Nothing Special   »   [go: up one dir, main page]

Academia.eduAcademia.edu

PRESENT STATUS OF CONVERGENCE WEB 2.0 TECHNOLOGY IN TECHNICAL LIBRARIES WEB PAGE: A STUDY OF IIT LIBRARIES IN INDIA

Web 2.0 tools acts as information facilitators to provide the essential information not only on demand but also in improvise of its use. These tools through LIS professionals appreciate to meets the library users of information need. The present study has been carrying out with an observation to examine the application of various Web 2.0 tools by the IIT Libraries website. The data used for the present study were collected through intensive content analysis of the library websites of the sixteen IITs in India. It has been revealed that 12 (75%) of IIT Library websites adopted Web 2.0 tools in their library webpages whereas remaining other not adopting still now. Most of the IIT Libraries offers the facility of Web OPAC to search the various information resources available in their libraries. The result indicated that IIT Indore used the highest number of Web 2.0 tools in the library website.

National Conference Library Information Science & Information Technology for Education (NCITE - 2015) Organizing Committee: Anil Kumar Jharotia Vaibhav Bansal Rahul Mittal Dr. Ashima Bhatnagar Bhatia J -147, 2nd Floor, Vikas Puri, New Delhi – 110018 Helpline : +91-9868147997 http://www.rtmonline.in First Impression: 2015 © Modern Rohini Education Society(Regd.), National Conference on Library Information Science & Information Technology for Education (NCITE2015) ISBN: 1-63102-455-8 No part of this publication may be reproduced or transmitted in any form by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the copyright owners. DISCLAIMER The authors are solely responsible for the contents of the papers compiled in this volume. The publishers or editors do not take any responsibility for the same in any manner. Errors, if any, are purely unintentional and readers are requested to communicate such errors to the editors or publishers to avoid discrepancies in future. Published by MODERN ROHINI EDUCATION SOCIETY J-147, Second Floor, Vikas Puri, New Delhi-110018 E-mail: brand@rtmonline.in, http://www.rtmonline.in Typeset by Modern Rohini Education Society, New Delhi-110018 Preface Change is the most inevitable environment for Learning. With the use of new technologies education and researches are evolving, strategic shifts have become imperative for organisations. “Digital India” is a large umbrella program which will re-structure and re-focus several existing schemes to bring in a transformative impact. This initiative will ensure that all government services and information are available anywhere, anytime, on any device that is easy-to-use, seamless, highly-available and secured. It aims everywhere mobile connectivity, broadband highways, public internet access program, e-governance, e-kranti (which aims to give electronic delivery of services), information to all, electronics manufacturing and jobs for IT. Strategic shifts such as new products and services, market expansion, evolving growth strategies, innovative technology, new leadership, or mergers and acquisitions and its management to achieve high impact, sustainable business results has become challenging, complicated, and necessary for organisations. In today's environment, a large amount of information needs to be processed to make a viable conclusion in a library or in any community. This information, referred as big data, is collected from various sources like social, geospatial, internet, etc and can even be directly provided by a human. The main aims is to bring together the Researchers, Scientists, Engineers and Scholar students in all area of Library Science, Computer Science, Information Technology, Engineering, Management, Engineering and provides an forum for the dissemination of original research results, new ideas and practical development experiences which concentrate on both theory and practices through web conferencing. Professionals and experts from all India have been participated in National Conference on Library Information Science & Information Technology for Education (NCITE’15). Besides at the end of the conference Research Awards announced in three categories namely: 1. Manohar Research Award. 2. Mitra Best Research Paper Award. 3. Kailash Best Research and Knowledge Sharing Award. Transforming organizations into proactive entities reduces costs eliminates duplication and non-valueadded processes, which is key to improving the bottom line and improving product and/or service delivery at the same time. For efforts like these to succeed, Institutions need increasingly realistic and secure environments that they themselves manage. With emergence of virtual world, marketers will need to figure out how users can interact with brands in these compelling environments. Interestingly, virtual worlds’ greatest potential for business, may be not as an entertainment medium but as the next-generation means of communicating and collaborating when people can’t be physically in the same place. The objective of this National Conference on Library Information Science & Information Technology for Education (NCITE'15) is to provide a platform for academicians and practitioners who are involved in research in the field of Library Science, Computer Science, Information Technology, Engineering, Management and Librarians have been contributed research papers for Education. The Conference provides a leading forum for sharing the original research contributions and practical development experiences among researchers and application developers understanding on the role of ICT, Management Science and LIS Professionals in Knowledge Innovation and Knowledge Management. Debate and develop strategies to manage information systems and libraries in web environment. Identify and share ‘Best Practices’ developed and adopted by various information systems and libraries, and Increase the expertise and provide the best possible platform by educating students and attracting new researchers. On behalf of Modern Rohini Education Society (Regd.) in general and on our personal behalf, we would like to acknowledge the contributions from various authors. We are thankful to our Hon’ble President Dr. (Mrs.) Archana Bansal for motivating us for various academic endeavours. We are also thankful to Mr. Anil Kumar Jharotia, Mr. Rahul Mittal for their support and Thanks to Mr. Vaibhav Bansal for technology support in making the NCITE’15 a successful conference, People across most of the states participated; and we are able to published 87 papers successfully. We also thank our publisher (www.rtmonline.in) for bringing the online version of NCITE’15 Proceeding and Proceeding in form of a Book in such a fine form. 27th August 2015 Editorial Committee Contents S. No. Paper Name Pg. No. 1 Libraries Services, Users Requirements and Social Media: Building Relationships via Social Networks Ruju Gadad, Rushanasab R. Gurikar 1 2 A Bibliometric Study on Research Trends in the Journal of Scientific and Industrial Research Dr. Anand Bandi, Amrit Kaur 6 3 Uses of Electronic Information Resources by Faculty Members in MIT College Library, Moradabad: A Survey Ravindra Mohan, Amit Gupta 14 4 RFID Technology for Identification, Security And Document Handling in Library Satish Kumar, Anil Kumar Mishra 18 5 Core and Behavioural Competencies for Library Professionals in Panjab University Chandigarh: A Survey Dr. Rupak Chakravarty, Jyoti Sharma 22 6 Use of Digital Library Software to Develop Institutional Repository in IITS Libraries: An Analysis Dr. Manoj Kumar Verma 27 7 Greenstone: Open Source Software for Digital Library Development Anil Kumar Jharotia, Shikha Verma, Jyoti 32 8 Right of Entry in Electronic Resources: Flows and GRIT in Institutional Libraries K.Nazeer Badhusha, R. Natarajan 39 9 Collection and Preservation of Newspapers: A Case Study Dr. Jawahar Lal 44 10 The Role of Computer and Internet in Education Rahul Mittal, Vipul Partap 52 11 Mobile Technology and Applications for Libraries Rajeev Kumar 61 12 Institutional Repositories and Digital Preservation in Libraries Parvathamma K S 68 13 The Changing Nature of the Public Libraries with Expanding Learning Frontiers with E- Learning Dr. D. K. Shrivastava 72 14 Use of Social Networking Sites in Library and Information Centres Aslam Ansari, Mehfoozul Hasan 84 15 Usage of E-Resources in Engineering Colleges of Greater Noida, G. B. Nagar, Uttar Pradesh: A Comparative Study Deepmala, Ashok Kumar Upadhyay 90 16 The Declining Traditional Print Books Reading Behaviour of the Public Libraries Readers with Switch to Jump with ibooks And ebooks Reading: User Experience Dr. D. K. Shrivastava, Shashi Jain, Pritima Vyas, Sunita Kumari, Manisha Mudagal, Yogendra Singh Tanwar 97 17 Knowledge Management in KendriyaVidyalaya Libraries Parna Ghosh 111 18 Social Networking and Library Consortia Pratibha Gautam 118 19 Present Status of Convergence Web 2.0 Technology in Technical Libraries Web Page: A Study of IIT Libraries in India Sur Chandra Singha, Sumit Paul, Pradip Kumar Singha 125 20 Big Data: Introduction to Applications in Libraries Purnima Joshi 131 21 Plagiarism and Research Misconduct: A Study Sanjay Kumar Jha, Pratibha Pritam 135 22 DSPACE: A Dais For Digital Resources Sudha Kaushik, Dr. Somvir 141 23 Analyzing of Cluster, Grid & Cloud Computing Shweta Agrawal, Dr. P. C. Agrawal 147 24 Information Literacy in India: Enhancing Services to the Research Community in the Digital Environment Rajeev Mishra, Dr. Ashok Kumar Upadhyay 156 25 Information Literacy Knowledge Management Bhupender Kumar, Anil Kumar Singh 161 26 Accessing Knowledge through the Attributes and Popularity of Search Engines Uma Pandey, Dr. (Ms.) Shiva Kanaujia Sukula 166 27 Reinventing library as Green Library: Beginning of Great Transformation Dr. (Mrs) KusumLata Malik 177 28 Cloud Computing and its Applicationa in Library Services Rajpal Singh Rajpurohit 184 29 Role of E- Resource Management in Academic Libraries Dr. Pankaj Kumar 189 30 Total Quality Management is not A Quick Fix for Libraries Dr. Mange Ram 193 31 Digitization process in Library and Information Center: Problematic Approach Kasifa Khatoon, Aslam Ansari 198 32 Library Reach to User through Social Media: Prospects and Problems a Practical Approach to LPU Jitu Mani Das 203 33 RFID Technology: A Gatekeeper to Library Security Dr. Raj Bala Gaur 209 34 Cloud Computing: An Innovative Tool for Library Services Rekhraj Sahu 213 35 Mobile Technology: Use in Library Sonali Malhotra, Harpreet Kaur 218 36 An Perspective on ICT Implementation at Karnataka Judical System Meera B.J 221 37 A Study on Determining the User Awareness to Evaluate the Effectiveness of Digital Reference Services Provided by Academic Library of Engineering and Technology Institutions in Tamilnadu K. Chandraprabha, Dr.K.Chinnasamy, Dr.S.Janakiraman 227 38 The Impact of Information Communication Technology Act in Communication Studies Richa Chandi, Rana khan 235 39 Use of SNS by Library Professionals and Users: An Overview Atika Khursheed, Aslam Ansari 238 40 Role of Mobile Communication in Rural Development: A Study of Karala Village Nidhi Chaudhry, Dr. Nisha Singh 244 41 A Comparative Study on Total Quality Management of Library Services in Tamil Nadu University Libraries Dr. I. Ravi Kumar Kennedy 250 42 A Paradigm of Knowledge Management in Academic Library: Some Innovative Experiments R. R. Kuralkar 255 43 Academic Libraries with RFID Anil K. Mishra, Jyoti Verma 259 44 Emotional Intelligence of Teachers in Work Performance S.Jerslin, Dr .N. Devaki 262 45 Library Automation: What, Why and How? Pankaj K. Bhardwaj 266 46 A Literature Survey of Signature Recognition and Verification System Vaibhav Bansal 271 47 Developing of Digital Library through GSDL: An Experience at GITAM Pushplata 276 48 Review on WSN Applications with some Issues Prachi Arora 282 49 Potentiality of Cloud Computing in Library Storage, Access and Retrieval: A Critical Analysis Medha Ray, Souvik Koner 287 50 Use of Library Management Software by Selected University Libraries of Delhi: A Study Jitendra Kumar, Tanuja Kumari 296 51 Cloud Computing in College Libraries Ram Nath (Maurya), Jai Prakash 303 52 Web Based Customized Information System: A Model Concept Shyamanta Boro 307 53 PKP and its Open Journal System: An Initiative in Open Access Scholarly Environment Satish Kumar, Anil K. Mishra 312 54 Surfacing a New Platform in MLIS: A Pathway of Gen-Next Library System Dr. Dharmendra Harit, Nasim Ali, Lalita Rani 318 55 Models of Information Seeking Behavior Sarita Mohan, Dr. C. K. Sharma 323 56 Elements of Collection Development: A Perspective Madhuri Gangal, Dr. S. P. Singh 327 57 Exchange of Meta data: A Concept towards Future Bikramaditya Barman 331 58 Total Quality Management in Academic Library Kanupriya, Khurshid Anwar, Dalip Singh 338 59 Radio Frequency Identification (RFID) Shyam Bihari Gupta, Gunjan Gupta 343 60 Information Technology for Education Role in Modern Educational Practices Suman Singh 347 61 E-Resource Management in Digital Library Shalini 354 62 Bibliographic Information Service using Zotero Dr. Jyoti Bhabal 357 63 Influence of Internet and Digital Media on Library Service Jyoti Verma 362 64 Mobile Phone based Library Services Dr. Anil Kumar Dhiman 365 65 Title: Challenges in setting up the Web based Online Public Access Catalogue (Web OPAC) at Library cum Documentation Centre of ICHR: A Case Study Ramesh Yernagula 370 66 Application of Radio Frequency Identification Technology (RFID) in LIS Media Centre Vijay Singh, Vijay Singh Chauhan, Devendra Mani Pandey 374 67 Library Security Rethinking: A Study Dr .M. Ananda Murugan 381 68 Open Access Journals in the field of Library Science and Information Technology : An Analysis Dr. Anil Agrawal 385 69 Knowledge Management in Academic Libraries Dr. Rakhi Tyagi 390 70 Cloud Computing and Libraries Anshu Bansal 396 71 Integrating ICT in Education is a Catalyst to Promote Universal Design for Learning for Students with Special Needs: Need, Challenges, and Possible Ratan Sarkar 402 72 Digitisation of Library Material in Academic Library: Challenges and Issues Sushma R. Mawande 413 73 E-Learning Initiatives in India: An Overview Urmila Devi 418 74 Effective Teaching using Blended Learning Models Dr. N. Devaki, M. Deivam 422 75 LIS Services in E & M Learning Technology Dr. Durga Prasad, Deepak Shukla 427 76 Relevance of Ict in Teacher Education R. Kington, Dr. N.Devaki 435 77 Awareness of Open Source Software for the Library Professionals N. Chidambaranathan, G. Elanjiyam 441 78 Management of Institutional Repositories in Academic Libraries by using D-SPACE Tribeni Devi, Lavita Deka 448 79 Awareness of ‘Big Data’ Among the Library Professionals in the Research Libraries of Odisha Dr. Sanghamitra Dalbehera 451 80 Mobile Applications and Information Resources for Library Users Jatinder Kumar, Dr. Suman Sumi 456 81 Gender Equation: Role of ICT’s in Women Empowerment Dr. Anjani Kumar Jha 462 82 Role of Information Literacy in Curriculum Mohd. Hanif 468 83 Open Access Repositories (OARS) in India: An Evaluative Study Dr. Rajesh Kumar Singh 472 84 Digital Library and its Advantages S. D. Singh, Shrikrishan Thapliyal 478 85 Powering Education with Mobile Technology through M- Learning Vijay Laxmi, Anil K Jharotia 482 86 Web 2.0 Applications in Library Services: Special Focus on Library and Information Science Blogs B. VijayLakshmi, Dr. A. Thirumagal 487 87 Application and Uses of Information Communication Technology (ICT) in Academic Library, SHIATS, Allahabad: A Study Monisha Grey 492 LIBRARIES SERVICES, USERS REQUIREMENTS AND SOCIAL MEDIA: BUILDING RELATIONSHIPS VIA SOCIAL NETWORKS Ruju Gadad | Research Scholar | DLIS | Rani Channamma University | Vidya Sangam- Belagavi | Email: rigadad@gmail.com Rushanasab R. Gurikar | Assistant Professor (ad hoc) | DLIS | Guru Ghasidas Vishwavidyalay, Bilaspur | Email: rrgurikar@gmail.com Abstract: In this paper is intended to describe the possible implication of social networking technologies in the field of library and information services. Social Networking sites are one of the new technologies offering libraries the opportunity to reach out to its patrons. An attempt made in this paper how libraries and information centers can disseminate the information to its user community and what are the possibilities roles these social networks will play. The social media hype has gradually crept into the library profession with social sites such as Facebook, Twitter, LinkedIn, Google+, MySpace, and YouTube etc. Keywords: Social Networking Sites, Library Service, Service Delivery, Social Library, Library 2.0, ICT, Web 2.0 Tools INTRODUCTION Social networks are playing vital role in connecting with people. These are integral part of the life. Social networks brought tremendous changes in exchange of information, ideas thoughts, messages, news and alike. With the help of these networks anyone knows how to interact with the others who are scattered across world. One can share their opinions, ideas and feelings etc., due to the convergence of ICT with library and information professionals should take implement of these social networks to make library’s routine activities as much as easy. Professionals can make library services as an attractive in a social library context. Social networks are obtainable help to the librarians as dissemination of the information. Users are moving outward from libraries to get required information because of fast growth in information and communication technology. One who can get an authentic, reliable and update information on their fingertips. Thus users are allured from induce internet. USE OF SOCIAL NETWORKS Michael Haenlein defines social media as "a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0 and that allow the creation and exchange of user-generated content”. Social network sites as web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system (Boyd, 2007). Social networks sites are web enabled services that allow people to connect with others and they can share and exchange the information, ideas, images and videos etc. A social network allows individual to join and create a personal profile, then formally connect with other users of the systems as social friend. It can be expressed as social connecting