attractive and lively by using multi-media and on the
other hand the students were able to capture the lessons taught to them easily. As they found the class very
interesting, the teachings also retained in their mind for a longer span which supported them during the time of
examination.
ROLE OF ICT IN EDUCATION TO PROMOTE UDL
The purpose of UDL curricula is not only to help students including students with special needs (SWND) master
a specific body of knowledge or a specific set of skills, but also to help them to become expert learners. Expert
learners have developed three broad characteristics. They are: a) strategic, skillful and goal directed; b)
knowledgeable, and c) purposeful and motivated to learn more. Designing curricula using UDL allows teachers
to remove potential barriers that could prevent learners from meeting this important goal. However, UDL
framework mainly focuses on three aspects in order to serve its purposes. These three aspects are; the means by
which information is presented to the learner, the means by which the learner is required to express what they
know, and the means by which the learners are engaged in learning. In this context ICT serves as the best tool to
facilitate teaching learning environment by providing multiple means of representation, action & expression,
and engagement, as per the needs and capabilities of each individual pupil and by providing tailored feedback.
Now, Let us describe how ICT integration in education helps us to promote UDL.
I.
ICT and Multiple Means of Representation (To support all students to comprehend and perception)
Visual support:
Graphics
Movies
Animations
Text
Physical objects and movement
Supports visual learners as well as students with cognitive impairment, students with learning disabilities,
students with hearing impairment, students with autism spectrum disorder, and to those learners whose second
language is English.
Auditory Support:
Digital recorder
Wav or MP3 files
Text-to-speech
Supports auditory learners as well as students with cognitive impairment, students with learning disabilities,
students with speech and language disorder, and to those whose second language is English.
Signs Support:
Pictorial signs supports students with intellectual disabilities
Signed English supports students with hearing impairment
ISBN 1-63102-455-8
405
Integrating ICT in Education is a Catalyst to Promote Universal Design for learning for Students with Special Needs: Need,
Challenges, and Possible Solutions
Supports visual learners as well as students with hearing impairment, students with cognition deficits, and
students with processing disorders.
Captions Support:
Video captions support students with hearing impairment
II. Multiple Means of Action and Expression (To enable all learners to express what they know/ learn)
Communication Modes:
Speech, Sign, Alternative and Augmentative Communication (AAC) including Speech Generating
Devices, Test-to Speech
Writing Modes:
Pencil and paper
Computer
Visual Modes:
Sculpture
Photos
Movies
Drama
Auditory Modes:
Sounds
Music
III. Multiple Means of Engagement (To support all learners): Multiple means of engagement includes those
tools that assist students to actively engage with learning environment (both input and output). The most
successful of these for UDL are those that can engage a diversity of students within the one device or
system. Many of these devices will have hidden benefits. These tools may include hardware, software or
any kinds of equipments that assist a learner to engage in the learning environment. Such as;
Hardware:
Various configurations of keyboards
Range of pointing devices
Trackballs
Joystick
Alternative Mouse systems
Gild point
Touch screens
IWBs
Digital pens
Smart Pen
Intellipen
Alternative computer systems
Micro laptops
iPad
Software:
Configuration of System or Software
406
Windows/ Mac OS
Word-processor configuration
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Writing templates or scaffolds
Rate Enhancement Software Supports students who may fatigue from the mechanics of writing
Supports students who struggle with reading or writing and may have poor motivation
Reduces errors in literacy processes
Word Talk; Natural Reader; Co: Writer; Text HELP
Graphic Organizers
For students with difficulties in organizing information and getting started with writing
Multi-media Interactive
Contain tools and functions that enable a range of students to engage with the learning
Framework applications (Clicker 5, Intelli Tools, Classroom Suite, ‘Communicate’ series)
Learning objects from TLF
Key Research Evidences about Using ICT to Support SWSN in Inclusive Settings Ensuring UDL
General Benefits
Enables greater learner autonomy.
Unlocks hidden potential for those with communication difficulties.
Enables students to demonstrate achievement in ways which might not be possible with traditional
methods.
Enables tasks to be tailored to suit individual skills and abilities.
Benefits for Students
Computers can improve independent access for students to education (Moore and Taylor, 2000; Waddell,
2000).
Students with special educational needs are able to accomplish tasks working at their own pace (ACE
Centre Advisory Trust, 1999).
Visually impaired students using the internet can access information alongside their sighted peers
(Waddell, 2000).
Students with profound and multiple learning difficulties can communicate more easily (Detheridge,
1997).
Students using voice communication aids gain confidence and social credibility at school and in their
communities (Worth, 2001).
Increased ICT confidence amongst students motivates them to use the internet at home for schoolwork
and leisure interests (Waddell, 2000).
Benefits for Teachers and Non-Teaching Staff
Reduces isolation for teachers working in special educational needs by enabling them to communicate
electronically with colleagues (Abbott and Cribb, 2001).
Supports reflection on professional practice via online communication (Perceval-Price, 2002).
Improved skills for staff and a greater understanding of access technology used by students (Waddell,
2000).
Enhances professional development and the effectiveness of the use of ICT with students through
collaboration with peers (Detheridge, 1997).
Materials already in electronic form (for example, from the internet) are more easily adapted into
accessible resources such as large print or Braille (Waddell, 2000).
Benefits for Parents and Care Givers
Use of voice communication aids encourages parents and care givers to have higher expectations of
children’s sociability and potential level of participation (Worth, 2001).
ISBN 1-63102-455-8
407
Integrating ICT in Education is a Catalyst to Promote Universal Design for learning for Students with Special Needs: Need,
Challenges, and Possible Solutions
Challenges to Integrated ICT in Education: There are significant challenges in integrating ICTs use in
education. The challenges are categorized as external (first-order) or internal (second order) (Keengwe,
Onchwari et al. 2008). According to Snoeyink and Ertmer (2001), first order barriers include lack of equipment,
unreliability of equipment, and lack of technical support and other resource related issues. Second-order barriers
include both school level factors, such as organizational culture and teacher level factors, such as beliefs about
teaching and technology and openness to change. Few major challenges are discussed below
408
ICT Supported Infrastructure and Lack of Resources: India is one of the developing countries that
lack the resources and appropriate infrastructure for implementing ICT in education. The effective use of
ICT would require the availability of equipment, supplies of computers and their proper maintenance
including other accessories. Implementing ICT demands other resources, such as computers, printers,
multimedia projectors, scanners, etc - which are not available in all the educational institutions. Besides,
ICT requires up-to-date hardware and software. Using up-to-date hardware and software resources is a
key feature in the diffusion of technology (Gulbahar 2007) but a rare experience in educational
institutions.
Insufficient Funds: Effective implementation of technology into education systems involves substantial
funding, that is very hard to manage in developing countries like India, where only 1% of total GDP
(2015-16) has been allotted for education sector. ICT-supported hardware, software, internet, audio visual
aids, teaching aids and other accessories demand huge funds. Afshari, Bakar & Su-Luan et al. (2009)
stated that efficient and effective use of technology depends on the availability of hardware, software, and
the equity of access to resources by teachers, students an administrative staff. These costs are in most
cases inflated and cannot be provided by most developing countries, including India.
Political Factors: Sharma (2003) states that the most notable of the barriers to the use of ICT in
education in developing countries seems to be the political will of the people in the corridors of power.
The allocation of sufficient funds for the educational sector and ICT does not seem to be very attractive to
the leaders. It can be seen from the budgetary allocations in third world countries that greater allocations
may be for the defense forces rather than education. If the political leaders favour the technology, it will
bloom. Here the case of India is worth citing.
Teachers' Attitudes and Beliefs about ICT: Teachers’ attitudes have been found to be major predictors
of the use of new technologies in instructional settings (Almusalam, 2001). Teachers’ beliefs about
teaching and learning with ICT are central to integration. To be successful in computer use and
integration, teachers need to engage in conceptual change regarding their beliefs about the nature of
learning, the role of the student, and their role as teacher. Hence the successful use of ICT into classroom
largely depends on teachers’ attitudes and belief relating to these. In fact, it has been suggested that
attitudes towards computers affect teachers’ use of computers in the classroom and the likelihood of their
benefiting from training (Kluever, et al, 1994). It is found that less technologically capable teachers, who
possess positive attitudes towards ICT, require less effort and encouragement to learn the skills necessary
for the implementation of ICT in their design activities into the classroom. Therefore, teachers who have
positive attitudes towards ICT itself will be positively disposed towards using it in the classroom
(Moseley & Higgins, 1999). Moreover, Harrison and Rainer (1992) found that participants with negative
computer attitudes were less skilled in computer use and were therefore less likely to accept and adapt to
technology than those with positive attitudes. They concluded that changing individuals’ negative
attitudes is essential for increasing their computer skills. Therefore, if teachers want to successfully use
technology in their classes, they need to be sufficiently comfortable with technology and have knowledge
about its use (Afshari et al, 2009).
Lack of Knowledge and Skill: According to Pelgrum (2001), the success of educational innovations
depends largely on the skills and knowledge of teachers. Teachers’ lack of knowledge and skills is one of
the main hindrances to the use of ICT in education both for the developed and underdeveloped countries.
Integrating technology in the curriculum requires knowledge of the subject area, an understanding of how
students learn and a level of technical expertise. Moreover, Berner (2003) found that the faculty’s belief
in their computer competence was the greatest predictor of their use of computers in the classroom. Very
few teachers get adequate training on ICTs during pre-service and in-service teacher education
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
programme in India. Therefore, lack of knowledge regarding the use of ICT and lack of skill on ICT tools
and software have also limited the use of ICT tools in teaching learning situation in India.
Internet: What has to be noted is that the changing paradigms of education delivery demand extensive
use of ICT and libraries are no longer the only source of information. The internet is now an information
highway and needs to be complemented with traditional libraries. It is therefore expected that schools use
the internet, but unfortunately the internet is only available in the urban schools. The rural schools have
electricity but there is still no internet and where there is Internet access it is very poor. This is also a
great challenge for integrating ICT in education in country like India.
Maintenance: There have been several initiatives from the Ministry and the private sector to introduce
ICTs in schools in the country. However, Government initiatives have been limited by budgetary
constraints and Schools that had computers donated by the private sector or bought by government have
had challenges in the maintenance and upgrading of the computing equipment.
POSSIBLE SOLUTIONS
Based on the above mentioned challenges the following solutions can be recommended for successful
integration of ICT in education to promote UDL Effective implementation of ICT in education requires commitment from the government of India,
administrators, teachers, parents, students, and the community. That is, all the stakeholders and
responsible authorities including teachers and other staff should be aware of the importance of technology
in developing student’s learning and should strive to overcome the barriers which prevent the use of
technology in classroom settings, so that students can benefit effectively from this ICT. Afshari et al,
(2009) states that it is crucial to involve those who have a stake in the outcomes, including teachers,
parents, students, and the community, and allow them to assist in the creation of the vision by
contributing their knowledge, skills, and positive attitude. Therefore, a clear vision of ICT integration in
schools that is shared by all members of the school community promotes effective use of ICT in the
classroom.
Lack of resources within educational institutions is another major hindrance to the implementation of ICT
in a developing country like India. Lack of computers and other ICT-supported tools in the classroom can
seriously limit the use of it by a teacher. Limited resources results in lack of computer integration, which
in turn results in lack of sufficient computer experience for both pupils and teachers (Rosen & Weil,
1995). The stakeholders and school authorities need to be provided with adequate facilities and resources
for effective implementation of ICT.
The Government of India has already taken numbers of initiatives to facilitate education for students with
special needs (SWSN). Hence, strategies and proper policies should be formulated for encouraging
education of SWSN and training of teachers with respect to the adoption of ICT. Without proper
empowering of SWSN and teachers, it is not possible to implement ICT in education.
Moreover, effective implementation of ICT in educational institutions depends on teachers, principals,
and other staffs who require in-depth professional development due to lack of knowledge and skills.
Vigilant attention needs to be given to in-service teacher training for both teachers and principals and preservice training for newly appointed teachers before joining the regular classes to acquaint them with the
important role of technology in schools settings and to train them on how to prepare and use ICT
competently. Afshari et al, (2009) states that professional development is necessary for teachers to enable
them to effectively use technology to improve student learning. Staff development should be
collaboratively created, based on faculty input and school needs. It must prepare teachers to use
technology effectively in their teaching. But this training should not consist merely of short workshops or
training, which is not enough to build proper knowledge and skills. In relation to this argument, Fullan
(1992) suggested that training should not be one-shot workshops, but rather ongoing experiences so that
learners/teachers can be kept up to date with ever-changing technologies. During their teacher training
programs teachers need to be given opportunities to practice using technology more practically so that
they can see ways in which technology can be used to augment their classroom activities.
To implement ICT in the classroom, teachers should feel confident and comfortable using ICT, through
the use of ICT on a consistent basis for instructional activities. Teachers must understand the value of
ISBN 1-63102-455-8
409
Integrating ICT in Education is a Catalyst to Promote Universal Design for learning for Students with Special Needs: Need,
Challenges, and Possible Solutions
ICT integration in education to benefit their students and to support meaningful learning. So changing
teachers’ negative attitudes is essential for increasing the ICT skills. Therefore, if teachers want to
successfully use technology in their classes, they need to possess a positive attitude to the use of
technology. Such an attitude is developed when teachers are sufficiently comfortable with technology and
are knowledgeable about it use (Afshari et al, 2009).
CONCLUSION
In the view of above it can be rightly stated that the integration and use of ICT in education have a positive
impact on teaching, learning, and research. ICT can affect the representation of education and wider access to
the same ensuring active engagement of the diverse students into the teaching learning process. In addition, it
will increase flexibility so that learners can access the education regardless of time, geographical barriers, and
individual differences. It can influence the way students are taught and how they learn. It would provide the rich
environment and motivation for teaching learning process which in turn will help in promoting Universal
Design for Learning.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
410
Abbott, C. & Cribb, A. (2001). Special Schools, Inclusion and the World Wide Web: The Emerging Research
Agenda. British Journal of Educational Technology (BJET), Volume- 32, Issue No. - 3, Pp. 331-342.
ACE Centre Advisory Trust. (1999). Catch net: The Use of Telecommunications Technology to Provide Remote
Support and Training to Young People with Access Difficulties. ACE Centre Advisory Trust. Retrieved from:
http://www.ace centre.org.uk/download/catchreport.doc, on 30.07.2015.
Afshari, M., Bakar, K. A., Su Luan, W., Samah, B. A., & Fooi, F.S. (2009). Factors affecting teachers’ use of
information and communication technology. International Journal of Instruction. Volume-2, Issue No.-1, Pp. 77104.
Al-Ansari, H. (2006). Internet Use by the Faculty Members of Kuwait University. The Electronic Library Volume24, Issue No. - 6, Pp. 791-803.
Amutabi, M. N. & Oketch, M. O. (2003). Experimenting in Distance Education: The African Virtual University
(AVU) and the Paradox of The World Bank in Kenya'. International Journal of Educational Development,
Volume-23, Issue No.- 1, Pp. 57-73.
Berge, Z. (1998). Guiding Principles in Web-based Instructional Design. Education Media International, Volume35, Issue No. - 2, Pp. 72-76.
Berner, J. E. (2003). A Study of Factors That May Influence Faculty in Selected Schools of Education in the
Commonwealth of Virginia to Adopt Computers in the Classroom. (Abstract Doctoral Dissertation, George Mason
University, 2003). ProQuest Digital Dissertations (UMI No. AAT 3090718).
Bhattacharya, I. & Sharma, K. (2007). India in the Knowledge Economy- An Electronic Paradigm. International
Journal of Educational Management, Volume- 21, Issue No.-6, Pp. 543-568.
Bryant, D. P., & Bryant, B. R. (1998). Using Assistive Technology to Include Students with Learning Disabilities
in Cooperative Learning Activities. Journal of Learning Disabilities, Volume -31, Pp. 41-54.
Collins, A. & Halverson, R. (2009). Rethinking Education in the Age of Digital Technology. New York: Teachers
College Press.
Collins, A. (1996). Design Issues for Learning Environments. In S. Vosniadou (Ed.), International Perspectives on
the Design of Technology-Supported Learning Environments (Pp. 347–361). Mahwah, NJ: Lawrence Erlbaum.
Davis, N.E., & Tearle, P. (Eds.). (1999). A Core Curriculum for Telematics in Teacher Training. Retrieved from:
www.ex.ac.uk/telematics.T3/corecurr/tteach98.htm on 30.07.2015.
De Corte, E., Verschaffel, L., Entwistle, N., & van Merrienboer, J. (Eds.). (2003). Powerful Learning
Environments: Unraveling Basic Components and Dimensions. Oxford: Pergamon/Elsevier.
Detheridge, T. (1997). Bridging the Communication Gap for Pupils with Profound and Multiple Learning
Difficulties. British Journal of Special Education, Volume- 24, Issue No. - 1, Pp. 21-26.
Duffy, T. (1996). Constructivism: Implications for the Design and Delivery of Instruction, Handbook of research
for educational telecommunications and technology (Pp. 170-198). New York: MacMillan.
Fullan, M. (1992). Successful School Improvement: The Implementation Perspective and Beyond. Philadelphia,
USA: Open University Press
Garner, J., & Campbell, P. (1987). Technology for Persons with Severe Disabilities: Practical and Ethical
Considerations. The Journal of Special Education, Volume- 21, Pp. 24-32.
Gulbahar, Y. (2007). Technology Planning: A Roadmap to Successful Technology Integration in Schools.
Computers & Education, Volume- 49, Issue No.-4, Pp. 943-956.
Jonassen, D. H. (1999).Computers As Mind Tools for Schools: Engaging Critical Thinking (2nd Ed.). Englewood
Cliffs, NJ: Prentice Hall.
Keengwe, J. & G. Onchwari. (2008). Computer Technology Integration and Student Learning: Barriers and
Promise. Journal of Science Education and Technology, Volume- 17, Issue No.-6, Pp. 560-565.
Khan, M. S. H., Hasan, M., and Clement, C.K. (2012). Barriers to the Instruction of ICT into Education in
Developing Countries: The Example of Bangladesh. International Journal of Instruction, Volume- 5, Issue No. - 2,
Pp. Print ISSN: 1694-609.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
Kluever, R. C., Lam T. C., Hoffman, E. R., Green, K. E., & Swearinges, D. L. (1994). The Computer Attitude
Scale: Assessing Changes in Teachers’ Attitudes Toward Computers. Journal of Educational Computing Research,
Volume-11, Issue No.-3, Pp. 251-261.
Lebow, D. (1993). Constructivist Values for Instructional Systems Design: Five Principles Toward A New
Mindset. Educational Technology, Research and Development, Volume-41, Issue No. - 3, Pp. 4-16.
McGorry, S. Y. (2002). Online, but on Target? Internet-based MBA courses: A case study. The Internet and
Higher Education Volume-5, Issue No.-2, Pp. 167-175.
McGregor, G., & Pachuski, P. (1996). Assistive Technology in Schools: Are Teachers, Ready, Able, and
Supported. Journal of Special Education Technology, Volume- 13, Pp. 4-15.
Moore, D. & Taylor, J. (2000). Interactive multimedia Systems for Students with Autism. Journal of Educational
Media, Volume- 25, Issue No.-3, Pp. 169-175.
Moore, M. & Kearsley, G. (1996). Distance Education: A Systems View. Belmont, CA: Wadsworth.
Mumtaz, S. (2000). Factors Affecting Teachers’ Use of Information and Communications Technology: A review
of the Literature. Journal of Information Technology for Teacher Education, Volume-9, Issue No.-3, Pp. 319-342.
New Media Consortium. (2007). Horizon Report. Retrieved from: www.nmc.org/pdf/2007_Horizon_Report.pdf,
on 30.07.2015.
Pajo, K., & Wallace, C. (2001). Barriers to the Uptake of Web-Based Technology by University Teachers. Journal
of Distance Education, Volume-16, Pp. 70-84.
Pajo, K., & Wallace, C. (2001). Barriers to the Uptake of Web-Based Technology by University Teachers. Journal
of Distance Education, Volume-16, Pp. 70-84.
Pelgrum, W. J. & Law, N. (2003). ICT in Education around the World: Trends, Problems and Prospects.
UNESCO-International
Institute
for
Educational
Planning.
Retrieved
from:
www.worldcatlibraries.org/wcpa/ow/02d077080fcf3210a19afeb4da09e526.html, on 30.07.2015.
Pelgrum, W.J. (2001). Obstacles to the Integration of ICT in Education: Results from a Worldwide Educational
Assessment. Computers & Education, Volume- 37, Pp.163- 178.
Plomp, T.J., Brummelhis, A.C.A., & Rapmund, R. (1996). Teaching and Learning for the Future. Report of the
Committee on Multimedia in Teacher Training (COMMITT). Den Haag: SDU.
Pulkkinen, J. (2007). Cultural globalization and Integration of ICT in Education. In K. Kumpulainen (Ed.),
Educational Technology: Opportunities and Challenges (Pp. 13–23). Oulu, Finland: University of Oulu.
Rosen, L. D. & Weil, M. M. (1995). Computer Availability, Computer Experience, and Technophobia among
Public School Teachers. Computers in Human Behavior Volume- 11, Issue no.-1, Pp. 9-31.
Sanyal, B. C. (2001). New Functions of Higher Education and ICT to Achieve Education for All. Paper prepared
for the Expert Roundtable on University and Technology-for- Literacy and Education Partnership in Developing
Countries, International Institute for Educational Planning, UNESCO, September 10 to 12, Paris.
Sharma, R. (2003). Barriers in Using Technology for Education in Developing Countries. IEEE0-7803-7724-9103.
Singapore Schools. Computers & Education, Volume-41, Issue No.-1, Pp.49-63.
Sharma, R. C. (2003). Barriers in Using Technology for Education in Developing Countries. Information
Technology: Research and Education, 2003. Proceedings. ITRE2003. International Conference.
Smeets, E. (2005). Does ICT contribute to powerful learning environments in primary education? Computers &
Education, Volume-44, Pp. 343-355.
Susman, E. B. (1998). Co-operative Learning: A Review of Factors that Increase the Effectiveness Of ComputerBased Instruction. Journal of Educational Computing Research, Volume-18, Issue No. - 4, Pp. 303-322.
UNESCO. (2002). Information and Communication Technology in Education–A Curriculum for Schools and
Programme for Teacher Development. Paris: UNESCO.
UNESCO. (2002). Open and Distance Learning Trends, Policy and Strategy Considerations. Paris: UNESCO.
Volman, M., & Van Eck, E. (2001). Gender Equity and Information Technology in Education: The Second
Decade. Review of Educational Research, Volume-71, Issue No.-4, Pp. 613-634.
Voogt, J. (2003). Consequences of ICT for Aims, Contents, Processes and Environments of Learning. In J. van den
Akker, W. Kuiper, & U. Hameyer (Eds.), Curriculum landscapes and trends (blz. Pp. 217-236). Dordrecht:
Kluwer.
Waddell, L. (2000).The Pilot Internet Project: Evaluation Report. RNIB. Retrieved from:
https://rocspgce.wordpress.com/send-learners/, on 30.07.2015.
Wood, D. (1995). Theory, Training, and Technology: Part I. Education and Training, Voluem-37, Issue No. - 1,
Pp. 12-16.
Worth, N. (2001). Fountain dale Communication Project. International Journal of Language and Communication
Disorders, Volume- 36, Pp. 240-245.
Young, J. (2002). The 24-Hour Professor. The Chronicle of Higher Education, Volume- 48, Issue No.- 38, Pp. 3133.
http://www.udlcenter.org/aboutudl/whatisudl/conceptofudl.30.07.2015
http://www.pmss.edu.bt/articles/ictineducation. 30.07.2015.
ISBN 1-63102-455-8
411
DIGITISATION OF LIBRARY MATERIAL IN ACADEMIC
LIBRARY:CHALLENGES AND ISSUES
Sushma R. Mawande | Librarian | Lt. Madangopal Mundhada Arts and Commerce College | Chandur Rly Dist
Amravati | smawande@ymail.com
Abstract: Digitization as a method of preservation is now a global phenomenon as well as the
new trend in managing a library collection especially precious ones among academic libraries.
Digitization of library collection has become a common activity among libraries. Libraries, are
realizing the need to make available their local collection in digital forms to their users apart
from subscribing to digitized resources in terms of online databases and e-books. This paper
discusses the reasons for digitization and also explains the processes and methodology of
digitization. Issues and challenges involved in the process of digitization are also highlighted.
Keywords: digitization, academic libraries, information, technology.
INTRODUCTION
Digitization of information materials is the process of converting analogue information to a digital format .It is
one of the newest methods of managing information resources in the new information age, whereby information
technology has assisted in making information accessible to people even in their homes. Traditional library
materials in the form of books, papers, manuscripts, documents, etc. are converted into electronic formats.
Images (such as photographs or maps) are converted into digital representations using some type of scanning
device (or digitizer) so that they can be displayed and manipulated on a screen.
Digital institutional resources such as theses, manuscripts, special monographs, research papers, or images are
of very high value to academic institutions. Cooperation, automation and building of the digital library — all for
the enhancement of service delivery in support of teaching and research — are the principal drivers that will
shape the collective future of libraries as suppliers of information to the scholarly world
DIGITISATION
Digitization of library collection has become a common activity among academic libraries. Libraries, more
particularly academic libraries are realizing the need to make available their local collection in digital forms to
their users apart from subscribing to digitized resourcs in terms of online databases and e-books,. Academic
libraries have always been the depositories of intellectual contents such as theses, dissertations, research reports,
students’ projects and various published and unpublished works of the faculty members, staff and students. In
this context digitization has become bare necessities for academic libraries in digital environment.
Witten and David (2003) defined Digitization as the process of taking traditional library materials that are in
form of books and papers and converting them to the electronic form where they can be stored and manipulated
by a computer.
Ding, Choo Ming (2000) has elaborated the works of Getz (1997), Line (1996) and Mckinley (1997) on the
advantages of digitization. They maintained that: Digitization is the creation of digital objects from physical,
analogue originals by means of a scanner, camera or other electronic device. It is undertaken as part of a process
that includes:
Selection
Assessment, including of needs
Prioritization
preparation of originals for digitization
metadata collection and creation
digitization and creation of data collections
submission of digital resources to delivery systems and repositories.
ISBN 1-63102-455-8
413
Digitisation of Library Material in Academic Library: Challenges and Issues
This process is accompanied along the way by management, including intellectual property rights management
and quality control, and evaluation at the end. These steps are essential to ensure that the digital object remains
accessible in the long-term.
NEED OF DIGITIZATION
Library materials especially old manuscripts, photo images, theses, and musical recordings etc that are in
danger of being lost in the future and which are mostly historical and valuable needs to be preserved for future
use. But the main problems for academic libraries are to select which materials to be digitized and how to get
these materials digitized. In this context De Stefano (2001) noted that there were different purposes for
digitization. She highlighted the types of materials selected must meet the purpose, selection to enhance access,
selection based on content and selection for preservation. Similarly Gertz (2000) outlined that when considering
materials for digitization, first criteria will be physical condition of the materials, followed by access, value of
content, the demand for the materials, the intellectual property rights, the required infrastructure, cost and
sources of funding.
Academic libraries are digitizing materials because they know the continuing value of library resources for
learning, teaching, research, scholarship, documentation, and public accountability. Another reason of
digitization is to make access facilities to these resources. The needs of digitization of library materials are:
To preserve the age old materials for long use which are important and valuable for future?
To facilitate new forms of access and use.
Better and enhanced access to a defined stock of research material
Creation of a single point of access to documentation from different institutions concerning a special
subject
Support for democratic considerations by making public records more widely accessible
Better search and retrieval facilities for library types of materials.
To give the institution opportunities for the development of its technical infrastructure and staff skill
capacity.
PROCESS OF DIGITIZATION
The basic process of digitization is fairly simple, though a wide range of sophisticated techniques and tools may
be used. Some important processes of digitization are discussed as below.
Scanning: Scanning means capturing a digital image. Image resolution is an important part of scanning process.
The number of pixels of a row and columns determine the quality of the scanning. Generally scanning done
through digital camera and scanners. Both have photo sensor, which consist of a charged coupled device or
CCD arrays. The CCD arrays convert the light into electronic signals. Various types of scanners are available
such as flat bed scanner, overhead scanner, and drum scanner etc. Scanning is the most cost effective way to
create a digital file. The alternative to scanning is to photograph a document using a digital camera. It may be
hand held or fixed. Hand held digital cameras are not suitable for archival scanning, but the high hand digital
camera has no scanning limitations. The size and shape of materials are also responsible for high speed of
scanning. Overhead fixed digital camera present great potential for scanning oversize materials, media in all
format.
File format: File formats are meant for storing image data. Some most commonly used file formats are:
GIF (Graphic Interchange Format) – 8 bits
JPEG (Joint Photographic Expert Group) – 24bits
TIFF - 24bits
PDF (Portable Document Format) – 32bits
Optical Character Recognition (OCR): Another technology involved in digitization is Optical Character
Recognition (OCR). When a page is stored as an image, manipulation of the text is not possible as the image file
414
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
contains only a digital representation of a printed page. Thus editing, cut and paste, correction, retrieval is not
possible. The usual process by which an image page is transformed into a text file is optical character
recognition. The purpose of the whole OCR process is to recognize the letters, words and symbols printed on a
page. It also uses spell checkers or other lexical analyzers that make use of context information to correct
recognition errors and resolve ambiguities in the generated text.
Mark up: An electronic document has no inherent structure other than that of linear character or bite string.