sites among the social user in web 2.0 domain. Social networking can be relevant to information seeking and sharing on information retrieval perspective by providing speed and quick information to the information community by connecting and collecting digital information required by the user. Social networking sites like Facebook, LinkedIn represent a new and powerful service through web 2.0. Some of the popular social networks as follows: -, Facebook, Myspace, LinkedIn, Hi5, twitter, Netlog, LIS Link, Orkut and Myzamana etc. ISBN 1-63102-455-8 1 Libraries Services, Users Requirements And Social Media: Building Relationships Via Social Networks Fig-1: Social Networks Connections POPULAR SOCIAL NETWORKS The popularity of social networking sites on the Internet introduces the use of mediated-Communication into the relationship development process. Facebook as the most visited site among the social networking sites. Most of the people visiting social networking sites for Connect with friends, Chart with friends, Make new friends, leisure and many other reasons. The Popularity of social networks is using widely which we can see from the below table as fig-1 as: Most Popular Social Networking Websites Rank No Social Networking sites Estimated Unique Monthly Visitors (as on 3/1/2013) 1 Facebook 750,000,000 2 Twitter 250,000,000 3 LinkedIn 110,000,000 4 Pinterest 85,500,000 5 MySpace 70,500,000 6 Google Plus+ 65,000,000 7 DeviantArt 25,500,000 8 LiveJournal 20,500,000 9 Tagged 19,500,000 10 Orkut 17,500,000 Table-1: Popular of Social Networks SOCIAL NETWORKS AND LIBRARY SERVICES We are here in the paperless society, most of the people aware about information and communication technology. The library and information centers also not far from this technology, library has been got fabulous changes in its routine activities. Thus in the dissemination of information, librarians have using different library softwares, network computers, mailing, fax, scanners etc. Such technologies are going to help the library professionals in making non-users as users and users as regular users, through that professionals can provide right information to the right person at a right time in a right manner. The growing population of patrons and librarians that make use of social networking is an indication that it is an ideal vehicle for marketing the services of libraries to patrons. The use of social networking tools enable 2 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education librarians to identify library patrons on the social cyberspace and pro-actively provide the type of information that would normally result from reference service. Social networking tools are not only being used as a vehicle for promoting services, programs and new resources but they are also used for reference service. (Steiner, 2009, p. 4) Students are using tools like Ask a Librarian, Meebo and Twitter to ask questions in “real time”(Steiner, 2009, p. 5) Social networking presents some important opportunities to libraries which include marketing of library services and reference services. PRE-REQUISITES TO IMPLEMENT OF SOCIAL NETWORKS IN LIBRARY SERVICES 1. 2. 3. 4. 5. 6. Librarian must be having hardware and software skills, which are necessary for work with social networks. Need of internet facility User must be able to create and maintain own profile in social network. Both parties’ librarian and user should have account in same social network. User must be able to check the notifications every day. Digitized information is much needed. USE OF SOCIAL NETWORKS IN LIBRARY Now day’s almost educated people are aware about social networks and the students are very familiar with the social networks. Like Facebook, Myzamana, Google+, Hi5 etc., in present time, such social networks providing following facilities to the people almost free of the cost. 1. Library can Create Own profile: This is first step and for most facility of the social networks, that is almost free of the cost. This profile is going to help the library to introduce to across its user community. In the profile librarian can locate name, address, contact number and present status etc., if required such kind of information they can change time to time. This is going to help the librarian to inform new services in the library to its user community. 2. To identify its User Community: It is one of the great opportunities to meet its users who are scattered across the world through social networks. E.g. in Facebook there is an option to find new friends, such option gives information by simply typing their name in user interface. At the same time which is going to help the librarian to know who are our library users? 3. To make Profile Attractive: Most of the social networks allow its users to make attractive profile. Such type of facility helps to others, to know their area of the interest. E.g. if an user has interest in playing cricket means we can see the famous cricket player photos in profile, if an user have love and affection with his family means the profile will covers family photos. This is going to help the library professionals to know the area of interest of the particular users and also helps to render the necessary information to users. 4. Live Chat with Users: Social networks are facilitated users to share their feelings, information, and ideas in the form of graphics, images and videos or else in text format. When the users are available online they can chat for the required information. In library circumstance such facility is great help to inform update information to users. 5. To Reduce the Consuming Time: Social networks are the helpful in speed posting. These of networks will help the professionals to send the same information to all the user community by simply clicking on the post option. According to Dr. S.R.Ranganathan, time is very important; librarian has to save the user time as much as possible. As S.R.Ranganathan fourth law of library science recommend that “save the time of users”. In this regard social networks defiantly help in reduce the consuming time as well. 6. Cost Effective: ISBN 1-63102-455-8 3 Libraries Services, Users Requirements And Social Media: Building Relationships Via Social Networks In this paperless society most of the people making use social networks because of most of the social networks are available free of the cost. Thus in library framework which is going to help the librarians to avoid unnecessary expenditures. 7. Data Security: It is an appreciable facility providing by the social networks. If there is no security for user’s personal information, it creates a immense predicament, and no one can show interest to create their personnel profiles in the social networks. But today’s available networks are providing full of protection to its customer’s profile. ROLE OF SOCIAL NETWORKS IN LIBRARY Library is store house of the information. In changing environment is obtaining new shape, because of inspiration of the ICT. Now library has to adopt or implement these social networks which are going to help the librarian to incarceration with users and make available the library services as much as attractive. It’s all possible through only proper utilization of freely available social networks. The social networks can act as mediator between the librarians and uses to get required information. Librarians can also provide library services with the help of social networks these are as follows Fig 2: Library Services through Social networks 4 1. New Arrival Service: Displaying newly arrived documents in library it is way to provide marketing to the library acquires. Librarian can make available this kind of library through social networks, it help the users to get information about new documents from any corner of the world. E.g. scan the cover page and content page of the document and upload on the face book or other networks or share available e-page (link) of the document in internet 2. Reference Service: The use of social networking tools enable librarians to identify library patrons on the social cyberspace and pro-actively provide the type of information that would normally result from reference service. Ezeani (2010) observed that for librarians to effectively deploy these social media for reference purposes they must be versatile and knowledgeable in different subject fields to be able to match patrons with desired information. 3. Recall: Recall is kind of library activity to reminder users about returning the library documents. This is very easy to send message by using social networks through posting the message on user profile. If librarian sent the message well in advance users will be aware in returning issued books to the library. 4. Extension Activities: Through social networks this is possible to display the library products by scanning cover page of the document and uploading to the profile. Library week celebration, on the occasion of great personality’s ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education birthday, librarian can post the related information. These kinds of activities going to help the users to know about the different sorts of library collection, as well as to librarian also can make marketing to the library products. E.g. on the eve of Mahatma Gandhi’s birth day, youth day, republic day, independence day, etc. 5. Referral Service: Referral service is nothing but get guidance from library. These service offers enquire about materials which are not available in their library. The referral service provides only source to information and no more. Librarian can offer such kind of service to users by providing hyperlinks on social networks. 6. Current Awareness Service: These days’ library and information centers are acquiring e resource in its collection including databases, journals, magazine and newspapers. These e resources are accessible certain IP address only, if the user is using the social network sites under same IP, professionals can share IP address link of enewspapers, e-magazines and databases e-journal to know recent development and trends in different fields to its user. CONCLUSION The tendency of social networking stipulates a new set of applications, processes, and potentially, library to enable social media as an abuser service. New modules and mechanisms for tracking what is trend on social networks must be put in place in order for libraries to effectively use social media for user service. The contemporary technologies used in contact centers are adequate for delivering healthier client service and improved user fulfillment. However, libraries need to continuously evolve their policies to keep up with patron expectations. Encompass a social media user approach will no longer be a choice in the future. There are millions of user interactions taking place every day on social media sites such as Facebook, Twitter, Google+, and YouTube, as well as a vast number of user support forums and online communities like LIS links, LIS Xpress, Library Soup etc. This is projected to grow exponentially over in the prospect years as the usage and number of active users of social media sites and forums continue to cultivate. This technology provides the enabling platform that goes beyond the traditional service delivery by allowing patrons to interact in real time with librarians in the comfort of their hall of residence or homes. Librarians must acquire the necessary skills in information technology to meet the challenging demands of social networking sites. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] Kaplan, Andreas M., Haenlein Michael, (2010), Users of the world, unite! The challenges and opportunities of social media, Business Horizons, Vol. 53, Issue 1 pp. 61 Most Popular Social Networking Websites: Available at: http://www.ebizmba.com/articles/social-networkingwebsites [Accessed on 03-03-2013] Boyd, d. m., & Ellison, N. B. Social network sites: Definition, history, and scholarship. Journal of ComputerMediated Communication, 2007, 13 (1), 1. http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html. [Accessed on 0303-2013] Ayiah, Efua Mansa and Kumah, Cynthia Henewaa, (2011), Social Networking: a tool to use for effective service delivery to clients by African Libraries, IFLA Meeting 2011 pp. 1-14 Mishra C. S. (2008) Social Networking Technologies (SITs) in Digital Environment: Its Possible Implications on Libraries. pp. 1-19 Available at: http://eprints.rclis.org/16844/1/Social%20networking%20in%20Library.pdf [Accessed on 03-03-2013] Ezeani, Chinwe Nwogo and Igwesi, Uzoamaka, (2012), "Using Social Media for Dynamic Library Service Delivery: The Nigeria Experience" Library Philosophy and Practice (e-journal). Paper 814. Steiner, H. (2009). Reference utility of social networking sites: Options and functionality. Library High Tech News, 26 (5/6), 4-6. Retrieved from: www.emeraldinsight.com/10.1108/07419050910985246. [Accessed on 03-032013] Ezeani, C.N. (2010). Network literacy skills of academic librarians for effective services delivery: The case of the University of Nigeria, Library Systems. In the Proceedings of Second Professional Summit on Information Science and Technology (PSIST). Nsukka: Nnamdi Azikiwe Library U.N.N 56-66. ISBN 1-63102-455-8 5 A BIBLIOMETRIC STUDY ON RESEARCH TRENDS IN THE JOURNAL OF SCIENTIFIC AND INDUSTRIAL RESEARCH Dr. Anand Bandi |Head Resource Centre | NIFT | NIFT Capmus | Plot No. 15, Sector 4, Kharghar | Navi Mumbai-410210 | anb321in@yahoo.co.in Mrs. Amrit Kaur | Assistant Librarian | NIFT | National Resource Centre | Head Office, Hauz Khas, Delhi| kauramrit24@yahoo.com Abstract: The paper deals with the analysis of the 542 contributions of the journal entitled 'Journal of Intellectual Property Right' published during 2011-2015. A total number of 542 articles crediting 12,687 journal citations during the period2011 to 2015. Examines year wise, state wise distribution of contributions, Authorship pattern, citation analysis, length of the contributions etc. The study shows that most of the articles are published by author and state wise distribution indicates that, most of the articles are contributed from New Delhi. Citations include finding out average number in contributions of this journal. Keywords: Intellectual Property Right, Citation Analysis, Bibliometric Analysis. INTRODUCTION The Journal of Scientific and Industrial Research is published bi-monthly by the esteemed National Institute of Science Communication and Information Resources (NISCAIR), New Delhi, India. JISR is indexed in Social Science Citation Index, Social SciSearch, and Journal Citation Reports. This journal has endeavored to enrich the contents of each issue through balanced overseas contributions. Therefore, a bibliometric study of this journal is of vital significance. It primarily intends to enhance the communication between policy makers, organizational agents, academics, and managers on the critical understanding and research on Scientific and Industrial Research. The word ‘Bibliometrics’ is derived from Latin word ‘biblio’ and the Greek word ‘metrics’ etymologically it means the application of mathematics to the study of bibliography. Derek de Solla Price (1970) argued that scholars in the hard sciences are likely to give citations in their papers and these citations are more recently published works. The study concluded indicating that the time lag between publication and citation was shorter in the hard sciences than it is in other disciplines. He further stated that citations represent a measure of utility rather than of quality. The concept of citation analysis was enunciated by Eugene Garfield (1972). He is also known as father of citation analysis studies, who has conducted enormous studies and published views based on analytical studies and out of his hundreds of studies which covers almost every branch of the natural and social science, indicated the better use of citation studies. Pritchard (1969), first introduced the term “Bibliometrics" in 1969 to mean ‘the application of mathematics and statistical methods to books and other media of communications’. Bibliometrics is a technique for identifying the research trends in a different area, obsolescence, core periodicals, studying the productivity, characteristics of subject literature including structure of knowledge, historical and sociological aspect of science and helpful in formation of need based collection development policy, weeding and stacking policy and many others. The bibliometric laws such as Lotka’s Law (Lotka 1926), Bradford Law (Bradford 1934), and Price Law (Price 1963) are some of the prominent measure which have been used by different library and information scientists to test their implication on different literature as well as subject. According to Sengupta et al, the bibliometric is the organization of classification and quantitative evaluation of publication patterns of all macro and micro communications along with their authorship by mathematical and statistical applications and calculations’. The present study is related to analysis of contributions of “Journal of Scientific and Industrial Research” from 2011-2015. 6 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education 1. OBJECTIVES To examine authorship pattern, year-wise and state-wise contributions, distribution of contributions of the journal. 2. To reveal the distribution of contributing authors by country. 3. To examine the average length of articles. 4. To examine average number of citations per article in the journal. PURPOSE OF THE STUDY: The main purposes of the present study are: ● To create awareness about the pattern of research in the field of law in India. ● To know the research output in the field of law in India. METHODOLOGY: For the purpose of the study, the Journal of Scientific and Industrial Research (JISR) has been selected as the source material and information about each contribution such as author, author’s affiliation, length of contributions, citations, etc. was scanned, checked and examined carefully. The study analyses the scholarly communication of Journal of Intellectual Property Rights from 2011 to 2015. A total Number of 12,687 journal citations form 542 articles published during the period were collected from the archives of the open access sources journal. The data thus collected were fed into MS Excel worksheet to process the gathered data for subsequent analysis. LITERATURE REVIEW Bibliometric analysis involves qualitative studies of research activities using statistical methods for measuring and analyzing the subject. In fact, the researchers are used various bibliometric methods in various field to explore the impact of their field, the impact of a set of researchers or the impact of a particular research paper. Mote and Deshmuck (1996) conducted a bibliometric study on Annual of Library Science and Documentation and Found that journals are the most cited forms of communication amongst the library and information scientists. Kamal lochen Jena (2006) conducted a study on citation analysis of 507 references cited in the articles published in the ‘Indian Journal of Fiber & textile Research’ the year (1996-2004). The articles have an average length of 6.45 pages, Journal constitutes 73.92%, books constitute 11.60% only and both constitute 85.53% of total citations. Proceeding constitutes 5.14%, patent 3.99%, standards 1.61%, theses 1.54%, reports and media both 0.64% and others have 0.90%. Hazarika, Goswami and Das (2003) made a bibliometric analysis of the 1402 research papers published in ‘The Indian Forester’ from 1991 to 2000. The state-wise distribution indicated that the Uttar Pradesh contributed maximum number of papers with 35.16%. Nagaland and Sikkim counted the lowest number of contribution with 0.14%. Multiple authorship papers were dominant in the field of Indian Forestry with 64.55%, while single authored papers were 35.45%. Bharvi et al. (2007) analyzed 1,317 papers published in the first fifty volumes from 1978 to 2001 of the international journal Scientometrics and found that the US share of the papers is constantly on the decline while that of the Netherlands, India, France and Japan is on the rise and that the scientometric output is dominated by the single-authored papers. Hussian and Fatima (2011) evaluated the characteristics of the Chinese Librarianship: an International Electronics Journal form 2006 to 2010 through a bibliometric analysis. ISBN 1-63102-455-8 7 A Bibliometric Study On Research Trends In The Journal Of Scientific And Industrial Research Kunwar Singh et al (2011) made a bibliometric study of research trends in the field of research papers patterns in DESIDOC Bulletin of Information Technology by library and information professionals during the period 1992-2002. The study revealed that 60 issues of the journal published 145 articles. Out of the 145 publications, 97 (66.90percent) articles were published by single author. The study also identified that 128 articles were from (88.28percent) India and the rest 17 (11.72percent) were contributed from rest of the countries. Neeraj Verma et al. (2007), of ‘Annuals of Library and Information Studies’ concluded that majority of citations i.e. 64% were single authored during 1999-2005. They examined year wise, institution wise, state wise distribution of contributions, authorship pattern, citation analysis, length of contributions etc. The study revealed that the journals were the most cited publication amongst the library and information scientists. They found out that the source journal was the most cited journal. Surendra Kumar and Kumar (2008) analyzed 8093 citations given in the Journal of oil seeds research (JOR) published during 1993 to 2004. Out of 8093 citations, 5642 were given in main articles and 2551 in short communications of JOR. They covered the analysis of citation pattern of along with calculation of collaboration coefficient. They concluded that 20 core periodicals cover more than 50% references and also indicated that collaborative research prevailed in oil seed research. Sudhier (2010) reviewed the application of Bradford’s Law of scattering. In addition to the theoretical aspects of the Law, the review covered papers dealing with the application of the law in the various subject fields. A study on five year data of journals (2004-2008) cited by the Physicists at the Indian institute of Science. Singh and Dominic (2006) carried out an analytical study of citation pattern of ‘Allopathy Journal’. A team research had been quite substantial in the field as multiple authors contributed more than 60% of the total citations. The study also revealed that nearly 90% of total citations were from journals, followed by theses with 6.11% and conference papers with 3.79%. Swain (2011) conducted a bibliometircs study of Library Philosophy and practice from 2004 to 2009 and revealed the partial compliance of authorship productivity pattern of LPP with Lotka’s Law at a slightly greater n Value Rana (2004) carried out a bibliometric study of mammal research in India. This study concluded that the contribution of highly productive authors was more than 20% of the total literature in Indian mammal research. Further, the overall length of period of contribution of highly productive authors was approximately inversely proportionate to the productivity of contribution. Zainab et al. (2009), in their bibliometric study of Malaysian Journal of Computer Science, reported their findings regarding the article productivity, authorship collaboration, and journal impact factor of MJCS. ANALYSIS AND FINDINGS Yearwise distribution of articles Year Vol. No. of Issues No. of Contribution % Age 2011 70 1 - 12 152 28.0442804 2012 71 1 - 12 111 20.4797048 2013 72 1 - 12 105 19.37269373 2014 73 1 - 12 126 23.24723247 2015 74 1 - 12 48 8.856088561 Total 542 100 Table-1 Yearwise distribution of articles 8 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education A total of 542 conrtibutions have been published in five years (2011-2015), which consists of full, review artciles and short communications. Table 1 give details regarding the distribution of 542 contributions published from 2011-2015. Maximum number of artciles i.e., 152 (28.05%) was published in 2011 and minimum number of contributions i.e. 48 (8.85%) in 2015. Authorship Pattern No. of authors One Two Three Four Five More than five Total Total no. of Percent contributions 14 2.58302583 175 32.2878288 134 24.72324723 125 23.06273063 49 9.040590406 45 8.302583026 542 100 Table-2 Authorship Pattern Table 2 gives the details about the authorship pattern. The distribution of 542 contributions published from 2011-2015. The 14 (2.58%) have been contributed by single author, 175 (32.28%) contributions by two authors and 134 (24.72%) contributions by three authors and 125 (23.06%) contributions by four authors, and 49 (9.04%) contributions by five authors and 45 (8.30%) contributions by more than five authors. Authorship pattern of contributions (Volume wise) Table-3 Authorship pattern of contributions (Volume wise) Table 3 gives authorship pattern of contributions volumewise. It indicates that out of the 14 contributions of single author, volume 70 and 73 have the highest number i.e. 05 (35.72%) and Vol. 71 and 72 has the lowest number i.e., 01 (7.14%) contributions. Out of the 175 conrtibutions by two authors, Vol. 73 has the highest i.e., 50 (28.57%) and Vol. 74 has the lowest number i.e, 13 (7.42%) conrtibutions. Out of 134 contributions by three authors, Vol. 70 has the highest i.e., 39 (29.10%) and Vol. 74 has the lowest number i.e. 15 (11.19%) conrtibutions. Out of 125 contributions by four authors, Vol. 71 has the highest i.e., 34 (27.2%) and Vol. 74 has the lowest number i.e. 9 (7.2%) conrtibutions. Out of 49 conrtibutions by five authors, Vol. 70 has the highest i.e., 17 (34.69%) and Vol. 74 has the lowest number i.e. 3 (6.2%) contributions. Out of 45 conrtibutions by more ISBN 1-63102-455-8 9 A Bibliometric Study On Research Trends In The Journal Of Scientific And Industrial Research than five authors, Vol. 70 has the highest i.e., 18 (40%) and Vol. 72 has the lowest number i.e. 2 (4.44%) contributions. Statewise distribution of contributions 10 Contributed by No. of contributions Percentage Agartala 2 0.36900369 Aligarh 3 0.553505535 Allahabad 4 0.73800738 Andhra Pradesh 3 0.553505535 Assam 3 0.553505535 Bangalore 10 1.84501845 Bangladesh 1 0.184501845 Bhopal 2 0.36900369 Bihar 1 0.184501845 Bulandshaher 1 0.184501845 Chandigarh 7 1.291512915 Chennai 35 6.457564576 Coimbatore 26 4.79704797 Darjeeling 2 0.36900369 Dehradun 4 0.73800738 Faridabad 1 0.184501845 Gandhinagar 5 0.922509225 Goa 3 0.553505535 Gujarat 3 0.553505535 Gurgaon 2 0.36900369 Guwahati 3 0.553505535 Gwalior 7 1.291512915 Haryana 1 0.184501845 Hisar 2 0.36900369 Hyderabad 9 1.660516605 Jaipur 3 0.553505535 Jalandhar 1 0.184501845 Jodhpur 1 0.184501845 Kanchipuram 1 0.184501845 Karnal 1 0.184501845 Karnataka 3 0.553505535 Kerala 17 3.136531365 Kharagpur 1 0.184501845 Kolkata 2 0.36900369 Krishi Nagar 1 0.184501845 Kurukshetra 1 0.184501845 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Lucknow 4 0.73800738 Ludhiana 1 0.184501845 Madhya Pradesh 2 0.36900369 Madurai 10 1.84501845 Manipal 1 0.184501845 Meerut 3 0.553505535 Mohanpur 1 0.184501845 Mumbai 3 0.553505535 Mysore 7 1.291512915 Nagpur 2 0.36900369 Navi Mumbai 2 0.36900369 New Delhi 43 7.933579336 Noida 2 0.36900369 Odisha 4 0.73800738 Pakistan 5 0.922509225 Pantnagar 2 0.36900369 Patiala 2 0.36900369 Pune 10 1.84501845 Punjab 2 0.36900369 Rajasthan 3 0.553505535 Rajkot 3 0.553505535 Ranchi 2 0.36900369 Roorkee 2 0.36900369 Sikkim 3 0.553505535 Solan 5 0.922509225 Surat 4 0.73800738 Tamil nadu 47 8.671586716 Thanjavur 1 0.184501845 Thirchengodu 2 0.36900369 Tripura 7 1.291512915 Triuchhirappali 2 0.36900369 Trivandrum 6 1.10701107 Udaipur 2 0.36900369 Uttra Pradesh 2 0.36900369 Uttrakhand 1 0.184501845 Varanasi 4 0.73800738 Vidyanagar 1 0.184501845 Visakhapatnam 7 1.291512915 Other states 160 29.5202952 542 Table-4 Statewise distribution of contributions ISBN 1-63102-455-8 11 A Bibliometric Study On Research Trends In The Journal Of Scientific And Industrial Research Figure 4 shows that the statewise distribution of contributed in the five volumes of the journal. Out of 542 contributions, the highest number i.e., 160 (29.52%) has been contributions by authors in other states and lowest number i.e. 1 (0.18%) has been contributed by authors from Bangladesh, Bihar, Bulandasher, Faridabad, Haryana, Jalandhar, Jodhpur, Kanchipuram, Karnal, Kharagpur, Krishi Nagar, Kurukshetra, Ludihana, Manipal, Mohanpur, Mohanpur, Thanjavur, Uttrakhand and Vidyanagar. Out 542 contributions only 95 contributions are from foreign countries. Length Of Articles: No. of Pages 2011 2012 2013 2014 2015 Total % age 1-5. 58 39 42 71 31 241 44.4649446 6-10. 89 67 60 54 16 286 52.7675277 11-15. 5 4 2 1 1 13 2.39852399 16-20. 0 1 1 0 0 2 0.36900369 21-25. 0 0 0 0 0 0 0 152 111 105 126 48 542 100 Table-5 Length of articles Table 5 indicates the details about the page length contributions. Out of 542 contributions, 241 (44.46%) have pages length of 1-5 page, 286 (52.76%) contributions have length of 6-10 pages, 13 (2.39%) contributions have length of 11-15 pages, 2 (0.36%) contributions have length of 16-20 pages. Study Of Citation: No. of Citations 1-10 11-20 21-30 31-40 41-50 51-60 61-70 71-80 81-90 91-100 100-110 More than 110 Total 2011 2012 2013 2014 2015 Total % age 13 61 40 19 9 0 2 2 1 1 2 10 43 34 13 5 3 1 0 0 1 1 6 42 38 14 4 1 0 0 0 0 0 15 63 40 6 1 0 0 0 1 0 0 9 23 10 4 1 1 0 0 0 0 0 53 232 162 56 20 5 3 2 2 2 3 9.778597786 42.80442804 29.88929889 10.33210332 3.6900369 0.922509225 0.553505535 0.36900369 0.36900369 0.36900369 0.553505535 2 0 0 0 0 2 0.36900369 48 542 100 152 111 105 126 Table-6 Study of Citations Table 6 reveals the details of number of citations appearing at the end of contributions during 2011-2015. Out of 542 contributions published. The highest number of contributions with citation between 11-20 is 232 (42.80%) and lowest number of contributions with citation between 71-80, 81-90, 91-100 and more than 110 are 2 (0.36%). 12 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Distributions Of Citation: Vol. 70 71 72 73 74 5 Vol. Year 2011 2012 2013 2014 2015 5 Years Issue No. No. Citations 1-12 4114 1-12 2828 1-12 2420 1-12 2425 1-12 900 30 Issues 12687 Table-7 Distributions of citations %age 32.42689 22.29053 19.07464 19.11405 7.093876 100 Tables 7 indicate that the 65 volumes have 12687 citations appended to the 542 articles. Out of 12687 citations, vol. 70 has the highest number i.e., 4114 (32.42%) and Vol. 74 has the lowest number i.e. 900 (7.09%). CONCLUSION Journal of Scientific and Industrial Research has successfully completed 20 year of its publication. Analysis of contributions of 5 volumes of the journal shows that it covers contributions related to nearly all aspects of Scientific and Industrial Research. The journal is highly cited title among Indian researchers in the area of Scientific and Industrial Research. It has an world-wide recognition and is steadily growing to be a very promosing journal in the area of intellectual property rights by attracting scholoary articles from around the world. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] Pritchard A, Statistical bibliography or bibliometrics, journal of Documentations, 25 (4) (1969) 348-349. Lotka, A.J. “The frequency distribution of scientific productivity”, Journal of the Washington Academy of Sciences, Vol.16, p. 323, 1926. Bradford, S.C. “Sources of Information on specific subjects”, Engineering, Vol.137, pp.85-86, 1934. Sengupta I. N, Ghosh B.N & sengupta K. N, Role of bibliometric in journal selection and management, IASLIC Bulletin, 25 (2) (1980) 87-92. Mote, M.V., & Deshmuck, P.P (1996). Ciattion analysis of Annals of Library Science and Documentation. Annal of Library Science and Documentation, 43(1), 11-25 JENA (K.L). A bibliometric analysis of the journal ‘Indian journal of fiber and Textile Research, 1996-2004’. Annual of Library and Information studies Vol. 53, March 2006, pp. 22-30. Hazarika, Tilak, Goswami, Kusuma and Das, Pritimoni (1995). Bibliometric analysis of Indian Forester: 19912000, IASLIC Bulletins, 48(4), 213-223. Bharvi, D.; Garg, K.C;. & Bali, A. (2007). Scientometrics of the international journal Scientometrics. Scientometrics, 36(1), 81-93. Hussian, A; & Fatima, N. (2011). A Bibliometric analysis of the “Chinese Librarianship: an International Electronic Journal (2006-2010)’. Chinese Librarianship: an International Electronic Journal, 31. Retrieved 15 September 2011. Kunwar P Singh et al (2011), “DESIDOC bulletin of information Technology: a bibliometric study”. SRELS Journal of Information Management: 48(1) 57-68. Neeraj Verma et al. (2007), “Analysis of Contributions in Annals of Library and Information Studies”, Annals of Library and Information studies, 54: 106-111 Surendra Kumar and Kumar, S. (2008), Citation analysis of journal oil seeds research 1993-2004, Annals of Library and Information studies 55: 35-44. Sudhier, K.G. (2010), “Application of Bradford’s Law of Scattering to the Physical Literature: A study of Doctoral Theses Citations at the Indian Institute of Science”, DESIDOC Journal of Library & Information Technology: 30(2) 3-14. Singh (N) and Dominic (J). An analysis of citation pattern of Allopathy journal: a case study. IASLIC Bulletin; 51(1); 2006; p37-41. Swain (2011). Library Philosophy and Practice: 2004-2009: A scientometric appraisal Library Philosophy and Practice. Retrieved 15 September 2011 from: http://www.webpages.uidaho.edu/~moblin/dillipswain-LPP.pdf. Rana (M S). Research collaboration in Wildlife Science: a study of mammals’ research in India. International Workshop on webometrics, infometrics and scientometrics (IIT, Roorkee); 2-5 march, 2004; p291-304. Zainab, A.N.; Ani, K.W.U.; & Anur, N.B. 92009). A single journal study: Malayasian Journal of Computyer Science. Malayasian Journal of Computer Science, 22(1), 1-18. ISBN 1-63102-455-8 13 USES OF ELECTRONIC INFORMATION RESOURCES BY FACULTY MEMBERS IN MIT COLLEGE LIBRARY, MORADABAD: A SURVEY Ravindra Mohan | Library Assistant | INMANTEC Institution | Ghaziabad Amit Gupta | Assistant Librarian | INMANTEC Institution | Ghaziabad Abstract: This article aim is to show the uses of electronic resources in library of MIT College Moradabad. Library uses by the faculty members for their research, teaching, project purpose etc. In this article I examine the interest of the faculty members of using the internet, online database, electronic article, CD/DVD,s and services which provide by the library . In this article I also discuss that how much time faculty members are spend in the library. Keywords: Electronic Resources, Information, Library Services, User Study, MIT Moradabad INTRODUCTION The main function of the library is to provide the current information service to their users. Now these days internet is the life line for every people. Millions of people depend on the internet. Internet is the world largest network to get the information. In the Hi-Tech environment of library is unlimited collection of current information, electronic journals, electronic Books, printed and non printed materials. Users of electronic resources users have been increasing day by day. A. About MIT MIT is among the first degree engineering colleges established in U.P. under the Self Financing Scheme of Govt. of India, established in 1996. In early days the Institute had three B. Tech. Programmes. Presently the Institute runs nine B. Tech. Programmes, namely Computer Science & Engineering, Electronics & Communication, Information Technology, Electronics & Instrumentation Engineering, Mechanical Engineering, Electrical Engineering, Chemical Engineering, Civil Engineering & Electronics & Electrical Engineering Besides B.Tech. Programmes the Institute is running M.Tech. program in Mechanical Engineering and Electronics & Communication Engineering and M.B.A. B. Area & Infrastructure of MIT The Infrastructure of MIT College is a new standard of excellence for teaching, social and residential facilities. Set in a contemporary, cutting-edge and environmentally-friendly building of large built up area of 38495 Sq Meters consisting of seven large academic buildings Eighth academic building is under construction. The College features floors of teaching space, including classrooms, laboratories, and a state-of-the-art library. Institute has a Guest House of 567 Sq Meters It has five spacious, air conditioned guest rooms with all modern facilities These rooms are also available for parents of students coming from outside. C. MIT Library The central library is well equipped with all modern facilities and resources in the form of CD-ROM, Online database, audio video cassettes, books, journals, standards, specifications, theses, and reports etc. It has a rich collection of more than 74,000 documents which include books and bound volumes of periodicals. The collection is mainly strong in science & technology. The library currently involved in utilizing the networked information resources for providing recent and most comprehensive access to e- journals, e-books, e-patents and other e-reference resources to the faculty, student, staff, industries, and alumnus under intranet and internet environments. 