Therefore if part of the document has to be made identifiable, convention must be established. So, different
identifier/ tag found in an electronic document are collectively referred as mark up. The three commonly known
markup languages are:
Standard Generalized Markup Language (SGML)
Hypertext Markup Language (HTML)
Extensible Markup Language (XML)
Metadata: The type of information in describing an electronic product is a great task. The metadata are used for
describing information about the technical characteristic of digital file, their location, and a summary of their
contents. These are located in the header of a tagged document. The function is to provide users with a
standardized means for intellectual access to digitized materials.
PDF (Portable Document Format): PDF is the open de facto standard for distribution of electronic documents
worldwide. Adobe PDF is a universal file format that preserves all the fonts, formatting colors and graphics of
any source document regardless of the application and platform used to create it. It is compact and can be
shared, viewed, navigated and printed exactly.
ISSUES AND CHALLENGES
Although Digitization of library materials seems to be simple, it is a complex process, which carries a lot of
issues and challenges .It includes managing budget, staffing, workflow, determining metadata, technical
specification etc to make the digitization project a success. The major issues and challenges of digitization are as
discussed below.
Policy formulation: Many issues related to Digital technology are unresolved since these technologies are
undergoing rapid and continuing development .It gives rise to “wait and see” approach. The technology changes
very often and therefore the management decision regarding digitization get delayed. The academic library
authority/management need to consider that whether the cost and time involved would be commensurate with
the benefits before taking any policy decision regarding digitization.
The policy of a library for digitization includes the standards and guidelines for digitization of materials of a
library. It differs from project to project and library to library. In most cases libraries adopts their own standards
and guidelines. However some widely accepted standards such as standard prescribed by Digital Library
Federation are commonly referred at the planning stage. Similarly common metadata standards used for this are
Dublin Core, RDF, TEL, MARC etc. Normally the standards fall into three major areas i.e. material description,
user access and system architecture. Hence at the planning stage of the digitization project ,a good policy
regarding standards, formats and protocols should be formulated .Framing of a policy for material to be
digitized is a tricky matter. One person cannot judge historical value, utility value, content value and quality
value. Therefore a group of experts should discuss on this matter and an overall policy has to be framed very
carefully.
Legal issues: The academic libraries which are interested to undertake a digitization project need to be aware of
the legal issues related to this. They must investigate the copyright laws involved for each item they intend to
digitize and also the legal issues affecting its access by users. Thus three issues such as copyright, authencity
and Intellectual Property Management must be properly addressed by the libraries.
ISBN 1-63102-455-8
415
Digitisation of Library Material in Academic Library: Challenges and Issues
Cost: Digitization is an expensive and resource intensive process. In includes cost relating to design,
implementation and maintenance. Therefore financial issues related to training of staff, integration of new work
process, procurement of machines and equipments, provision of a suitable workspace and the establishment of
new systems for digital storage to ensure the preservation of digital heritage must be taken into consideration at
the time of planning the digitization programme.
However the high cost involved in digitization suggest the need for cost recovery by the library as a small
compensation in a way similar to a photocopy service. A digital collection normally includes surrogate copies of
all types of library materials, which may be of high interest to a range of potential markets. Since libraries
seldom retain copyright for the original works, the permission to access may be given basing upon licensing the
use of images in protection of intellectual property of digital assets held by the libraries.
Technology Obsolescence: The greatest challenge lies in technology preservation, which entails not only the
migration of the data itself, but also the migration and emulation of the technology platform, including devices
and the data formats in which the information are created to ensure that it will continue to be accessible on
emerging new platforms. File formats are also changing rapidly. The age-old preservation techniques are
changing into new techniques. Some strategies to meet these new challenges of technology obsolescence are:
Application of International standards and best practices
Policy development for use of latest technology available at the time of initiation of digitization project
Selection of hardware, software and other equipments which will be compatible with the future change.
Development of skilled manpower to use the available technology
Sufficient financial provisions for procurement and maintenance of new technologies.
Skilled Manpower: Although there are many problems associated with process of digitization, most libraries
feel manpower as the main problem. Since the library and information science processionals are not educated or
trained for digitization process, there is need for more training and education for library & information science
professionals.
Training is the most essential part in digitization process. Handsome training need to be provided regularly to
the library staff, particularly those who are engaged in digitization project of the library
CONCLUSION
It is a challenge for Library & Information science professionals to cope with the change and to adopt the new
tools and techniques to make the digitization process fruitful. The process and methodology used in the
digitization is a great task. Above all the copyright issue, cost, skilled manpower, technological obsolescence,
file format, correction, etc. are various issue related to digitization that must be addressed properly.
Digitization has opened up new audiences and services for libraries, and it needs to be integrated into the plans
and policies of any institution to maximize its effectiveness. Digitization is a complex process with many crucial
dependencies between different stages over time. Utilizing a holistic life-cycle approach for digitization
initiatives will help develop sustainable and successful project.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
416
J. Feather and R. P. Sturges, International Encyclopedia of Information ad Library Science. 2d ed. London:
Routledge, 2003, pp. 138.
R. Carr, “The future of libraries and collection,” Keynote Address to the Fiesole Collection Development Retreat,
Oxford, 20 July, 2000.
J. Flanders and E. Mylonas, “Digital humanities,” in Encyclopedia of Library And Information Science, M. J. Bate
Ed., 3rd ed., 2010, pp. 1557-1568.
B. A. Fabunmi, M. Paris, and M. Fabunmi, “Digitization of library resources: Challenges and implications for
policy and planning,” International Jopurnal of Africa America Studies, vol. 5, no. 2, pp. 23-36, 2006.
P. De. Stefano, “Selection for digital conversion in academic libraries,” College & Research Libraries, vol. 62, no.
1, pp. 58-69, 2001
J. E. Gertz, “Selection for preservation in the digital age: An overview,” Library Resources & Technical Services,
vol. 44, no. 2, pp. 97-104, 2000.
I. T. Silkroad. Digitization service. [Online]. Available: http://digitizationservice.com/?p=3
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
[8]
[9]
[10]
[11]
[12]
[13]
[14]
B. A. Fabunmi, M. Paris, and M. Fabunmi, “Digitization of library resources: Challenges and implications for
policy and planning,” International Journal of African American Studies, vol, 5, no. 2, 2006.
P. De Stefano, “Selection for digital conversion,” Moving Theory into Practice. Mountain View, A. Kenney and O.
Reiger, Ed., CA: Research Libraries Group, 2000.
R. Tennant, “Selecting collections to digitize,” Library Journal, vol. 125, no. 19, pp. 26, 2000.
UNESCO, IFLA, & ICA. (2002). Guidelines for digitization Projects. [Online]. Available: http://portal.unesco.org
P. Ayris. Guidance for selecting materials for digitization. Joint RLG and NPO. Preservation Conference
Guidelines for Digital imaging. [Online] Available: www.rlg.org/preserve/joint/ayris.html
T. Beamsley, “Securing digital image assets in museums and libraries: A risk management approach,” Library
Trends, vol. 48 no. 2, pp. 358-78, 1999.
C. Rusbridge. (1998). Towards the hybrid library. [Online]. Available: www.dlib.org/dlib/july98/rusbridge.html
ISBN 1-63102-455-8
417
E-LEARNING INITIATIVES IN INDIA: AN OVERVIEW
Urmila Devi | Research Scholar | Babamasthnath University | Asthal Bohar, Rohtak | 1977nrana@gmail.com
Abstract: This article provides useful information about the e-learning. The aim of this article is
to briefly describe the meaning, definition, and initiatives of e-learning in India. In India, the
development of e-learning is more successful incorporate segment where it is seen as a means of
achieving business goals and also describese-learning merits, demerits and future of the elearning. E-learning has rapidly evolved from a thing of the future to a practical approach
towards education. It will continue to be an extremely useful classroom teaching tool as well as
self-study platform.
Keywords: E-learning initiatives, advantages, disadvantages, future of e-learning, India.
INTRODUCTION
E-learning is an abbreviation of the term electronic learning with the help of electronic small devices, media or
resources. E-learning is essentially the computer and network enabled transfer of skills and knowledge. Elearning applications and processes include web based learning, computer-based learning, virtual classroom
opportunities and digital collaboration. Content is delivered via the internet, intranet/ extranet, audio or video
tape, satellite TV, and CD-ROM. It can be self-paced or instructor- led and includes media in the form of text,
image, animation, streaming video and audio. (Sharma & Rawat 2011-12)1
E-learning has become the happening ground OD learning in recent times. It is the buzzwords, which dictate
likes of every learner, irrespective of any religion, cast and academic or professional interest. Now a days every
institute and corporate is zapping cutting edge on line and e-learning solutions to augment the efficiency and
productivity of their employees and student community. The e-learning solutions have been envisioned with a
foresight to dart and smoothen learning processes world over. In addition, with the purpose of increasing the
reach of e-learning courses to every individual, mode of blended learning has also been incorporated. Blended
learning
makes
use
of
traditional
learning
methodologies
to
make
the
subject
understandable.(www.librainteractive.com/elearning-future.html.)2
DEFINITIONS OF E-LEARNING
Ellitott Masie, one off the renowned experts in e-learning, suggests that e-learning is the use of the network
technology to design, deliver, select, administer and extend learning.
Cisco Chairman John Chamberstates that e-learning is an internet-enabled learning process whose components
can include content delivery in multiple formats, management of the learning experience and community of
networked learners, content developers and experts. (Pandey, 2008)3
E-learning initiatives in India: Uses of e-learning applications can raise the level of education, literacy and
economic development in under developed and developing countries. In India development of e-learning is
more successful incorporate segment where it is seen as a means of achieving business goals. Indian Govt. helps
always given preference to the use of ICT as means of mas’ education.
In 1984, a project named CLASS (Computer literacy and Social on Schools) started to make a computer literacy
as compulsory project for class 11th and 12th by the Indian Govt. In the 7th five year plan and 8th five year plan
2598 Schools and 2371 Schools respectively started computer literacy having foundation step towards elearning in India. During year 2003 with the aim to take at leaving to school in every District across the country.
A project was started which will cover 6, 00,000 Schools in India. University Grant Commission higher
education was project launched by UGC in collaboration with INSAT named CONTRY WIDE CLASS
ROOMS in 1984 to upgrade and enrich quality of education. The first on line education enterprise net varsity
with private initiative was taken by national institute of information technology in 1996. In 1991 Indira Gandhi
National Open University started telecasting educational programme of Doordarshan. In 1999, it is started to
virtual campus initiative with to programs of Bachelor of information technology and advance development in
information technology.
418
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Gyandashan education channel was started in 2000 to telecast educational programme round the clock in joint
collaboration of Govt. of India, ParsarBharti in IGNOU. Indian Institute of Management Bangalore used elearning face to face teaching. UGC organized a dialogue on “enhancing higher education through e-learning” in
collaboration with common wealth of learning CCOL wancover from M-19 November, 2003 at New Delhi.
World first educational satellite was started in India in 20 th September, 2001 named EDUSAT to provide
education to millions of people at their door step. It enable information to be broadcasted in local language and
devoted to long distance learning in India. (Chandwani & Anil Kumar)4
Advantages of e-learning:
Individualized instructions: - e-learning provides individualized instructions suiting to the needs, abilities,
learning styles, and interests of the learners.
Easy access: - The learner gets access to learning by breaking all barriers of the time place and distance.
The learners can access information and educational contents any time at any place.
Qualitative: - e-learning has a unique feature of arranging an access to unlimited number of time student
has.
Effective media:- e-learning can prove an effective media and tool for facing the problems of lack of
trained and competent teachers, shortage of schools and the needed infrastructure and material facilities
for providing quality education to the number of students residing in for and wide corners of the country.
Different learning styles: - Unlike traditional classroom education, e-learning can cater to different
learning styles and promote collaboration among students from different localities, cultures, regions,
states and countries.
Flexibility: - The flexibility of e-learning in the terms delivery media and access may prove very
beneficial for the learners.
Play-way spirit and learning by doing: - Learning experiences via simulated and gaming techniques, may
also provide the advantages of getting richer experiences on the useful pedagogical footings of Play-way
spirit and learning by doing or living.
Interesting and motivating: - e-learning may make the students more interested and movated towards
learning experiences by having an access to multimedia.
Evaluation and feedback: - It provides opportunities for timely evaluation and feedback for the learning
outcomes.
Self pacing: - Self pacing provides a special weightage to the process of learning.
Self-learning and self improvement: - e-learning leads to self learning. It can be utilized for improving
technical vocational skills.
Mass learning: - e-learning is a system of mass learning.
Development of manpower resources: - e-learning helps in the Development of manpower resources in
the country.
Learning of international level: - A person can attain maximum and latest knowledge of any topic or
subject by using internet.
Multi-sided research: - A person can collect complete information about any topic and he can do research
on any part of the topic. (Walia, 2011)5.
Disadvantage or limitation of e-learning:
Lack of awareness, acceptance and motivation towards use of e-learning.
India has not developed National Policy on e-learning therefore country has not made much progress in
systematic development of e-learning.
Lack of co-ordination between the various funding agencies, resulting duplication of efforts and initiative
in similar areas of e-learning development and implementation.
Lack of financial provision in the present budgetary system for development of e-learning.( Singh, Ritu,
2014)6
Lack of computer knowledge.
E-learning is more costly than traditional education.
ISBN 1-63102-455-8
419
E-Learning Initiatives in India: An Overview
There is no face-to-face interaction and humanistic touch profoundly available in the traditional
classroom set up.
Lack of provision for teacher training programmer.
E-learning adversely affects the eye-sight and some other parts of the body.
E-learning is based on the technology. When technical defect occurs, e-learning stop. As a result
continuity of learning is broken and there is no progress in e-learning.(Walia, 2011)7
Future of e-learning: E-learning has rapidly evolved from a thing of the future to a practical approach towards
education. It will continue to be an extremely useful classroom teaching tool as well as self-study platform. With
the rise of virtual reality technology and augment reality solutions, experimental subjects, skill-based learning
and military training will come to depend more heavily on e-learning solutions. Various education technology
providers are also hinting towards the rise of mobile learning solution as the advance stage of educational
technology in the future. I phone and face time based online tutoring has also become popular and is being
termed as I-learning platform. Assignment help net is one of the top e-learning companies and a PIONEER in
online education. It offers e-learning solution and online tutoring for kids park-12, schools as well as college and
University students can access education assistance with service such as online tutoring online programming
help, project help, essay writing and editing services and thesis and course work guidance. Visit assignment help
net today more information on e-tutoring, e-education, online assignment help, e-learning contents solution,
online corporate training as well as writing and editing services. (www.assignmenthelp.net/blog/e-learning
education and -its-future-scope)8
Bandwidth will continue to increase to allow more media reach and interactive content to be delivered. However
as users becomes even more demanding, the debate on whether there will ever be enough bandwidth will remain
to be seen. The wireless WAP enabled device as should mean that we will be able to access e-learning content
anywhere we can take over mobile devices. The real future lies not just in the technology but in the potential to
integrate several key areas:
Knowledge management of intellectual capital.
E-learning to develop this capital.
Web enabled electronic performance support
productively.(www.elearnity.com)9
systems
to
use
this
capital
more
CONCLUSION
E-learning stands for electronic learning with the help of electronic small device, media or resources. So, we can
say that it is use of network to extend learning. E-learning is a very useful to make education more effective, so
it is appreciated all over the world including India. E-learning has a very wide scope, as by using this one can
learn anytime and anywhere and also one can have self-paced learning.
Though e-learning has raised the standard of education still it also have some demerits like, lack of financial
provision, lack of awareness and motivation, it is very costly etc. But, fore sure, one can not deny that e-learning
is revolutionary step in field of education.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
420
Sharma, Sanjay and Rawat, Tarun (2011-12) Information communication and educational technology, New Delhi
:IPSDPublishan, pp. 78-79.
www.librainteractive.com/elearning-future.html
Pandey,K.P. (2008) E-learning: Concept, Potenitial and future, Indian Journal of teacher education Anweshika,
New Delhi :National council for teacher education, 5 (1), p.3.
Chandwani, Anita and Anil Kumar, Shraddha, E-learning initiatives in India available on
http://eprints.rclis.org/15721.
Walia, J.S. (2011) Information communication and educational technology, Jalandhar :Ahim Paul Publishers, pp.
174-176 .
Singh, Ritu,et al. (2014) Development of e-learning and e-content creation in Indian Higher education system:
Issues, solutions and suggestions. New Delhi University News: A weekly journal of higher education, Association
of Indian universities, 52 (12), pp. 22-23
Walia, J.S. (2011) Information communication and educational technology, Jalandhar :Ahim Paul Publishers, p.
176 .
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
[8]
[9]
www.assignmenthelp.net/blog/e-learning education and -its-future-scope
www.elearnity.com
ISBN 1-63102-455-8
421
EFFECTIVE TEACHING USING BLENDED LEARNING
MODELS
Dr. N. Devaki | Assistant Professor | Department of Education | Gandhigram Rural Institute | Deemed
University | devakiaries@gmail.com
M. Deivam | Ph. D Scholar | Department of Education | Gandhigram Rural Institute | Deemed University
| deivammuniyandi@gmail.com
Abstract: Nowadays, eLearning has been adapted in all educational institutes, starting from
kindergartens, primary schools, high schools, to the universities. Blended learning is not a new
concept, evolving over the last four decades from the use of a combination of classroom formats,
books, and handouts to a blend face-to-face instruction and technologically mediated approaches
(American Society for Training & Development, 2001). The main objectives of blended learning
are to optimize learning outcomes and minimize the cost of the program through “any
combination of learning delivery methods, including most often face-to-face instruction with
synchronous computer technologies (So & Brush, 2007). In this paper discussed different kinds of
blended learning models such as rotation, flex, self blend and Virtual enriched models.
Keywords: Blended Learning, Models, Face-to Face instruction, Online Learning.
INTRODUCTION
Blended Learning is a planned combination of online learning and Face-to-Face (F2F) instruction using a
variety of learning resources. It is a flexible learning resources. It is a flexible learning strategy that integrates
innovative and technological advances of online learning with interaction and participation of traditional F2F
classroom learning. Thorn (2003) describes Blended Learning as a way of meeting the challenges of tailoring
learning and development to the needs of individuals by integrating the innovative and technological advances
offered in the best of traditional learning.
Blended Learning reflects more conscious intentional approaches to designing optional instruction or learning
environment following the strategy of blended components while the blended character of traditional
instructional contexts in largely the result of habit (tradition), convenience or happenstance (American
Management Association). As both the F2F instruction and online learning suffer from limitations, it is natural
to combine the strengths of the two into Blended Learning. Combining face-to-face and fully online components
optimizes both environments in ways impossible in other formats (Dziuban and Hartman, 2004).
422
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
REVIEW OF RELATED LITERATURE
Devaki and Muthuraj (2015) study on Blended Learning for Science Teaching; In this context the researcher
for conducted on experimental research to find out the effectiveness of “Blended Learning for Science
Teaching” with the sample size 66 of Thambithottam higher secondary school and cheran matriculation school.
Investigators selected topic such as the skeletal system, the nervous system, the circulatory system, The
Respiratory system from XI standard science text book prescribed by Tamilnadu text book society, Tamilnadu.
The Blended Learning environment was created by blending on Evaluation, 3D Model, Online presentation
through Interaction Black Board, Working Model, Demonstration, Face to Face Interaction, You tube video
through experimental research investigators, administrators and collected the data. The data was statistically
analyzed and the findings reveals that there is significant difference in gain scores of pre test and post test scores
among higher secondary school students teaching science using “Blended Learning for Science Teaching”.
Hence study is the greatest contribution in teaching using Blended Learning environment.
Regi P.Mathew (2013) studied Blended Learning Strategy: Teacher Perspective. The investigator tries to
understand the awareness of secondary school teachers regarding Blended Learning. The Objectives of the study
and nature of data required for their realization, survey method is selected for the present study. A sample of 90
secondary school teachers has been selected from different schools of Thrissur district in kerala. The secondary
level teachers have low awareness (53%) of about blended learning strategy. About 35 % of secondary level
teachers showed average awareness about blended learning strategy. Only 11.1% of the teachers showed high
awareness about blended learning strategy. The government school teachers are having average awareness. The
secondary level government aided management school teachers are having low awareness about Blended
learning strategy. The secondary level private school teachers are having low awareness about Blended learning
strategy. The current study reveals that the secondary school teachers are not fully aware about the potentials of
Blended learning practices for classroom instruction.
Clement C.hen and Keith T.Jones (2007) study conducted on Blended Learning Vs. Traditional classroom
setting: Assessing Effectiveness and student perceptions in an MBA Accounting Course. The journal of
Educators online, Volume 4, Number 1, January 2007; Objectives: To find out the course Effectiveness of
Blended and Traditional classroom teaching among M.BA Students; To find out the M.BA students perception
towards Blended Learning and Traditional classroom Accounting course. Survey was conducted MBA students
at a university of Northern United States. One group of students enrolled traditional classroom course (n=38)
and other group of students enrolled blended learning course. Findings: There is no significant difference
between the two instructional methods of traditional and blended learning course. The general course
effectiveness assessed through five point scale from 1 (Strongly disagree) to 5 (Strongly agree) and‘t’ test used
to examine the comparative differences. Based on the survey result traditional classroom setting to add the value
in terms on instructional clarity; blended learning course participation indicated that their analytical skill
improved and willing to enroll if they offered. Accounting program administrators have the opportunity to
maintain or increased enrollments. Not significant difference between blended course and traditional classroom
course outcome of learning.
Jeyanthi . R (2014) study conducted on Effectiveness of Blended Learning Method in Teaching Practical
Chemistry. Objective: To find out the effectiveness of Blended Learning Chemistry through Blended Learning
Method. Sample: The investigator chose 50 student of standard XI from government girls higher secondary
school in Dindigul by Purposive sampling technique 25 students of Section ‘A’ as Experimental group and 25
students of section ‘B’ as Control group, pre-test, treatment and post test. The investigator measured the score
by the prescribed format given by the government of examination, Tamilnadu. The multimedia package with
animated practical chemistry was used to experimental group. The practical chemistry taught through
demonstration method for control group. Result: There is no significant difference between the control and
experimental group in pre-test scores of their practical chemistry. There is significant difference between the
control and experimental groups post test score of their practical chemistry at 0.001 level of significant. This
gives the evidence of teaching practical chemistry through blended learning is more effective than the teacher
demonstration method.
ISBN 1-63102-455-8
423
Effective Teaching Using Blended Learning Models
Balarable Yashau (2006) study conducted on The effects of Blended E-Learning on Mathematics and
Computer Attitudes in Pre-Calculus Algebra; The Montana Mathematics Enthusiast Vol. 3. No.2 PP.176-183;
Objectives: To find out the influence of Blended E-Learning on students attitude towards mathematics and
computers. Methodology: The one semester experiment was conducted. Data were collected beginning and end
of the semester. The MINITAB software was used to analyze the data. The 70 students were randomly selected
(second year pre-calculus course) from king fahd university of Petrolem & minerals, Dhahran Saudi Arabia. The
experiment was conducted via tow mode of learning both online and offline learning. Offline learning as a
control group and Online learning as a experimental group. The offline mode of instruction is face-to-face
instruction was conducted three times in a week. The online learning (WebTC) was as used as a delivery mode
of Learning. In this mode of learning students solve the problem using MATLAB (Mathematical Software).
Findings: The subjects have positive attitude towards mathematics and computer. The analysis of variance
shows not statistically significant change in student attitudes towards that computer confidence and anxiety subscale.
Sivasankar. A (2011) study conducted on Development, Valuation and Effectiveness of Blended Learning
Modules on Teaching of Science at B.Ed level. Objective: To integrate the personal touch of conventional faceto-face learning and e-learning; To find out the level of achievements through Blended Learning modules in
science subjects; To analyse the achievement of students teachers with respect to personal variables through
blended learning; To evaluate the effectiveness of blended learning modules in science subjects; To find out the
e quest of student teachers learning science through blended learning; To study the ICT readiness of Blended
Learning; To find out relationship between e quest and ICT readiness of student teachers learning through
blended learning; Sample: A sample OF 40 student teachers were selected from MASS colleges of Education as
the control group and 40 B.Ed student teachers were selected from SASTRA University as the experimental
group. They were purposive sampling technique used in this study. Method: There pre-test, Treatment, post-test
equivalent group experimental design was adopted in the study. Findings: The blended learning strategy is
effective in improving the post test achievement of student teachers in science and improving the post test e
quest scores of student teachers. There is significant difference is there mean scores of achievement in science
subject of Experimental and Control group. Through this experiment blended learning is more effective than
traditional classroom practice.
INGREDIENTS OF BLENDED LEARNING
Live Events: Synchronous, teacher-led learning environments in which all learners participate at the same time.
Teacher may use lecture, demonstration, discussion or computer-based instruction to all the students in live. For
many learners, nothing can replace the ability to tab the expertise of a live teacher. It can be in real classroom or
can be in virtual.
Self-paced learning: Learning experiences that the learner completes individually at his own pace and on his
own time such as recorded live events, Internet-based or CD-ROM-based; it implies on-demands learning at a
pace that is managed or controlled by the learner.
Collaboration: It implies a more dynamic communication and interaction among many learners that brings
about knowledge sharing. Collaborative learning has more advantage which are not available from traditional
instruction because a group can accomplish meaningful learning and solve problems better than any individual
can alone. It can be extended from discussion in the live classroom to synchronous communications in chat
room or in open discussion forums and asynchronous communication by using e-mail and threaded discussion.
Assessment: It is both live and online measure of learner’s knowledge to determine prior knowledge as well as
to measure learning transfer.
Performance Support: These are the reference materials that enhance learning, retention and transfer. It may
be printable reference, downloaded multimedia learning objects, documentation etc;
424
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
MODELS OF BLENDED LEARNING
Rotation model: In the Rotation model of blended learning: within a given course, a student rotates on a fixed
schedule between learning online in a one-to-one, self-paced environment and sitting in a classroom with a
traditional face-to-face teacher.
Station-Rotation model: Station Rotation – a Rotation model implementation in which a given course or
subject (e.g., math), student rotate on a fixed schedule or at the teacher’s discretion among classroom based
learning modalities. The rotation includes at least one station for online learning. Other stations might include
activities such as small group or full class instruction, group projects, individual tutoring, and pencil and paper
assignments.
Lab Rotation model: Lab Rotation – a Rotation model implementation in which within a given course or
subject (e.g., math). Students rotate on a fixed schedule or at the teacher’s discretion among locations on the
brick and mortar campus. At least one of these spaces is a learning lab for predominantly online learning, while
the additional classroom(s) house other learning modalities. The Lab rotation model differs from the station
rotation model because students rotate among locations on the campus instead of staying in one classroom for
the blended course or subject.
Flipped Classroom: Flipped Classroom – a Rotation model implementation in which within a given course or
subject (e.g., math), students rotate on a fixed schedule between face-to-face guided practice (or projects) on
campus during the standard school day and online delivery of content and instruction of the same subject from a
remote location (often home) after school. The primary delivery of content and instruction is online, which
differentiates a Flipped Classroom from students who are merely doing homework practice online at night. The
Flipped Classroom model accords with the idea that blended learning includes some element of student control
over time, place, path, and / or pace because the model allows students to choose the location where they receive
content and instruction online and to control the pace at which they move through the online elements.
Individual Rotation model: Individual Rotation – a Rotation model implementation in which within a given
course or subject (e.g., math), students rotate on an individually customized, fixed schedule among learning
modalities, at least one of which is online learning. An algorithm or teacher(s) sets individual student schedules.
The Individual rotation model differs from the other Rotation models because students do not necessarily rotate
to each available station or modality.
ISBN 1-63102-455-8
425
Effective Teaching Using Blended Learning Models
Flex model:Flex model of blended learning features an online platform that delivers most of the curricula. It is
the model where most of the learning is done online and the face-to-face model exists to provide on-site support
for flexible and adoptive, as required basis through in-person tutoring sessions and small group sessions.
Self Blend model: The self-Blended model is a fully individualized approach that allows students to choose to
take one or more coursed online to supplement their traditional schools catalog. Maximum part of the learning is
done online, but the students still attend face-to-face classes.
Enriched Virtual Model: Enriched Virtual model – a whole school experience in which within each course
(e.g., math), students divide their time between attending a brick and mortar campus and learning remotely
using online delivery of content and instruction. Many Enriched Virtual programs began as full time online
schools and then developed blended programs to provide students with brick and mortar school experiences.
The Enriched Virtual model differs from the Flipped Classroom because in Enriched Virtual model differs from
the brick and mortar campus every weekday. It differs from the Self Blend model because it is a whole school
experience, not a course by course model.
CONCLUSION
The blended learning programs must be developed in making learning more accessible, engaging and relevant. It
provides more flexible learning opportunities and reduces the amount of time spent on face to face learning
activities. These programs are relatively cheap to repeat or use with large groups of learners. This explores new
approaches to learning and technologies.
There are different kinds of instructional designs of blended learning is there. Each model has some unique
features and similarities also there. Hence, teachers have to choose appropriate instructional models according to
subject content as well as circumstance.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
426
Nehru R.S.S. (2014). Blended learning, New Delhi: APH Publishing House.
Begum Jahitha. A. (2011), ICT in Teaching and Learning. New Delhi: APH Publishing House.
Harjeet Kaur Bhatia (2012). Reflections on blended learning and peer collaboration in Teacher Education, New
Delhi: Global books organisation.
Akkoyunlu, B., & Yilmaz-Soylu, M. (2008). A study of students’ perceptions in a blended learning environment
based on different learning styles. Educational Technology and Society, 11(1), 183-193.
Vaughan, N. (2007). Perspectives on blended learning in higher education. International Journal on E-Learning,
6(1), 81-94.
Garrison, D.R., & Vaughan, N.D., (2008). Blended Learning in Higher Education, San Francisco: Jossey- Bass
Wiley Imprint.