14 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education OBJECTIVES OF THE STUDY    To know the usages of e-resources by the faculty members of MIT college Moradabad. To find out e-resource collection in the library. To find out how many hours faculty spend in the library for using e-resource METHODOLOGY The data for this study is based on questionnaires, interview, observation, opinions and comments by faculty members of MIT colleges of Moradabad. Total 50 questionnaires are distributed to the faculty members of MIT college Moradabad. Questionnaires’ containing both open-ended and closed questions was prepared and send to the faculty members of MIT College. Detailed questionnaire having information about infrastructure collection and services in the library were prepared and distributed to the users and collected. ANALYSIS AND INTERPRETATION OF DATA 1. Uses of Library by Faculty members in a week 10% 0% 0% Less than 10 hours 30% Oct-20 60% Table 1: Use of library in week Fig. 1 Use of library in a week It is analyzed from the table that the mostly (36%) faculty members visit the library daily and (20%) faculty members visit the library twice a week , whereas (26%) faculty members are respondent that they visit the library three times a week. Few (18%) faculty members are visit to library four times a week 2. Hours spend for the electronic sources in per week in searching web recourses Daily 18% 36% 26% 20% Table 2. Hours spend in library Twice a week Three times a week Four times a week Fig. 2 Spending hours in a week It is analyzed from the table that majority (60%) of faculty members spend time in the library for searching web resources in 0-10 hours in a week and (30%) faculty members spend time 10-20 hours in a week. Few (10%) faculty members visit library 20-30 hours in week. ISBN 1-63102-455-8 15 Uses of Electronic Information Resources by Faculty Members in MIT College Library, Moradabad: A Survey 3. Information service that faculty expected to find Table 3. Service expect to find Fig. 3 Faculty expect to find the service From the table it analyzed that majority (30%) faculty members visit to library for news paper clipping and (24%) faculty members visit to library for use the reprography section for the periodicals articles. Whereas (12%) faculty members are stay in the library for use the current awareness service , (12%) faculty members expect to find notification about conference /seminars/workshop and (12%) faculty members use the interlibrary loan service. But few (10%) faculty members visit the library for searching the literature for their research and for their article. 4. Uses of internet by faculty members Yes No Percentage M.I.T. 50 0 100% Total 50 0 100% 100% Use of Internet 0% MIT Table 4: Use of Internet Fig. 4 Using of internet On the basis of above data collected from the colleges it is analyzed that all the faculty members of MIT colleges understudy use the internet. From the analysis all the (100%) faculty members of MIT College, are normally use the internet for get the information. 5. Purpose of using internet Research 40% Entertainment 20% Education Health 0% Faculty Table 5.Purpose of use internet by faculty members 16 Sports Fig. 5 Purpose use of internet ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education The table shows that (38%) faculty members use the internet in library for growth his education and (32%) majority of faculty members use the internet for research, whereas (30%) faculty members use internet for entertainment /communication. Few (20%) faculty members use the internet for health and (20%) faculty members for sports. 6. Need of tools by faculty members to get access the documents Library Catalogue 40% Indexing Journals 30% 20% Abstracting Journals 10% 0% Faculty Table 6. Use of tools to get access the documents Reference Books Fig. 6 Use of tools to get access documents The table shows that mostly (32%) faculty members use the abstract journals to the access documents and (30%) faculty members use the reference books for gain the knowledge and (28%) faculty members visit the library to use the library catalogue. Few (10%) faculty members use the indexing journals to see the latest articles. CONCLUSION 1. All the faculty members are visiting the library to get access the online database. 2. Faculty members visit in the library daily and using the internet. 3. All the faculty members are satisfied that e-resource is the most powerful communication technology in the Hi-Tech environment 4. Faculty members visit the library to study for research, articles, newspaper, journals, books case study etc. [1] Maurya, Ram Nath , “Use of Electronic Resources in KGEC Kanpur: A Survey” Year 2012, Vol. 3, Issue: 2 , Print ISSN : 2229-4023. Online ISSN : 2249-3182 http://www.mitmoradabad.edu.in Research Methodology by C.R. Kothari on chapter 6 from page 89 Eqbal Monawwer & Khan Azhar Shah, Use of Electronic Journals by the Research Scholars of Faculty of Science and Faculty of Engineering, In:NACLIN 2007, p309-319. Naqvi Shehbaz Husain, Use of Electronic Resources at Jamia Millia Islamia (A Central University): A Case Study, In: NACLIN 2007, p320-324. REFERENCE [2] [3] [4] [5] ISBN 1-63102-455-8 17 RFID TECHNOLOGY FOR IDENTIFICATION, SECURITY AND DOCUMENT HANDLING IN LIBRARY Satish Kumar | Information Scientist, ARIES | Nainital, UK | sklisc@gmail.com Anil Kumar Mishra | Senior Technical Assistant ‘B’ | CVRDE, DRDO | Avadi, Chennai, Tamil Nadu | anilmlis@gmail.com Abstract: Radio Frequency IDentification (RFID) is a wireless non-contact system that uses radio-frequency waves to transfer data from a tag attached to an object, for the automatic identification and tracking. It is a technology that uses the radio waves for transferring data from an electronic tag called as RFID tag. Library RFID systems are composed of tags, readers and middleware software. The systems rely heavily on the Integrated Library Management System (ILMS). Tags are placed inside library documents. The readers are placed at staff workstations and self-check machines and built into security gates. The readers read the information on the tag and pass the information to the ILMS. RFID is a powerful technology that can change how libraries deal with physical as well as digital technologies to offer new services. Keywords: RFID; Library; RFID Frequency; RFID Tags RFID - INTRODUCTION A Radio Frequency Identification tag, or RFID tag, is a small tag placed on objects like shipping pallets or product packages. RFID tag contains a unique serial number, as opposed to a generic product identifier. In other words, it doesn't just identify that a pallet contains some Model123 computers. It identifies the pallet as being a specific, unique set of Model123 computers. When an RFID reader sends out a signal, the RFID tag responds by sending information back. It's possible to have many tags respond to one query if they are all with range of the reader. This makes accounting of lots of items easy. Even when items are stacked on top of one another or behind a wall, as long as signals can penetrate, it will be possible to get a response. RFID tags remove the need to manually or inventory each item and allow a census to be taken much more rapidly. Most RFID tags used outside of very high value applications are known as passive. This means that the tags do not have an embedded battery. The radio waves from a reader create a magnetic field that is used to provide just enough power to allow a tag to send out the information embedded within it. While RFID technology has been around for a long time, costs were unaffordable for most applications. Today a passive tag costs just a few rupees and prices continue to drop. HISTORY OF RFID RFID technology came into fame when the first Auto-ID lab at MIT (Massachusetts Institute of Technology) was started. The Auto-ID lab, was started by a consortium of businesses (including large retailers, packaged consumers good manufacturers and others), the US DoD (Department of Defence) and academics, who wanted to solve a very global and big problem – how to track shipment in the global supply chain. At that time, problems of pilferage, counterfeiting and lost shipments were in the range of billions of dollars (as they are even today). The Auto-ID centre was to find a solution, using automatic identification technology, to minimize these losses. Later on, the Auto-ID centre at MIT expanded to include a global chain of six labs at universities, including Cambridge (UK) and the University of Adelaide (Australia) among others. The technology, which MIT had developed upon that point, was licensed to an organization known as EPCglobal, who is then carrying it forward to develop standards, protocols and allot Electronic Product Codes (EPCs). The ultimate vision is to network all physical objects (including consumer items, containers etc.) into a globally pervasive "Internet of Things"2. 18 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education BASIC PRINCIPLES OF RFID The three key or the main components of an RFID system are tag, middleware and reader.  1. 2. 3. RFID tags: also known as transponders or labels which are attached to the objects. Tags could be of active, passive or semi-passive. There are tags with memory that are available to store information in the form of bits.  Reader: also known as transceiver (transmitter/receiver) made up of a Radio Frequency Interface (RFI) module and control unit. The readers are classified based on the frequency (LF,HF,UHF, etc.,) and also in terms of portability ( Fixed & Handheld).Their main function is to activate the tags, structure the communication sequence with the tag and transfer data between the application software and tags Middleware.  RFID middleware: It is a computer program that controls one or more RFID Interrogators and allows the data captured by those devices to be routed to another system. RFID middleware solutions provide messaging, routing, and connectivity features required to integrate RFID data into existing library management system4. The library management system connects data coming in from tags on library items such as Middleware provides a coherent and stable interface between RFID hardware operations and flow of data elements such as membership number, catalogue number, etc. into the library database3. RFID Tags: RFID tags are the objects containing the Radio Frequency circuits which are affixed to the items which need to be identified. We can think them as "Smart labels" or "Smart bar codes". Each RFID tag consists of a data storage device (like an electronic chip) and an antenna to communicate. To read RFID tags, one need RFID reader, just like one need to have a bar code reader to read bar codes. RFID tags and RFID readers communicate with each other using radio waves. The RFID tag may also have other components, based on its type. RFID tags can store enormous amounts of data, compared to bar codes. RFID Working System:A basic RFID system, at its minimum, requires and RFID tag and an RFID reader. If the tag is passive, then the radio waves coming from the RFID reader to the tag also supply it with power. The reader is said to 'interrogate' the tag. The tag replies and gives out the data stored in it. This data also travels through the air in the form of radio waves and is 'read' by the RFID reader. The RFID reader is then connected to a standalone PC or a network, which collects the data from the reader and transmits it to a higher level system. Many such tags communicate with one or more readers and many such readers are connected to a central computing system (e.g. EPR system or a Warehouse Management System or a similar database). In libraries, passive tags are used, these tags remain inactive. The readers will be always propagating radio waves. When a tag comes in the range (radio wave area) the tags harvests power get activated. Types of RFID tags: There are several types of RFID tags and they can be classified in many ways. One of the ways is by classifying them on the basis of their power source.    Active tags – RFID tags that have their own onboard power supply, like a battery. Passive tags – Those RFID tags that do not have their own power supply. These tags derive their power from the RFID reader, when it communicates with them. Semi-passive tags – These RFID tags have a smaller onboard battery, which is enough to retain only its onboard data. It cannot use this data for communication. Another way to classify RFID tag is by specifying whether the RFID tag is Read-Only tag or a Read/Write tag.   Read-Only RFID tags – Those tags that have the data fields written to it when it is manufactured and cannot be changed afterwards. These tags are also called Write once read many. Read/Write RFID tags – Those tags that have the data fields written to it many times over, by the users. Users can use RFID readers to write the data apart from reading. So, in this case the RFID reader is called RFID reader cum writer. These tags are also called Write many and read many. ISBN 1-63102-455-8 19 RFID Technology for Identification, Security and Document handling in Library Tags are divided on the size of the tag - Tag memory with 1K, Tag with memory 2K. In libraries passive tags with 1 K or 2 K memory and frequency 13.56 MHz. are used. 4. RFID Frequencies: RFID tags can be conceptually similar to small radio transmitters, which beam out information about themselves to RFID readers. Just like our domestic radios, RFID tags and readers operate at different frequencies in different bands, depending on the application. The RFID tags used in smart cards for toll passes operate at different frequency, than for tags that are used to track shipping containers in a truck yard. The typical frequency bands for RFID tags are divided into –  Low Frequency (LF) around 125 KHz.  High Frequency (HF) around 13.56 MHz  Ultra High Frequency (UHF) around 902- 928 MHz  Microwave around 2.45 GHz So, different types of RFID tags used different frequency bands, for different types of applications. Thus, RFID tags used in smart labels on books in a library are used in a different frequency band than the RFID tag used to track containers in shipping yards. In fact, though both use radio communication, their method of communication with their readers are also different. For example: some types of tags use a method known as "load modulation", while others use "backscatter" and so on. RFID Tags Low Frequency (LF) High Frequency (HF) Ultra High Frequency (UHF) Frequency 125kHz 13.56 MHz 100 MHz to 1 GHz Operating Distance 30 cm to 1 m 10 cm to 1 m Passive: up to 25 m Active: up to 100 m Characteristics Short read range. Read range is easier to control. Handle metal and water better than UHF. Can be affected by industrial noise. Slower data transfer rate. Cannot always communicate with multiple tags. Applications Short read range (especially NFC tags). Long read range. Fast reading of multiple tags. Read range easier to control than UHF. Not as effective as LF in presence of metal and water, but better than UHF. Unaffected by industrial noise. Can communicate with multiple tags simultaneously Library materials management and security, access control, banking cards, contactless payment systems, goods control, security. Less tag memory than HF. Poor performance liquids and metals. Operate in frequency. a around crowded Asset tracking, supply chain, logistics, toll booths, real-time locating systems, container security, library material management and security (limited) Table 1- Types of RFID tags (Source: Library Technology Report, Vol. 48, No.5, July 2012) 5. 20 Benefits of Library RFID system: The benefits of adopting RFID technology in library are – ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education     6. Reduction of staff manual processes, error and repetitive motion. Enhanced customer experience through fact and private self check-outs. Reduction of staff and patron time spent on finding items. Integrated security functionality. RFID Standards : Standards are established and agreed protocols that enable people, as well as devices to work and communicate. For example: English language. Similarly, there are established standards for RFID tags and the communication protocols used. These standards specify the frequency of communication, form of the data that is being transferred and many other aspects, which make it easier for tags and readers, often made by different vendors to communicate clearly and work harmoniously together. Many of these standards have been set by International organizations like ISO and are widely accepted. For instance ISO: 15693 & ISO: 18000 Part 2 Mode 3 etc. Standards act as a warranty on library's investment in RFID. Without standards, RFID is more risky investment for libraries. Standards eliminate vendor lock-in and allow for interoperability across different vendors' solutions. With vendors' interoperability, libraries can buy their RFID components from any vendor with the expectation that everything will work together. Standards lead to library and ILMS interoperability as well. With library interoperability, libraries can read each other's RFID tags, making resource sharing and inter library loan (ILL) transactions more secure and simple. Integrated Library Management Solution (ILMS) interoperability will allow libraries to switch from one ILMS to another without having to worry that their RFID components will stop working4. 