Allen, E., Seaman, J., & Garrett, R., (2007). Blending In: The Extent and Promise of Blended Education in the
United States, Needham, MA: Sloan-C. http://sloanconsortium.org/publications/survey/pdf/Blending_In.pdf
ISBN 1-63102-455-8
LIS SERVICES IN E & M LEARNING TECHNOLOGY
Dr. Durga Prasad | Librarian | Central Digital Library | Shree Ganpati Institute of Technology | Ghaziabad |
drdurgaprasad387@gmail.com
Deepak Shukla | Librarian | AIIMS | Delhi | deepakshuklaonline@gmail.com
Abstract: Mobile learning is new and modern confection education field. It is currently difficult to
define, conceptualize and discuss. It could perhaps be a wholly new and distinct educational
format, needing to set its own standards and expectations. Mobile learning has becomes anther
very important complement to the traditional ways of learning after digital learning. The
development of the third generation mobile communication technology 3G provides a more
adequate technical basis for mobile learning. The integrated objective of m-learning and elearning is to explore and to accumulate useful knowledge over and above faster coping,
searching and to distributing. The present paper discusses in E-learning & M- learning, its needs
of e-learning modules, forms, M-learning technologies, components, motivating factors, virtual
communication tools, M-learning development, advantages and disadvantage, role of librarians in
M-learning technologies and future developments.
Keywords: E-learning, M-learning, Components, 3G Technologies, Virtual Communication, Tools.
INTRODUCTION
New wave and Information Communication and Technology (ICT) provide computer enhanced learning process
which is commonly known as e-learning is a growing and dynamic environment which has given a new shape to
higher education besides classroom teaching. E-learning are now the global scenario providing learning
facilities in e-mode to such learning programme in which learning and also the course content is delivered to
learners electronically though CD ROM, DVD, INTERNET and on-line E-learning has emerged as one of the
most interactive, effective and revolutionary technologies of education in which the learner and learning
providers remain connected with each other via email, video conferencing, discussions forums, instant messages
and chat room etc. E-learning has been emerged as the most powerful system of making information,
instructional content and learning experiences accessible at learner’s computer though electronic technology.
Historical Trace out of e-learning- The e-learning is the extension of distance education learning in ICT era,
which enables learners and teachers to engage in synchronous as well as asynchronous interaction across space,
time and their own pace.
CONCEPTS OF E-LEARNING
In simple terms learning though Internet technology is known as e-learning. ‘E-learning is the use of new
multimedia technologies and the internet to improve the quality of learning by facilitating access to resources
and services as well as remote exchanges and collaboration.’
‘E-learning is the delivery of education, which includes activities related to instruction, teaching and learning
though various electronic media, such as internet, intranet, extranet, satellite television, video/audio tape or CD
ROM.’
‘E-learning is pedagogy empowered by digital technology.’
Thus, e-learning is interactive learning though digital technologies.’
What is E-Learning?
E-learning is approach to facilitate and enhance learning though both computer and communication technology.
Such device can include personal computers, CD-ROMs, Digital Television, PDAs and Mobil Phones.
Communication Technology enables the use of the Internet- Mail, Discussion forums, collaborative softer and
real learning system.
COMPONENTS OF E-LEARNING
Following are the popular and common e-learning components
ISBN 1-63102-455-8
427
LIS Services in E & M Learning Technology
Learning Management system or Learning content Management system.
Content.
Collaboration.
Testing and assessment.
Skill & Competence.
E- Commerce.
Internet video based service.
E-LEARNING SOFTWARE
There are many software available for e-learning. Here I quote some open source & commercial e-learning
software.
Open Source Software:
Atutor
DeceboLMS
Dokes
Internet
Word Circle
Site@schools
Commercial Software:
Blackboard
eCOllege
Inquisiq
Grade point
Learn eXact
Web CT
NEED FOR E-LEARNING
Today, the information needs of the users have increased enormously so much that no single library on its own
can meet their needs. This has necessitated the need for effective linkages and co-operation between libraries
and information centers for sharing of available resource & information through network services. Network email, online access, use of CD-Rom, software and hardware system etc. are now being used for resource
sharing.
The Swami Vivekananda says about education and library’ “Education is not information that is put into your
brain and runs riot there undigested all your life. You have more education they any man who has got by heart a
whole library. If education were identical with information the libraries would be the greatest in the world.”
MOTIVATING FACTORS FOR E-LEARNING
Due to globalization of business, it is essential to bring employees together at the same time; it is possible
through e-learning.
Corporate sector wants enhancement in their competitiveness by training to manpower.
Employees want to enhance their learning opportunities.
Wide spread proliferation of information technology has enable the employees to have access to Internet.
Mobile-Learning (M-learning) Technology: Mobile learning through the use of wire mobile technology
allows anyone to access information and learning materials from anywhere and at anytime as a result learner
have control of when they want to learn and from which location they want to learn. Also all human have right
to access learning materials and information to improve their quality of life regardless of where they live, their
status and their culture. mobile learning, through the use of mobile technology, will allow citizens of the world
to access learning materials and information from anywhere and at anytime. Learners will not have to wait for a
certain time to learn or to a certain place to learn. With mobile learning, learners will be empowered since they
can learn whenever and wherever they want. Also, learners do not have to learn what is prescribed to them.
They can use the wireless mobile technology for formal and informal learning where they can access additional
428
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
and personalized learning materials from the internet or host organization. Teacher can use the mobile
technology to access training material and information when they need it for just-in-time training just-in-time
learning encourages high level learning since learner’s access and applies the information right away rather than
learns the information and then applies the information at a later time. Trainer are empowered since they accuse
the mobile technology to communicate with learned from anywhere and at anytime.
Basic SIP Commands:
INVITE- Initiates a session. This method includes information about the calling and called users and the
type of media that is to be exchanged.
ACK- Sent by the client who sends the INVITE? ACK is sent to confirm that the session is established.
Media can then be exchanged.
BYE- Terminates a session .This method can be sent by either user.
CANCEL- Terminates a pending request, such as an outstanding INVITE. After a session is established
a BYE method needs to be used terminate the session.
OPTIONS- Queries the capabilities of the server or other devices. It can be used to check media
capabilities before issuing an INVITE.
REGISTER- Used by a client to login and register its address with a SIP registrar server.
M-Learning Tools Used: SIP is an application- layer control protocol that can establish, modify, and terminate
multimedia sessions (conference) such as Internet telephony calls. SIP can also invite participants to already
existing sessions, such as multicast conference. Normally SIP uses UDP and TCP port 5061 for SSL
communication. SIP protocol is very similar to HTTP, so if you have some knowledge about HTTP, then it is
easy to learn SIP. SIP doesn’t transfer session data like audio, video. RTP (Real Time Protocol) is used for that,
SIP just helps to open RTP streams.
Role of librarians in M-learning:
The following are the role the librarian in M-learning
M-learning nowadays becomes the order of the day and it is being used to impart education.
Librarians are the information intermediaries who can help the users in making use of e-resources
The librarians need to be made aware of the internet and the resources available therein and how to make
efficient use of them.
The idea behind m-learning module is to train both the librarians as well as the users regarding the
efficient use of e-resources.
The emphasis is on the resources related to librarianship in addition to general topics of interest.
M-Learning Technologies: M-learning technologies used to support different educational configurations in
terms of place and time video conferencing for example, is a same time. Different place technology. Whereas email can support different time, different place.
The Following figure shows technologies used in m-learning and their advantage.
Different place
Same place
ISBN 1-63102-455-8
Synchronous interaction
Group interactive video
Desktop interactive video
Chat sessions
Audio conferencing
Collaborative groupware
whiteboard
Classroom- based instruction
Black boards
Teaching theater
In-class lab and groupware
Presentation tools
Asynchronous interaction
Online discussion forums
E-mail
Voice mail
Video mail
Video on demand web casting
collaborative document editing
Shared use
Laboratory assignments
Self-paced programmes in central facility
429
LIS Services in E & M Learning Technology
Issues in M-learning today M- Learning: Today M-learning is considered as alternative tools of empowering
knowledge and skills. It is also treated as alternative means for classroom teaching. Now with the help of it is
possible to deliver the information with highest degree of precision which is not possible with traditional skills.
It has overcome several constraints of traditional system. But still there are some issues such as.
Figure1: Mobile learning using 3G Technology
VIRTUAL COMMUNICATION TOOL
The following tool are they are;
E-mail; e-mail is used by information workers, librarian and other for formal and learning and teaching
activities
Mailing list; it is possible to send e-mail to groups using mailing lists. The process is managed by a
hosting service that maintain a list of all the different different discussion list and people who subscribe to
them. It is run by a mail server.
News groups; the user can read and post message in a single environment than a series of e-mail arriving
at different times. Here an individual will send a message to a central source ,which then copies it to
individuals and other news groups.
Bulletin boards; bulletin boards provide a facility for discussion under various topic heading and not in
real time. Many library and information services provide bulletin boards within their websites as means
of enabling their customers to discuss ideas and share information.
Web forms; web form are often used as a means for providing a reference service within a library or
information unit they are commonly based in
Reference service
Administration of servicing such as mentoring programmes
As a tool for obtaining information from participant on e-learning programme
Polling; polling enables us to setup a survey/questionnaire and obtain feedback for a wide range of
people
Instant messaging; it enables us to send and display a message on someone’s screen in a matter of
seconds. It means the staff who is working on a busy reference or help point may message a colleague
with a question and obtain response.
Chat or conferencing ; this enables users to hold a live discussion by sending each other short written
messages.
Internet telephony ; in this tool a user can make calla by using the internet. An individual can make
distance phone calls through the computer and the internet without paying long-distance phone charges.
430
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Video conferencing ; it requires specialists and very expensive machines are used in video conferencing.
Virtual worlds; used for e –learning within universities, it is possible to through dimensional virtual
world
Developing Library Services in M-learning Environment: Repid spread of information communication
technologies, Recent reduction in technology costs and increasing PC awareness in learner are very much
attractive. Many libraries are in the process of delivering the information services and resources through the
online chat rooms, e-mail services, list serves, or fee online databases and reference services, teleconferencing
and toll free numbers.
Access to information Resources: Student at remote sites must get the information resources supporting their
learning. Computer search services should be extended with full text document delivery. Library should provide
full text documents. In a step ahead the e-learning the library can setup the digital library. Digital library will
break all the barriers of data transfer. It can store a large amount of information in various forms i.e., text, audio,
video, graphic material. Learners can make effective search for the information in digital libraries with
sophisticated search engines and download into his or her system.
Budgetary support: Considerable infrastructure such as hardware, software and manpower requires heavy
investment. Organization who wants to start e-learning system should have enough funding
Copyright: Libraries need to distribute copies of the same information to the distance learners. So librarian
must be familiar with the sufficient right to acquire intellectual property.
Consultation services: Consultation can be conducted through e-mail, toll free telephone services, pre –
packged mail out information or scheduled remote site visits.
Inter-library lone and consortia sharing: Today there is one or the form of network or cooperation is existing
in the form of associations or consortia. Such as INFLIBNET, DELNET, CALIBNET etc. further each of the
member library possess the computer, online systems and network. The effective electronic transmissions of
document demand helps quicker inter library loan and information services.
Instruction and training: One of the main problem in e-learning system that learner should have sufficient
knowledge and skills of usage of the information technology in the web based education require much training
as the e-learning involves different types of multimedia files.
Interaction: There is a lack interaction between learner and subject specialist. It may possible for subject expert
availability. But teacher may be possible to access via e-mail. Some time face interaction can be made possible
through online conferencing. E-learning designer should need to increase the interactivity
Quality of the Service: To ensure the higher quality of the services to its user regular survey is required to test
the material and they should be repackaged on periodical basis.
References services: electronically references on the inter is gaining more popularity reference librarian In the
distance education programme learner can use forms to make research queries with the ready reference services
in the form frequently asked question (FAQ) is most convenient for the learner.
Speed of Network: To access the learning material it is very much required to connect internet. As e-learning
involves multimedia file, higher speed of network with sufficient bandwidth is required.
ISBN 1-63102-455-8
431
LIS Services in E & M Learning Technology
Figure2: A live video of classroom on 3G mobile phone
Advantages the following the advantage of M-leaning
Lower costs
Time savings
Flexibility
Faster response
Greater effectiveness
Better competitiveness
M-learning complements the process and can help reach out the masses.
M-learning lies in its ability to cover distances.
The consistency that e-learning provides, e-learning is learning is done at the learners.
Learning resources can be pace easily developed using a variety of standard packages.
One can make use of, and link into other resources available on the internet
Online delivery cheap as there are no printing or distribution costs
It is easy to track learner activity and progress.
Electronic learning where the student can access the study modules through web, irrespective of the
location, time etc.
It is interactive and can serve as a substitute for a classroom teaching environment
Disadvantage
Many people find it daunting, especially at first
The student and tutor need reliable to a computer and internet.
The student and tutor need basic information technology skills
432
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Training is required for both tutor and student
The development of high-quality learning materials is time consuming and expensive.
Online tutoring can be more time- consuming than face to face tutoring.
Learning is a social process and many people enjoy face to face interactions.
The use of the large virtual learning environments is expensive and may demand additional equipment
and specialized staff.
Some learning environments require state of the art computer and the most update browser
Blended solutions can be expensive as they may involve the development of expensive online learning
resources and providing technology based support as well as face- to face support.
FUTURE DEVELOPMENTS
Automatic Response to question: Problems of learners received, the server should be in accordance
with the method of matching.
Browsing questions and answers: Learners though the system should visit the other student’s question
and corresponding answers, in order to achieve knowledge-sharing with each other to improve.
Sending notification of teaching activities: System should send notification to students when they go
out to, so that students can be in touch with the educational institution at any time, replacing a lot of
inconvenience.
CONCLUSION
In IT era information needs are changing and demands of LIS profession are also varying. Due to rapid
advancement in computer communication as well as information technology worldwide exchanges of
information is possible. Thus technology takes us to the globe anywhere at any time for any theme. The
dimension of new information technology brings the world to any one before the people while they site before
the computer with internet connectivity. But Mobile technologies are development rapidly, and the
functionalities available on mobile devices grow more numerous and complex every day. These technological
advancements, coupled with widespread availability and relatively low cost of mobile devices, represent a
tremendous opportunity to leverage the power and ubiquity of mobile.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
Allan & Barbara. E-learning and Teaching in Library & Information Services, 2002, Facet publishing, London.
Anandkrishnan, M. “e-learning: substitute or supplement?” paper presented in xx IATLIS national conference,
Madras Chennai 21-23 Pp. 123-129.
Annandan, C. & Gangatharan, M. 2002, Digital Library: From Technology to Culture 1st Edition, New Delhi:
Kanishka Publisher.
EUROPEAN COMMISSION. The e-learning action plan: Designing tomorrow’s education, 2001. Available in
http:www.study mentor.com/study mentor/.
Joshi, Vinod “e-learning to the wisdom” the Hindu October 15.2003.
Keegan, Desmond, “the future of learning: From e-learning in of m learning” Information Analysis.2002.11, Pp4465.
Kohei Arai, Herman Tolle “Efficiency improvement of e-learning document search engine for mobile browser”
International Journal of research and review in computer science (IJRRCS) Vol.02. No.06; dec.2011, Pp12871291.
KOOHANG, A. and HARMAN, K. Open Source: A metaphor of learning. Information Science Journal. 8, 2005,
p.75-86.
NICHOLS,
M.
E-learning
in
context,
E-Primer
Series
2008
Available
in
:
http//akaotearora.ac.nz/download/ng/file/group-661/877-1…..e-learning-in-context pdf.
Riggs, D.E “Distance education: rethinkikingpractices, implementing new approaches” collage and research
libraries 58, 1997.Pp. 208-209.
Sangam S L and Vantal R M “e- learning and libraries in offering LIS education” Paper presented at xx IATLIS
national conference, Chennai, 21-23. Nov. Pp. 123-129.
Seppala & H .Alamaki, “Mobile learning in teacher training” Journal of computer Assisted learning (2003)19.
Srivastava, D.K.- E-learning : A New way of Education, University News 43 (26) 2005,27-3.
Supyan Hussin, Mohd Radzi Manap, Zaini Amir & Pramela Krish, “ Mobile learning Readiness among Malaysian
Students at Higher learning Institute” Asian Social Science; Vol. 08, No. 12; 2012, p276-283.
Vathal, R.M.- Introducing Electronic Information Resources through E-learning mechanism. University News 42
(14) (2004) 5-11
Why e-learning is so powerful? [www.zdnetindiacom/specials/elarning/]. 2 December 2003.
ISBN 1-63102-455-8
433
LIS Services in E & M Learning Technology
[17]
[18]
434
Wu Junqi, Qi Lili, Zhaengbing Hu, “3G Phone-Based mobile learning for improving K-12 Teachers’ educational
technology in rural area” ,2010 Second International Workshop on education technology and computer
Science,P821-825.
Yazhen Zhang, Jian Li. “Application of 3G-Based mobile learning in teacher training” 2011 Fourth Conference on
information and computing, P27-29.
ISBN 1-63102-455-8
RELEVANCE OF ICT IN TEACHER EDUCATION
R. Kington | Research scholar | Gandhigram Rural Institute Deemed University | Gandhigram |
kingstonkings2010@gmail.com
Dr. N. Devaki | Assistant Professor | Gandhigram Rural Institute Deemed University | Gandhigram |
devakiaries@gmail.com
Abstract: We are living in the knowledge based society. Knowledge today is not only power, but
also a promising asset for both individual development and social well being In the modern
context, education alone can provide the most dependable and most effective apparatus for
accelerating sustainable growth and development in all domains of human activities, In order to
function effectively in the emerging knowledge society, the teachers have to learn to collect relevant
information, to analyze and make decisions and to master new knowledge and to accomplish
diverse tasks collaboratively. Information Communication Technology (ICT) is an emerging area
of communication technology application. ICT involves a wide spectrum of audio-visual and
media-technology inputs and networks and it has brought about a paradigm shift in education
service based upon them. ICT is the latest tool for making teaching and learning effective and
performance based. Teacher education, an essential component of general education, must take
advantage of ICT advancements. ICT- enabled teacher preparation is the need of the hour. It is in
this context, developing an ICT culture is an essential part of the process of integrating ICT in to
all the transactions of teacher education. In fact, ICT involves both teacher educators and student
teachers.
Keywords: Teacher Education, ICT, ICT Development Skills.
INTRODUCTION
The professional development of teacher educators necessitates an elaborate process of harnessing the diverse
ICT resources. Yet the access to and use of ICT in teacher education are limited to teacher education institutions
which are known for their resource-base. Suitable modalities are evolved for the effective use of ICT in teacher
education, such as transmission, manipulation and dissemination relevant knowledge, skills, attitudes and values
of information, as accurately and efficiently as possible. This paper is an attempt to highlight the relevance and
potentials of ICT in teacher education in the contemporary Indian perspective.
Teacher Education: In teacher education, the teacher has a major role in educational development whether he
approaches his work actively or passively. He can influence development adversely by opposing innovation or
merely remaining mute in the face of a growing need for reforms; on the other hand, he can participate actively
as the initiator himself or an interpreter of the plans devised by others.
Significance of ICT in Teacher Education Programme: The most critical factor in the successful integration
of ICT’s into teacher education is the extent to which the teacher education have use of ICT’s in their own
teaching practices, To Effectively harness the power of the new information and communication technologies to
improve learning
ICT DEVELOPMENT SKILLS
ICT helps he teacher trainees for preparing lesson plans for their class by referring downloading the
latest materials available for the topics under discussion teaching from different web sites declaring on the topic
in the World Wide Web. It is the need of the time that today’s teacher should possess the ability to use computer
based technologies. As the primary goal of teacher education is to focus more on pedagogy and not on
technology, the introduction of ICT will help to make the instruction more learners centered and successful.
Some of the Important Skills Developed By ICT are:
ISBN 1-63102-455-8
435
Relevance of ICT in Teacher Education
Development of Intellectual Skills: The intellectual skills consists critical thinking and problem solving
skill. ICT helps to develop creativity of the teacher trainees by using software’s, these software’s help
them to become problem solves.
Development of Learning Skills: ICT helps in the development of independent learning or self learning
through a host of tutorials and interactive packages within built self-test and scoring tools.
Development of Personal and Inter –Personal Skills: Development of personal and inter –personal
skills include cultural transference obtaining while chatting through sharing ideas through e-mail. There
are educational websites for extending assistance to solve homework grammatical or mathematical or
science or software programme related problems exposure a practices prevailing different parts of the
world will enhance one’s skills like these relating to time management communication etc.
Development of Soft Skills: It helps to develop ‘friendship from worldwide level through sharing their
ideas opinions etc. It will help to develop tolerance, cooperativeness, empathy, creativity,
communication, time management patience and confidence among the teacher trainees.
Development of Web Designing Skills: The teacher trainee can create their own website related to their
respective subjects. They can plan it according to their creativity level. This may be helpful for students
to make reference or to clear their further doubts, faraway from the teacher i.e., even when they are at
home or while teachers are holidaying at distant places.
ICT IN TEACHER EDUCATION
The brains grow and thrive continuously throughout our life. One recent information Suggest that, brain is like
plastic, which means it changes continuously and sprouts out its nervous endings in response to environmental
stimuli and experiences. Brain changes physically in the classroom where students are gaining meaningful and
reverberating experiences. So the activities of teachers which are essential for good classroom interaction among
the students can be of the following:
Help the learner to pay attention
Eliminate destructor
Open “mental files”
Provide choices
Encourage self-directed learning
Capitalize on “prime time”
Fill unallocated time-extended or enrich extra time
To apply all these successfully in the life of a learner; within his total active hours
in a day, a teacher requires quality training along with accommodation of modern tools, techniques, methods
and methodologies of ICT in the teacher education programmes in a more systematic way.
Quality Improvement through ICT for Teacher Education: The improvement of quality through integration
of newer technologies is not only important but also is indispensable. Improvement of quality in managerial
efficiency may be enhanced by proper applications of required technologies which require efficient managerial
training. A teacher is a manager in the classroom situation. So development of proper managerial quality among
the student teacher should also be incorporated in Teacher Education. In teaching-learning process, some basic
components are required for quality improvement.
There is no difference of opinion regarding the integration of ICT into the system of Teacher Education. ICT
can be mentioned when used in education. A teacher can develop the following qualities by using ICT:
436
Learning at one’s own pace, choice and time.
Exploring information as and when required.
Developing of proficiency of assessing, processing and communicating Information.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Increasing quality and quantity of creativity and thinking ability.
Non linear access of information through hypermedia.
Extending ability to solve complex problems.
Developing artistic sense.
Increasing efficiency in teaching process.
Making comfortable in using tools of information age.
Hypermedia increases the natural forms of working mind.
Decreases cost of education in terms of money, time and energy.
ICT IN TEACHING AND LEARNING
ICT in teaching and learning is about exploiting the full capabilities of technology to open new perspective for
both teachers and students. At the same time, it is unwise to ignore traditional styles and models of learning as
well as ideas from the past that were not implemented in the mass school but were precious exceptions.
Therefore, we need to start with things that we are already doing, but consider them a new. Lot of possible areas
are there for the use of ICT in teaching and learning like presentation, Calculation, completing assignments,
information sources and some of the other possibilities are immediate oral communication, reading, writing,
science experiments and observations, school use of general and professional applications, virtual laboratory and
organization of the learning process. Researchers have proved that ICT can change the way of teaching and
especially useful in supporting student-centered approaches to instruction and promoting collaborative activities.
STEPS FOR INTEGRATING ICT IN TEACHING-LEARNING PROCESS
ICT in teaching-learning process involves in the following steps.
Step 1: Awareness: To instruct and creating awareness of ICT among teachers.
Step 2: basic knowledge: To create and insert the basic knowledge of the modern technology those are
involved in teaching and learning towards teachers. The basic knowledge are,
Nature of media
Use of media in teaching learning process.
Implementing the media in teaching
Step 3: Proper Training: It is needed to give proper training to teachers about the equipment and instrument,
which are utilized and involved in teaching.
Step 4: Implementation / put into practice: After receiving training, the teachers should implement his
training in his teaching and evaluation.
Step 5: Follow-up activities: While implementing new technology, there may so many difficulties and
experiments arise. These may be eradicated through sharing and consulting the experts.
Awareness
Basic Knowledge
Proper Training
Implementation
Follow - Up
ISBN 1-63102-455-8
437
Relevance of ICT in Teacher Education
TEACHING-LEARNING PROCESS
Advantages of Using of ICT in Teaching-Learning Process:
First hand experiences: The learners can feel the first hand experience is the best type of educative
experience.
Variety: The learner can enjoy the variety-ness of the ICT.
Clear images: Clear images are formed when we see, hear, touch, taste, and smell as our experiences are
direct, concrete and more or less permanent.
Freedom: The learners can work freely without the interruption of the teacher.
Helpful in attracting attention
Based on maxims of teaching
Example:
Concrete to abstract
Known to unknown
Learning by doing
Relatively cheaper and more economical.
Any number of students may enroll themselves.
Learners can do part-time course development
No restriction on the pace of learning
Saving of energy and time
Encouragement to healthy classroom interaction
Immediate reinforcement to learners.
PEDAGOGY-ICT INTEGRATION
The inclusion of both pedagogy and technology as core competencies of teachers acknowledges that integrating
ICT in education for teaching and learning is far broader than the simple acquisition of these two sets of
competencies. Competencies of integration are neither competencies of pedagogy alone nor competencies of
technology. Rather competencies of integration are about the appropriate selection, use, mix, fusion and
integration of sets of competencies including those covered under pedagogy and technology.
TEACHER EDUCATORS’ ROLE IN PEDAGOGY-ICT INTEGRATION
There are four broad stages in the way that Teacher educators use ICT as support to teaching and learning.
Specializing in the use
of ICT
Transforming
Creating innovative
learning environments
Understanding how and
When to use ICT
Infusing
Facilitating learning
Learning how to use ICT
Applying
Enhancing traditional
teaching
Becoming aware of ICT
Emerging
Stages of ICT usage
ICT Development
Supporting work
performance
Pedagogical usages
Of ICT
Fig: Pedagogy-ICT Integration
438
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Emerging: Institutions at the initial stages of ICT development demonstrate emerging approach. Such
institutions have just started their journey in the ICT field. To start with the administrators and Teacher
educators begin to explore all the possibilities and consequences of using ICT in the institutional management
and adding ICT to the curriculum. The emerging approach phase to ICT development focuses on technical
functions and uses of ICT.
Applying: In the secondary phase, the administrators and teachers use ICT for tasks already carried out in
institutional management and in the curriculum. Institutions at this stage adapt curriculum in order to increase
the use of ICT in various subject areas with specific tools and software such as drawing, designing, modeling
and applications of specific tools. In applying approach phase to ICT development, Teacher educators use ICT
for professional purposes, focusing on improving their subject teaching with a range of ICT applications. They
integrate ICT with their classroom teaching and use ICT to support their training and professional development.
Teacher educators gain confidence in a number of specialized ICT tools that can be applied to teaching of their
subject areas.
Infusing: At the third stage, infusing approach involves integrating or embedding ICT across the curriculum
and is seen in those institutions that now employ a range of computer based technologies in laboratories,
classrooms and administrative offices. Teacher educators explore new ways in which ICT changes their
professional practices. In the fusing approach to ICT development, ICT infuses all aspects of teacher educators’
professional lives in such ways as to improve student learning and the management of learning processes. It
supports the active and creative teachers who are able to stimulate and manage the learning of students,
integrating a range of preferred learning styles and uses of ICT in achieving their goals.
In this approach, Teacher educators fully integrate ICT in all aspects of their professional lives to improve their
learning and as well as, the learning of their students. In this approach it becomes quite natural to collaborate
with other teachers in solving the common problems and sharing their experiences with others.
TRANSFORMING
In the transforming approach to ICT development, Teacher educators and other staff members regard ICT as a
natural part of their everyday life of institutions that they begin to look at teaching learning process in new
ways. The emphasis changes from teacher centered to learner centered. Teachers together with students, expect
a continuously changing teaching methodology designed to meet individual learning objectives.
The adoption of ICT in the classroom follows in stages. At first, teacher discovers ICT tools such as
presentation software. This follows the application of ICT in place of previous instructional activities, such as
power point presentation in place of a lecture. As teacher becomes familiar with ICT in the subjects, new ways
of using ICT are explored so that his previous classroom delivery mechanism begins to change. In time, his
classroom practice is transformed as learner centered and students use ICT to solve real problems. To integrate
ICT with pedagogy properly, capacity building programmes should be provided to teacher educators.
CONCLUSION
The Quality of Teacher Education and ICT can be improved successfully in classroom teaching learning
systems and instructional practices. But the proper teaching and learning theories are also to be incorporated
with technology framework. The teachers should also be creative so that they can use the customized plans to
bring in the technologies best suited for a particular classroom situation. To achieve the goals and to arrive at the
desired objectives of quality teacher education by the effective applications of ICT can help us to travel fast in
this information age.
Undoubtedly, ICT has brought about many challenges and opportunities for education. The educational system
needs to come to terms with these new challenges and take full advantages of the opportunities. If educational
institutions have to ensure that their students leave the institutions as confident individuals capable of using new
technology creatively and productively then their teachers should have the competence to integrate the emerging
technologies and the digital content with all their operations.
ISBN 1-63102-455-8
439
Relevance of ICT in Teacher Education
REFERENCE
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
440
Surender Dahiya(2005) ICT enabled Teacher education, University News 43(18).
Alexis and Mathews(2011), Fundamentals of Information technology, Vikas publishing house, New Delhi.
Mujibal Hasan Siddiqui (2004), Technology in Teacher education, APH, Publishing Corporation, New Delhi.
J.M. Arul Sekar and K. Thiyagu (2007), Information and communication technology in education, prophet
publishers, Trichy.
S.K. Mangal (2012), Educational Technology, Tandon Publications, Ludhiana.
NCERT (2000), Nation Curriculum Framework for School Children, New Delhi, Publication Division, NCERT.
J. M. Arul Sekar & Thiyagu K (2007), Information and Communication Technology in Education, Prophet
Publishers, Tiruchirappalli.
Sreedevi P.S (2014), ScienceEducation : Innovstions and InstructionalStrategies, Dominant Publishers, New Delhi.
www.education.nic.ssa
ISBN 1-63102-455-8
AWARENESS OF OPEN SOURCE SOFTWARE FOR THE
LIBRARY PROFESSIONALS
N. Chidambaranathan | Assistant Librarian | Valliammai Engineering College | SRM Nagar, Kanchipuram
District (Tamilnadu) | nathan1234in@gmail.com, nathan1234in@yahoo.co.in
G. Elanjiyam | Librarian | Anand Institute of Higher Technology | Old Mahabaliburam Road, Chennai
(Tamilnadu) | elanjiyamg@gmail.com, aihtlibrary@gmail.com
Abstract: The rapid growth of information explosion, users have more difficulties to find the
relevant information through the internet. To solve the problem, open source software and
commercial software have become nowadays to manage and retrieve the relevant information.
This paper is discussed about varies types of library open software such as Integrated Library
Management software, VuFind, SOPAC, Backlight OPAC, National Resource Centre for
Free/Open Source Software (NRCFOSS), Green Stone (Software), DSpace, EPrints, KOHA
(software), Joomla, Drupal, Fedora, NewGenLib, Evergreen (Software), advantages of open
source software and disadvantage of open source software.
Keywords: Open Source Licenses, VuFind, SOPAC, Backlight OPAC, National Resource Centre for Free/Open
Source Software (NRCFOSS), Green Stone.
INTRODUCTION
Free/Open Source Software (FOSS) is very useful for software industry and the general public. Open Source
software is freely available in the internet. Open Source software is growing globally, particularly in developing
countries. In many government sectors open source software are used frequently. Open Source software are used
all types of areas. Nowadays many schools, colleges and universities are used open source software. In the field
of Library and information science many open source software are available in the field of OPAC, Library
automation and the digital library.
SOFTWARE
Computer software or simply software is any set of machine-readable instructions that directs a computer's
processor to perform specific operations. Computer software includes computer programs. The word software is
also sometimes used in a more narrow sense, meaning application software only. At the lowest level, executable
code consists of machine language instructions specific to an individual processor – typically a central
processing unit (CPU). A machine language consists of groups of binary values signifying processor instructions
that change the state of the computer from its preceding state. Software written in a machine language is known
as "machine code". However, in practice, software is usually written in high-level programming languages that
are easier and more efficient for humans to use (closer to natural language) than machine language. High-level
languages are translated, using compilation or interpretation or a combination of the two, into machine
language. Software may also be written in a low-level assembly language, essentially, a
vaguely mnemonic representation of a machine language using a natural language alphabet. Assembly language
is translated into machine code using an assembler [1].
OPEN SOURCE SOFTWARE
Open-source software (OSS) is computer software with its source code made available with a license in which
the copyright holder provides the rights to study, change, and distribute the software to anyone and for any
purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the
most prominent example of open-source development and often compared to (technically defined) usergenerated content or (legally defined) open-content movements. The open-source model, or collaborative
competition development from multiple independent sources, generates an increasingly diverse scope of design
perspective than one company development alone can sustain long term. And a report by the Standish
Group (from 2008) states that adoption of open-source software models has resulted in savings of about
$60 billion per year to consumers [2].
ISBN 1-63102-455-8
441
Awareness of Open Source Software for the Library Professionals
OPEN SOURCE LICENSES
An open-source license is a type of license for computer software and other products that allows the source
code, blueprint or design to be used, modified and/or shared under defined terms and conditions. This allows
end users to review and modify the source code, blueprint or design for their own customization, curiosity or
troubleshooting needs. Open-source licensed software is mostly available free of charge, though this does not
necessarily have to be the case. Licenses which only permit non-commercial redistribution or modification of
the source code for personal use only are generally not considered as open-source licenses. However, opensource licenses may have some restrictions, particularly regarding the expression of respect to the origin of
software, such as a requirement to preserve the name of the authors and a copyright statement within the code,
or a requirement to redistribute the licensed software only under the same license (as in a copy left license). One
popular set of open-source software licenses are those approved by the Open Source Initiative (OSI) based on
their Open Source Definition (OSD) [3].
INTEGRATED LIBRARY MANAGEMENT SOFTWARE
An integrated library system (ILS), also known as a library management system (LMS), is an enterprise
resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have
borrowed. An ILS usually comprises a relational database, software to interact with that database, and
two graphical user interfaces (one for patrons, one for staff). Most ILSes separate software functions into
discrete programs called modules, each of them integrated with a unified interface. Examples of modules might
include:
acquisitions (ordering, receiving, and invoicing materials)
cataloging (classifying and indexing materials)
circulation (lending materials to patrons and receiving them back)
serials (tracking magazine and newspaper holdings)
the OPAC (public interface for users)
Each patron and item has a unique ID in the database that allows the ILS to track its activity. Larger libraries use
an ILS to order and acquire, receive and invoice, catalog, circulate, track and shelve materials. Smaller libraries,
such as those in private homes or non-profit organizations (like churches or synagogues, for instance), often
forgo the expense and maintenance required to run an ILS, and instead use a library computer system [4].
VuFind: VuFind is an open source library search engine that allows users to search and browse beyond the
resources of a traditional OPAC. Developed by Villanova University, version 1.0 was released in July 2010 after
two years in beta.VuFind operates with a simple, Google-like interface and offers flexible keyword searching.
While most commonly used for searching catalog records, VuFind can be extended to search other library
resources including but not limited to: locally cached journals, digital library items, and institutional repository
and bibliography. The software is also modular and highly configurable, allowing implementers to choose
system components to best fit their needs. As of March 2012, a total of 64 institutions are running live instances
of Vufind including the Georgia Tech Library, the London School of Economics, the National Library of
Ireland, Yale University, and the DC Public Library [5].
SOPAC: SOPAC (Social Online Public Access Catalog) is a Drupal module that provides true integration of
your library catalog system with the power of the Drupal content management system while allowing users to
tag, rate, and review your holdings. User input is then incorporated into the discovery index so that SOPAC
becomes a truly community-driven catalog system. Other features include:
442
Faceted browsing
Ajax-empowered interface with native jQuery support
100% customizable interface via the Drupal template system
Ability to remove search limiters
Saved searches
Integrated renewals, holds placement, and fine payment
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Ability to customize the user experience via the administrative control panel
Ability to create custom functionality via a Drupal sub-module
Because SOPAC depends on Locum to connect to your integrated library system, it has the potential to work
with any ILS [6].
Backlight OPAC: Located in Charlottesville, the University of Virginia (UVA) offers 56 bachelor’s, 79
master’s, and 54 doctoral degree programs in a variety of fields such as architecture, business administration,
education, engineering, law, medicine, nursing, and the arts and sciences. One of the top public research
institutions in the country, UVA has more than five million print volumes, nearly 463,000 e-books, and dozens
of electronic databases in its library collection. In 2014, the UVA Libraries replaced their previous discovery
platform with EBSCO Discovery Service (EDS), a research solution that streamlines access to library resources
through a single search box. With superior relevance ranking that quickly surfaces pertinent search results and a
robust API that integrates with the Libraries’ Blacklight-driven interface, EDS has given librarians a more
reliable research tool to offer students and faculty [7].
LibraryFind: LibraryFind® makes finding information in the library easier. LibraryFind gives you the ability to
search the library catalog, online databases, image collections, and other resources with one search. Currently,
LibraryFind provides a general search which is most useful for undergraduate work, but it can also be used as a
starting point for deeper research.LibraryFind ® is software developed by the Oregon State University Libraries,
in part funded from a grant from the State Library. More information on the development of LibraryFind can be
found at the LibraryFind Project Website [8].
National Resource Centre for Free/Open Source Software (NRCFOSS): National Resource Centre for
Free/Open Source Software (NRCFOSS) is an organisation created and financed in India by the Department of
Information Technology, Ministry of Communication and Information Technology, Government of India in
April 2005.It is jointly administered by the Chennai Division of Centre for Development of Advanced
Computing (C-DAC) and the AU-KBC Research Centre of Anna University. Some state governments, for
example Kerala, already have programmes to popularize FOSS among the masses especially among the
students. The founding of NRCFOSS is the first initiative by the Government of India in the direction of making
efforts for increasing the acceptance of FOSS at a national level. NRCFOSS is designed to give a boost to the
efforts to popularize FOSS products among lay computer users of India. NRCFOSS has caused the introduction
of elective papers in FOSS in the syllabi and curriculum of Anna University.[4] The syllabi is applicable to
around 250 engineering colleges affiliated to Anna University. It has prepared the entire course material for
these elective papers and made it available for free download. NRCFOSS has organized a series of workshops
and seminars in different parts of India to popularize the idea of FOSS. It developed the FOSS Lab Server as an
archive of various resources that are essential for the students taking FOSS courses. It contains source code,
documentation and mailing list archives. NRCFOSS developed Bharat Operating System Solutions a
GNU/Linux distribution made specifically for the Indian environment. The latest version of this Free/Open
Source Software, BOSS GNU/Linux v4.0, was released in February 26, 2011. This software supports eighteen
Indian languages out of a total of twenty-two constitutionally recognized languages in India at the desktop level
[9].
OPEN SOURCE SOFTWARE IN INDIAN LIBRARY
Green Stone (Software): Greenstone is a suite of software tools for building and distributing digital
library collections on the Internet or CD-ROM. It is open-source, multilingual software, issued under the terms
of the GNU General Public License. Greenstone is produced by the New Zealand Digital Library Project at
the University of Waikato, and has been developed and distributed in cooperation with UNESCO and the
Human Info NGO in Belgium. Greenstone may be used to create large, searchable collections of digital
documents. In addition to command line tools for digital collection building, Greenstone has a graphical
Greenstone Librarians Interface (GLI) used to build collections and assign metadata. hrough user selected
plugins, Greenstone can import digital documents in formats including text, html, jpg, tiff, MP3, PDF, video,
and Word, among others. The text, PDF, HTML and similar documents are converted into Greenstone Archive
Format (GAF) which is an XML equivalent format. A project on SourceForge was created in October 2005 for
ISBN 1-63102-455-8
443
Awareness of Open Source Software for the Library Professionals
version 3 of Greenstone. In 2010, Greenstone version 2.83 was included, along with the Koha Integrated Library
System, in an Ubuntu Live-Cd [10].
DSpace: DSpace is an open source repository software package typically used for creating open access
repositories for scholarly and/or published digital content. While DSpace shares some feature overlap
with content management systems and document management systems, the DSpace repository software serves a
specific need as a digital archives system, focused on the long-term storage, access and preservation of digital
content. DSpace is a set of cooperating Java web applications and utility programs that maintain an asset store
and an associated metadata store. The web applications provide interfaces for administration, deposit, ingest,
search and access. The asset store is maintained on a file system or similar storage system [11].
EPrints: EPrints is a free and open-source software package for building open access repositories that are
compliant with the Open Archives Initiative Protocol for Metadata Harvesting. It shares many of the features
commonly seen in document management systems, but is primarily used for institutional
repositories and scientific journals. EPrints has been developed at the University of Southampton School of
Electronics and Computer Science and released under a GPL license [12].
KOHA (software): Koha is an open source Integrated Library System (ILS), used world-wide
by public, school and special libraries. Koha is web-based ILS, with a SQL database (MySQL preferred)
backend with cataloguing data stored in MARC and accessible viaZ39.50 or SRU. The user interface is very
configurable and adaptable and has been translated into many languages. Koha has most of the features that
would be expected in an ILS, including:
Various Web 2.0 facilities like tagging, comment, Social sharing and RSS feeds
Union catalog facility
Customizable search
Circulation and borrower management
Full acquisitions system including budgets and pricing information (including supplier and currency
conversion)
Simple acquisitions system for the smaller library
Ability to cope with any number of branches, patrons, patron categories, item categories, items,
currencies and other data
Serials system for magazines or newspapers
Reporting
Reading lists for members [13]
Joomla: Joomla is a free and open-source content management system (CMS) for publishing web content. It is
built on a model–view–controller web application framework that can be used independently of the
CMS.Joomla is written in PHP, uses object-oriented programming (OOP) techniques (since version 1.5)
and software design patterns, stores data in a MySQL, MS SQL (since version 2.5), or PostgreSQL (since
version 3.0) database, and includes features such as page caching, RSS feeds, printable versions of pages, news
flashes, blogs, search, and support for language internationalization. As of February 2014, Joomla has been
downloaded over 50 million times. Over 7,700 free and commercial extensions are available from the official
Joomla! Extension Directory and more are available from other sources. It is estimated to be the second most
used content management system on the Internet [14].
Drupal: Drupal is a free and open-source content-management framework written in PHP and distributed under
the GNU General Public License. It is used as a back-end framework for at least 2.1% of all Web
sites worldwide ranging from personal blogs to corporate, political, and government sites. It is also used
for knowledge management and business collaboration. The standard release of Drupal, known as Drupal core,
contains basic features common to content management systems. These include user account registration and
maintenance, menu management, RSS feeds, taxonomy, page layout customization, and system administration.
The Drupal core installation can serve as a simple Web site, a single- or multi-user blog, an Internet forum, or a
444
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
community Web site providing for user-generated content. As of April 2015, the Drupal community has
provided more than 30,000 contributed modules. Such modules alter and extend the core capabilities, behavior,
and appearance of a Drupal site. The Drupal community comprises more than one million members (as of
October 2013) and 31,000 Developers (as of February 2014). "The Drupal Overview", a feature of the project
web site, describes it as a content management framework. Drupal also describes itself as a Web application
framework, as it meets the generally accepted feature requirements for such frameworks. Although Drupal
offers a sophisticated application programming interface for developers, basic Web site installation and
administration of the framework requires no programming skills. Drupal runs on any computing platform that
supports both a Web server capable of running PHP and a database to store content and configuration [15].
Fedora: Fedora (or Flexible Extensible Digital Object Repository Architecture) is a digital asset management
(DAM) architecture upon which institutional repositories, digital archives, and digital library systems might be
built. Fedora is the underlying architecture for a digital repository, and is not a complete management, indexing,
discovery, and delivery application. It is a modular architecture built on the principle that interoperability and
extensibility are best achieved by the integration of data, interfaces, and mechanisms (i.e., executable programs)
as clearly defined modules. Fedora supports two types of access services: a management client for ingest,
maintenance, and export of objects; or via API hooks for customized web-based access services built on either
HTTP or SOAP. A Fedora Repository provides a general-purpose management layer for digital objects, and
containers that aggregate mime-typed datastreams (e.g., digital images, XML files, metadata). Out-of-the-box
Fedora includes the necessary software tools to ingest, manage, and provide basic delivery of objects with few
or no custom disseminators, or can be used as a backend to a more monolithic user interface. Fedora supports
ingest and export of digital objects in a variety of XML formats. This enables interchange of objects between
Fedora and other applications, as well as facilitating digital preservation and archiving.
Digital Object Model The FEDORA digital object model allows aggregation of both metadata and
digital content as "datastreams", regardless of format and physical location. FEDORA objects can include
content from external or distributed repositories. Digital Objects can be modeled to represent many types
of entities from digital texts, publications, photos, videos, and datasets. Digital objects can have
associated "behaviors" that can provide different views of the object, or that can produce dynamic
transformations of digital object content.
Relationships The FEDORA digital object model supports the ability to assert semantic relationships
using the Resource Description Framework (RDF). Relationships between objects and within objects can
be indexed using a semantic triplestore that enables queries over the entire repository of digital objects.
Repository Service is based upon four main Application Programming Interfaces (APIs): manage,
access, search and metadata harvesting via OAI-PMH. The system is scalable and flexible and Fedora
users have adopted the repository as a core component of many applications and platforms.
The Fedora Project is currently supported by the DuraSpace organization [16].
NewGenLib: NewGenLib is an integrated library management system developed by Verus Solutions Pvt Ltd.
Domain expertise is provided by Kesavan Institute of Information and Knowledge Management
in Hyderabad, India. NewGenLib version 1.0 was released in March 2005. On 9 January 2008, NewGenLib was
declared Open Source Software under GNU GPL. The latest version of NewGenLib is 3.1.1 released on 16
April 2015. Many libraries across the globe (mainly from the developing countries) are using NewGenLib as
their Primary integrated library management system.
NewGenLib has following main modules
Acquisitions
Technical Processing
Serials management
Circulation
Administration
ISBN 1-63102-455-8
445
Awareness of Open Source Software for the Library Professionals
MIS Reports
Task to do today (daily scheduler)
OPAC
Some advanced functional features:
Android mobile and tablet capable
Integration with Twitter helping send messages of transactions directly to users’ Twitter accounts.
Flexibility of defining own search field in OPAC.
Enhanced contents and interactive OPAC like Availability of Book jackets, Google preview,
Comments/ Book review, Tagging, Favorite reading list, etc.
Zotero compliant OPAC
RSS Feeds in OPAC
Faceted Browsing (Refining search results)
Suggestion for other books in the rack
RFID supports
Provision for frequently used predefined templates along with freedom of defining own customized
data entry template s in Cataloguing
Configurable SMS system - a proof of transaction.
Integration with Gmail or paid mailbox account. This enables automatic sending of email to patrons
during issue /return.
Enhanced Report Module for generating in .csv format with a provision for wide customization.
Provision for integrating with Vufind SOPAC (Ex: OPAC of the Library of Bangalore University).
Catalogue can be harvested through Google site map, and thus the visibility of the library can be
further improved [17].
Evergreen (Software): Evergreen is an open source Integrated Library System (ILS), initially developed by
the Georgia Public Library Service for Public Information Network for Electronic Services (PINES), a statewide
resource-sharing consortium with over 270 member libraries. Beyond PINES, the Evergreen ILS is deployed
worldwide in hundreds of libraries, and is used to power a number of statewide consortial catalogs. In 2007, the
original Evergreen development team formed a commercial company around the software, Equinox Software,
which provides custom support, development, migration, training, and consultation for Evergreen. As of 2014,
several more companies and groups also provide support and related services for Evergreen [18].
Advantages of Open Source Software:
Lesser hardware costs
High-quality software
No vendor lock-in
Integrated management
Simple license management
Lower software costs
Abundant support
Scaling and consolidating
Disadvantages of Open Source Software:
No Free Support
Lower Security
High Maintenance Overhead
446
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
CONCLUSION
Most of the school, college and university libraries are prefer the open source software. Open source seawares
provide direct and active role to librarian to reshaping their libraries. Integrated Library Management software,
VuFind, SOPAC, Backlight OPAC, National Resource Centre for Free/Open Source Software (NRCFOSS),
Green Stone (Software), DSpace, EPrints, KOHA (software), Joomla, Drupal, Fedora, NewGenLib and
Evergreen (Software) are very useful in the field of library and information science. At present all the students
and staff members are using Digital libraries frequently. In this situation Open Source Software training
programs are needed in the field of Library and Information Science professionals. The library science
professionals should know enough knowledge in the field of Open Source Software and they should guide the
users in the digital library section.
REFERENCE
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
https://en.wikipedia.org/wiki/Software
https://en.wikipedia.org/wiki/Open-source_software
https://en.wikipedia.org/wiki/Open-source_license
https://en.wikipedia.org/wiki/Integrated_library_system
https://en.wikipedia.org/wiki/VuFind
https://www.drupal.org/project/sopac
https://www.ebsco.com/success-stories/story/university-of-virginia
https://osulibrary.oregonstate.edu/libraryfind.html
https://en.wikipedia.org/wiki/National_Resource_Centre_for_Free/Open_Source_Software
https://en.wikipedia.org/wiki/Greenstone_(software)
https://en.wikipedia.org/wiki/DSpace
https://en.wikipedia.org/wiki/EPrints
https://en.wikipedia.org/wiki/Koha_(software)
https://en.wikipedia.org/wiki/Joomla
https://en.wikipedia.org/wiki/Drupal
https://en.wikipedia.org/wiki/Fedora_Commons
https://en.wikipedia.org/wiki/NewGenLib
https://en.wikipedia.org/wiki/Evergreen_(software)
https://www.outsource2india.com/software/articles/open-source-software.asp
https://besthostingsearch.net/tutorial/open-source-software-advantage-disadvantage/
ISBN 1-63102-455-8
447
MANAGEMENT OF INSTITUTIONAL REPOSITORIES IN
ACADEMIC LIBRARIES BY USING D-SPACE
Tribeni Devi | Professional Assistant | North Guwahati College | Assam
trivenidevi04@gmail.com
Lavita Deka | Librarian | Dr. ABS College of Education | Assam
lavitadeka45@gmail.com
Abstract: Institutional repositories are online databases of scholarly materials such as articles,
reports and datasets to enable and faster sharing, discovery and archiving of scholarly resources
produced at a given institution. Institutional repositories are development in managing digital
objects for effective utilization. It includes variety of research output of any organization. It
includes variety of research output of any organization. An institutional repository might also
include other digital assets generated by academics, such as administrative documents, course
notes, learning objects, or conference proceedings. It is a means to ensure that the published work
of scholars is available to the academic community even after increases in subscription fees or
budget cuts within libraries.An institutional repository provides scholars with a common platform
so that everyone in the institution can contribute scholarly material to promote cross-campus
interdisciplinary research. In college libraries different types of publications are published either
department wise or the college own publication. For managing those repositories in college
libraries digital networked environment is required. There are a number of open-source software
packages for running a repository. These are D Space, E-Prints, Fedora, Opus, Greenstone
etc.For building digital library and institutional repositories D Space is one of the essential and
important software. This paper discusses about Institutional repositories managing through D
Space in digital environment, features of D Space, supporting organization of D Space, how it
provide services towards user communities etc. In this paper also discuss about benefit of
managing institutional repositories in academic libraries.
Keywords: Institutional Repositories, D Space, Argonet, @mire Academic Libraries.
INTRODUCTION
Institutional repositories represent an important open access channel and are relatively new developments in
scholarly communication process compared to open journals and subject-specific repositories. It means digital
collections that capture and preserve the intellectual output of university communities. An institutional
repository (IR) consists of formally organized and managed collections of digital content generated by staff,
students, faculty at an institution the content of these repositories can be available for integration with the
institution campus library and course management systems and can also be made available to other institution as
well as to the general public.An institutional repository can be viewed as a "...a set of services that a university
offers to members of its community for the management and dissemination of digital materials generated by the
institution and its community members." For a university, this material includes, monographs, eprints of
academic journal articles—both before and after undergoing peer review as well as electronic theses and
dissertations.
An institutional repository might also include other digital assets generated by academics, such as administrative
documents, course notes, learning objects, or conference proceedings. The broad view of institutional
repositories as a means to manage and preserve effectively an institution’s knowledge base and intellectual
assets results in the content of IR expanding beyond e-prints to include research materials forms of institutional
intellectual outputs, which are generally not published or preserved elsewhere.
Essential characteristics of an institutional repository:
The major features of institutional repositories are,
448
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
I.
II.
III.
IV.
Institutionally defined.
Scholarly content.
Cumulative and perpetual.
Inter-operability and open access.
Benefit of institutional repositories:I. Collecting and curating digital output.
II. Managing and measuring research and teaching activities.
III. Opening up outputs of the institution to a worldwide audience.
IV. Enabling and encouraging interdisciplinary approaches to research.
V. Facilitating the development and sharing of digital teaching materials and aids.
VI. Maximizing the visibility and impact of these outputs as a result etc.
Open source software D Space: D Space is one of the digital repository software, created as a joint project of
MIT libraries and the Hewlett-Packard Company, and publicly released in November 2002 as an open source
software. It allows us to capture documents in any format like in text, audio, video and datasets etc. it has BSD
license. For building digital library and institutional repository, D Space is one of the reliable software. It is built
in java platform. D Space installation required many software bundles. Documents can be uploaded in D Space
whenever required, that is why it is very important for academic library to maintain institutional repositories. D
Space software supports next generation digital archiving that is more permanent and shareable than current
analog archives. D Space provides a way to manage research materials and publications in a professionally
maintained repository to give users greater accessibility and visibility over time.
Who use DSpace: DSpace is the most widely used digital repository software in the world. It is used by
libraries, universities, research centres, non-profit organization, government agencies, archives and private
sector companies to manage collect and share all types of digital documents including digital images, articles,
videos, datasets, working papers and archives. It is an open source repository software which is typically used
for creating open access repositories for scholarly and or published digital content. DSpace is handled by Dura
Space. It has BSD license. For building digital library and institutional repository DSpace is one of the best
software. It is a soft of choice for academic, non-profit and commercial organizations for building open digital
repositories.
All types of organization use DSpace who support a variety of types of digital assets management needs some
examples,
Libraries of all types: To collect, manage and publicly display collections of archival material such as
digitized or scan documents, images or oral histories.
Corporate Archives: Manage both public and private archives.
Non-Governmental organization/ non-profit organization:Collect and publish datasets, reports, working papers, position papers, fact sheets etc.
Research Centres:Collect and disseminate research outputs, working papers.
Business:Collect and organize internally restricted digital assets such as images, corporate histories, electronic
records etc.
Schools- primary and secondary educational institutions:Collect and share student project, disseminate locally produced open educational resources.
Higher Educational institutions:Collect, manage, shares student work, disseminate faculty research, open access research datasets, open
educational resources.
ISBN 1-63102-455-8
449
Management of Institutional Repositories in Academic Libraries by Using D-Space
Why use D Space in Academic library: Largest community of users and developers worldwide: - It has over
250 institutions that are currently using the D Space software within their organization in a project and
production environment.
Free open source software completely customizable to fit your needs: - One can fully customize the
look and feel of D Space website so it will integrate seamlessly with their own institution’s website and
can be more intuitive for their users.
Use by educational, government, private and commercial institution: - The platform of D Space is not
only used by higher education institutions, who the platform was initially developed for, but also
additionally the software has broader appeal.
Can be installing out of the box: - Each DSpace implementation is unique. While the technology is
fairly easy to install and set up.
Can manage and preserve all types of digital content: - The DSpace application can recognize and
manage a large number of file formats at MIME types. Some such formats are PDF and word
documents, JPG, MPG, TIF files.
Registered Service Provider: Registered service providers have made an investment in the D Space technology
and commitment to work cooperatively with Dura Space organization to best serve the community of users.
There are many lists of registered service providers (RSP). They are as follows,
Argonet: - It has been working in the area of institutional repository since 2007 and is developing
scientific data, repository solution based on DSpace, fedora and other open source products.
@mire: - Even since the beginning in 2006 @mire has been 100 per chant committed to DSpace
services and add-on modules.
CINECA:- Cineca, a non-profit consortium of universities and the Italian ministry of university and
research, since 1969 has been supporting, hosting and customizing open source solutions for Epublishing and digital repositories since 2003 including DSpace and fedora.
D-Square technologies: - India, is focused on providing services in solutions in the field of institutional
repositories and libraries using the open-source platform D Space.
Long sight: - Long sight provides comprehensive support for carefully selected open source software,
including D Space, to education and non-profit organizations.
CONCLUSION
Institutional repositories offer a strategic response both to the opportunities of the digital networked
environment and the systemic problems in the today's scholarly journal system. This response can be
applied immediately, reaping both short-term and on-going benefits for universities and their faculty and
advancing the transformation of scholarly communication over the long term. One of the major uses for
DSpace is an institutional repository. It follows the librarian’s inclination to create and manage system that
would be as easy as possible to implement and use. DSpace is designed as open source application software
that an organization and an institution could run with relatively few resources.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
450
Liber. Library. Uu.ml/index.php/lq/…/8396.
Www.Dspace.org/introduction/index.html.
Thakuria, Juli 2008. ‘Building an institutional repository with DSpace’, Planner.
Tyler Q. Walters April1 2007, ‘The new Academic Library-Building Institutional Repositories to support changing
Scholarly and research processes’, Baltimore, Maryland.
Heery, R. and Anderson, S. (2005) ‘Digital repositories review’ other. Joint Information Systems Committee.
Olivia, Silas Marques De 2011 IATUL Proceedings, ‘Benefits and challenges of OA and institutional Repository
Implementation in Seventh-day Adventist University Libraries: An International Perspective, Andrews University.
Www.openscholarship.org.
Giesecke, Joan 2011, ‘Institutional Repositories: Keys to Success’university of Nebraska- Lincoln.
http://www.arl.org/sparc/IR/ir.html.
ISBN 1-63102-455-8
AWARENESS OF ‘BIG DATA’ AMONG THE LIBRARY
PROFESSIONALS IN THE RESEARCH LIBRARIES OF
ODISHA
Dr. Sanghamitra Dalbehera | Librarian | Institute of Technical Education & Research | S.O.A University |
Bhubaneswar | sanghamitra348@gmail.com
Abstarct: ‘Big data’ means reflecting on the implications that the accumulation and analysis of
an enormous amount of digital data have for organizations and for their information management
strategies. According to Wikipedia “Big data” is “the term for a collection of data sets so large
and complex that it becomes difficult to process using on-hand database management tools or
traditional data processing applications.” Libraries have amassed an enormous amount of
machine-readable data about library collections, both physical and electronic. Librarians are well
skilled to discuss with researchers the value of data management and sharing strategies, and to
increase their awareness of metadata standards and practices and institutional repositories.