7. RFID tags as an Anti-theft solution In Libraries, one bit chip in-built in the RFID tag, gets de-activated at the time of issuing and activated at the time of returning. If a book issued properly is moving through the walk through antenna (as the one bit chip is inactive) will not produce any beep sound. But when a book not properly issued and is moving through the walkthrough antenna, it will produce a beep sound thus alerts the counter Assistant. Similarly, it can be used in departmental stores. CONCLUSION RFID tags have been used in libraries since 1999, when the National Library of Singapore installed the first system. RFID tags, like barcodes, are used to uniquely identify library documents. It can be used for weeding, stock verification, ILL, materials handling, and possible even for providing enhanced content to patrons using RFID enabled Smartphone. But in order to develop these new library applications, Librarians need to be able to interface in more ways with the ILMS. It is also time to think creatively about what else libraries can do with RFID tags. This will require new protocols for communicating with the ILMS and development of new functions. REFERENCES [1] Renold, A. Pravin; rani R., Joshi. An Internet based RFID Library management System. Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013); 932-936p. [2] Xiaolin Jia; Quanyuan Feng; Taihua Fan; Quanshui Lei; , "RFID technology and its applications in Internet of Things (IoT)," Consumer Electronics, Communications and Networks (CECNet), 2012, pp.1282-1285. [3] K. Varma, M. Imtiaz Ahmed “RFID applications in libraries” 4th International Convention CALIBER-2006, Gulbarga, 2-4 February, 2006. [4] Ayre, Lori Bowen. "RFID in Libraries: A Step toward interoperability". Library Technology Reports. Vol. 48, No. 5, July 2012, pp. 1-35. ISBN 1-63102-455-8 21 CORE AND BEHAVIOURAL COMPETENCIES FOR LIBRARY PROFESSIONALS IN PANJAB UNIVERSITY CHANDIGARH: A SURVEY Dr. Rupak Chakravarty | Assistant Professor | DLIS | Punjab University | Chandigarh | India | rupak@pu.ac.in Jyoti Sharma | Research Scholar | DLIS | Punjab University | Chandigarh | India | jyotisharma@pu.ac.in. Abstract: Professional competence includes professional knowledge, attitude, and skills required in a particular profession. It is crucial in case of LIS professionals also. These competencies are based on the values of the organization and not only sharpen the ability of the professional but also contributes to organizational success in the long run. The purpose of this paper is to review the perception, expectations, preferences and current status of two competencies (core and behavioural) that are required by the library professionals. Core competencies are based on the values of the organization. Behavioural competencies (also referred to as personal competencies) encompass knowledge, skills, attitudes, and actions that distinguish excellent performers. This paper is an attempt to map these competencies level among Library Professionals of Panjab University, Chandigarh. The study is based upon the response received by the LIS professionals (library assistants and assistant librarians) for which a structured questionnaire was prepared. Keywords: - Competencies, Continuous professional development, CPD, Library Librarians, Library Assistants, Panjab University, Chandigarh Professionals, Assistant INTRODUCTION Competence is the ability of an individual to do a job properly. A competency is a set of defined behaviors that provide a structured guide enabling the identification, evaluation and development of the behaviors in individual employees.To enhance professional progress and define goals and objectives of an organisation a Competency profiles plays a vital role. Competencies are the characteristics employers look for in their employees. A lot of competency studies have been done to analysis need of necessary competencies to achieve fixed targets and to make the organization successful. These competencies are based on the values of the organization and not only sharpen the ability of the professional but also contributes to organizational success in the long run. Core and Behavioural competencies are categories of competencies. Core competencies are based on the values of the organization Behavioural competencies encompass knowledge, skills, attitudes, and actions that distinguish excellent performers. OBJECTIVES OF THE STUDY 1. 2. 3. To understand the status and trends regarding Core and Behavioural competencies of LIS professionals To identify the minor and major competencies being preferred by the LIS professionals. To do the comparative analysis amongst the Core and Behavioural competencies. SCOPE OF THE STUDY & METHODOLOGY This paper is an attempt to map these competencies level among Library Professionals of Panjab University, Chandigarh which include 17 (Seventeen) Assistant Librarians and 26 (Twenty Five) Library Assistants working on permanent basis. To obtain the necessary primary data, a structured questionnaire was prepared. The questionnaire comprised of 22 (Twenty Two) questions out of which, Core Competencies (Part A) has 8 (Eight) questions and Behavioural Competencies (Part B) has 14 (Fourteen) questions. For calculating scores assigned by respondents multiples of 10 was taken as base. The total population for survey was 43. The authors were able to obtain data from all the (43) respondents thus making the response rate 100%. 22 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education DATA ANALYSIS & INTERPRETATION Core Competencies A core competency is a specific factor that a business sees as central to the way the company or its employees work. It fulfils three key criteria including it is not easy for competitors to imitate, it can be reused widely for many products and markets and it must contribute to the end consumer's experienced benefits and the value of the product or service to its customers. Core competencies are particular strengths relative to other organizations in the industry, which provide the fundamental basis for the provision of added value. Core competencies reflect the collective learning of an organization and involve coordinating diverse production skills and integrating multiple streams of technologies. It includes communication, involvement and a deep commitment to working across organizational boundaries. The following table enlists the main core competencies relevant to the library professionals and libraries: Table 1: Core Competencies Figure 1: Core Competencies ISBN 1-63102-455-8 23 Collection and Preservation of Newspapers: A Case Study Figure 1 indicates that highest priority has been assigned to the aspect of Team Work (mean score = 325) followed by Result Oriented (mean score = 313) and Innovation & creativity (mean score = 305). The component further study is having least mean score i.e. 250. It can be interpreted from the above figure that all of the components were give importance and none of the aspect has been highly ignored. Behavioural Competencies Behavioural competencies encompass knowledge, skills, attitudes, and actions that distinguish excellent performers. In order to achieve consistency of understanding across the University and to enhance discussions about work behaviours, the following definitions are provided. Select the statements that best fit the work being reviewed and discuss them with the employee when giving feedback and setting expectations. Table 2: Behavioural Competencies Figure 2: Behavioural Competencies 24 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Figure 2 above depicts that amongst the many behavioural competencies, “Committed to lifelong learning and personal career planning” as well as “Effective communication skills” received maximum preference (mean score = 320 each). They were closely followed by the competencies like “Creative Skills” and “Recognize the value of professional networking” a having mean score of 317 and 315 respectively. The component attend/presented Paper in Conferences/ Seminars at regional/national/international levels got least mean score of 252. CATEGORY WISE EVALUATION Category Competencies Mean Scores (total) A Core Competencies 1751.25 B Behavioural Competencies 1795.71 Table 3: Category wise analysis Comparative Analysis Behavioural Competencies 51% Core Competencies 49% Figure 3: Category Wise Analyses Table and figure 3 above reveal that library professionals have given prime significance to the category i.e. Behavioural Competencies (51%). Category B i.e., Core Competencies (49%) has been given less emphasis by library professional as compare to behavioural competences ISBN 1-63102-455-8 25 Collection and Preservation of Newspapers: A Case Study CONCLUSION By analysis the competencies preferences of the library professionals it can be concluded that there is strong need to facilitate all domains of competencies with greater emphasis on core competencies. Highest priority has been assigned to the aspect of Team Work and Committed to lifelong learning and personal career planning in Core & Behavioural Competencies respectively. The component further study is having least mean score i.e. 250 in Core Competencies The component attend/presented Paper in Conferences/ Seminars at regional/national/international levels got least mean score of 252 in Behavioural Competencies. For this, a more holistic approach has to be implemented to have more skilled staff with greater job satisfaction because a skill and satisfied library professional can understand and meet the user needs in a better way. REFERENCES [1] [2] Bryant, Josephine and Poustie, Kay (2001). “Competencies Needed by Public Library Staff”. Behavioral Competencies. (n.d.). Retrieved September 29, 2013, from http://www.hr.msu.edu/performance/ supportstaff/competencies.htm [3] Competence (human resources). (2015, May 26). In Wikipedia, The Free Encyclopedia. Retrieved 08:02, June 12, 2015, fromhttp://en.wikipedia.org/w/index.php?title=Competence_(human_resources)&oldid=664048971 [4] What are Competencies? | WikiJob. (n.d.). Retrieved September 29, 2013, from http://www.wikijob.co.uk/wiki/ what-are-competencies 26 ISBN 1-63102-455-8 USE OF DIGITAL LIBRARY SOFTWARE TO DEVELOP INSTITUTIONAL REPOSITORY IN IITS LIBRARIES: AN ANALYSIS Dr. Manoj Kumar Verma | Assistant Professor | Deptt. of Library & Information Science | Mizoram University | Aizawl | manojdlisbhu@gmail.com Abstract: In the present digital era, where users demand exact, secure and update information in any time, any were, any way, mode. Library cannot provide such type of information services with the traditional concept of library and its working style. To satisfy the demand of the present digital era users, Libraries have to change the traditional techniques and adopt the ICT based new techniques and technology. With the help of these techniques and technology library can share their research output globally by access and disseminate research information in digital form. The Institutional Repository (IR) is digital libraries which manages and maintain by an institution/ organization and hosted their research output in public domain for accessing preserving and sharing. The spirit of IR is to make global visibility of research publications of an organization. To develop an IR, digital library software is required and the success of IR is depending upon this software. The aim of this paper is to analyze the use and application of digital library software to develop IR in IITs. Keywords: Institutional Repository (IR); Digital Library (DL); Digital Content; Open Access; Library software, Open Source Software; Digital Library Software etc INTRODUCTION The ICT makes tremendous impact on library and s completely changed the old concept, meaning and services of traditional library. Due to emergence of digital resources in last two decades and observed its popularity and research impact among the academic community. Now many libraries has started to move towards digital library to satisfied their users demand in this digital era. The Institutional Repository (IR) is digital libraries which manages and maintain by institutions/organizations and hosted their research output in public domain for accessing preserving and sharing. Institutional repository is a collection of digital works which includes the published and the unpublished works of the scholars or even anything a contributor deposits. The information can be accessed from a remote area with the help of internet at anytime. The open access concept has come up with the solutions for the problems like storing, arranging and disseminating the primary source to their end users. The establishing of Institutional Repositories is a step ahead for open and free access. IR helps in communicating the scholarly literature with the researchers and the students who are unable to reach the information because of the problem of the access of these resources. Indian Institute of Technology Indian Institutes of Technology are apex institutions for engineering education and research. These are a group of autonomous engineering and management institutes of India. At present, there are sixteen Indian Institutes of Technology (IITs) located at Bombay, Delhi, Kanpur, Kharagpur, Madras, Guwahati, Roorkee, Hyderabad, Patna, Bhubaneshwar, Ropar, Jodhpur, Gandhinagar, Indore, Mandi and Varanasi. All IITs are governed by the Institutes of Technology Act, 1961 which has declared them as "Institutions of National Importance", and lays down their powers, duties, framework for governance and are linked to each others through a common IIT council. The main objective of IITs is to impart world class education in engineering and technology to conduct research in the relevant fields, and to further advancement of learning and dissemination of knowledge. These Institutes are also contributing significantly to education and research in basic sciences and humanities. 25 Institutional Repositories (IR) ISBN 1-63102-455-8 27 Use of Digital Library software to Develop Institutional Repository in IITs Libraries: An Analysis All the new trends and developments of technologies have come up with new strategies to accelerate to changes in scholarly communication. IR is an electronic mechanism for providing access to digital information to the faculties and the students of an institution. In the present digital world it is very necessary to built up an Institutional Repository for all the organizations because of the increase in publishing the scholarly research materials to preserve it as well as in accessing the knowledge from any part of the world at anytime. Institutional repositories emerged in the year 2002 with the launch of DSpace at MIT and it was coined by SPARC (Scholarly Publishing and Academic Resources Coalition). The different authors have tried to explain the term Institutional Repositories (IR) to make it understand; Shearer19 defined IR as “an institutional repository (IR) is a digital archive of an institution’s intellectual output. They collect and make accessible a range of research material and also part of a larger global system of repositories”. Clifford A. Lynch11 defines as “a university based institutional repository is a set of services that a university offers to the members of its community for the management and dissemination of digital materials created by the institution and its community members. It is most essentially an organizational commitment to the stewardship of these digital materials, including long-term preservation where appropriate as well as organization and access or distribution”. Purpose of Institutional Repository The main purpose of IR is to preserve and making available of research output of an institutions/organization on public domain. Other objectives to having IR in an institution are:       To create global visibility and wider access for an institutions’ academic research output To serve the research community by putting their research papers at a single location and check the duplicity of work. To providing open access to institutional research output be self archiving To store and preserve other unpublished (gray literature) like thesis and research reports, technical reports etc. To bring prestige to the author as well as to the organization for their contribution To get recognition from peers by getting citation of their work. Benefits of IR The Institutional repositories also have many benefits such as;          The Institutional Repository minimizes the access barriers and maximizes the rate of dissemination of scholarly communication. IR helps in publicizing the research and the teaching programmes of their staff and students. IR brings out the research outputs of an institution to the world. IR helps in getting all the materials published by the scholars in the university at one place. It manages the academic and the research activities. It helps in avoiding the duplication of research works. It also enables us for the interdisciplinary approach for the research. The students easily get accessible to the university’s publication via institutional portal through internet or intranet. Works of art and photographs and video recordings, etc. IR Software Software is an important part in building up a successful Institutional Repository in an institutions or an organization. There are many open source software packages available in the market for IR. The commonly used IR software is mentioned below: 28 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education A) DSpace6: DSpace was developed by MIT (Massachusetts Institute of Technology) libraries and Hewlett- Packard labs. It is open source software for academic, non-profit and commercial organizations for building up open digital repositories. It preserves and enables access to all types of digital content including text, images, moving images, mpegs and data set. B) EPrints22: GNU EPrints is open source software which was developed by the University of Southampton. It is open access repository software that is compliant with the Open Archives Initiative Protocol for Metadata Harvesting. This software accommodates a wider variety of digital objects to consolidate a wide range of services and applications in serving the needs of the whole institution. C) CDSware8: CDSware is developed by CERN (Conseil Européen pour la Recherche Nucléaire) in Geneva. It is designed to run on the website and become OAI compatible. D) Fedora7: Fedora (Flexible Extensible Digital Object Repository Architecture) was developed by the researchers at Cornell University as an architecture for storing, managing, and accessing