Librarians have expertise and experience with institutional repositories, and libraries have a
legacy of preserving knowledge for future generations. Librarians advocate open access and, as
such, are advocates of the value of open data. Librarians can act as intermediaries, linking faculty
with peers in other disciplines to facilitate interdisciplinary research. The focus of this paper is
on the knowledge of library professionals in the research libraries of Odisha about OCLC’s
WorldCat database of global library holdings and includes work by other library organizations to
expose their data using big data concepts and standards.
Keywords: Bigdata, Hadoop, Technology, Library.
INTRODUCTION
Big data normally comprise of heterogeneous dataset, both structured and unstructured and also containing
diverse data and file formats. It is very difficult to locate and retrieve the relevant information in real time from
the universe of big data. The main elements of "Big Data" consists of: the degree of complexity within the data
set ;the amount of value that can be derived from innovative vs. non-innovative analysis techniques and the use
of longitudinal information supplements the analysis . The dataset acting as a component of the big data may
consist of a statistical database, an unstructured dataset of collection of web pages, a natural language text, a
dataset of message posts in social networking website, a live data stream, a collection of unstructured data files,
etc. The official definition of ‘big data’ namely is: ‘high-volume, high-velocity and high-variety information
assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision
making’ ;Gartner (2013). Laney (2001) emphasized three key tendencies: (a) the remarkable volume of
transactional data generated by e-commerce and the willingness of companies to retain this information; (b) the
speed of data creation produced by the interaction between organizations and customers; and (c) the opportunity
to integrate and manage a wider variety of information, with different formats and structures. These three trends
became the three basic attributes of ‘big data’—i.e. volume, velocity and variety, which are known as the three
basic v-attributes of big data. As a matter of fact research libraries collect a host of usage and transactional data
created by users as they interact with their systems and services. They are aware with this type of data –and are
waking up the potential value that can be extracted from what at the moment is largely, unstructured
data. Librarians are often at the forefront within institutions in both recognising the opportunities the data
presents, and acting on this data. They are helping inform collection management decisions, designing new
forms of interactive, game-like participation and collaborating in strategic institutional initiatives in student
learning analytics.
ATTRIBUTES OF BIG DATA
Big data is high-volume, high-velocity and high-variety information assets that demand cost-effective,
innovative forms of information processing for enhanced insight and decision making.
Volume: Big data uses massive datasets, including for example meta-data from internet searches, credit
and debit card purchases, social media postings, mobile phone location data, or data from sensors in cars
and other devices. The volume of data being produced in the world continues to increase rapidly. So new
tools have been developed to analyse them such as NoSQL and the open source software Hadoop.
Variety: Big data often involves bringing together data from different sources. Currently it appears that
big data analytics mainly uses structured data, e.g. in tables with defined fields, but it can also include
unstructured data. For example, it is possible to obtain a feed of all the data coming from a social media
ISBN 1-63102-455-8
451
Awareness of ‘Big Data’ Among the Library Professionals in the Research Libraries of Odisha
source such as Twitter. This is often used for ‘sentiment analysis’, i.e. to analyse what people are saying
about products or organisations. Data can come from a variety of sources (typically both internal and
external to an organisation) and in a variety of types. With the explosion of sensors, smart devices as well
as social networking, data in an enterprise has become complex because it includes not only structured
traditional relational data, but also semi-structured and unstructured data.
Structured data: This type describes data which is grouped into a relational scheme (e.g., rows and
columns within a standard database). The data configuration and consistency allows it to respond to
simple queries to arrive at usable information, based on an organisation’s parameters and operational
needs.
Semi-structured data: This is a form of structured data that does not conform to an explicit and fixed
schema. The data is inherently self-describing and contains tags or other markers to enforce hierarchies of
records and fields within the data. Examples include weblogs and social media feeds.
Unstructured data: This type of data consists of formats which cannot easily be indexed into relational
tables for analysis or querying. Examples include images, audio and video files.
Velocity: In some contexts, it is important to analyse data as quickly as possible, even in real time. Big
data analytics can be used to analyse data ‘in motion’, as it is produced or recorded, as well as data ‘at
rest’ in data stores. A potential application of ‘in motion’ analysis is in credit card payments. The velocity
of data in terms of the frequency of its generation and delivery is also a characteristic of big data.
Conventional understanding of velocity typically considers how quickly the data arrives and is stored,
and how quickly it can be retrieved. In the context of Big Data, velocity should also be applied to data in
motion: the speed at which the data is flowing. The various information streams and the increase in
sensor network deployment have led to a constant flow of data at a pace that has made it impossible for
traditional systems to handle.
Benefit from Big Data:
The benefits obtained from big data are
Technology and Application
High-speed networking:
Cluster computer programming:
Extending the reach of cloud computing
Machine learning and other data analysis techniques
Widespread deployment
Security and privacy:
REVIEW OF LITERATURE
Many of the big data applications have to do with operational and/or transactional data, shedding light on
operations, supply chain, or distribution channel performance or on customer/consumer behavior ;Vance (2011).
Big data, in particular, has the potential to add value by providing transparency with immediate performance
feedback, experimentation with quick results, more precise segmentation, more objective decision-making
(algorithms rather than humans), and new products; Manyika, et. al .(2011). Big data and business analytics
bring new capabilities to the party, and we need to discuss how they fit within the knowledge
management/intellectual capital universe. More power and decreased costs have led to an ability in many firms
to store ever greater amounts of data and conduct more in-depth analysis on a regular basis, either through their
own IT systems or in the cloud; Bussey (2011)&Vance (2011). Cloud services are available at reasonable costs
by any number of big providers, including such well-known names as amazon.com, Google, and Microsoft.
While surrendering the data to a second party gives away some level of control, security may actually be
increased as the larger providers are usually more experienced at keeping data away from prying eyes. As
volume, velocity, and variety have increased, along with dropping costs, they have allowed increased analysis of
the new databases, enabling better strategic, tactical, and operational decision-making; Beyer & Laney (2012).
Big data has grown accordingly, bringing new metrics such as data storage into the mix ;Liebowitz (2013) &
Manyika et. al.(2011) and the new buzz words we all associate with this important trend. It’s important to
remember, however, that the size of the databases is only one piece of the equation. As we know from
knowledge and intelligence approaches, the information and data don’t reveal their full value until insights are
drawn from them. And so, big data becomes useful when it enhances decision-making. Decision-making is
enhanced only when analytical techniques are applied and some element of human interaction is applied; Zhao
(2013).
452
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
The capacity of analyzing big data increasingly becomes a business differentiator: there are companies who
outperform their peers thanks to their ability to apply analytics to their own data. These companies are known as
analytical competitors ;Davenport and Harris (2007).
Big data’, considered by some the new path to technological progress and economic welfare, presupposes the
deployment and implementation of information systems enabling the creation and collection of digital data.
These systems, which represent already mundane parts of everyone’s daily existence, make bureaucracies and
organizations function, and let people participate in the life of modern societies; Lyon (2001). Analytics is what
connects ‘big data’, in logical and practical terms, with value creation. More specifically, ‘[a]nalytics is the
process of developing actionable insights through problem definition and the application of statistical models
and analysis against existing and/or simulated future data’ ;Cooper (2012: 3). Big data simply means business
intelligence at a larger scale. [...] We’re building Retention Science to help businesses make sense of data more
easily and turn data into actionable campaign recommendations. [...] Retention Science focuses on the data
points that will positively increase the accuracy of our recommendations to our clients. [...]Whenever we engage
a new client, we set experimental and control groups so we can clearly measure our benefits and focus on
improving our results. We leverage machine learning technology to continuously improve our algorithms so we
can make more accurate campaign predictions to help our clients maximize customer retention; Bloomberg
(2013). Franklin et al. (2005) have proposed the idea of dataspaces and the development of DataSpace Support
Platforms (DSSP), as a means of addressing the challenges of information management of the organization’s
many diverse but often inter-related data sources. This paper suggest that for each participant in the dataspace,
the catalog should include the schema of the source, statistics, rates of change, accuracy, completeness, query
answering capabilities, ownership, and access and privacy policies. Siwach (2014) proposed an approach for
identifying the encoding technique to advance towards an expedited search over encrypted text leading to the
security enhancements in big data. Cárdenas et al. (2013) have given the differentiators of traditional and big
data and emphasized on volume, variety and velocity of the data. In the paper they investigated security from
first generation ‘Intrusion detection systems’ to third generation ‘Big Data in analytics’. Focus is on big data
security and the use of cluster Infrastructures that makes it more reliable and available. Lesk (2013) has
highlighted the role of librarians by stating that the significance of analytics for libraries is that the skills needed
for this work are similar to data management skills, and if, as is likely, all large libraries are doing web
analytics, they are employing people who have that set of skills, and combined with librarianship, are 2/3 of the
way to being scientific data curators. Vemuganti (2013) concluded that metadata and its management is an
often ignored area in enterprises with multiple consequences. The absence of robust metadata management
processes lead to erroneous results, project delays and multiple interpretations of business data entities. These
are all avoidable with a good metadata management framework.
BIG DATA IN THE RESEARCH LIBRARIES OF ODISHA
Libraries, the bastions of information, are adapting to accommodate for the growth of data resources and
provide data literacy instruction. Research libraries in Odisha have been most impacted by this evolution; many
federally funded research grants have recently required data management plans (DMP) as part of the application
process. In 2011, the National Science Foundation (NSF) began to require DMPs with all grant proposals and
many other funding institutions have followed suit. The role of data librarians are needed in four key areas: (1)
organization, (2) search and access of internal datasets, (3) awareness of external data sources, and (4) to serve
as authorities on copyright and intellectual property issues. To equip librarians with these essential data-specific
skills, “data curation” programs are becoming common in library and information schools.
OCLC offers a programme , titled Collective Insight: Driven by Shared Data addressed the issue of libraries and
Big data. Here, participants watched videos from previous OCLC Symposia and came together online to chat,
the conversation starting with the question: “What are your thoughts about the kinds of information that when
shared create new potential, and how would those uses help to benefit our user communities?” .There were two
kinds of Big data librarians are mainly involved in. The first has to do with assisting researchers in data
management tasks. Many librarians from larger research-oriented institutions discussed what they were
currently doing, how their “data repositories” needed to be improved, and the challenge of sharing with other
institutions etc. The second kind of Big data that libraries are involved in would be assessment data i.e. data
visualization. One noted that even as one may “know what matters and what to asses, it now takes an entirely
separate skill set to be able to do it!” The underlying theme of the conversation seemed to me that paying evercloser attention to areas that can be measured had the potential to not only help libraries make the case that they
serve a useful function and help meet desired goals, but also to help libraries in aggregate to be more useful
when that data is shared more broadly.
The Summon provides , at the core of the Summon service is a single & unified index as a SaaS solution. This
unique architecture, which ensures that all users are searching the same system, allows us to gather and analyze
ISBN 1-63102-455-8
453
Awareness of ‘Big Data’ Among the Library Professionals in the Research Libraries of Odisha
user behavior data from the hundreds of millions of Summon searches performed by millions of users—
including researchers from the largest and most prestigious academic and research libraries around the world.
All users searching across the same unified index, no matter how customized their local Summon site might be,
is the key to capturing meaningful and interpretable data. This data can expose behaviors that illustrate true
usage of library services, as opposed to the usage of a small number of participants being observed in an
unfamiliar situation such a usability study with defined tasks. So for the Library initiatives in the Big Data, the
library administration and management examine what types of big data sets their library could be gathering and
analyzing using big data tools. They should work on the following questions:- Does your library have an
opportunity to measure something new, some massive data set which previously was out of your reach because
of software and hardware constraints? From the side of big data curation, could your library, as part of storing
your faculty’s scholarly research and making it accessible, also store and mount your faculty’s raw research data
for others to use? What types of big data could you use to make better decisions about collection development,
big data curation at your institution by providing guidance to storing and making accessible big data sets. Now
is the opportunity for your library to understand the issues and opportunities big data offers to researchers,
administration, and the librarians at your institution. There are many collaborative initiatives launched all over
the world by the library and information services organizations. Some of them are as below.
DataOne, Data Conservancy and Data to Insight Center have all been funded by NSF through DataNet.
MetaArchive, a dark preservation archive making use of peer-to-peer technology, andGeoMAPP, focused
on the preservation of local/state government spatial data were both funded by Library of Congress’s
NDIIPP program.
The Library of Congress’s NDIIPP program has given rise to the National Digital Stewardship Alliance,
which includes members from academia, industry, and government, convened to work on Content,
Standards and Practices, Infrastructure, Innovation, Outreach.
DataCite is an organization founded by several European national libraries and including some North
American libraries to work with the publishing industry to develop the mechanisms to assign persistent,
unique identifiers to datasets so that they can be cited.
The Digital Preservation Network is the newest and perhaps the most ambitious.
BIG DATA TECHNOLOGIES
Big Data technology can be broken down into two major components – the hardware component and the
software component, as shown in the figure below. The hardware component refers to the component and
infrastructure layer. The software component can be further divided into data organisation and management
software, analytics and discovery software, and decision support and automation software. The layered
architecture of Big Data consists of following elements:Data Organisation and Management: This layer refers to the software that processes and prepares all types of
structured and unstructured data for analysis. This layer extracts, cleanses, normalises and integrates data. Two
architectures – extended Relational Database Management System (RDBMS) and the NoSQL database
management system – have been developed to manage the different types of data. Extended RDBMS is
optimised for scale and speed in processing huge relational data (i.e., structured data) sets, adopting approaches
such as using columnar data stores to reduce the number of table scans (columnar database) and exploiting
massively parallel processing (MPP) frameworks. On the other hand, the NoSQL database management system
(NoSQL DBMS) grew out of the realisation that SQL’s transactional qualities and detailed indexing are not
suitable for the processing of unstructured files.
Data Analytics and Discovery: This layer comprises two data analytics software segments – software that
supports offline, ad hoc, discovery and deep analytics, and software that supports dynamic real-time analysis
and automated, rule-based transactional decision making. The tools can also be categorised by the type of data
being analysed, such as text, audio and video.
Decision support and automation interface: The process of data analysis usually involves a closed-loop
decision making model which, at the minimum, includes steps such as track, analyse, decide and act. To support
decision making and to ensure that an action is taken, based on data analysis, is not a trivial matter. From a
technology perspective, additional functionalities such as decision capture and retention are required to support
collaboration and risk management. There are two decision support and automation software categories:
transactional decision management and project-based decision management software..
CONCLUSIONS
454
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
‘big data’ applications can help tackle several societal problems by implementing new surveillance-based data
gathering technologies, and the wide use of algorithms and profiling procedures that have unexplored social
implications. The magnitude of the data issue requires collaboration by research libraries, researchers, the
university, funders, software and hardware technologists, national organizations and policy makers to grapple
with the issues of data management, curation, storage and preservation. Librarians advocate open access and, as
such, are advocates of the value of open data. Librarians can act as intermediaries, linking faculty with peers in
other disciplines to facilitate interdisciplinary research. It is largely the librarians’ role to create and provide data
management services that meet this new grant specification. In addition to providing DMP guidance, libraries
have entered into the data lifecycle by taking on the task of housing and preserving the data generated from
student and faculty research projects in data repositories. Librarians are well placed to discuss with researchers
the value of data management and sharing strategies, and to increase their awareness of metadata standards and
practices and institutional repositories. Librarians have expertise and experience with institutional repositories,
and libraries have a legacy of preserving knowledge for future generations.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
Bloomberg. (2013a) Company Overview of Retention Science. Business Week, Internet Software and Services.
http://investing.businessweek.com/research/stocks/private/snapshot.asp?privcapId=154080
Bussey, J. (2011) ‘Seeking safety in clouds’, The Wall Street Journal, September 16, p. B8.
Beyer, M.A. and Laney, D. (2012) ‘The importance of ‘big data’: A definition’, Retrieved from
https://www.gartner.com/doc/2057415.
Cárdenas, Alvaro A. Manadhata, Pratyusa K. and Rajan, Sree (2013). Big Data Analytics for Security Intelligence.
Big Data Working Group Cloud Security Alliance.
Cooper, Adam.(2012). What is Analytics? Definition and Essential Characteristics. CETIS Analytics Series 1(5):
1-10.
Davenport, Thomas H. and Jeanne G. Harris. (2007). Competing on analytics: the new science of winning. Boston:
Harvard Business School Press.
Franklin, Michael. Halevy, Alon and Maier, David (2005). From databases to dataspaces: a new abstraction for
information management. SIGMOD Rec. 34(4):27--33
Gartner. (2013). IT Glossary. http://www.gartner.com/it-glossary/big-data/
Lyon, David. (2001). Surveillance society: Monitoring everyday life. Buckingham and Philadelphia: Open
University Press
Lesk, Michael (2013). Curators of the Future. New Technology of Library and Information Service. 29(3): 1-7
Liebowitz, J. (ed.) (2013) Big data and business analytics, Boca Raton, FL: CRC Press/Taylor & Francis.
Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C. and Hung Byers, A. (2011) Big data: The
next frontier for innovation, competition and productivity, McKinsey Global Institute
Laney, Doug.(2001). 3D Data Management: Controlling Data Volume, Velocity, and Variety. Technical report,
META Group, 6 February
Siwacch, Gautam and Esmailpour, Amir (2014). Encrypted Search & Cluster Formation in Big Data. IN ASEE
2014 Zone I Conference, University of Bridgeport, Bridgpeort.
Vemuganti, Gautam (2013). Metadata Management in Big Data. Infosys Labs Briefings. Vol.11 No. 1.
Vance, A. (2011a) ‘The data knows’, Bloomberg Businessweek, September 12, pp. 70-74.
Zhao, D. (2013) ‘Frontiers of big data business analytics: Patterns and cases in online marketing’, in J. Liebowitz
(ed.) Big Data and Business Analytics, Boca Raton, FL: CRC Press/Taylor & Francis
ISBN 1-63102-455-8
455
MOBILE APPLICATIONS AND INFORMATION RESOURCES
FOR LIBRARY USERS
Jatinder Kumar | Librarian | Baddi University of Emerging Sciences & Technology | Solan | Himachal
Pradesh | jksamyal@gmail.com
Dr.Suman Sumi | Assistant Librarian | Panjab University | Chandigarh | sumangood@gmail.com
Abstract: With a massive eight billion user of mobile phone around the world, it is predicted that
Internet access from Mobile devices will exceed from the desktop computers within 5 years. These
statistics are hardly surprising as we can see new advancements in Information and
Communication Technology and the rise in mobile phone use. People want to stay connected
where ever they are in this competitive world. The market of smart phones is booming as these
offer numbers of free applications such as e-mail, web search, video chat, games, social media,
productivity tools, e-learning, entertainment etc. literally on your palm. The libraries are not far
away from this technology and have started exploring new educational applications to keep
themselves connected with patrons. There are number of libraries which are offering Mobile
Application or Mobile Websites to its clients to access library catalogue, resources, user’s
accounts or search from various databases. There is positive response of the patrons as they found
these services easier than to physically visit the libraries.
Keywords: Mobile Applications, Web-based Library services, Mobile Technology in Libraries.
INTRODUCTION
The recent developments in Information Technology (IT) have given the platform to all libraries and information
centres to provide variety of resources and launch special services for the patrons. The libraries nowadays are being
accessed with mobile devices including cell phones, PDAs, Laptops, tablets and e-book readers. The trend of
physically accessing and using library resources is going to vanish soon. The cutting edge mobile technology for
patron empowers them to access library resources and services everywhere. The portable library WebPages, OPACs
and Educational Applications have established a new relation with the patrons called Mobile Web Presence of
Library. The online web services include portable instructional resources, library virtual tours, online catalogue,
SMS service, reference services, event book and notifications etc.
The worldwide subscription to telephone services has touched 6 billion, which is equivalent to half of the world
populations. At present 90% of world population is within the mobile range. China is leading mobile phone
subscribers list with over 1 billion of its population use cellular services followed by India with nearly 75.21% of
total country population subscribe to mobile services. In a latest survey report every Indian spends approximately 3
hours per day on Smartphone. It is also found in survey that there are 7 million people using e-learning platform
worldwide. These statistics show that people like to interact and share the information with others online, which has
given a boom to mobile based information services. The ITU has predicted that Internet access from Mobile devices
will exceed from the desktop computers within 5 years. It is also positively expected that by 2017 the production of
cell phones will surpass the total population on earth.
In recent times the cell phones have become more data-capable and can save millions of records and files within
fewer space. They offer much better technology and interface than desktops. The cell phones primarily used for
making calls, accessing web, listening music, playing games, reading books, watching TV shows and
communicating with friends. Mobile phone has been adjudged one of major way of communication and
entertainment over the last 20 years. The information managers or librarians need to be aware of all these
technological changes and upgrade themselves as well as their library resources to meet the future informational
needs of the patrons.
456
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
OBJECTIVES OF THE STUDY
The objectives of the study are;
To make library professionals aware of cutting edge mobile technology being used.
To know various advantages of Web 2.0 social media tools.
To introduce available web services accessible through mobile devices.
To know some mobile based application for information community.
To explore some designing platform to build mobile applications.
Development of Mobile Phones
A mobile phone also known as a cell phone is a device that can make and receive telephone calls over a radio link
whilst moving around a wide geographic area. The cellular networks are provided by various mobile phone
operators that allow phone users to access information on their devices and also interconnect to the public.
In addition to simple telephone functions, a modern mobile phones also support a wide range of other services such
as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth),
business applications, gaming and photography. Mobile phones that offer these and more general computing
capabilities are referred to as smart phones.
The first hand-held mobile phone was demonstrated by John F. Mitchelland Dr Martin Cooper of Motorola in 1973,
using a handset weighing around 2.2 pounds (1 kg). In 1983, the DynaTAC 8000x was the first to be commercially
available. From 1990 to 2011, worldwide mobile phone subscriptions grew from 12.4 million to over 5.6 billion,
penetrating about 70% of the global population. Source: http://en.wikipedia.org/wiki/Mobile_phone.
The world's first commercial automated cellular network was launched in Japan by NTT in 1979, initially in the
metropolitan area of Tokyo. In 1981, this was followed by the simultaneous launch of the Nordic Mobile Telephone
(NMT) system in Denmark, Finland, Norway and Sweden. Several countries then followed in the early-to-mid
1980s including the UK, Mexico and Canada.
In 1983 the DynaTAC mobile phone was launched on the first US 1G network by Ameritech. It cost US$100
million to develop, and took over a decade to hit the market. The phone had a talk time of just half an hour and took
ten hours to charge. Consumer demand was strong despite the battery life, weight, and low talk time, and waiting
lists were in the thousands. Source: http://www.adotas.com/2013/06/get-smart-about-mobile-marketing/
In 1991, the second generation (2G) cellular technology was launched in Finland by Radiolinja on the GSM
standard, which sparked competition in the sector as the new operators challenged the incumbent 1G network
operators.
Ten years later, in 2001, the third generation (3G) was launched in Japan by NTT DoCoMo on the WCDMA
standard. This was followed by 3.5G, 3G+ or turbo 3G enhancements based on the high-speed packet access
(HSPA) family, allowing UMTS networks to have higher data transfer speeds and capacity. Source:
http://en.wikipedia.org/wiki/Mobile_phone.
By 2009, it had become clear that, at some point, 3G networks would be overwhelmed by the growth of bandwidthintensive applications like streaming media. Consequently, the industry began looking to data-optimized 4thgeneration technologies, with the promise of speed improvements up to 10-fold over existing 3G technologies. The
first two commercially available technologies billed as 4G were the WiMAX standard (offered in the U.S. by Sprint)
and the LTE standard, first offered in Scandinavia by TeliaSonera. Source: http://teleinformation.com/2012/07/mobile-phone-systems-overview/
ISBN 1-63102-455-8
457
Mobile Applications And Information Resources For Library Users
MOBILE APPLICATIONS FOR EDUCATIONAL INFORMATION
There is large number of Mobile Applications being used which have their own importance in information world.
Some of Mobile Applications based on relevancy, accuracy and contents for library users are discussed here.
Keeping in view the Patrons’ preferences and financial constraints, we have chosen some paid or similar application
to enlist here;
Spreadsong: This application provides nearly 24000 free to read classic literature by eminent authors like
Aristotle, Charles Dickens, Plato and Oscar Wilde. The application includes ebooks, and audio books.
Ebooks are in pdf format and can be downloaded on your mobile phone, whereas audio books can be
listened online or offline. The application is free of cost for iPhone, iPod, iPad, Android smart phones.
Website: http://www.spreadsong.com/
Dropbox: Dropbox is used to store, sync and share files online and across the networked environment.
Dropbox is a free service that lets you bring all your photos, docs, and videos anywhere. Any file you save
to your Dropbox is accessible from all your computers, iPhone, iPad and even the Dropbox website! The
application is free of cost for iPhone, iPod, iPad, Android smart phones and BlackBerry. Website:
https://www.dropbox.com/
Evernote: Evernote creates text, video, and audio memos. All content within Evernote is searchable,
including text within snapshots. Notes can be synchronized to Mac, PC, and Web. Evernote works with
iPhone, iPod touch, iPad, Android, BlackBerry, Palm, and Windows Mobile. Price: Free. Website:
http://www.evernote.com
iSSRN: iSSRN is Created by the Social Science Research Network (SSRN), iSSRN provides access to
more than 260,000 research papers in the social sciences and humanities from scholars worldwide. Articles
can be e-mailed or viewed on the device. iSSRN works with iPhone and iPod touch. Price: Free. Website:
http://ssrnblog.com/2009/11/19/ssrns-iphone-app-issrn-is-available/
OECD Factbook: OECD Factbook 2010. Created by the Organization for Economic Co-operation and
Development, this app presents current economic, social, and environmental statistics. The data is
organized into 12 categories, such as Population and Migration, Production and Income, Labour, Science
and Technology, and more. Each category offers a range of specific sub-topics with data organized into
tables. More countries than ever are covered in greater detail, enabling direct comparisons for many
indicators between OECD Members and Brazil, China, India, Indonesia, Russian Federation and South
Africa. OECD Factbook 2010 works with iPhone, iPod touch, and iPad. Website:
http://www.oecd.org/publications/factbook/
TED Talks: This app by TED Conferences contains the entire TEDTalks library of more than 700 video
presentations. Ability to sort by recency, popularity, tags, or themes. Save talks for offline viewing. TED
works with the iPad. Website: http://itunes.apple.com/us/app/ted/id376183339/
Medscape
WebMD is a popular medical site, with tons of information. It is both a well regarded and well trusted site as far as
medical news and contents goes. In 2009 the developers of WebMD decided to bring this information to mobile
devices and launched an app called Medscape. Medscape is now the most popular medical app for download. It is
used by medical students, physicians, nurses almost everybody in the medical profession. Besides all features of an
app, there is also a medical news function that keeps the user up to date with new advancements in medical sciences.
Website: http://www.medscape.com/
458
Earthviewer: Earthviewer is one of the coolest e-learning apps. It serves as a time machine to explore the
geological, geographical history of the world. The app has a 3D globe on the right hand side which rotates
allowing you to select your region of interest. On the lift hand side is a virtual slider which will take you
back ro earlier ages as far as 540 million years. You can see weather information and temperature map of
past 100 years to till time. Website: http://www.hhmi.org/biointeractive/earthviewer
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Khan Academy: Khan academy is a famous non-profit organization created by an educator called Salman
Khan. It was started with the intention of providing a high class education to anyone, anywhere. There are
lectures, tutorials, exercise in languages ranging from English to Norwegian to Kannada. The Khan
Academy receives funding and support from the Bill and Melinda Gates Foundation. Google and the Carlos
Slim Foundation are also known contributors. Website: https://www.khanacademy.org/
Coursera: Coursera is another education app with a difference. It connects students, professionals and
other learners from everywhere with free online courses. These courses are ones offered by top notch
colleges and academicians. Only the best of the best is provided by Coursera. These courses are taught in
14 different languages and come from over a hundred top tier global institutions and universities. There are
over 20 subject areas with over 600 courses. These of course are more formal lectures than what Khan
Academy or TED has to offer. Website: https://www.coursera.org/
My Open Courses: My Open Courses is the Indian take on Coursera. After downloading the app you sign
in through some form of social media or email. You are presented with a list of categories in the left hand
panel. The categories are many ranging from engineering and sciences to humanities and design. Once the
category is selected you can see the list of lectures and professor who is taking them. There are lots of
professors from IITs and IISc, so you are getting some quality stuff here. The courses are accompanied by
syllabus, videos and other relevant documents. There is also an introduction of professor before the start of
a course. My Open Courses is an initiative started by the National Programme on Technology Enhanced
Learning which aims at using Technology to spread education to everyone. It is funded by Ministry of
Human Resource Development in India. My Open Courses has 25 courses, 1300 subjects and over 11000
hours of videos. Website: http://myopencourses.com/
NASA App: The NASA App is released by NASA themselves to showcase the contents regarding
developments and ongoing missions of the organization. The app opnes p to a grid of its contents like
images, videos, missions, tweets, news, programs etc. All the latest news and articles released by NASA
are uploaded here first along with videos from around the agency. There are over 9000 videos that immerse
you completely and keep you watching for hours. This app has something for everyone – from kids to
students to space geeks. It is very informative and graphics that captivate you in from the very start.