digital content in the form of digital objects. E) Greenstone14: This software is for building and distributing digital library collections. It was produced by the New Zealand Digital Library Project at the University of Waikato, and developed and distributed in cooperation with UNESCO and the Human Info NGO. It has been issued under the terms of the GNU General Public License. OBJECTIVE AND SCOPE OF THE STUDY The objectives of the study is to determine the IITs libraries which having the institutional repository and to know which software they are using for their IR. The scope of study was confined to all 16 IITs (as listed in MHRD website, http://mhrd.gov.in/technical-education-2). METHODOLOGY The survey method was used as research methodology in this study. The questionnaire was used as a tool to collect the primary data. A structured online questionnaire was prepared and distributed to all 16 Librarians of Indian Institute of Technology. The collected data was tabulated and graph has been prepared by using excel spreadsheet for analysis and draw the conclusion based on selected parameters. DATA ANALYSIS Sl. No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ISBN 1-63102-455-8 Name of the Institute State/Union Territories Whether the Institute has Institutional Repository or not IIT Kharagpur West Bengal Yes IIT Bombay Maharashtra Yes IIT Kanpur Uttar Pradesh Yes IIT Madras Tamil Nadu Yes IIT Delhi Delhi Yes IIT Guwahati Assam NA IIT Roorkee Uttarakhand Yes IIT Bhubaneswar Odisha NA IIT Gandhinagar Gujarat Yes IIT Hyderabad Telangana Yes IIT Jodhpur Rajasthan NA IIT Patna Bihar NA IIT Ropar Punjab Yes IIT Indore Madhya Pradesh NA IIT Mandi Himachal Pradesh NA IIT BHU Varanasi Uttar Pradesh NA Table-1: Uses of Institutional Repository by IITs’ Library 29 Use of Digital Library software to Develop Institutional Repository in IITs Libraries: An Analysis IR in IITs 44% Yes 56% No Figure 1: IITs having Institutional Repository There are sixteen IITs in India, out of which only 9 (56%) IITs having Institutional Repository and 44% IITs do not have IR. But IIT Guwahati and IIT Bhubaneswar have mentioned that they are in the process of implementing IR in their respective institutes in future very soon. IR Software No. of IITs using Percentage DSpace 9 90 EPrints 1 10 Table-2: Digital Library Software used for IR 10% Dspace EPrints 90% Figure 2: Digital Library Software using by the IITs. All the IITs, having IR are using two types digital library software- Dspace and EPrints. The majority of IITs (90%) are using DSpace software for IR, whereas only 10% IITs are using EPrints software for their IR. The IIT Hyderabad is using both DSpace and EPrints software for his IR. FINDINGS On the basis of data analysis, the findings of study are as: 1 Out of the 16 IITs in India, only 9 (56%) IITs (IIT Kharagpur, IIT Bombay, IIT Kanpur, IIT Madras, IIT Delhi, IIT Roorkee, IIT Gandhinagar, IIT Hyderabad, and IIT Ropar) are having IR and 7(44%) IITs don’t’ have IR right now. Although, 2 IITs (IIT Guwahati and IIT Bhubaneswar) have reported that they are in the process of implementing IR in their institute. 2. Dspcae digital library software commonly used as digital library software to develop IR because almost all the IITs having IR are using the DSpace software, whereas, IIT Hyderabad is using both DSpace and e-Prints software for their institute for IR 30 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education CONCLUSION The Institutional Repository (IR) movement in India was started in 2004 when MS Swaminathan Foundation and Indian National Science Academy had signed the Berlin Declaration and same year Indian Institute of Science developed their IR. After that many institutions and organizations including IITs has started to develop their IR and it can be probably viewed as one of the most significant happenings in the information world because through IR they are going to put their academic output on public domain. Now, the librarians and scholars made tremendous efforts to utilize it various content to improve the scholarly out put of institutions. The initiative of “institutional repositories” definitely included many opportunities and challenges to libraries as well as Librarians but it facilitate a lot to users as well as contributor. Academic libraries and librarians have to play a most important role in developing successful repositories for their institutions and change the landscape of scholarly communication at global level. The IR software will also play an important role in success of IR because the success of digital library is depending upon the quality of software. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] Budapest Open Access Initiative. 14 February 2002. 24 September 2014 <http://www.budapesto penaccessinitiative.org/read>. Chand, Prem, et al. "Institutional Repositories, Open Access Movement and OAI- PMH Complaint Software." 2nd Convention PLANNER. Imphal: INFLIBNET Centre, 2004. 52-64. Crow, Raym. The Case For Institutional Repositories: A SPARC Position Paper. ARL Bimonthly Report. Washington, DC: SPARC, 2002. Deka, Dipen. "The Role Of Open Source Software In Building Institutional Repository." 4th Convention PLANNER. Aizawl: INFLIBNET Centre, 2006. 121-127. Devi, Thiyam Satyabati. "Edifice of Institutional Repositories in UNISWA Library: A Challenge." 6th Conventional PLANNER. Nagaland: INFLIBNET Centre, 2008. 70-75. DURASPACE. DSPACE. 15 October 2014 <http://www.dspace.org/>. Fedora. 15 October 2014 <http://www.fedora-commons.org/>. Invenio. CDSware. 15 October 2014 <http://cdsware.cern.ch/>. Kamila, Kanchan. "Institutional Repository Projects in India." 7th International CALIBER. Puducherry: INFLIBNET Centre, 2009. 128-132. Lalremsiami. "Institutional Repository With Special Reference to Initiative of Mizoram University." 8th Convention PLANNER. Gangtok: INFLIBNET Centre, 2012. 252-258. Lynch, Clifford A. Institutional Repositories: Essential Infrastructure For Scholarship In The Digital Age. A Bimonthly Report. Washington, DC: Association of Research Libraries, 2003. Mahemei, Lohrii Kaini and Muttayya Koganuramath. "Institutional Repository of Jawaharlal Nehru University Library, New Delhi." 4th Convention PLANNER. Mizoram: INFLIBNET Centre, 2006. 64-70. Nahak, Brundaban and Sanjukta Nahak. "Institutional Repositories: The Prospects and Challenges in Indian Digital Library Environment." 8th Convention PLANNER. Gangtok: INFLIBNET Centre, 2012. 233-244. New Zealand Digital Library Project. Greenstone Digital Library Software. 2005. 16 October 2014 <http://www.greenstone.org/>. Passah, Pansngiat. "Institutional Repositories of India: A Comparative Study of North-Eastern Hill University with Other Universities." 8th Convention PLANNER. Gangtok: INFLIBNET Centre, 2012. 245-251. Roy, Bijan Kumar, Parthasarathi Mukhopadhyay and Subal Chandra Biswas. "An Analytical Study of Institutional Digital Repositories in India." Library Philosophy and Practice (2012): 1-7. Satarkar, S P, R G Dharmapurikar and R D Kale. "Pilot Study of Institutional Repository For Swami Ramanand Teerth Marathwada University, Nanded." 6th Convention PLANNER. Nagaland: INFLIBNET Centre, 2008. 320330. Sharma, Ajay Kumar, Nimai Chand Saha and Kevinino Mechieo. "Institutional Repositories and Skills Requirements, A New Horizon to Preserve the Intellectual Output: An Indian Perspective." 6th Convention PLANNER. Nagaland: INFLIBNET, 2008. 336-353. Shearer, Kathleen. "Institutional Repositories: Towards Identification of Critical Success Factors." Canadian Journal of Information and Library Science (2003): 250-263. SPARC. Open Access. 2007. 16 October 2014 <http://www.sparc.arl.org/issues/open-access>. Suleta, Thoudam and Keisham Sangeeta. "Institutional Repositories: A Gateway For Knowledge Revolution." 4th Convention PLANNER. Aizawl: INFLIBNET Centre, 2006. 161-165. University of Southampton, UK. eprints. 2011. 15 October 2014 <http://www.eprints.org/>. Wikipedia. Wikipedia The Free Encyclopedia. 16 October 2014 <http://en.wikipedia. org/wiki/Indian_Institutes_of_Technology>. http://mhrd.gov.in/technical-education-2 Verma, Mk and Devi, Ksh. Krishna. “Creation and Use of Open Access Initiatives in Indian Institute of Technology (IITs) through Institutional Repository: A Survey”. KNOWLEDGE ORGANISATION IN ACADEMIC LIBRARIES New Delhi, Library Professionals association (LPA), Pp70-79. ISBN-978-93-5196852-2. ISBN 1-63102-455-8 31 GREENSTONE: OPEN SOURCE SOFTWARE FOR DIGITAL LIBRARY DEVELOPMENT Anil Kumar Jharotia | Librarian | Tecnia Institute of Advanced Studies | GGSIP University | Delhi Shikha Verma | Asst. Librarian | Tecnia Institute of Advanced Studies | GGSIP University | Delhi Jyoti | Library Assistant | Tecnia Institute of Advanced Studies | GGSIP University | Delhi Abstract: Now a day’s computerization became very important for the smooth running of Library. Library is a storehouse of knowledge. It is also called the heart of the institution. It help user for learning, research programme etc. Computerization and Automation in libraries increase the effectiveness and efficiency of library service. So the role of computer and automation in library is very crucial. Automation in Libraries helps to give better services to the user. Many open source library software now available on the internet. Greenstone is a suite of software tools for building and developing of digital library Keywords: GSDL, Free Software, OSS, Library Automation INTRODUCTION Open Source Software: Which software are free available on internet that is called Open Source Software as well as free software. Open source software appeared in the mid – 1990s with the creation of the GNU (or GNU’s NOT UNIX) project, aimed at developing a freely available UNIX – like operating system. The GNU website provides the following definition of “free software” which is key to the philosophy of the open source software: “Free software” is a matter of liberty, not price. To understand the concept, you should think of “free speech “not as in “free beer”. Free software is a matter of the users’ freedom to run, copy, distribute, study, change and improve the software. Many open source library software now available in the market. Open Source Software is computer software that is available in source code form for which the source code and certain other rights normally reserved for copy right holders are provided under a software license that permits users to study, change, and improve the software. Some open source licenses meet the requirements of the Open Source Definition. Some open source software is available within the public domain. The Open Source Initiative (OSI) was formed in February 1998 by Raymond and Perens and in August 1998 greenstone.org website has been established. With about 20 years of evidence from case histories of closed and open development already provided by the Internet, the OSI continued to present the 'open source' case to commercial businesses. They sought to bring a higher profile to the practical benefits of freely available source code, and wanted to bring major software businesses and other high-tech industries into open source. More precisely it refers to four kinds of freedom for the users of the software:     The freedom to run the program, for any purpose The freedom to study how the program works, and adapt it to your needs. Access to the source code is a precondition for this. The freedom to redistribute copies so you can help your neighbor The freedom to improve the program, and release your improvements to the public, so that the whole community benefits. Access to the source code is a precondition for this. A Program is free software if users have all of these freedoms. Thus, you should be free to redistribute copies, either with or without modification, either gratis or charging a fee for distribution, to anyone anywhere being free to do these things means ( among other things ) that you do not have to ask or pay for permission. (www.gnu.org) An indication of the worldwide applicability of open source software is provided by the number of languages in which homepage of the GNU website exists.: Albanian, Chinese, Dutch, English, Korean, Italian, Japnese, 32 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Spanish, Thai, Polish, Romanian,. A Special license, known as the GNU Licence, is often used for the distribution of open source software. A directory of open source software is available form the Free Software Foundation on the GNU website. The directory was started in 1999 and since 2003 Unesco has been involved in its development. “Standard” open source software includes:     Apache – an HTTp – compliant web server Linux – an operating system My SQL – a relational database management system that support the query language SQL o (Structured Query Language) Perl – a general, high – level scripting language Open source software is of great benefit in many countries. In using such software it must be realized that a certain amount of expertise is required to enable any particular software to meet the needs of the particular digital library system being developed. Staff with such expertise is likely to be in demand, and many not stay in the institution for a long time. In such cases it will be necessary to ensure that appropriate documentation has been produced so that use of the software and its “customization” to meet local needs can be understood by successive members of staff. Some LMS suppliers are beginning to be aware of open source software developments: innovative, for instance supports Linux. In a special issue of Information Technology and Libraries on open source software, Morgan (2002) outlines its possibilities for the development of digital library collections and services. Through funding from the DLI, Morgan was one of the developers of the personalization software My Library @ NCState at North Carolina State University (referred to in Chapter Two) and which is now distributed as open source software using the GNU public license. In his paper Morgan Emphasizes that open source software is both a Philosophy and a process. The Philosophy is described in the quote given above and the original developers is assisted by others who are attempting to solve similar problems in a two heads are better that one approach. A list of open source software for libraries is maintained (www.oss4lib.org) DEFINITION The Open Source Definition is used by the Open Source Initiative to determine whether a software license can be considered open source. The definition was based on the Debian Free Software Guidelines, written and adapted primarily by Bruce Perens. Perens did not base his writing on the "four freedoms" of Free Software from the Free Software Foundation, which were only widely available later. Greenstone: The Greenstone is opensource software, issued under the terms of the GNU General Public License. The aim of the software is to empower users, particularly in universities, libraries, and other public service institutions, to build their own digital libraries. Greenstone digital library software is an open-source system for the construction and presentation of information collections. Collections built with Greenstone offer effective full-text searching and metadata-based browsing Fig. 1: Greenstone Digital Library Software facilities that are attractive and easy to use. Moreover, they are easily maintainable and can be augmented and rebuilt entirely automatically. The system is extensible: software “plugins” accommodate different document and metadata types. Greenstone incorporates an interface that makes it easy for people to create their own library collections. Collections may be ISBN 1-63102-455-8 33 Social Networking and Library Consortia built and served locally from the user’s own Web server, or (given appropriate permissions) remotely on a shared digital library host. End users can easily build new collections styled after existing ones from material on the Web or from their local files (or both), and collections can be updated and new ones brought online at any time. Greenstone began in 1995, with a small group of people who wanted to make online technical reports more accessible to the research community by presenting them over the Web in a uniform and fully searchable way. Combining skills from several areas, and using existing public-domain compression and indexing software, a tool was devised that compiled an index from the full text of a large set of computer science technical reports gathered from many international FTP sites. Users could search for documents using any combination of words, and receive an ordered list of documents whose full text included those words, along with hyperlinks back to the original documents. The result was striking: it frequently drew attention to many extremely pertinent but previously unknown documents (such as obscure PhD theses), without the need to invest any effort in manual metadata production. Greenstone is a suite of software tools for building and developing of digital library collections on the Internet or CD-ROM. Greenstone is open-source, multilingual software, issued under the terms of the General Public License GNU. Greenstone is produced by the New Zealand Digital Library Fig. 2: Greenstone Librarian Interface Project at the University of Waikato, and has been developed and distributed in cooperation with UNESCO and the Human Fig. 2: Greenstone Librarian Interface Info NGO in Belgium (http;//www.greenstone.org) Greenstone has been implemented with interfaces in a number of languages and in addition, the full documentation is a available in a number of languages including English, French, Kazak, Russian, and Spanish. In Chapter Six there are examples of the Greenstone interface in Arabic and in Czech. The aim of the software is to empower users, particularly in universities, libraries, and other public service institutions, to build their own digital libraries. The development and distribution of Greenstone is being carried out by NZDL in conjunction with Unesco and the Human Info NGO ( Non Govermental Organization ). The dissemination of educational, scientific and cultural information throughout the Fig. 3: Greenstone Web Download Setting world, and particularly its availability in developing countries,is central to Unesco goals as pursued within its intergovernmental Information for All Programe, and appropriate, accessiable ICTs such as Greenston, are seen as important tools in this context. The 34 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Human Info NGOs documentation is based Antwerp, Belgium and works with UN agencies and NGOs involved in digitizing document of interest to human development and making it widely available, free of charge to developing nations,and on a cost – recovery basis to others.      Archives of Indian Labour (http:// www.indialabourarchives.org) Bibliotheca Digital porla Identidad /Human Rights in Argentina (http;//conadi.jus.org.ar/gsdl/cgi-bin/library) Digitale bibliotheca Information und Medien at the University of Applied Sciences in Stuttgart, Germany (http;//Diana.iuk.hdm-stuttgart.de/digbib/gsdl/cgi-bin/library) Mirabilie Vicomercate-local history collections in a public library in Italy (http;//www.mirabilliavicomercati.org./sezioni/606/index.html) FEATURES OF OPEN SOURCE SOFTWARE Open source doesn’t just mean access to the source code. The distribution terms of OSS must comply with the following criteria:          Derived works Distribution of license Free redistribution Integrity of the author’s source code No discrimination against persons or groups No discrimination against fields of Endeavour License must not be specific to a product. License must not restrict other software Source code SYSTEM REQUIREMENTS FOR GSDL Operating Systems required for Greenstone software installation, Windows 2OOO, Windows XP, Windows Vista, Windows 7, Windows 8 and Java Runtime Digital Library Architecture The software used for developing digital libraries, then, can come from a variety of organizations or from an open source collection. Much of the software is based on international ( developed and developing ) standards that enale functions such as reference linking ( that is the ability to click on a reference to an item and then be presented with the item itself on the screen ) between many diverse systems and services, as described by Caplan. The interoperable building blocks that can linked together to develop an application such as a digital library are generally known as “Web Services” Tennat states that “these can be thought of as a suite of protocols that define now requests and responses between software applications should be encoded and transferred ( for example over the web via http or e-mail ) and how such services should be described and registered for research discovery and use Hickey provides an introduction to the concepts of web services with examples taken from the digital library world. In the very first issue of D – Lib Magazine, Arms outlined the key concept in the architecture of digital library systems which include Standards in Digital Libraries     Archiving and Preservation Standard. Digital Collection Development Standard Metadata Standards for Cataloguing Contents and Indexing Standards. Electronic Publishing and Retrieval Standards for Books, Journals and other Objects such as OAI-PMH and Z39.50. ISBN 1-63102-455-8 35 Social Networking and Library Consortia Metadata in Digital Libraries:     Metadata can be classified into 3 broad categories Descriptive Metadata; Structural Metadata; and Administrative Metadata Metadata Standards:        Dubline Core (DC) – set of 17 metadata elements. Learning Object Metadata (LOM). Metadata Encoding and Transmission Standards (METS). Metadata Object Description Scheme (MODS). MPEG multimedia metadata The Encoded Archival Description (EAD). Visual Objects.     Software does not depend on specific hardware or operating system platform in order to function. Since source code is available, one can customize the software as per the end users requirements. It is possible to incorporate the software into another program to perform new function. With OSS, people can have any number of copies of programs on their machine, at home or at work.                  36 BENEFITS OF USING OPEN SOURCE SOFTWARE ADVANTAGES OF OSS Ability to incorporate tools for personal health, such as personal health records No cost or a lower cost for licensing "open source" solutions Flexibility to adapt the software for particular health care solutions Continuing software enhancements available through the open source community "Mission" rather than "market" objectives focused on patient-centered, population-based health improvement Open architecture allows for greater opportunities for health information exchange Many pre-existing tools for interface and reporting already developed Tools make it easier to build generic rather than custom interfaces Centralized hosting using the health center-controlled network model affords economies of scale DISADVANTAGES OF OSS Difficult for smaller organizations to afford the resources individually Often no single source to support all aspects of the application; multiple sources of technical and clinical support may be required Must understand business logic to adjust configuration or make code adjustments to meet unique work flow and clinical needs Difficult to engage support of vendors with practical experience in supporting the application; often they have retired or left the agency May require sophisticated professional guidance on licensing issues and the preparation of contracts The open source solution may not be CCHIT certified by the originating agency and this may provide challenges, especially if the user is seeking grant funding that requires, as a condition of funding, that the software to be acquired is CCHIT certified. Often have to adapt and develop training materials appropriate for the particular application of the open source solution Must guard against information overload and alert fatigue ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education SOFTWARE NEED FOR AUTOMATION Before be look into the needs of software let us see what are the activities in a library that can be automated. The libraries also need to interact with other libraries to share resources. So the third type of activity would be resource sharing with other libraries. Each of these three kinds of activities is mostly still done manually in the traditional libraries.      Housekeeping Activities: The Housekeeping activities are essential for the day-to-day functioning of the library. These include: use of software in library. Acquisitions: Tracking purchase of the materials through ordering, claiming, receiving, invoicing and processing. Cataloging: Creating cataloging records. Serials: Automating ordering, receipt routing and renewals of all serial subscriptions. Reminders: For library patrons as well as venders of books and periodicals Services to Users:       Online public Access Catalogue(OPAC): An electronic record of holding, bibliographic and item information. Circulation: Allowing libraries to check materials in and out, place renewals or holds, and enter payment. Cooperative Cataloguing: For sharing the cataloguing work among a group of libraries. Reference services: To the users and others communities. Resource sharing: For sharing resources. Union Catalogue: To enable easy identifications’ of a resource in the holdings of a group of libraries. DIFFICULTIES IN USING OPEN SOURCE SOFTWARE IN INDIA There are some problems of using OSS in libraries in India, some of them are:       Copyright /IPR Issue Lack of proper Information & Communication Technology (ICT) infrastructure. Lack of proper Planning and Integration of Information Resources Rigidity in the publishers policies Lack of ICT strategies and policies Management Support CONCLUSION Greenstone is a suite of software tools for developing of digital libraries and using this GSDL open source software in the library, money that otherwise would be spent on software solutions can be used for other important resources, such that as purchasing, additional media resource (books, journals etc.), or can be used to hire educated, technical support that provides patrons with the know how to better use already existing resources. In addition, this free software is constantly being updated changed, and customized to meet the library’s needs. Open Source Movement and Free Software Movement given lot’s of thing to society. The OSS has natural strengths which benefit individual users. Above and beyond this, the widespread use of OSS holds advantages open standards and open data. The implementation of above software is not possible without support of management and motivations. REFERENCES [1] [2] [3] Arora, Jagadish (2006). Building Digital Libraries: an overview. DESIDOC Bulletin of Information Bainbridge, David, McKay, Dana and Witten, Ian H. (2004). Greenstone digital library developers guide, Newzealand, Dept. of Computer Science, University of Waikato. Choosing and Using Free and Open Source Software: A primer for nonprofits. Retrieved from http:/ /www.nosi.net/choosing-and-usingfree-and-open-source-software- primernonprofits/chapter-3 ISBN 1-63102-455-8 37 Social Networking and Library Consortia [4] Courant, P. N., & Griffiths, R. J. (2006). Software and collaboration in higher education: A study of open source software. Ithaca, NY: Organization for Open Source Software Study. Retrieved from http://www.ithaka.org/strategicservices/ oss/OOSS_Report_FINAL.pdf. [5] C. Lagoze and H. Van de Sompel. The Open Archives Initiative: Building a low-barrier interoperability framework. In Proceedings of the Joint Conference on Digital Libraries (JCDL ’01), 2001. [6] Greenstone Digital Library Software. Retrieved from http://www.greenstone.org/ [7] Greenstone Overview. 2012. Retrieved from http://www.greenstone.org/manuals/gsdl2/en/html/Chapter_overview_of_greenstone.htm [8] Greenstone Developers Guide. (n.d.). Retrieved from http://www.greenstone.org/developer-guide [9] Information resource management using IT: a training programme, November 6 – 11, 2006, Centre for Media & Rural Documentation, National Institute of Rural Development, Hyderabad. [10] Jharotia, Anil Kumar (2013). Development of Digital Libraries through Open Source Software Conference proceedings of RKGIT College held on 16 March 2013. (pp.78-90). Ghaziabad: RKGIT [11] New Zealand Digital Library project Retrieved from http://www.nzdl.org [12] Rama Reddy, E (2005). Open Source systems in the library and on the Net International workshop on Democratization of Information: Focus on Libraries, Retrieved from http://www.nigd.org/libraries/mumbai/reports/article-3.pdf [13] Weber, S. (2004). The success of open source. Cambridge, MA: Harvard University. Retrieved from http://www.amazon.com/Success-Open-Source-Steven- Weber/dp/0674018583 WEBSITES Greenstone software information retrieved from [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] 38 http://www.cdeep.iitb.ac.in/Live_edu/mode1.html http://moodle.iitb.ac.in Free software. http://en.wikipedia.org/wiki/free_software http://www.library.iitb.ac.in http://www.fujitsu.com/img/PR/2010/20101109-01a.jpg http://open-tube.com/wp-content/uploads/2010/06/image20.png http://www.emeraldinsight.com/content_images/fig/2640250501002.png http://www.verussolutions.biz/ OSS http://en.wikipedia.org/wiki/Open-source_software#Definitions http://en.wikipedia.org/wiki/Greenstone_%28software%29 http://www.dlib.org/dlib/october01/witten/10witten.html http://en.kioskea.net/download/download-20177-greenstone ISBN 1-63102-455-8 RIGHT OF ENTRY IN ELECTRONIC RESOURCES: FLOWS AND GRIT IN INSTITUTIONAL LIBRARIES K.Nazeer Badhusha | Chief Librarian | Hindustan Institute of Engineering Technology (HIET) | Chennai, Tamilnadu | India | nazeer30@rediffmail.com R. Natarajan | Asst. Prof. | Library & Information Science Wing | Directorate of Distance Education | Annamalai University | Annamalai Nagar | Tamilnadu | India | cdmnatraj@yahoo.co.in Abstract: In late 20th and early 21st centuries, library automation and the Internet revolutionized information access and library procedure in and around the world. The effect on academic institutions has been profound. It facilitates users to access library resources from sites in hundreds or thousands of miles away. Libraries in academic institutions can now provide information access to off-campus faculty and students wherever they are located. To meet up the ever increasing stress for information availability, academic libraries must now subscribe to electronic resources such as e-books, full-text e-journals and online bibliographic databases in addition to the printed formats. While the availability of these electronic resources enables remote access to needed information, concomitantly they present issues and challenges. Keywords: E-resources, Academic Libraries E-resources Management, E-resources access, Library automation, INTRODUCTION By the turn of the 21st century, library automation and the Internet had revolutionized information access and library operations around the world. The effect of this revolution has been profound, especially on academic institutions. Libraries in such institutions can now provide information access to off-campus faculty and students wherever they are located – even to sites hundreds and thousands of miles away. To meet the ever-increasing demands from users for remote access to information, academic libraries now subscribe to electronic resources such as e-books, full-text e-journals and online bibliographic databases, in addition to housing these resources in their printed formats. While the availability of these electronic resources enables remote access to needed information, they concomitantly present issues and challenges. Among these challenging issues facing librarians dealing with these electronic resources are:     Access Control Workload and Personnel Volatility in Coverage of Journal Titles by Resource Providers Overlapping Coverage of Same Journal Titles by Resource Providers ACCESS CONTROL With traditional printed journal subscriptions, libraries own the printed issues, which they can bind and archive, and any library users can come to the library building to use them. The library has total control of these printed materials and users’ access poses no significant problem, except for the requirement to post copyright notices adjacent to photocopiers in public areas. With electronic journals, however, users’ access becomes somewhat problematic, for the following reasons:  Users increasingly do not want to come to the library and expect access to library materials from remote sites, sometimes even from other countries. This is borne out by majority drop in usage of current issues of print journals at academic libraries. ISBN 1-63102-455-8 39 Collection and Preservation of Newspapers: A Case Study   Since electronic materials are no longer physically located in the library, control of access to them is no longer under the purview of the library but under the dictate of providers, who are the publishers, vendors, and aggregators. Library users expect to access all articles seamlessly and readily from all remote sites. Providers use varying methods and technologies to control access to their products in different ways. The expectation of library users for seamless access to all articles, and the providers’ non-uniformity of access delivery is a critical issue many libraries are facing today. This issue is especially compelling for large academic libraries in India.         Through ID Login and Password. Through IP authentication. Through licensing policies. All three methods pose inherent problems. ALL THE WAY THROUGH ID LOGIN AND PASSWORD IDs/Passwords have to be issued to individuals, which may not be feasible in large university settings, especially for popular resources. Issued IDs/Passwords can be easily re-distributed by legitimate users to unauthorized users. Users have to deal with many passwords for a wide variety of titles or systems. Timeliness of access may be compromised while waiting to get needed IDs/Passwords. ALL THE WAY THROUGH IP AUTHENTICATION IP authentication is less intrusive and the preferred mode for most of the libraries because there is no need to give out passwords to users, there are no passwords for them to remember, and furthermore, libraries do not have to manage changing passwords mandated by providers. Despite these advantages, access through IP authentication remains a concern for large academic libraries for the following reasons:      IP addresses are not contiguous in academic institutions with off-site campuses and centers Some academic institutions provide dial-in through a institutions modem pool where IP filtering may bar access to remote users Students and faculty who live and work off-campus increasingly have Ethernet connections instead of modems, and do not have IP addresses within the IP ranges of the institutions. Instead, they use addresses provided to them by non-institutions-affiliated Internet Service Providers (ISPs). For them, special arrangements such as the use of proxy servers that recognize legitimate library users on other authentication schemes must be put into place. Many academic institutions are now implementing the systems by which users are not given permanent IP addresses. These systems dynamically generate and assign IP addresses for the use of one session. Though these systems of assigning IP addresses represent economies for the communications and computing centers for the academic institutions, they make tracking of problems by IP addresses problematic for libraries. Computers that are locked behind “firewalls” by companies, agencies, or other controlling ISPs cannot be authenticated by any means and so is barred access to electronic resources of the library. ALL THE WAY THROUGH LICENSING POLICIES Some licensing policies tend to be overly restrictive and do not reflect “real world” settings and needs. Some licensing policies restrict by the sites, which can be defined as on-campus or as narrowly as the library building itself. Restriction by the site poses problems as more courses and degree programs are being offered off-campus students and faculty increase in numbers. These off-campus students and faculty are regarded, and rightly so, by their parent institutions as full-fledged members of their communities. Despite potentially varying distant locations, these off-campus students and faculty should have exactly the same access privileges and capabilities as their on-campus counterparts. However, with restriction by the site they