Website: http://www.nasa.gov/centers/ames/iphone/#.U99jbaOB8a8
CREATING MOBILE WEBSITES, OPACS/SOPACS AND APPLICATIONS
There are number of online tools available for developers to build mobile websites and applications. Some of them
are given below:
Android Developers is Resource for creating Android applications. It Includes developer’s guide,
tutorials, and videos. Access: http://developer.android.com
AirPac (Innovative Interfaces) offers a mobile version of the Innovative Interfaces library catalogue. It
Includes features such as cover images, integrated library locations with Google Maps software, request
and renew items, and more. Contact Innovative Interfaces for pricing. Access:
http://www.iii.com/products/airpac.shtml
Boopsie is specializing in public and academic libraries and universities. Boopsie can deliver mobile
applications that are compatible with all Web-enabled phones. Contact the site for a price quote. Access:
http://www.boopsie2.com/
Create an iPhone Optimised Website using JQTouch is developed by freelance Web Designer and
Developer Matthew Leak. It outlines one way to create an iPhone-friendly version of a Web site. Coding
examples are included in this tutorial. Access: http://www.tuttoaster.com/create-an-iphone-optimisedwebsite-using-jqtouch/
Library Anywhere is created and sold through LibraryThing, Library Anywhere is a mobile catalogue for
any library. It Includes mobile Web and apps for iPhone, Blackberry, and Android. Prices range from $150
annually for schools to $1,000 annually for universities (additional fees may apply). Access:
http://www.librarything.com/forlibraries
ISBN 1-63102-455-8
459
Mobile Applications And Information Resources For Library Users
MobileTuts+ contains tutorials for all mobile developers, regardless of platform. Topics include techniques
for building mobile apps and mobile Web sites. Access: http://mobile.tutsplus.com/
MobiSiteGalore builds a mobile Web site in less than 60 minutes. No technical or programming
knowledge required. Packages range from basic (cost: free) to unlimited (cost: $24.99 per month). Access:
http://www.mobisitegalore.com/
MoFuse helps us to build a mobile version of an existing Web site or blog with the MoFuse (short for
Mobile Fusion) content management platform. Plans range from $7.95 per month to $199 per month. All
accounts come with a 14-day risk-free trial. Access: http://mofuse.com/
Mobile Web Best Practices 1.0 is Created by the World Wide Web Consortium (W3C). This document
specifies guidelines for developing Web-based content for mobile devices. Access:
http://www.w3.org/TR/mobile-bp/
LIBRARIES USING MOBILE WEBSITES
Adelphi University Libraries Mobile (AU2GO) offers library hours, library staff contact information, a
link to the library’s blog “biBLIOGraphy,” and more. Access: http://m.adelphi.edu/library/
Albertsons Library, Boise State University offers various ways to find the library and its contents. An
interesting feature is the inclusion of a “Find in Our Building” category, which lists call number locations
and popular locations such as study rooms and computers, each linked to an animated floor map. Access:
http://library.boisestate.edu/m
North Carolina State University (NCSU) Libraries provides elegant interface with icons representing
categories such as room reservations, group finder, and Webcams. Another interesting feature is the ability
to
view
the
number
of
available
library
computers.
Access:
http://www.lib.ncsu.edu/m/home/?browse=iphone
PENNLibraries, University of Pennsylvania presents multitude of information at your fingertips, such as
mobile versions of databases, image search, library video clips, and more. Access:
http://www.library.upenn.edu/m/
University of California Riverside Libraries has glossy icons designate many useful categories,
including research guides, library workshops, and links to the library’s social media profiles. Access:
http://m.library.ucr.edu /
Virginia Tech University Libraries provides simple but effective layout and offers important information,
such as library hours, contact information, catalogue search, and library maps. Access: http://m.lib.vt.edu/
CONCLUSION
During the last decade we have seen tremendous changes in the working and management of Information
Technology in libraries which has revolutionized the resources and services of the parent organization. The library
patrons are now getting feature rich services and seem more satisfied than before. In India there are a few cases
where the institutional library has its own mobile application for easy access of library collection and services, but
with the widespread of new technology the days are not far when we will see huge number of mobile based services
to be offered by various libraries in the country. It is anticipated that with easy and cheap availability of technology
the libraries would create and offer their own web pages, OPACs, Apps and e-contents accessible through mobile
devices.
There is no doubt that smart phones have created a new world for information seekers with amazing service through
mobile web. And it is believed that in coming five years Internet adoption will continue to increase with the help of
portable devices. The libraries are most advantageous, as they can highlight there services, resources and activities
to their patrons and can always stay connected with them. The coming generation of students will be getting the
habit of reading books while walking, watching movies during journeys, downloading classrooms notes from library
web pages, watching their favourite TV shows in free time, Chatting with friends & family and a lot more. This may
sound strange but the fact is that we (librarians) have to get ready and equip ourselves for tomorrow’s world when
everyone will ask information through mobile devices by using various applications of information sharing.
460
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
REFERENCES
[1] Griffey, Jason. “Mobile technology and libraries”. Neal-Schuman Publishers, Inc., NewYork, 2010. Web. 21 August
2012. <http://www.neal-schuman.com/uploads/pdf/0242-mobile-technology-and-libraries.pdf>
[2] http://developer.android.com
[3] http://library.boisestate.edu/m
[4] http://library.boisestate.edu/m
[5] http://m.adelphi.edu/library/
[6] http://m.lib.vt.edu/
[7] http://m.library.ucr.edu /
[8] http://mobile.tutsplus.com/
[9] http://mofuse.com/
[10] http://myopencourses.com/
[11] http://ssrnblog.com/2009/11/19/ssrns-iphone-app-issrn-is-available/
[12] http://tele-information.com/2012/07/mobile-phone-systems-overview/
[13] http://www.boopsie2.com/
[14] http://www.evernote.com
[15] http://www.hhmi.org/biointeractive/earthviewer
[16] http://www.iii.com/products/airpac.shtml
[17] http://www.lib.ncsu.edu/m/home/?browse=iphone
[18] http://www.lib.ncsu.edu/m/home/?browse=iphone
[19] http://www.librarything.com/forlibraries
[20] http://www.librarything.com/forlibraries
[21] http://www.medscape.com/
[22] http://www.mobisitegalore.com/
[23] http://www.nasa.gov/centers/ames/iphone/#.U99jbaOB8a8
[24] http://www.oecd.org/publications/factbook/
[25] http://www.spreadsong.com/
[26] http://www.tuttoaster.com/create-an-iphone-optimised-website-using-jqtouch/
[27] http://www.w3.org/TR/mobile-bp/
[28] https://www.coursera.org/
[29] https://www.dropbox.com/
[30] https://www.khanacademy.org/
[31] Library Technology Reports. “On the Move with the Mobile Web: Libraries and Mobile Technologies.” ALA Tech
Source, 2012. Web. 21 August 2012. <http://www.alatechsource.org/ltr/on-the-move-with-the-mobile-web-librariesand-mobile-technologies>
[32] Lippincott, Joan K. “Mobile technologies, mobile users: Implications for academic libraries.” Association for Research
Libraries, 2012. Web. Web. 21 August 2012. < http://www.arl.org/bm~doc/arl-br-261-mobile.pdf>
[33] Mobithinking. “Global mobile statistics 2012 Home: all the latest stats on mobile Web, apps, marketing, advertising,
subscribers and trends”. Web. 20 August 2012. <http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats>
[34] Wikipedia: The free encyclopaedia. “List of countries by number of mobile phones in use.” Web. 21 August 2012.
<http://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_inuse>
[35] Wikipedia:The free encyclopaedia.“Mobile Phone.”Web.20August 2012. <http://en.wikipedia.org/wiki/Mobile_phone>
ISBN 1-63102-455-8
461
GENDER EQUATION: ROLE OF ICT’S IN WOMEN
EMPOWERMENT
Dr. Anjani Kumar Jha | Professor | Technia Institute of Advanced Studies | journlistanjani@gmail.com
Abstract: Empowerment, the goal of development is deferred as the process by which individuals;
organizations and communities gain control and mastery over social and economic conditions
over democratic participation. (Freire, 1970: Zimmerman and Rappaport ,1988) However, there
has been much debate on just what constitutes improved living condition and how they should be
achieved. Nevertheless, to improve one’s living status, information regarding ‘how to improve’ the
condition need to be provided, which is the basic level of improvement. Probably the provision of
such information especially to the marginalized, can balance the gender equation. To balance
this, the divide between the ‘haves’ and the ‘have-not’ needs to be bridged for which, there is a
possibility of using the crucial media and the ICTs.
Keywords: Empowerment, Gender, ICT, Mass Media, Women.
INTRODUCTION
Larry Shore (1980) in his book, “Mass Media for Development: A re-examination of Access, Exposure and
impact”, says, “What was apparent from the results of research in rural development over the past two decades
is the need to consider communication not as a single independent variable but as both dependent and
independent in a complex set of relation ship with social economic and political structures and processes”.
Defining Information and Communication Technologies:
ICTs are defined by communication researchers, sociologists, and activists in a number of ways. ICTs are
defined as a diverse set of technologies and resources which create, disseminate, store, bring value addition and
manage information. ICTs are used as a broad tool for amalgamation knowledge existing in remote databases.
Knowledge thereby becomes the fundamental resource for all economic and developmental activities. ICTs are
considered as a matrix of Formal Communication system x Non-formal communication systems x ICTs where
the formal communication systems and ICTs include a set of technologies, which range from the traditional
print media to the modern digital technology implying
Formal Communication
ICTS Non-formal Communication
Newspapers X Magazines
TV
Computers usage
X
Networking X
Interpersonal communication Radio x
Hence the matrix will be
ICTs x Non-formal communication
Women Empowerment
The concept of women empowerment is operationally conceived as women’s awareness on various factors of
empowerment. These factors of empowerment were broadly conceptualized as
Health and Family Welfare
Education
Social and Economic Development
Skills Development and Employment
For the purposes of pilot study only two factors of empowerment were considered.
In Fact, Shore (1980) has quoted studies on the content of newspapers, radio and TV, which suggest that
information relevant to development was given less preference that trivial, and non-development oriented
462
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
subjects. The poor, disadvantaged, marginalized section especially in rural areas of third world lived in a state of
“Under Communication”.
Everett Rogers as early as in 1969, observed on one of this visits to a village in a developing nation, “the only
Radio in the village, owned by the president of the village council was turned to music rather than to news of the
outside world’. In fact, not much has changed in the urban and rural India, although even slums in the urban
areas and most of the village households own a TV in the contemporary times, as they still watch entertainment
and music oriented channels.
PILOT STUDY METHODOLOGY
For the pilot study, in the two states i.e. Karnataka and Tamil Nadu, a sample of 80 in each district was selected.
In Karnataka urban 30 women in the age group of 18-60 were randomly picked from Bangalore South area. The
Karnataka rural respondents of 30 women were randomly obtained from Gajanur.
In case of Tamil Nadu, the Tamil Nadu urban respondents of 30 women were randomly picked from Hosur and
the Tamil Nadu rural respondents were from Talavadi picked randomly.
Data was collected from these respondents with the help of a questionnaire administered personally by the
researcher and research assistants. Information thus collected was converted into numerical data and frequency
was tabulated which was then converted into percentages.
Percentages was provided regarding the access of media and ICTs by the respondents and the KAP and IS
analysis was carried out to find the empirical information regarding the knowledge, attitude and practice of the
various factors of empowerment and the sources from which the information was obtained from.
DATA ANALYSIS
The researcher initially wanted to know whether there was any access to media and ICTs for the basic reasoning
that without any access, the media and the ICTs will have no role to play in increasing awareness of the
respondents..
Incidentally, the information thus obtained could check on the ‘knowledge Gap Hypothesis’ proposed by
‘Tichenor, et al. According to this hypothesis “ As the infusion of mass media information into a social system
increases, segments of the population with higher socio-economics status tend to get this information at a faster
rate than the lower status segments, so that the gap in knowledge of these two segments tends to increase rather
than decrease’. This hypothesis is ‘true’ in the present scenario of the sample as the demography of the sample
related to access to media shown that the lower the socio-economic status of the population, the lesser is the
access which is in concurrence with the ‘knowledge gap hypothesis’.
ANALYSIS AND INTERPRETATION
I Access to Media
Karnataka – U
Karnataka – R
N = 30
N = 30
Urban
No of Persons
Percentage
Urban
No of Persons
Percentage
Newspaper
Reading
28
84%
Newspaper
Reading
16
48%
Magazines
27
81%
Magazines
10
30%
ISBN 1-63102-455-8
463
Role of Information Literacy in Curriculum
Multiple Responses: The above two tables related to access to newspaper and magazines, very clearly indicate
that the access to and reading of newspapers among Karnataka urban respondents are comparatively more than
those in Karnataka rural. Women respondents in rural areas are mostly illiterates with little or no interest in
reading .
II – Radio Listeners
Karnatake – U
Karnataka – R
Radio
Listeners
AIR
%
FM
%
Radio
Listeners
AIR
%
FM
%
N = 30
20
60%
26
78%
N = 30
20
60%
26
78%
Multiple Responses: Interestingly, more people especially the women respondents in the urban areas were
found to listen to FM stations. It appears that as was found by Everett Rogers in early 70s, generally people
tune on to Radio for music. The FM, which is predominantly music oriented, is extremely popular everywhere
due to its easy access, mobility and financial viability.In fact, the respondents rarely quoted as listening to AIR
for news, talks and other serious matter even in the rural Karnataka area (Gajanur). Women respondents hardly
listened to the programme “ Mahileyarigagi” or the Agricultural information:
III: TV VIEWERS
Karnataka – U
N = 30
Karnataka – R
No of Persons
Percentage
TV Viewers 30
100 %
N = 30
No of persons
Percentage
TV Viewers
75%
TV as a media of information does not have much to offer relating to the IEC strategies (Information, Education
and Communication) as per the information obtained from the respondents, and it appears that the IEC should
be changed to information, entertainment, communication instead of education.
Most of the households even in the rural area (Gajanur)owned a TV set. Many of them also had cable
connection. This is an interesting fact to note because though they were not very economically sound, they
owned a TV and paid for the cable net work. Although, according to ‘Johari window’ –a 2 x 2 matrix, which
claims that development of community goes parallely with media development, it is interesting to note the
paradox here.
IV: Access to ICTS (Digital Technologies mainly Computers)
KARNATAKA URBAN
Don’s have Computers
Number
Percentage
11
33%
Don’t use computer
Number
Percentage
13
39%
Use of computers though
Number
6
5
4
5
2
Purpose
Typing
Surfing
e-mail
Other
The sampled women respondents for the pilot study belonged to an age group of 25-55. Although all of them
were educated, only 6 numbers of the respondents used computers. However, non surfed for any kind of
information on women or gender issues. It is rather alarming to note that the educated, well informed women
don’t bother to bridge the gender divide.
464
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
KARNATAKA RURAL –GAJANUR
The situation in Karnataka, as far as the sample and the urban/rural disparity with regard to use of computers
for information dissemination is concerned, it appears that the urban women are as bad or as good as their rural
counterparts (urban 6 women used computers/whereas rural 2 used computers)
V: ACCESS TO MEDIA – TAMIL NADU
Tamil Nadu – Urban
Newspaper
Tamil Nadu – Rural
Magazine
Reader
Newspaper
Reader
N=30
Magazine
Reader
Reader
No
%
No
%
21
63
19
57
N=30
No
%
No
%
8
19
10
30
*Multiple Responses: For Tamil Nadu Urban area, the Pilot study was conducted at Hosur. The random sample
of women selected was not very literate. The pilot study clearly indicated that the independent variable and
their impact on the dependent variable cannot be studied in isolation (Larry & Shone, 1980) and as is in the case
of Johari Window.
Comparing Gajanur with Talavadi we find the number of news paper readers are more in Gajanur. A case in
point to mate is that Gajanur has an NGO and Christian missionary working towards eradicating illiteracy.
VI : Radio Listeners and TV Viewers
Incidentally, Timil Nadu does not have a FM Station at Hosur. It appears that if they had a Fm Station, then the
respondents would have only listened to that.
Tamil Naduj – Urban
Tamil Nadu – Rural
Radio
Listeners
N=30
TV Viewers
Listerners
Radio Listeners
TV Viewers
Listerners
No
%
No
%
16
51
28
84
No
%
No
%
15
50
30
100
N=30
A very notable fact is that women in both Karnataka Urban and Tamil Nadu urban areas were fond of watching
TV. In fact, they watched TV mainly for entertainment purposes and news. In rural areas TV was the most
popular media, mainly watched for entertainment and serials. It is not surprising to note that TC as a media of
entertainment has such high impact that they tend to think its for real.
VII : Access to ICTS (Digital Technologies)
The access to and use of ICTs is more or less the same as in case of Karnataka Urban and Rural even in Tamil
Nadu Urban and Rural areas.
Tamil Nadu – Urban
Don’s have Computers
Number
Percentage
20
60%
ISBN 1-63102-455-8
Number
04
Don’t use computer Use of computers
Percentage
Number
12%
6
4
4
4
4
Purpose
Typing
Surfing
e-mail
Any other
465
Role of Information Literacy in Curriculum
Tamil Nadu – Rural
Don’s have Computers / Don’t
Use
Know about Computers
Use of computers at NGO
Number
Percentage
Number
Percentage
Number
Percentage
20
60
13
39
03
09
In Tamil Nadu Talavadi area nearly 39 % of the women respondents knew what computers were though they
were unable to use it.
VIII: Analysis of KAP (Knowledge, Attitude, Practice)
An in-depth analysis of KAP will be conducted as per the Osgoods scale, for the final study. However, for the
pilot study just the frequency of the responses was calculated. Here, we provide you with an overview of the
results.
VIII (A): Health and Family Welfare – Karnataka Urban.
Although the educated, well informed women of Bangalore were aware of MMR vaccination and strongly agree
it is needed, not all have administered their wards with MMR Vaccine.
They do not fully agree that Leprosy is curable.
Bangalore educated women are not fully aware of single child norm of the government.
Practice spacing between children only to some extent.
Avoid eating fatty foods only to a certain extent.
Although aware fully about yoga and its usefulness, practice yoga and avoid salt and sugar to some
extent.
VIII (B) Health And Family Welfare – Karnataka Rural
Illiteracy being a major factor, awareness is less in case of MMR vaccine, tetanus for pregnant women,
spacing between children, fatty foods being injurious to health, menopause problems, etc.
Women respondents in rural areas are not at all aware of single child policy.
All the respondents are fully aware of HIV and take complete care against it.
IX (A) Health And Family Welfare –Tamil Nadu Urban
The sampled women respondents at Hosur were both educated and illiterates and were not at all aware
of MMR vaccine.
Although they were aware of Malaria and Cholera, they did not bother much to boil water for drinking
and keep surroundings clean. This was very evident as observed by the researcher. It is very ironical
that Hosur being an urban district it appears to be under-developed.
Paradoxically, although women agreed that Yoga was good for health and one should not over eat fatty
foods, they did not practice it.
As in case of Karnataka Urban, even Tamil Nadu respondents were unaware of single child policy.
IX (B) Health And Family Welfare – Tamil Nadu Rural
Like in case of Karnataka Rural, awareness and practice of MMR vaccine was not found.
The respondents were aware of Vitamin E for children and to some extent provided food with Vitamin
E for Children.
A notable factor is the single child policy of the government which respondents are not aware of.
An important fact was that respondents were fully aware of AIDS and they took complete care to avoid
it.
X (A) Education – Karnataka Urban
466
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
It appears that Bangalore’s educated women are not very aware about non-formal school for drop-outs
and distance education programmes and have not undergone any form of distance education.
Most of them although aware of computers and their tremendous usage, do not use computers. It is
already observed earlier that among the 30 respondents, hardly six of them use computers.
X (B) Education – Karnataka Rural
Although Gajanur has a Christian missionary and an NGO working towards empowering women,
many facts they were not aware of. Like for instance night school, non-formal school,. Dropout,
educational loan, female literacy, adult education etc. in fact, when asked about their attitude towards
educational loan, they did not respond.
XI (A) Edcuation – Tamil Nadu Urban
Midday meal programme may not be very popular in Tamil Nadu. Incidentally, some of the women
were aware of it and some were not.
Although the respondents claimed they aware of female literacy being comparatively low, it appears
that they did nothing about it because many of them were illiterates.
XI (B) Education – Tamil Nadu Rural
In Talavadi area, there were no NGOs and they were mostly illiterates and they were not aware of
many of the factors regarding education. They were not aware of night school programmes, non-formal
school for dropouts, female literacy being low etc.
Although some were aware of computers, they did not know about its usage. Neither were they fully
aware of government schemes for women’s literacy.
INFORMATION SOURCE
Most respondents quoted TV and non-formal communication as sources of information.
Most rural respondents depended mainly on non-formal source.
At places where they were NGOs, respondents said, information was being collected by the NGOs
through computers and passed on to them through interpersonal channels.
Neither the Karnataka Urban nor the Tamil Nadu Urban respondents quoted ICTs as sources.
CONCLUSION
According to the pilot study, there is an imbalance in the Gender equation with the role ICTs play in
empowerment.
Illiteracy in rural areas creates a gender imbalance, which needs to be bridged.
Formal communication systems are mainly used by women for entertainment purposes.
The imbalance in gender equation is more so related to socio-economic and political conditions.
Bridging this digital-divide and creating a balanced gender equation requires meticulous need based
study of every situation, improving the socio-economic conditions, considering a situational genderwise communication and ICT policy by the government.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
Castells, M: The information age economy, Society and culture; Oxford, UK, Blackwell Publishers 1997.
Chambers, Robert: Rural Development: Putting the last first: New York, 1983.
Foster, George M: Traditional culture and the Impact of Technological change. New York, Harper, 1962.
Melkote S. R & K. Kandath: Look at the Discipline and practice of Development Communication in Critical
issues of Development, New Delhi Sage, 2001.
Melkote S. R and Steeves H Lestie: Communication for Development in the Third World, New Delhi, Sage 2005.
Rogers, Everett: Communication and Development, Reflections on diffusion research: New Delhi Sage, 1976
Schramm, Wilben: Communication and Development, Communicator, April 1977
Tichenor, P.J. et al: Mass Media Flow and Differential Growth in Knowledge Public Opinion Quarterly.
ISBN 1-63102-455-8
467
ROLE OF INFORMATION LITERACY IN CURRICULUM
Mohd. Hanif | Librarian | IPFT (Govt. of India) | Udyog Vihar | Gurgaon (HR) | mohd.hanif1984@yahoo.in
Abstract: This paper provides the meaning and definition of information literacy. It highlights the
module and SCONUL seven pillars model IL. It also suggests students’ improvement information
literacy by faculty and librarian By Ellen Breen and Helen Fallon of Project/Coursework-related
classes, Stand-alone (one-shot) classes.The last during few years Information and communication
technology has change the modern society as well as in information explosion. For that people
should be information and digital literate. Information literacy is associated with training and
skills imparted by the teachers and librarians at the primary, secondary level to postgraduate and
doctoral level. Many developed countries have implemented information literacy in their
curriculum so they can access and use information effectively.
Keyword: Information Litracy, ICT, Web2.0, Learning, Skill
INTRODUCTION
The rapid development in Information and communication Technology (ICT) has made an impact and influence
on society. It has effect on the various fields such as education, science & technology, medicine, business,
agriculture, health and so on. The main motive and objective of the Information literacy curriculum is to
incorporate students learning and critical thinking. Faculty member and library staff collaboration is the best
medium to improve and achieve goal of Information Literacy. They can personally take interest and motivate
students to adopt and apply to enhance their Information Literacy skills. New applications (various software),
technology (ICT), web tools (Web 2.0 and 3.0) and internet development making path for participatory and
collaborative learning. Educational Institutions should conduct an assessment of the IL competency level of
students.
What is Information Literacy?
Information literacy is a set of abilities requiring individuals to "recognize when information is needed and have
the ability to locate, evaluate, and use effectively the needed information."
Information Literacy Curriculum: The Internet is changing the way people find and use information. In 1995,
the Purdue Libraries Faculty adopted the Goals and Objectives for our Information Literacy Curriculum.
Fig. 1: What is Information Literacy?
"Librarians at Purdue University have developed one of the best sets of learning outcome statements in use
today."
468
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Since the development of our own goals, the Information Literacy Competency Standards for Higher Education
have been developed by the Association of College and Research Libraries and approved by the American
Association for Higher Education. The Libraries Faculty Curriculum Committee coordinates development of the
curriculum materials. Information literacy should focus on identifying various shortcomings and including these
in student’s curriculum. Henri (1999) coined the term “information literate school communities” which
describes and emphasis factors, attributes, goals and practices on learning environment than to teaching for the
development of informed students.
Fig. 2: Types of Information Literacy
ACRL Definition of Information literacy is a set of abilities requiring individuals to “recognize when
information is needed and have the ability to locate, evaluate, and use effectively the needed information.”
(Information Literacy Competency Standards for Higher Education, ACRL, 2000) There are various types of
literacy which are Functional, Multicultural, Media Literacy, Computer, Digital, Technology etc.
Fig. 3: Information Literacy
ISBN 1-63102-455-8
469
Role of Information Literacy in Curriculum
Five ACRL Standards for Information Literacy are:
a)
b)
c)
d)
e)
Access information effectively and efficiently;
Identifies and addresses information need;
Evaluates and thinks critically about information;
Uses information effectively for a specific purpose; and
Uses information ethically and legally
“Information literacy is not about analytic thinking or neutral cognitive processes but about improving student
opportunity and capacity to design and forge life worlds in a range of text-based communities and economies”
(Cope & Kalantzis, 2000).
Sconul Seven Pillars Model Information Literacy
The circular nature of the model demonstrates that becoming information literate is not a linear process; a
person can be developing within several pillars simultaneously and independently, although in practice they are
often closely linked each pillar is further described by a series of statements relating to a set of
skills/competencies and a set of attitudes/understandings. It is expected that as a person becomes more
information literate they will demonstrate more of the attributes in each pillar and so move towards the top of
the pillar.
Fig. 4: Seven Pillars of Information Literacy
:
How do students require these skills?
Now Information literacy is gaining importance in transforming education, training and also regarded as central
pillar to education system. Application of information and communication technology has made vast impact on
learning and solving problems more than basic reading, writing and calculating skills. However, it is widely
recognized that in even the most technologically advanced countries, efforts to prepare students for the
information age have been only partially successful and implementation of recommendations from information
skills research have been slow and difficult to implement (e.g. Kuhlthau, 2001; Rogers, 1994). Information
literacy function as intermediate to bridge the gap of digital divide through various forms in India such as ‘echoupals’, common services centres’ gyandoot’, ‘community information centers’, UGC Infonet, INDSET, Epgphatshala, village knowledge centers’, etc. Henri (1999) coined the term “information literate school
communities” which emphasis on the learning skills and development than to teaching and simply informed, it
also includes various component, features, aims and objectives and applications.
470
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Project/Coursework-related classes
Introduction of Digital Information literacy.
Visiting of library by the students at the beginning of academic session.
Compulsory to attained library orientation programme.
Introduction of Fundamental Library coursework so that student familiar with library resources and
activities.
Project work, homework and assignment using materials available in library.
Stand-alone (one-shot) classes
This course will help students in supporting their course work. They are not compelled to attend this course. It is
organized for short session. These could include sessions on effective use of the online public access catalogue
(OPAC), e-journal, e-learning, online searching, database searching etc.
CONCLUSION
Libraries can take participative activation to engage students in the effective delivery of information literacy
programmes. Librarian and their staff can be used formal course modules for delivering IL, for example
Engineering or Medical colleges’ librarian can introduce a course on effective search and use of e-journals to all
the first year students through library orientation. It can be use live demonstrations with practical training hand
followed by class lecture. The following methods would be useful for implementing information literacy skills
education.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
Breen, Ellen and Fallon, Helen.(n.d) Developing student information literacy to support project and problembased learning. Retrieved from http://www.aishe.org/readings/2005-2/chapter17.pdf
Breivik, Patricia Senn. Student Learning in the Information Age. Phoenix, AZ, Oryx Press, 1998, p 49
Edzan, N.N. (2008). Information Literacy Development in Malaysia: A Review. Libri, 2008, vol. 58, pp. 265–280.
Retrieved
from
http://www.researchgate.net/
publication/
236470269_Information_l
iteracy_development_in_Malaysia_A_review
Cope, B., & Kalantzis, M. (Eds). (2000). Multiliteracies: Literacy learning and the design of social futures
(pp.203-234 London: Routledge.
Henri, J. (1999). The information literate school community: Not just a pretty face. In J. Henri & K. Bonanno,
(Eds.). The information literacy school community: Best practice. Wagga Wagga: Centre for Information Studies,
Charles Sturt University.
The SCONUL Seven Pillars of Information Literacy Core Model For Higher Education. SCONUL Working Group
on
Information
Literacy
April
2011.
Retrieved
from
http://www.sconul.ac.uk/sites/default/fil
es/documents/coremodel.pdf
Gedam, Pranali B and Agashe, Ajay T.(n.d) Information Literacy Competencies and Programmes in India.
Retrieved from http://crl.du.ac.in/ical09/papers/index_files/ical-88_100_227_2_RV.pdf
Moore, Penny.(n.d) An Analysis of Information Literacy Education Worldwide. Retrieved from
http://portal.unesco.org/ci/en/file_download.php/33e3dd652a107b3be6d64fd67ae898f5Information+Literacy+Edu
cation+(Moore).pdf
Kuhlthau, Carol C. (2001) Rethinking libraries for the information age school: vital roles in inquiry learning.
Keynote Address, International Association of School Librarianship Conference & International Research, Forum
on
Research
in
School
Librarianship,
July
9,
2001
Auckland,
New
Zealand.
URL: http://www.scils.rutgers.edu/~kuhlthau/Presentations.htm
Vishwas Jeet Rajbanshi, Dr. Sharad Kumar Sonker and Mithilesh Kumar, (2015). Information Literacy in
Curriculam: An important Role in students Learning and Critical Thinking, proceedings of the International
Conference “Grey to Green” held on 11-12 April 2015 at TIAS, Delhi, pp.528-532.
Websites
[1]
[2]
[3]
[4]
[5]
[6]
http://www.sconul.ac.uk/sites/default/files/documents/coremodel.pdf
https://www.lib.purdue.edu/services/instructor-services/curriculum
http://www.lib.umt.edu/library-information-literacy-curriculum
http://crln.acrl.org/content/71/10/534.full
http://njla.pbworks.com/f/Info_Lit_Brochure_Revised_2-12-10.pdf
http://www.sconul.ac.uk/sites/default/files/documents/coremodel.pdf
ISBN 1-63102-455-8
471
OPEN ACCESS REPOSITORIES (OARS) IN INDIA: AN
EVALUATIVE STUDY
Dr. Rajesh Kumar Singh | Assistant Librarian | Central Library| Banaras Hindu University | Varanasi |
rksb17@yahoo.com
Abstract: The open access repository collects, stores, disseminates digital resources and also
preserves digital materials for long term usage. An effective operational open access repository
requires alliance among librarians of Institute/University, information scientists, record
managers, faculties of University, researchers and policy makers. The open access repositories
have been identified through internet browsing. The resulting 69 OARs have been explored from
OpenDOAR(The Directory of Open Access Repositories ) for the present study. This paper is the
first of its kind that attempts to identify and evaluate open access repositories in India. It also
gives a comprehensive listing of open access repositories in India available in public domain and
evaluates growth rate of OARs, software usage, content type, repository type and subject coverage
of OARs in India.
Keywords: Open access repositories, Institutional repositories, Digital libraries. Digital library software and
Open source software
INTRODUCTION
In the information society, free flow of information is a fundamental principle for bridging the knowledge gaps
between privileged and under-privileged communities. Social inclusion and economic empowerment are also
achieved in a society where citizens have universal access to the information and knowledge, ranging from
public information to specialized or customized information related to one’s profession, vocation or culture.
Open access to information and knowledge is a key contributor in provisioning universal access to information
and knowledge. The appearance of information and communication technologies has been accelerated and
offers opportunities to fast, cost effective and efficient electronic communication of information. Open Access
Repositories (OARs) are the ventures of Information Communication Technology which have become boon to
the open access initiatives. Budapest Open Access Initiative (2002) described the concept of “open access as
scholarly literature’s free availability on the internet, permitting any user to read, download, copy, distribute,
print, search or link to the full texts these articles, crawl them for indexing, pass them as data to software or use
them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable
from gaining access to the internet itself.” According to Crow (2002), “an institutional repository is a digital
archive of the intellectual product created by faculty members, research staffs and students of an institution with
few barriers to access” Chang (2003) has also defined as “Institutional repository as new method for capturing,
collecting, managing, disseminating and preserving scholarly works created in digital form by constituent
members of an institution” In simple words we can say OARs are those repositories which are being made open
to make the content accessible to the user group of a particular organization or at the global level.
In 1991, IBM discovered digital library software to manage collection of digital files. This software was
grappled with key issues of storage, maintenance, retrieval and display digital content. This was first effort
towards the open access repository software. Today, there are number of leading softwares available to create
OARs. Among these open source softwares, DSpace, Eprint and Greenstone are more popular open source
software. In India, open access repositories movement was started in 2004 and is also gaining momentum
around the country due to following reasons:
472
To support open access movement;
To make available the public funded research outputs by the researchers to the end users/clientele;
To make available open access to the universities/ institutions research output;
To support digital preservation of knowledge and research output for future;
To support “Digital India Project” of India.
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
OBJECTIVES
The main objectives of the present study are as follows:
To investigate the total numbers of open access repositories in India;
To identify the year wise growth of OARs in India;
To find out the type of repository and subject coverage of OARs developed in India;
To ascertain the type of content included by the OARs;
To identify the widely used open access repository software;
To find out the number of records available in each OAR.
METHODOLOGY
The study, surveys the various Open Access Repositories registered with OpenDOAR (the Directory of Open
Access Repositories).This has been performed during the period starting from January to July 2015.The author
has visited websites of different OARs to understand their policies and other features.
SCOPE AND LIMITATION
The present study has been delimited with the OARs which are registered with OpenDOAR (the Directory of
Open Access Repositories). This directory is most widely used and conventional directory in the present time.
Although a large no of repositories have been developed in India but still good number of repositories have not
been registered with OpenDOAR. This is the limitation of present study.
MAJOR FINDINGS
Major findings of the study are given below:
Number of Repositories in India
In India, many universities and research institutes have developed repositories for archiving publications and
documents. It is not limited to science and technology but covers other subjects also. Sixty nine open access
repositories have set up in India as indicted by OpenDOAR ( the Directory of Open Access Repositories) till
30th June 2015.The table no.1 provide us names and URL address of registered OARs.
Name of OARs
Architexturez South Asia
Social Science Cyber Library
ARIES, Digital Repository
Digital Knowledge Repository of C DR I (DKR@CDRI)
URL of IR
http://www.architexturez.net/
http://socsccybraryamu.ac.in/
http://210.212.91.105:8080/jspui/
http://dkr.cdri.res.in:8080/dspace/index.jsp
Eprints@CMFRI (CMFRI Digital Repository)
Dyuthi (Digital repository of Cochin Uni. of Science & T.))
DigitalLibrary@CUSAT
DIR@IMTECH
IR@NPL
IR@CECRI
http://eprints.cmfri.org.in/
http://dyuthi.cusat.ac.in/
http://dspace.cusat.ac.in/jspui/
http://crdd.osdd.net/open/
http://npl.csircentral.net/
http://cecri.csircentral.net
Institutional Repository@CSIO
Institutional Repository of Intectual Contributions of Delhi
Technological University
E Knowledge Center
http://csioir.csio.res.in
http://www.dspace.dce.edu
DSpace@GIPE (DSpace @ Gokhale Institute of Pol. and
Eco.)
DSpace @ GGSIPU
Indian Academy of Sciences: Publications of Fellows
Eprints@IARI
http://dspace.gipe.ac.in
IACS Institutional Repository
http://arxiv.iacs.res.in:8080/jspui
ISBN 1-63102-455-8
http://ekcenter.fdrindia.org/
http://14.139.60.216:8080/xmlui
http://repository.ias.ac.in
http://eprints.iari.res.in
473
Role of Information Literacy in Curriculum
KrishiKosh ()
RAIITH
Dspace at IIT Bombay (DSpace@IITB)
http://krishikosh.egranth.ac.in/
http://raiith.iith.ac.in
http://dspace.library.iitb.ac.in/jspui/
Indian Institute of Astrophysics Repository (DSpace@IIA)
E-Repository@IIHR (Knowledge Repository of Indian
Institute of Horticultural Research)
DSpace at Indian Ins. of Manag.
Kozhikode (DSpace@IIMK)
Indian Institute of Management Kozhikode Digital Library
Institutional repository@VSL
Indian Institute of Petroleum Institutional Repository
Electronic Theses and Diss. at Indian Ins. of
Science (edt@IISc)
Open Access Repository of IISc Research Publications
Bhagirathi (IIT Roorkee Repository)
Research Archive of Indian Institute of Technology
http://prints.iiap.res.in
http://www.erepo.iihr.ernet.in/
openagri (Open Access Agricultural Research Repository)
EPrints@IITD
Librarians' Digital Library (LDL)
Kautilya Digital Repository at IGIDR (Kautilya@igidr)
eGyankosh
DSpace@INFLIBNET
http://agropedialabs.iitk.ac.in/openaccess/
http://eprint.iitd.ac.in/dspace
https://drtc.isibang.ac.in/
http://oii.igidr.ac.in:8080/jspui
http://www.egyankosh.ac.in
http://ir.inflibnet.ac.in
INFLIBNET’s Institutional repository
ShodhGanga: A reservoir of Indian theses
National Aerospace Laboratories Institutional Repository
DSpace@IMSC
DSpace at IUCAA
ICRISAT Open Access Repository (OAR)
http://ir.inflibnet.ac.in
http://shodhganga.inflibnet.ac.in/
http://nal-ir.nal.res.in/
http://www.imsc.res.in/xmlui
http://www.iucaa.ernet.in:8080/jspui/
http://oar.icrisat.org/
Eprints @MDRF
Eprints@SBT MKU
DSpace at M S University
Mahatma Gandhi University Theses Online
Management Development Institute - OAR (DSpace@MDI)
ePrints@MoES:Open Access Digital Repository
http://mdrf-eprints.in/
http://eprints.bicmku.in/
http://14.139.121.106:8080/jspui/
http://www.mgutheses.org/
http://dspace.mdi.ac.in/dspace
http://moeseprints.incois.gov.in/
OpenMED@NIC
NIRT Institutional Repository (EPrints@NIRT)
DRS at National Institute Of Oceanography (DRS@nio)
National Science Digital Library (NSDL)
NOPR (NISCAIR Online Periodical Repository)
Dspace@NITR
Eprint@NML
http://openmed.nic.in/
http://eprints.nirt.res.in/
http://drs.nio.org/
http://nsdl.niscair.res.in/
http://nopr.niscair.res.in/
http://dspace.nitrkl.ac.in/dspace/
http://eprints.nmlindia.org/
Osmania University Digital Library [OUDL]
DeepBlue Knowledge Repository@PDPU
RRI Digital Repository (Raman Research I. Digital
Repository)
Etheses - A Saurashtra University Library Service
dspace @ sdmcet
http://oudl.osmania.ac.in/
http://spmlib.pdpu.ac.in:8080/xmlui/
http://dspace.rri.res.in/
474
http://dspace.iimk.ac.in/
http://www.iimk.ac.in/gsdl/cgi-bin/library
http://vslir.iimahd.ernet.in:8080/xmlui
http://library.iip.res.in:8080/dspace
http://etd.ncsi.iisc.ernet.in/
http://eprints.iisc.ernet.in/
http://bhagirathi.iitr.ac.in/dspace/
http://raiith.iith.ac.in/
http://etheses.saurashtrauniversity.edu/
http://210.212.198.149:8080/jspui
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
DSpace@TU
Knowledge Repository Open Network (KNoor)
DSpace at Vidyanidhi
http://dspace.thapar.edu:8080/dspace/
http://dspaces.uok.edu.in:8080/jspui/
http://dspace.vidyanidhi.org.in:8080/dspace/
University of Mysore - Digital Repository of Research,
Innovation and Scholarship (ePrints@UoM)
Archives of Indian Labour
Vidya Prasarak Mandal - Thane
http://eprints.uni-mysore.ac.in/
http://www.indialabourarchives.org/
http://dspace.vpmthane.org:8080/jspui/index.jsp
Dspace at Vidyasagar University
http://14.139.211.206:8080/jspui/
Digital repository of West Bengal Public Library Network
http://dspace.wbpublibnet.gov.in:8080/jspui/
Table no. 1: List of OARs registered under OpenDOAR
Growth of OARs in India
Table no. 2 shows that growth rate of OARs in during the period 2004-2015. Growth rate of OARs is highest in
2006 and lowest in 2013 and 2015. In 2006, 11 repositories were added. This result reveals that the numbers of
OARs is not growing continuously with time.
Year
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
No. of OARs added
01
04
01
03
05
10
09
08
05
11
08
04
Growth Rate (%)
01.44
05.79
01.44
04.34
07.24
14.49
13.04
11.59
07.24
15.94
11.59
05.79
Table no. 2: Growth rate of Repositories (Year-wise)
Digital Library Software Usage
In India, OARs are rapidly growing with the help of open source softwares. The following table no. 3 depicts
that the DSpace open source software created by MIT libraries and HP Labs is the most widely used repositories
software among all the others. A total of 42 (60.86%) OARs running on this platform followed by Eprint open
source software 20(28.98%).
Software used
No of OARs
Dspace
42
Eprint
20
Others (Greenstone, Nitya, Drupal,
07
Calibre, Archilexturez, HTML,
Table no. 3.Digital library software usage of OARs
%age
60.86
28.98
10.14
Content Type
The developed open access repositories manage the repository contents by such as published papers, theses,
unpublished papers, conference proceedings, multimedia objects etc.The present study shows that a large
number of OARs have more than one type of content. Table No. 4 shows a clear picture of the content type of
the OARs of India.The data shows a total of 55 (79.71) OARs preserve published papers which is highest
followed by 31 (41.92) others (Multimedia objects, patents, software, learning object..etc).
ISBN 1-63102-455-8
475
Role of Information Literacy in Curriculum
Content type
No. of
OARs
55
%age
Published papers (Preprint, post print, conference
proceeding, research reports, book chapters.etc.)
Theses
29
Unpublished papers
22
Others (Multimedia objects, patents, software, learning
31
object..etc.)
Table no. 4: Content type-wise OARs
79.71
42.02
31.88
41.92
Repository Type
There are different types of repositories in India. The study reveals that most of the repositories are institution
based. A total of 44 (63.78%) repositories were created by an institutions/universities. Only 07(10.14%) &
05(07.24%) have been created respectively for e-theses & e-journals. Table no. 5 shows a clear understanding
of the result.
Type of repository
No. of
%age
OARs
Research Institutional/departmental
44
63.78
Research cross-Institutional
04
05.79
E-thesis
07
10.14
e-journal
05
07.24
Learning and teaching & others
08
11.59
Table no. 5: Repository type-wise open access repositories
Number of Digital Records
Based on data and statistics of table no. 6, it appears that there is a vast difference amongst the OARs in terms of
average number of digital records. Only 13 (18.84%) OARs have uploaded more than 10,000 digital records and
25 (32.23%) have uploaded less than 1000 digital records.
Numbers of digital record
No. of OARs
%age
Less than 1000 digital records
25
79.71
Less than 5000 digital records
22
42.02
Less than 10000 digital records
09
31.88
More than 10000 digital records
13
44.42
Table no. 6: Numbers of digital records available at open access repositories
Subject Wise OARs
Due to information explosion, universe of knowledge has been divided into many subjects. Study shows that
Science repositories are highest in number 30 (43.47%) followed by Engineering 20 (28.98%), Arts &
Humanities14 (20.28%), Medical Science 6(08.69%) and Agriculture, Food and Veterinary 2(02.89%). It is
clear from the present study that in most cases one repository archives more than one subject. Table No. 7 shows
detailed result of subject-wise repositories registered with OpenDOAR.
Subject
No of OARs
Agriculture, food and veterinary
2
Science (Physical & biological )
30
Medical Science
6
Engineering
20
Arts & Humanities
14
Table no. 7: Subject-wise Distribution of OARs
476
%age
02.89
43.47
08.69
28.98
20.28
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Some Other Findings
The present study finds some other results that cannot be shown in the tabulation form. These finding are given
below.
Only 37 open access repositories ( 53.62%) have working on OAI base;
Growth rate of OARs in India is quite low in comparison to the developed countries;
Only 8 (11.59%) open access repositories have learning objects and multimedia e-documents;
The open access repositories comprises mainly two type of search options viz., simple search and
advance search;
All open access repositories have Boolean search facilities and users can browse by author, title and
date;
Some Institutes have not provided total number of records;
All open access repositories are considered as same object of theses and dissertations.
CONCLUSION
Open access repositories are boon to the open access movement. It is now recognized as a necessary element to
answer the digital challenges due to the fund restrictions and soaring price of academic research journals. The
present study shows that the growth of OARs in India is much low in comparison to developed countries.
Therefore, awareness of creation of open access repository is essential and the funding agencies should have
mandatory open access so that creation of the repositories or depositing publications to the open access
repositories becomes compulsory. Now it is very obvious that the open access repositories are one of the best
option which can be used every universities/institutions to make their research output widely available and
accessible to the interested users throughout the world.
REFERENCES
Budapest Open Access Initiative (14 February 2002), "Budapest Open Access Initiative," available at:
http://www.soros.org/openaccess/read.shtml. Accessed on 15 June 2015.
[2] Chang, S.H. (2003), “Institutional repositories: the library’s new role”, OCLC Systems and Services, Vol. 19 No.
3, pp. 77-9.
[3] Crow, Raym (2002), The Case for Institutional Repositories: A SPARC PositionPaper, The Scholarly Publishing
and Academic Resources Coalition, Washington, DC, available at: http://www.arl.org/sparc/IR/ir.html.
http://www.soros.org/openaccess/read.shtml. Accessed on 15 June 2015.
[4] http://www.opendoar.org/find.php?cID=99&title.India.Accessed on 21 June 2015.
[1]
ISBN 1-63102-455-8
477
DIGITAL LIBRARY AND ITS ADVANTAGES
S. D. Singh | Galgotias Institute of Management & Technology | Greater Noida | U.P. |
sdsingh2008@gmail.com
Shrikrishan Thapliyal | Galgotias Institute of Management & Technology | Greater Noida | U.P. |
krishanlibrarian@gmail.com
Abstract: We are in the age of a networked society where IT in addition to its use in all spheres of
human activity has been used extensively to record; each and every Library is slowly getting
digitized. In the past few years procedures for digitalizing books at high speed and comparatively
low cost have improved considerately with the result that it is now possible to digitized million of
books per year. This article will discuss the factors that will necessitate those traditional libraries
to get digitized as well as the introduction, and its advantages of digital Libraries the field of
digital libraries will be limited if viewed only as a sub field of prior research interest to realize its
full potential, the field must be viewed as a union of sub field from a variety of domains combined
with additional goal..
KEYWORDS: Digital Library, Definition, Equipments. Advantages
INTRODUCTION
A digital library is a managed collection of information with associated services where the information is stored
in digital format and accessible over a network where is it require, digital library is an organized collection of
digitalized in digital form which can be accessible by a computer on the network by using any protocol. The
majority of the holding of a digital library is in the computer readable form and also acts as a point of access to
other online sources. Digital libraries are being created today for diverse communities and in different field e.g.
education, science, culture, health etc. library automation has helped to provide easy access from any collection,
different library is a collection of digital documents like books, journals, images, maps, video, and audio with
methods of access and retrieval. We are in the age of a networked society where information technology is
addition to use in all spheres of human activity has been used extensively to record. Large amount of electronic
data stored and preserve. A digital library preserves the rare document as well as a good portion of printed
literature that would be of significant relevance to the society today. Digital libraries have received wide
attention in the recent years allowing access to digital information from any where across the world. In the past
few years procedures for digitalizing of books at high speed and comparatively low cost have improved
considerably with the result that it is now possible to digitize million of books per year, the term which have
been vogue at different time include; paperless library, electronic library, virtual library, libraries without
boundaries and more recently digital library.
The term digital library is used to refer to a system whose function is to extend electronic access. The digital
libraries mean different things to different people.
A digital library would maintain a major part of its collections in computer, a digital library has a strong
presence on the internet with a have page for the library providing an integrated access interface.
WHAT IS DIGITAL LIBRARY?
Digitalization is the part of computerization, digitalization means; there we can find the information through
computer in digital form. Digital library, a global virtual library, is a library of thousands of networked
electronics libraries.
A digital library is a collection of digital objects a collection of research papers is a typical example, when this
collection get significant large user of digital library can not examine each paper individually to find if its
subject interest them, to address this problem. Digital librarians create an interface to stand between the content
of the collection and the user.
478
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
On CD ROM, the amount of data limited to several hundred megabytes per disk, but access is generally much
faster than on an internet connection, several CD ROM can be combined in a set and because the disk are small ,
a large libraries can physical space.
In the past, the problems had been involved in that digital libraries have been very expensive to develop, this is
become people where programming them all from scratch. Lot of people and organizations has digital
collections, why should each digital library be a reinvention of the wheel? Another problem is interoperability,
where many organizations have collections. Digital library contain diverse information for use by many
different users. Digital libraries range in size from tiny to huge they can use any type of computing, equipment
and any suitable software, the digital libraries are organizations that provide the resources; including the
specialized staff to select, structure, offer, intellectual access to interpret distribute. Preserve the integrity of, and
ensure the persistence over time of collections of digital work so that they are readably and economically
available for use by a defined community or set of communities. Digital library is an organized searchable
collection in digital format, and then the future of digital libraries will reflect a more toward integrated service
functions and collection development and management similar to the traditional library organizations.
DEFINITION
Digital libraries are very different from traditional libraries yet, is other they are remarkable similar people do
not change because new technology is invented they still create information on that has to be organized, stored
and distributed, they still need to find information that others have created and use it for study, reference or
entertainment.
A digital library is a machine readable representation of materials which might be found in a university library
together with organizing information intended to help users find specific information. A digital library service is
an assemblage of digital computing, storage, and communicating machinery together with the software needed
to reprise emulate, and extend the services provided by conventional libraries based on paper and other materials
means of collecting, storing, cataloguing, finding, and disseminating information (Edward A. Fox)
A digital library is a special library with focused collection of digital objects that can include text, visual
materials, audio materials, video materials stored, an electronic media format along with means for organizing,
storing and retrieving the files and media contain in the library collections.
Figure1. Great advantages of digital libraries
ADVANTAGES
The advantages of digital libraries as a means of easily and rapidly accessing books, archives and images of
various types are now widely recognized by commercial interest and public bodies alike. Traditional libraries
are limited storages space, digital libraries have the potential to store much more information the uses can get
ISBN 1-63102-455-8
479
Digital Library and Its Advantages
his/ her information on his own computer screen by using the internet. The unprecedented of activities in digital
library can be attributed.
The digital library offers significant and value addition to library services improved information retrieval and
enhanced document delivery of digital libraries. Digital libraries greater access to digital contents can be
managed and provide a way to enrich the teaching and learning environment. Digital library systems can be
accessed simultaneously. Libraries have marched hand in hand adapted and adopted themselves, when any new
technology has evolved paving way for electronic libraries , networked libraries, digital libraries, virtual
libraries etc.
Networking
Digital library can provide the link to any other resources of other digital library very easily, sharing can be
achieved.
Space
Whereas traditional libraries are limited by storage space, just digital library and digital information requires
very little physical space to contain the term. Traditional libraries have always been centered in physical space
with physical collection.
No Physical Boundary
User of digital library need not go to the library physically, all the users can get their beneficial information all
over the world from an internet, and it’s very useful to digital library users.
No Time Boundary
Traditional library maintain the time table but digital library provide the information any time, users can access
any time with any information in across the world.
Access Approach
Digital library provides access to much richer contents in a more accessible; they can easily more from
catalogue to the particular book then to a particular topic or other.
Information Retrieval
Modern approach to information retrieval from a computer, digital library provide very user friendly, interfaces,
then giving click able access to its resources, search can be based on metadata and on full-text (or other content
based indexing)
Multiple Accesses
The same resources can be used at the same time by a number of users.
Easily Accessible
Others
On-line library catalogue through internet gives access to bibliographic records of million books and
details of holding of academic and research.
Help the libraries go get recent publication from the publishers.
Help in resources sharing facilities.
It saves the library manpower and funds.
Help inter library loan.
Help to search information to their users at faster rate through online communication.
Researchers and scientist will get information with minimum time.
The digital library is ideal in support of students receiving their schooling using distance learning
education.
Digital library need not be dependent on each user having a particular type of computer or even a
computer at all.
480
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Digital libraries can be customized so user can have access to what they want and need to use.
E-Publication data can be maintained up to date so that the buyer will be able to purchase the latest
version of publications.
PRIMARY EQUIPMENTS FOR DIGITAL LIBRARY
These components are very essentials to create digital library. The noted below are the requirement of digital
library as follows:
Desktop computers with supporting accessories
Input capture devices: Scanner and Digital Camera.
Printer
CD/DVDs or other external storages devices
UPS (Uninterrupted power supply) high power
24 hour cable for networking
Converter
Networks
Multimedia Interface
Software
The software requirements of digital library as indicated below:
Linux operating systems
Digital library software like GREENSTONE and D-SPACE
Editing Software
Human Ware
The key skills are required for digital library staff as indicated below:
Management skill
Technical skill
Subject skill
CONCLUSION
Day by day the cost of digitized is decreasing, online publication automated increasing. Slowly all the libraries
would be digitalized in the country. Digital India Week in being celebrated across the nation these days, digital
India is an ambitious program of the GOI to make India a digital country; digitalization consolidates the security
systems of a library and makes its study materials available to a large number of users GOI said. Digital libraries
are amongst the most advance form of information systems; as such development of digital libraries requires
integration of many information technologies. The digital libraries are emerging as a growing interdisciplinary
area of research and education for information communication technology, computer science, and library
science.
REFERENCE
[1] https://en.wikipedia.org/wiki/Digital_library
[2] Trivedi Mayank: Digital libraries: functionality, usability, and accessibility. Lib.Phil.Pract., 2010.
http://www.webpages.uidaho.edu/~mbolin/trivedi-diglib.htm.
[3] Arora Jagdish: Building Digital Libraries: An Overview (DESIDOC Journal) publications.drdo.gov.in ›
Home › Vol 21, No 6 (2001)
[4] Use of multiple digital libraries: a case study - uclic,
[5]
www.uclic.ucl.ac.uk/annb/docs/abhsnbkJCDL.pdf
[6] Jharotia, Anil Kumar “Empowering Knowledge for all: Role of Digital Library” published in the
proceedings of the International Conference of Indian Library Association held on 12-15 Nov.2008.
http://librarydotcom.webs.com/researchpapers.htm
[7] Arms, Williams Y., “Digital Libraries”, Cambridge, MA: The MIT Press, 2000.
ISBN 1-63102-455-8
481
POWERING EDUCATION WITH MOBILE TECHNOLOGY
THROUGH M-LEARNING
Vijay Laxmi | Library Incharge (Professional Assistant) | Department of Social Work | University of Delhi |
chetanutkarsh1996@gmail.com
Anil Kumar Jharotia | Librarian | Tecnia Institute of Advanced Studies | GGSIP University | Delhi |
aniljharotia@yahoo.com
Abstract: In many ways, mobile technology is motivating the younger generation to use modern
gadgets for learning purposes. Mobile library services can meet people's needs for information in
a fast-paced society. Latest technological developments present an overview of trends in mobile
tools and applications for libraries, including the internet mobile, mobile multimedia and SMS etc.
This paper focused on application of mobile computing and its possible applications that can be
mobile with library services on the web based environment. This study may be helpful in
identifying and generating mobile based service for libraries.
Keywords: e-Learning, ICT, Library Services, Mobile Learning, Mobile Technology.
INTRODUCTION
M-learning as a phenomenon has been in process, unintentional progress since the late twentieth century. The
unintended consequence of smaller and faster computing is the enabling of an anywhere and anytime learning.
In the course of scientific discovery products are produced which have novel application that are wholly
unintentional.
This is the unplanned nature of science –
phenomena occur and exist before being named and
investigated. Students learn through new technology
before educators have inquired to their attributes. In
this way we now play a game of catch-up.
Fig.1: M-Learning
The world today is a technology-driven place to
dwell in where the age of machines has taken over
and has definitely ensured a comfortable life for us.
The ability of mankind to use science in an efficient
way has led to many inventions and opened up
myriad possibilities to explore. We all live in the
digital smart age where we have access to
technology at our fingertips. Things that we thought
to be impossible to achieve back then have been
made possible now as we have eliminated the time
and place factor.
Today, as a result of developments and advancements in information and communication, the mobile
technology becomes essential for connecting with internet. Users are currently more positive about accessing
and seeking information from their mobile phones. Mobile is a device through which people access their
information and do business. With the recent advancement of mobile technologies, such as smart phones, digital
cameras and PDAs (Personal Digital Assistants), and tablet PCs mobile learning provides opportunities for
formal and informal education in a wide range of settings.
DEFINITION OF MOBILE LEARNING
According to Wikipedia, mobile learning can be defined as "Learning across multiple contexts, through social
and content interactions, using personal electronic devices." It's really the same concept of eLearning only the
482
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
electronic media platform is specifically clarified as personal devices or portable technology. With this type of
learning, employees or students have the ability to access training content anywhere they can use their mobile
device.
The exploitation of ubiquitous handheld technologies, together with wireless and mobile phone
networks, to facilitate, support, enhance and extend the reach of teaching and learning
Harris’s (2001) defines it “M-learning is the point at whit mobile computing and E-learning intersect to
produce an anytime, anywhere learning experience.”
Hoppe, Joner (2003), “M-learning is e-learning using a Mobile device and wireless transmission.”
WHAT IS M-LEARNING?
Mobile learning is the ability to obtain or provide educational content on personal pocket devices such as PDAs,
smartphones and mobile phones. Educational content refers to digital learning assets which includes any form of
content or media made available on a personal device.
Fig.2: Meaning of M-Learning
Mobile learning involves the use of mobile technology, either alone or in combination with other information
and communication technology (ICT), to enable learning anytime and anywhere. Learning can unfold in a
variety of ways: people can use mobile devices to access educational resources, connect with others, or create
content, both inside and outside classrooms. Mobile learning also encompasses efforts to support broad
educational goals such as the effective administration of school systems and improved communication between
schools and families.
Enterprise mobility
With the introduction of cloud-based systems, the term “enterprise” that was used earlier with a limited group of
people or companies has extended its reach to small and medium sized organisations. Education is the new kid
on the block and this sector is experiencing technology transformation in almost every area. Be it providing
digital training, conducting online examinations or anything in between, we’ll experience technology adoption
in every area going forward.
Enterprise mobility may seem to be an intimidating jargon, but if one can imagine students sitting at home and
watching videos of their teacher explaining scientific concepts on their tablets, or think about college students
finding their next class location on their handhelds, it becomes more tangible.
System of Learning
From the days of the Gurukulas to the high-end schools and colleges, we have come a long way, not only
through breakthroughs in infrastructure but also in the concept of education as a whole. We have gone through
the system of writing and memorising in copies to storing digital notes on a high-end device. In India, we are
ISBN 1-63102-455-8
483
Powering Education With Mobile Technology Through M-Learning
slowly witnessing mobility solutions being introduced into our education system. One can now find lectures
delivered online and presentations created and transferred through internet or applications in a secured way. The
idea has already been solidified and several mobile apps are being built to access this information.
Mobile devices have made the world smarter for students. They can reduce the time and money with the support
of these devices, as they don’t have to travel anywhere to get in touch with teachers or their institutes. Institutes
and colleges are using the mobile solutions in order to make learning fun, accessible and environmentallyfriendly for their students.
Learning is a never-ending process and mobile applications are being developed to meet the learning needs with
respect of time and money. Universities can manage students’ data, which consists of attendance, admission
status, fees, performance report, and results using mobility solutions. It is tedious to manage the details like class
schedules, teacher schedules, event management, class roster, discussions and announcements for the institutes,
schools and universities. Therefore, a right solution is needed to cope with these upcoming challenges. Now,
students can read books on mobile through mobile App namely “Rockstand” which free available on Apps Store
in smart mobile.
Mobile Education
Mobility solutions have brought about a paradigm shift in the education industry. When we compare the
learning process of students with earlier days, there has been a remarkable change today. Earlier, it was
necessary for students to attend colleges and schools to gain knowledge. The teacher and the classroom were the
only platforms for students to learn new things and then there was the age and time-limit for students to learn
new things. Mobile technologies have made it possible for anyone to learn without taking location into
consideration.
Today, there are many software and mobile application development companies which are providing mobile
applications for institutes and colleges to streamline their learning practices. These solutions are proving to be
productive and effective mobile learning for students and teachers. Videos pause as soon as the student takes her
eyes off the screen, the device vibrates to bring the student’s attention back to the material, and teachers get
feedback on which parts of their video lecture the students had the most difficulty with. Students can also create
their knowledge graphs and based on their past learning and use the mobile app to receive recommendations on
what courses to pursue next and this is just the beginning.
To conclude, like in all the other fields, enterprise mobility has transformed the education sector as well, with
educational institutes, teachers and students benefiting significantly from this uber popular movement.
Recognizing the gravity of its essence, IT companies have also made notable contributions, helping educators to
leverage education apps, software and mobile devices in conveying information among the students. It is
definitely the magic of mobility that has motivated the younger generation to use modern gadgets for learning
purposes along with traditional textbooks.
Mobile Phones and Library Services
For some years now, people have been creating applications which can be downloaded to mobile phones in
addition to the software supplied with them. Examples include mapping software, games, mobile email clients
and software which provides a way of uploading photos or other content to the user’s blog or social networking
accounts. Until recently the take-up for these applications was relatively low, but iPhone users download a great
many more applications than owners of other phones
ICT has collapsed barriers and promoted fast communication and interactions across boundaries. The need to
meet life's basic challenges and responsibilities has informed the invention and the use of information
technologies. Libraries are deeply interested in channels for the transmission of information, such as telephones
and telephone lines, cellular networks, cable television, and the Internet. The Internet and World Wide Web
(www) have made it possible for university teachers, researchers, and students to locate what they need without
going to the library. Most academic libraries have started exploring the viability of Internet technologies. These
would support library-to-user, user-to-library, and user-to-user online interactions.
484
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Mobile Technology in Libraries
Mobile technology has now come up with “Libraries in hand” trend. Our librarians are in move to mobile
determine how these devices are affecting information access and ensure that they are communicating with
patrons and providing web content in the most appropriate and effective ways.
Our librarians must be prepared to take this
challenge and put this effort to increase the
market and demand for mobile access to
personalized facts and information anytime,
anywhere on one s own handheld device.
Since mobile handled devices truly are
personal devices, search histories and
physical locations can be harnessed to
produce more accurate, individualized
information and services users on the go don’t
want to wait for list of web result, libraries
today are covering most of the technologies
given by mobile industry like PDA s
Blackberry, iPod, Cell Phones, UM PC s
(ultra mobile PC) and mobilizing library
contents in a portable from suit able for small
screen and delivering short service in the form
of contents/information with device s multiple
Fig.3: M-Technology in Library
searching features. Librarians will need to
become proficient in using these devices to
enable users to access them anywhere from anytime and anyplace.
HOW ANDROID APPLICATION HELPFUL TO USERS?
They can Search the collection, View new arrivals and also access their account.
Users can reserve books as well as request a book for check out from their mobile phones.
Users can renew items from their mobile.
If library server has a public domain IP then your users can access from their homes using GPRS/Wifi
facility on their mobile.
If library server is only accessible via LAN then your users can access within the LAN using their Wifi
facility on their mobile.
Users can now access library from their Smart phones.
ADVANTAGES OF USING MOBILE IN LIBRARIES
Mobile phones and other mobile technology devices have created a way for library and users.
Mobile technology is helping services providers increase habitual users. Library provide the
increasingly using the complexity of their supported mobile technology to attract new users and retain
old ones.
The user can also sent request for ILL, reference query, suggestions and complains. Libraries will also
reply the same though automatically mail and Short Message Services.
Users can read m-book on smart phone and tablet through “Rockstand” mobile App which free
download from ‘Google App Store”.
CONCLUSION
Libraries are moving forward in providing access to digital collections via mobile devices. In the near future,
more and more people will be able to experience digital collections in the palm of their hand through a mobile
phone. No longer do visitors have to visit a library to find a computer with internet access. In order to meet these
requirements, libraries are also facing some challenges. Though mobile communication technology is not a
problem, our librarians should know how to use this technology to serve our readers. We have to think about the
ISBN 1-63102-455-8
485
Powering Education With Mobile Technology Through M-Learning
access authority to our data bank, otherwise the may be a tort incurred. How to find a proper operator whose
gateway is trustworthy to cooperate with us. Besides, user interfaces are nearly always varied and lack of
standards. We have several operators and it’s laborious to develop services. Now, Users can read books on
smart phone through m-learning.
REFERENCES
[1] Brown, J. S., Collins, A., & Duguid, P. (1989). Situated cognition and the culture of learning. Educational
Researcher, January-February, 32-42.
[2] Donald, J. (1995). Disciplinary Differences in Knowledge Validation. In N. Hativa & M. Marincovich (Eds.),
Disciplinary Differences in Teaching and Learning: Implications for Practice (pp.7-18).
[3] Entwistle, N. (1997). Introduction: Phenomenography in Higher Education. Higher Education Research &
Development, 16(2), 127-34.
[4] Fairweather, P.G. & Gibbons, A.S. (2006). Introduction to special issue on learning objects. Educational
Technolocy, 46(1), 7-9.
[5] Jharotia, Anil Kumar (2012). “M-Learning is the future of e-learning: A new dimension in library services”
Conference proceeding of National conference on beyond librarianship: Search for new frontier held at G.B.U on
21-22 Sept. 2012. Vol-1 pp.203-210.
[6] Kroski, E. (2008), "On the move with the mobile web: libraries and mobile technologies", Library Technology
Report, Vol. 44 No. 5, p. 38.
[7] Kirschenman, J. (2001). The Electronic Prometheus and its Consequences for Art Education. International Journal
of Art & Design Education, 20 (1), 11–18.
[8] Kearsley, G. (Ed.) (2005). Online learning: Personal reflections on the transformation of education. NJ:
Educational Technology Publications.
[9] Naidu, S. (2005). Researching Distance Education and E-learning. In C. Howard, J. V. Boettcher, L. Justice, K.
Schenk, P. Rogers, & G. A. Berg (Eds.), Encyclopedia of Distance Learning, Volume 1-IV, Pages 1564-1572, Idea
Group, Inc.: Hershey PA.
[10] Newspaper “Financial Express”, 29 June 2015
[11] Stahr, Beth (2009), “SMS library refrence service options” Library Hi Tech News, Number 3 / 4: pp.13-15.
[12] Traxler, J. (2005). Use of mobile technology for mobile learning and mobile libraries in a mobile society, p. 44, In
G. Needham and M. Ally (Eds.). M-libraries: Libraries on the move to provide virtual access, Facet, London.
Websites
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
486
http://www.m-learning.org/knowledge-centre/whatismlearning
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.1087
http://emeraldinsight.com/
http://blog.galaxyweblinks.com/wp-content/uploads/2012/06/M-learning.jpg
http://1.bp.blogspot.com/_9WwRmOHZKHA/TM14kNeQWHI/AAAAAAAAAF4/mw2eufAgJQ/s1600/mLearning-Feature-Sets.png
http://www.upsidelearning.com/blog/wp-content/uploads/2010/06/mLearning_wordcloud-e1277286032624.jpg
http://www.upsidelearning.com/blog/wp-content/uploads/2010/07/mobile_learning_demand1e1280413173331.jpg
http://www.dashe.com/blog/wp-content/uploads/2012/02/mlearning-v-elearning-devices4.jpg
http://kevincorbett.com/wp-content/uploads/2012/06/mobile-learning-kc.jpg
http://edpstuff.blogspot.in/p/edp-in-mobile.html
http://mtotowajirani.com/wp-content/uploads/2010/09/mobile-2.0.png
http://librarydotcom.webs.com
http://www.litmos.com/training-platform/mobile-learning-definition
http://www.ifets.info/journals/13_3/3.pdf
http://www.mobl21.com/Basics_Of_Mobile_Learning.pdf
http://www.unesco.org/new/en/unesco/themes/icts/m4ed/
ISBN 1-63102-455-8
WEB 2.0 APPLICATIONS IN LIBRARY SERVICES: SPECIAL
FOCUS ON LIBRARY & INFORMATION SCIENCE BLOGS
B.Vijayalakshmi | Librarian | Sarada Library | Sri Sarada College for Women | Tirunelveli | vijayanew@gmail.com
Dr.A.Thirumagal | University Librarian | Manonmaniam Sundaranar University | Tirunelveli
Abstract: Web 2.0 is defined intersection of web application features that facilitate participatory information
sharing, interoperability, user-centered design and collaboration on the World Wide Web. The purpose of this paper
is to highlight the importance & ease use of web 2.0 tools on Library Services. Web 2.0 helps to bridge between
digital divide of different types of Users. It provides new Learning Environment to the users. This paper focuses on
Blogs. Blog platforms provide easy and convenient website management and can be used to produce attractive
websites with great features. It could be used in Libraries to provide Modern Library Services.
Keywords: Web2.0, Library 2.0, ICT on Library Services, Innovative Library Services, Blogging
INTRODUCTION
Web 2.0 is defined intersection of web application features that facilitate participatory information sharing,
interoperability, user-centered design and collaboration on the World Wide Web. A Web 2.0 site allows users to
interact and collaborate with each other. In Web2.0, Blogging is an important tool to use easily. Blog platforms
provide easy and convenient website management and can be used to produce attractive websites with great features.
Other website publishing options require cost, in-depth knowledge of HTML coding, and/or complex web
publishing software. So that with the help of a blog, Librarians can promote library's services, resources, and
programs online.
WEB 2.0 APPLICATIONS IN LIBRARY SERVICES:
Web 2.0 technology is creating a more “Interactive” environment for scholarly communication. Through social
media, researchers have more routes to express their ideas. They may present their opinions not only in writing but
also through multimedia, including audio, broadcast, video, photo and so on. “Knowledge sharing” is one of the
motivations of scholarly communication. To them, web 2.0 is a multidimensional which enables knowledge sharing
to satisfy the needs of researchers in their discussions and communications with others on interdisciplinary subjects.
A variety of Web 2.0 communication tools help to save researchers energy and offer wider channels to
communication processes. Librarians can use the internet to communicate, share ideas and offer support for a long
time through use of web2.0 tools which present opportunity for large scale professional collaboration and
cooperation.
Web 2.0 tools are weblogs, wikis, podcasts, RSS feeds, photo-sharing, social bookmarking, instant messaging,
social media networks and so on. Librarians can provide virtual learning environment by online access. OPAC,
WEBOPAC are very useful to the Users. Librarians need to acquire skills to effectively utilize web 2.0 tools & they
have to impart skills for the users to use these tools effectively. These Library Services attract the non visitors of the
Library also to use Library Services at their home.
IMPORTANCE OF USING WEB 2.0 FOR LIBRARY SERVICES:
The applications of web 2.0 can broaden the walls of the Libraries. It allows Users to comment, review and re-use of
information or service with the application of web 2.0 tools. So that, Librarians can gets the feedback from the users
without any formal procedures. Thus the users also can express their views or needs to the Librarian without any
hesitation or any other barrier. Library 2.0 is the product of application of web 2.0 tools in libraries. Library 2.0 was
first coined by Michael Casey in his blog Library Crunch. According to the use of Web2.0 tools in library activities
is known as Library 2.0.
ISBN 1-63102-455-8
487
Web 2.0 Applications In Library Services: Special Focus On Library & Information Science Blogs
Blogging:
The word blog is a contraction of "web log", a phrase not so commonly used these days. The term "weblog" was
coined by Jorn Barger on 17 December 1997. In the simplest definition of the term, a blog is a log of your thoughts,
ideas, useful links, photos, videos, or the latest news.
Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other
material such as graphics or video. Entries are commonly displayed in reverse-chronological order. Most blogs are
interactive, allowing visitors to leave comments and even message each other via widgets on the blogs and it is this
interactivity that distinguishes them from other static websites.
Many blogs provide commentary or news on a particular subject; others function as more personal online diaries. A
typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The
ability of readers to leave comments in an interactive format is an important part of many blogs. Most blogs are
primarily textual, although some focus on art (Art blog), photographs (photoblog), videos (video blogging), music
(MP3 blog), and audio (podcasting). Microblogging is another type of blogging, featuring very short posts.
Posts are actually arranged in reverse chronological order, which means that when you visit a blog on the web, the
latest story will appear at the top of the website, and the earlier ones will descend in order beneath it, by how
recently they were published to the web.
Online Blogging Platform: An online blogging platform is the software you use to publish your content to the web.
Just as you might have a choice about which word processor or web browser to use, there are also a range of
different online blogging platforms available to you.
Hosted Blogging Platforms: By far the easiest way to get started is a hosted blogging platform. The most popular
choices here are Blogger.com and WordPress.com. Both of these services are free to use, and you can start a blog
very easily, with a minimum of setup.
Themed Blog Sites
Blogabond.com – A site dedicated to travel blogs with map integration and more.
BlogCheese.com – A video blogging website.
BusyThumbs.com – A blog site specifically for your text messages and camera phone images.
Freelog – Designed for video blogging and completely free.
Trippert.com – Create and share blogs of your travels.
Ufem.com – Blogging site specifically geared towards women. It offers multiple themes and plugins.
Xanco.com – Another moblogging site for you to share all your mobile communications with friends and family.
WordPress Powered
Blogetery.com – Offers multiple templates, anti-spam, free sub-domain and more.
BlogRox.com – Runs on WordPress and offers 50MB of free online space.
Blogsome.com – Based out of Ireland, this site uses the WordPress MU platform, large choice of themes.
Edublogs.com – WordPress powered blogging for educators.
WordPress.com – Not only can you install WordPress on your own sites, you can use the same software on their site
and save yourself all of the technical work.
Blog Applications in Library Services:
All the Web 2.0 applications can be implemented through Blogs. It facilitates the Librarian to provide various
Library Services through online. Some ways are explained below.
Library Events: In the blog, we could publish our Library Events to the Users & the world.
Announcements: In the blog, Librarian could give important announcements which need to be circulated.
488
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Web OPAC: Web OPAC is a library catalog on the Web or Intranet. Users can search the required information by
connecting to Uniform Resource Locator (URL) of Web OPAC anytime during the day and from anywhere in the
world.
Gallery: Librarian could upload photos in the Blog. Thus we could attract the Users towards our Blog.
Alerts: In the Blog, we could publish important News Alerts, New Books Alerts & so on.
Fresh Picks: Library Resources could be updated online for the benefit of the users.
FAQ: Frequently Asked Questions could be updated in the Blog. So that Users could know about the Library Rules
& Regulations.
Useful Links: Useful Links could be added to the website. So that Users could get connected to the world wide web
through Library blog.
Online User Survey: Librarian could take user survey online. So that, library resources & services could be
enhanced.
Feed Back: Librarian could get feed back online. A form could be created for getting feed back.
RSS: Rich Site Summary is a format for delivering regularly changing web content. It allows users to easily stay
informed by retrieving the latest content from the sites interested in. Users save time by not needing to visit each site
individually.
E Mail Alert service: It is email updates of the automatic delivery of latest relevant information at the mail box.
Through this, Librarian can send Library News & Events, New Arrivals, Any Announcements at the User’s desktop.
SMS Alert Service: Short Message Service (SMS) is a text messaging service component of phone, web, or mobile
communication systems, using standardized communications protocols that allow the exchange of short text
messages between fixed line or mobile phone devices. Through this, Librarian can connect with the Users while they
are mobile.
E-mail reference Service: Through this Users can ask Queries from anywhere. Librarian could publish the e-mail
address in the blog.
Telephone Reference: Users can ask Queries to the Librarian over phone. Librarian could publish the telephone
number in the blog.
Chat Reference: Users can ask the Librarian online. They could get reply immediately.
User's Magazine Online: Here we could publish User’s articles online. So that Users will be happy to see their
work online.
Carrier Guidance: Librarian could give carrier Guidance & various opportunities online for the benefit of the
users.
Educational Guidance: Librarian could give Educational Guidance online by creating separate link for Educational
Guidance.
Multimedia: Librarian could upload Audio & Video files through Blogs regarding Library.
ADVANTAGES
Blogs can be updated online from any computer with internet access. This can be a big advantage for Librarians who
want to be able to make frequent updates to their website. Some plug-in allow for automatic updating of Twitter,
Face book, and other social networking / social bookmarking sites. This has the advantages of both increasing our
exposure and providing our website with valuable back links that will enhance Library Blog’s presence on the
search engines. Probably the primary reason to consider using a blog platform for Library is the ease in making
changes and updates. Content can be added quickly and easily, including text, images, audio, and video. It can also
be quickly made radical changes in the appearance of the blog by changing just the master settings of readymade
templates.
PROBLEMS OF BLOGS
ISBN 1-63102-455-8
489
Web 2.0 Applications In Library Services: Special Focus On Library & Information Science Blogs
Following are some of the problems may arise due to the use of blogs; hence library staff has to be careful about
these aspects,
Copy right issues related to information being published on a blog.
Confidentiality of information.
CONCLUSION
Michael Casey’s vision was a with the advent of Library 2.0, the transformation of librarian’s role and library
services that the shift would result in taking the traditional library to the next level of course the virtual library.
Especially, Blog platforms provide easy and convenient website management and can be used to produce attractive
websites with great features. It could be used in Libraries to provide Modern Library Services. So that Librarian
could reach & attract the Users towards Library. As Blog is visible to the world, Librarians could expose the Library
Resources, Services & Activities to the World. Thus, Web 2.0 tools are important tools for Librarians to provide
right services to the right users.
REFERENCES
[1] Abungu, P. S. (2012). Application of Web 2.0 tools in Delivering Library Services: A Case of selected Libraries in
Tanzania. Retrieved 2015, from SCECSAL XXth Conference hosted by KLA on 4th-8th June 2012:
https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&cad=rja&uact=8&ved=0CEMQFjAF&url=
http%3A%2F%2Fwww.researchgate.net%2Fprofile%2FPaul_Muneja%2Fpublication%2F258831592_Application_of_
Web_2.0_tools_in_Delivering_Library_Services
[2] Bansode, S. Y., & Pujar, S. M. (2008). BLOGS: A Online Tool for Library Services . Retrieved 2015, from
International CALIBER-2008: http://ir.inflibnet.ac.in/dxml/bitstream/handle/1944/1269/48.pdf?sequence=1
[3] Chua, A. Y. (2011). e journals. Retrieved 2015, from Evidence Based Library and Information Practice:
http://ejournals.library.ualberta.ca/index.php/EBLIP/article/view/9474/7860
[4] Karami Tahereh, T. O. (2006). THE 27TH ANNUAL CONFRENCE: Embedding Libraries in Learning And Research.
Retrieved 2015, from eprints: http://eprints.rclis.org/10824/1/IATUL_Paper2.pdf
[5] Kulkarni, S. N. (2003). Web OPAC: An Effective Tool for Management ofReprints of ARI Scientists. Retrieved 2015,
from Inflibnet: http://ir.inflibnet.ac.in/dxml/bitstream/handle/1944/225/cali_56.pdf?sequence=1
[6] Prasad, H. N., & Singh, S. (2008). Blogs Application in Developing Library & Information Services. Retrieved 2015,
from International CALIBER-2008: http://ir.inflibnet.ac.in/dxml/bitstream/handle/1944/1273/49.pdf?sequence=1
[7] http://www.masternewmedia.org/independent_publishing/blogging-how-to-blog/guide-to-publishing-first-blog20071104.htm
[8] http://www.whatisrss.com/
[9] http://en.wikipedia.org/wiki/SMS
[10] http://en.wikipedia.org/wiki/Web_2.0
[11] http://en.wikipedia.org/wiki/Blog
[12] http://librarykvpattom.wordpress.com/
490
ISBN 1-63102-455-8
APPLICATION AND USES OF INFORMATION
COMMUNICATION TECHNOLOGY (ICT) IN ACADEMIC
LIBRARY, SHIATS, ALLAHABAD: A STUDY
Monisha Gray | Assistant Librarian | Sam Higginbottom Institute of Agriculture Technology & Sciences |
Allahabad | monisha.gray@shiats.edu.in
Abstract: The papers also determine the satisfaction level of users regarding research work,
online database services and infrastructure facilities. Suggestions have been given to make the
service more beneficial in the library users of FHS Shiats. Allahabad.
Information Communication Technology (ICT) in fact is changing the way the librarian view
information sources. Professional associations, research organizations publisher is treated as the
speedy, accurate and effective way of communication among academic, research, executives and
business communities. Hence, internet for information service/ current awareness service in
the library is gaining momentum and becoming popular too. It is also true that internet has
become a part of library environment today. Information and Communication Technology (ICT)
has transformed library services globally. Most current information are recorded in electronic
format, ICT has also contributed immensely to the performance of librarians in the discharge of
their duties such as in cataloguing, reference services, circulation management, serials control
etc. ICT has contributed to the library in the following specific ways.
Keywords: ICT, Social Media, Mobile, Library.
INTRODUCTION
ICT has changed the traditional methods of library activities and services providing new dimensions for
teaching, learning and research in higher educational institutions. With the help of ICT tools, it is possible
to store, retrieve, disseminate and organize information by creating websites and databases. Information is
now published both electronically and by print making it accessible to users according to their demands. It is
important to assess the ICT applications in library and information centers in the 19 context of changing
user needs. This section includes studies related to the application of ICT in libraries both in India and abroad.
Now in the present time user information software also working the fist user is in a Delhi and second user in
Allahabad that operate computer or laptop. This is very important for a Academic Libraries & users Information
and communication technology (ICT). It plays a vital role in bringing about changes This age of ICT the role
of the public library has changed drastically in developed countries. They are providing more cultured and
user friendly information services to their patrons. In this view, Academic libraries in developing
college & universities are using these facilities very slowly due to shortage of funds, skilled manpower
and other support.
REVIEW OF LITERATURE
Hussain and Abalkhail (2013) The study clearly revealed that the majority of users of the library used the
circulation service. The study found that a majority of research scholars consult the reference books for
research work followed by undergraduate students who used the library circulation service.
Antherjanam & Sheeja (2008) carried out a study to find out the impact of ICT on LIS and its major shifts
and practices in university library of CUSAT. The major findings of the study were:(a) Users are making
very good use of the available ICT facilities.(b) With the help of telephone, e-mail, Fax etc. reference queries
are answered faster than before.(c) SDI, CAS etc. are also done faster than before.(d) Issue & return of
books, renewals are done faster than before.(e) Book selection, price checking are also done very efficiently
using ICT.(f) About 90% of the users of the library search OPAC for getting information about the where about
of books.
NEED FOR THE STUDY
ISBN 1-63102-455-8
491
Application And Uses Of Information Communication Technology (ICT) In Academic Library, SHIATS, Allahabad: A
Study
Education is a lifelong process therefore anytime anywhere access to it is the need Information explosion is an
ever increasing phenomena therefore there is need to get access to this information Education should meet the
needs of variety of learners and therefore IT is important in meeting this need It is a requirement of the society
that the individuals should posses technological literacy We need to increase access and bring down the cost of
education to meet the challenges of illiteracy and poverty-IT is the answer
OBJECTIVES OF THE STUDY
To find out the applications of ICT skills in LIS professionals to modernize the libraries.
To understand how ICT tools can be applied to provide, Innovative services to the users.
To analyze the barriers in collection of e-resources in academic libraries.
To know the practical opinion of the users and libraries about the application of ICT.
METHODOLOGY
The study is based on the Primary data collected from the selected Academic Libraries. A Structured
questionnaire was designed based on ICT applications the questionnaire was divided into seven major
applications of ICT Tools. E-group, e-mail, fax, Internet, Intranet, Mobile Phone, Video Conference, 125
questionnaire was distributed among various Academic Libraries out of which 110 were respondent (88%).Both
primary and secondary data were used for the present research. Primary data have been collected from the users
of colleges and university library (Academic Libraries). The Secondary data were collected from the web sites
and Prospectus of institutions, Research journals, Magazines, Reports and conference proceedings.
ICT-Based User Services
ICT has been a means to bring quality services. Systematic planning of its introduction and application will
assure that the technology based information services are sustainable, and enhances the ability of library.
In the present scenario, the library and information centers at global level are able to provide access to IT based
services.
Use of ICT in libraries enhances users satisfaction. It provides numerous benefits to library users. Some of the
benefits are:
Provide speedy and easy access to information
Provides remote access to users
Provides round the clock access to users
Provides access to unlimited information from different sources
Provides information flexibility to be used by any individual according to his/her requirements
Provides increased flexibility
Facilitates the reformatting and combining of data from different sources Libraries are also providing various
ICT-based services to their user, including the following
492
Electronic document delivery
Networked information resources
Delivery of information to user desktops
Online instructions
Provision of Web access to OPACs
Online readers advisory services
ISBN 1-63102-455-8
National Conference on Library Information Science and Information Technology for Education
Fig. 1: ICT Tools
Data Analysis
The study was carried out in ten Academic Libraries the information to these respondents is shown in table 1.
S.No.
Description
Total
Percentage
1
Engineering Shiats. Allahabad
6
60%
2
FHS Shiats. Allahabad
4
40%
100%
Table 1. Information about Respondents
Seven major applications of ICT Tools, such as e-group, e-mail, fax, Internet, Intranet, Mobile Phone, Video
Conference. Were identified for this study and same is shown in table 2.The table and the figure shows all the
respondent uses all the facilities but the highest is mobile phone with (90%) and e-mail (89.09), Intranet (86.36)
and Internet with (81.81). The use of Mobile Phones is high due to its fast and easy way of communication.
S.No
1
2
3
4
5
6
7
Name of ICT Tool
E-Group
E-mail
Fax
Internet
Whats up
Mobile Phone
Video Conference
No. of
86
98
40
90
90
99
30
Percentage
78.18
89.09
36.36
81.81
86.36
90
27.27
Rank
5
2
6
4
3
1
7
Table 2.ICT tools for Academic Libraries
LIBRARIAN
YES
NO
TOTAL
17
15
32
53%
47%
100
Table 3. Librarian Use a ICT Tools
To understand whether the functions and objectives of the library laid down or not for that we asked this
question to the librarians of 32 colleges and 53% librarians said it has been laid down whereas 47%
librarians said it not being laid down. Here it is very difficult to get exact conclusion because the
variation of data is quite close in nature.
ISBN 1-63102-455-8
493
Application And Uses Of Information Communication Technology (ICT) In Academic Library, SHIATS, Allahabad: A
Study
ICT helps librarian to share information with patrons and students in the easiest way for digital library
environment. Librarian can use in three broad activities in library and information services. The major three
are Information communication, Knowledge distribution n and knowledge organization
Name of ICT Tool
E-Group
E-mail
Fax
Internet
Whats aap
Mobile Phone
Video Conference
Male
30
50
20
40
14
53
15
Female Total
28
55
20
45
16
55
13
Total
58
105
40
85
30
108
28
Percentage
52.72
95.45
36.36
77.27
27.27
98.18
25.45
Table 3 is a Cross tabulation of ICT Tools and gender and shows that female professionals are using mobile phones more
than other media and female respondent uses live video Conference.
CONCLUSIONS
The application of ICT tools are increasing in Academic Libraries especially in Engineering College Shiats.
Allahabad and FHS Shiats. Allahabad due to the development of technologies. According to the respondent
ranking Mobile phone is in 1st position due to easy access at any time anywhere. There is a Lack of LAN facility
in most of the Academic Libraries so the usage of Internet is less which was shown in the table 3.The Academic
Libraries must increase the Video Conferencing facilities which enables the users to maximize the usage of ICT
based activities and services. It has been observed that very few libraries are offering Video conferences it is due
to fewer consortiums. If consortium with other libraries will increase the usage of Video conferencing will also
increase. Information is considered as fifth need of human in ranking. In this paper the study has been done a
research for application of Information communication Technology (ICT) and uses of ICT tools in Academic
Libraries, to find out the application of ICT skills in SHIATS, Allahabad Library.
REFERENCES
[1] Ahmad, N., & Fatima, N. (2009). Usage of ICT products and services for research in social sciences at Aligarh
Muslim University. DESIDOC journal of Library and Information Technology, 29(2):.25-30.
[2] Is ICT Infrastructure capable to accommodate standardized library management systems? : Case studies of library
automation
from
public
sector
universities
in
Islamabad
(Pakistan).
Available:http://www.crl.edu.ac.in/ical09/papers/indes_files/ical-44_191_402_1_RV.pdf
[3] ivakumaren, K.S; Geetha, V.; and jeyaprakash, B., “ICT Facilities in university Libraries: A Study” (2011).
Library philosophy and Practice (e-journal). Paper 628. http://digitalcommons.unl.edu/libphilprac/628
[4] A. Saleem [et al.] (2013). Application and Uses of Information Communication Technology (ICT) in Academic
Libraries: An Overview, International Journal of Library Science 2013, 2(3): 49-52
494
ISBN 1-63102-455-8