could be denied the same privileges 40 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education and capabilities their on-campus counterparts have with regard to information access. A few licensing policies go as far as restricting by patron types. HUMAN RESOURCES AND WORKLOAD With the advent of e-journals, an assumption is often made that providers take over the work previously done by staff, and that less work from staff is required since “everything is online,” but in reality work is not reduced but shifted to new activities and responsibilities. Since e-journal collections are located on servers of the resource providers, library staff have to find new ways to track inventories. Journals have become elusive because they no longer are physical entities that can be held in the hand and placed in physical locations in library buildings. They are now tracked in locally maintained spreadsheet, or via online administrative modules made available by vendors, e.g. Elsevier’s Science Direct, or serials management services such as Serials Solutions. With literally thousands of e-journals available in large academic libraries, this role involves substantial investment in time and effort in:        establishing a gateway to providers’ servers maintaining active and accurate links to journal titles adding new journal titles deleting ceased and cancelled titles tracking titles that provide electronic access with print subscriptions ensuring coverage changes and title changes are up-to-date updating URL changes Since information of this nature is rarely forthcoming from the providers themselves, library staff are at their own devices to track down the information. Many libraries have allocated at least one full-time position to overseeing electronic access. As the role of library staff has changed with the advent of e-journals, so has the role of public service librarians. Some of their new roles include:     Teaching users some core competencies in information access since users are often overwhelmed by all the materials that libraries make available electronically. Serving as intermediaries between the library users and the staff who can “fix” access problems Educating users about what is and is not free access, whether a title is part of a consortia purchase, and if proxy access is permitted. Devising easy access for journal articles that become free after some fixed interval of time following their publication. INSTABILITY IN COVERAGE OF JOURNAL TITTLES BY RESOURCE CONTRIBUTORS All libraries providing electronic full-text journals service are well aware of the issue of volatility in journal coverage and have experienced the frustration involved in coverage maintenance. Coverage volatility often results from: Providers dropping, adding, or modifying coverage without notifying their subscribers, and their title lists do not indicate what has been changed from one update to the next. Titles changing in an instant, and all traces of former titles disappearing, prompt frequent complaints from users regarding misleading coverage information. A sterling example is Pro Quest’s is available one day and gone the next, with everything deleted, current as well as back files. Another example is Elsevier’s Science Direct whose inclusion of the Supplement of spotty at best. Coverage lost due to a change in publisher of the journal. For example, Journal of Evolutionary Biology which was by Elsevier from 1997-1998 switched to Blackwell in 1999. Thus, from 1999 it is no longer available through Elsevier’s Science Direct but through Blackwell’s Synergy service, without the rights to access being transferred from Science Direct to Synergy. ISBN 1-63102-455-8 41 Collection and Preservation of Newspapers: A Case Study Resource providers’ non-cognizance of libraries’ established rules regarding serial title changes, resulting in former titles continuing to be listed as current issues on providers’ lists or absorbed into the date range for a new title. EXTENT BEYOND THE COVERAGE OF SAME TITLES BY RESOURCES CONTRIBUTORS Libraries facing shrinking budgets are trying to acquire quality information in the most efficient and effective means possible. To achieve this, many are joining state, regional, and national consortia for better group subscription discounts. Some consortia in India are: a) INDEST-AICTE Consortium b) UGC-INFONET Consortium c) National Knowledge Resource Consortium E-Journals d) FORSA Consortium (Astronomy (http://www.iiap.res.in/library/forsa.html) e) DAE Library Consortium (http://www.tifr.res.in/~libws/) f) CSIR Library Consortium g) ISRO Library Consortium h) IIM Library Consortium i) HELINET (Rajiv Gandhi University (http://www.rguhs.ac.in/hn/newhell.htm) j) ICICI Knowledge Park (http://www.iciciknowledgepark.com/) k) ICMR Library Consortium and of Astrophysics Health Sciences, Libraries) Karnataka) Even though the price per journal is lower when libraries subscribe to electronic journals through package deals for consortia from different providers. Besides negating lower prices, overlapping coverage by different providers create confusion among library users because of their different user interfaces. This in turn creates challenges for reference and bibliographic instruction for public service librarians. To alleviate the confusion for users, Academic institutions libraries use an article linking software program to list multiple resource providers for the same title in order of the most preferred. For example, the High wire link for a journal could be listed before the Pro Quest link. CONCLUSION Throughout the 20th century, librarians have faced and surmounted the challenges posed by new formats of materials, from print to microforms, audio-visual materials, CD-ROM, computer software, and machinereadable data files. Beginning in the mid-1990s, electronic journal access through the internet has made librarianship more challenging. Even though the major issues inherent in electronic access management have been raised, not all have been resolved. Librarians are continuing to seek ways to make access for users as easy as possible. While they are confronted with the challenging aspect of hunting for creative solutions, they are rewarded in seeing the surprise and amazement of users when told that they can access needed journal articles and other library resources with their computers from their office. Like colleagues before them, librarians of the 21st century will succeed in surmounting the challenges posed by electronic access of library resources. Part of their eventual success is because librarians consider challenges not impediments, but opportunities to improve the accessibility of their clienteles to their libraries’ resources. The other contributing factor to success is their innate disposition in injecting an element of all their undertakings. Fun is an essential ingredient in any profession but especially in librarianship. So as long as librarians continue 42 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education to have fun in resolving problems, challenges currently posed by electronic access of information will be successfully met. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] Bookbinder, D. and others. (n.d.) Monique Hypertext Docuverse. Available from: http://cnsvax.albany.edu/~hfiction/index.html. [ed 1st September 1997. No longer available, 26th December 2002] Herther, N. (April 2011). The Sizzling E-book Marketplace. Searcher, Vol. 19, Issue 3, pp. 14-23. Herther, N. (June 2011). From CD-ROMs to E-books. Searcher, Vol. 19, Issue 5, pp. 12-46. International Digital Publishing Forum. Retrieved from http://idpf.org/ Lynch C. A. The Changing Role in a Networked Information Environment. Library Hi Tech 1997;15:30-38. Machovec G. Management and Technical Considerations for Acquiring and Accessing Electronic Serials. In Bluh PM. ed. Managing Electronic Serials. Chicago: American Library Association, 2001. 67-85. Nisonger TE. Collection Management Issues for Electronic Journals. IFLA Journal 1996;22::233-9. Orenstein R. The Fullness of Full Text. Database Searcher 1989;5:21Saminather, N. (March 25, 2011). Apple begins global sales of new iPad 2 tablet as competition intensifies". Bloomberg. Retrieved from http://www.bloomberg.com/news/2011-03-25/apple-begins-global-sales-of-new-ipad2-tablet-as-competition-increases.html Tonkery, Dan (October 2010). The iPad and its Possible Impact on Publishers and Libraries. Searcher, Vol. 18, Issue 8, pp. 39-43. The Electronic Visual Arts Journal (1995) Available from: http://www.uwo.ca/ visarts/eva.html. [ed 1st September 1997. No longer available, 26th December 2002]. ISBN 1-63102-455-8 43 COLLECTION AND PRESERVATION OF NEWSPAPERS: A CASE STUDY Dr. Jawahar Lal | Assistant Librarian | Sayaji Rao Gaekwad Library | Central Library | Bararas Hindu University | Varanasi | jlal0512@gmail.com Abstract: Newspapers provide a rich sense of detailed history by recording events on a day-byday basis down the years. However, newspapers have presented special challenges for libraries, such as storage and preservation due to fragility and size. Traditionally therefore, newspapers, unless microfilmed, have not been afforded a high profile in library holdings. Digital technology and changes to library collection development policies driven by user demand has emphasized libraries to reconsider them on incorporating newspapers into their digital collections. This article presents the nature, feature, importance, factors for damage, care during handling and preservation aspects of newspapers. The various methods of preservation are discussed in this. It also represents the short account of newspapers collection and preservation of Banaras Hindu University Library. Keywords: Newspapres, Preservation, Conservation, Clippings, Microfilming, Digitisation, Deacidification, Online Newspaper, Electronic Newspaper, e-Paper, Digital Library, etc. INTRODUCTION A newspaper acts an important medium to control corruption and scams. Newspapers are called ‘the mirrors of the world’. They reflect and report the trends and happening from all parts of the world. The chief topics of general interest in newspaper include politics, sports, economy, movies, and share market. The substantial portion of the content of newspaper is devoted to local and international news stories, advertisements, announcements, opinion, cartoons, sports news and television channel listings and editorial opinion of the important occurrence. A wide coverage of information is obtained at low cost through newspaper. It also influences the habit of thinking in men. It has also seen that illiterate adults are taking up education to read newspaper. Newspaper is a publication produced on newsprint papers. The frequency of newspaper publication may be daily, weekly and some fortnightly. Newspaper is the important medium to let the people know about everything that are happening in their local areas and around the world. According to Ugah (Ugah, 2009) a newspaper is a written publication containing news, information and advertising, usually printed on low-cost paper called newsprint. General interest newspapers often contain feature articles on political events, crime, business, arts, entertainment, society and sports. Besides the aforementioned news and opinions, the newspapers also include weather forecasts, criticism and reviews of the arts (including literature, film, television, theater, fine arts, and architecture) and of local services such as restaurants, obituaries, entertainment features such as crosswords, horoscopes, editorial cartoons, gag cartoons, and comic strips; advice, food, and other columns. Most traditional newspapers feature an editorial page containing columns which express the personal or corporate opinion of the writers or publishers. The supplementary sections of the newspaper contain advertising, comics, coupons and other printed media. The students and scholars who want to be acquainted in their social and academic interest always look for and make use of newspaper which is an integral part of today’s information source for them. These are irreplaceable documents which provide interesting account of local places, events and people. Banaras Hindu University is an internationally reputed temple of learning, situated in the holy city of Varanasi. This Creative and innovative university was founded by the great nationalist leader, Pandit Madan Mohan Malviya, in 1916 with cooperation of great personalities like Dr Annie Besant. It played an important role in the 44 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education independence movement and has developed into the greatest center of learning in India. It has produced many great freedom fighters and builders of modern India and has immensely contributed to the progress of the nation through a large number of renowned scholars, artists, scientists and technologists who have graced this university. The area of the main campus of this premiere Central University is 1300 acres, having well maintained roads, extensive greenery, a temple, an air strip and buildings which are an architectural delight. The university comprises 3 Institutes, 14 Faculties 140 Departments, 4 Inter disciplinary Centers, a constituent college for women's and 3 Constituents Schools, spanning a vast range of subjects pertaining to all branches of humanities, social science, technology, medicine ,science, fine arts and performing arts. It has 6 centres of Advanced Studies, 10 Departments under Special Assistance Programme and a large number of specialized Research Centers. Four Degree Colleges of the city are affiliated to this University. The University family consists of about 15000 students, about 1700 teachers, and nearly 8000 non-teaching staff. A large number of students from foreign countries like the U.S.A, the countries of Europe, Asia, Middle East, Africa etc., come to study here. The university has taken a leadership role in promoting new ideas, the spirit of integration of the world, and cultivation of intellect and culture. The Banaras Hindu University Library system is the largest University Library System in the country. Presently the Banaras Hindu University Library System consists of Central Library at apex and 3 Institute Libraries, 8 Faculty Libraries, 25 Departmental Libraries, with a total collection of over 13 lakh volumes to serve the students, faculty members, researchers, technical staff of fourteen faculties consisting of 126 subject departments of the university. This study is confined to Banaras Hindu University Library. HISTORICAL BACKGROUND OF NEWSPAPERS In 1605 first newspaper ‘Relation aller Furnemmen und gedenckwurdigen Historien’ was published in German language. In 1780 first Indian newspaper ‘The Bengal Gazette’ was published by James Augustus Hickey. The Indian Gazette, The Calcutta Gazette, The Madras Courier, The Bombay Herald were other newspapers published in India in 18th century. The Bombay Herald was followed by the Bombay Courier, which later on amalgamated with the Times of India in 1861 (Dhiman, 2014). During 1950s, 214 daily newspapers were published in the India. In 1993 number of newspaper reached to 35595 with 3805 dailies. Hindustan Times, Indian Express, The Pioneer, The Hindu and Times of India are some of prominent English newspapers of the India while Amar Ujala, Dainik Jagaran, Hindustan, Jansatta, etc are some of the Hindi newspapers of the country. Besides, there are so many regional newspapers serving throughout the country. Some regional language newspapers are Aamader Malda (Bengali), Aankhodekhi News (Gujarati), Anakapalli News (Tamil), Anweshanam (Malayalam), Aurangabadtimes Urdu Daily (Urdu), Badlapur Vikas (Marathi), Costatimes Telugu News Online (Telugu), Dharitri (Oriya), etc (Dhiman, 2014). FEATURES OF NEWSPAPERS The newspapers are important source of information because they contain latest information in the form of news. The information published in newspapers covers every aspect of society, technology, economic and cultural scenario prevalent in particular country and around the world. The contents of newspapers are reasonably accessible to the public, published at regular interval, up to date and cover a range of topics. The newspapers have achieved a great deal of important in the transmission of government policies, priority changes and even interest changes. They are recognized as regular source of primary and up to date information. There is high demand for newspaper by students, scholars, administrators and literate people through selfacquisition, exchange, borrowing from friends, relatives and from libraries (Dhiman, 2014). IMPORTANCE OF NEWSPAPERS Newspapers have become an essential part of modern life. The modern man starts his day by reading over the news with a cup of tea. Equally it is unimaginable for some people in the morning without the daily newspaper ISBN 1-63102-455-8 45 Collection and Preservation of Newspapers: A Case Study because reading of newspapers is in habit and is seen everywhere in the world. They are printed and published in each and every language known to man all over the world. Usually they cover national, international, local, social, political, cultural, etc. aspects of life. They are designed in a complete picture of our day-to-day life, this is the reason that all powerful personalities begin their day by reading the newspapers. Newspapers are the guardians of democracy. They keep the general peoples well-informed to the world about the goings on. Well-informed public is essential for the success of a democracy. Newspapers perform the duty of making people aware of everything. They form the public opinion and turn the people for or against the moves of the rulers. They visualise every aspect including jokes, matrimonial, huddles, scientific facts, and cinemas, etc. The newspapers also add to the knowledge of the readers by informing them about the new discoveries, inventions and products. The magazine sections of newspapers provide a colorful bouquet of information and entertainment. The advertisement published in the newspapers also serves a great purpose. Matrimonial advertisements help people to find suitable life partners. Newspapers also help people to buy and sell property. Newspapers help the job seekers to find suitable jobs through the ‘wanted’ columns. Advertisements help a great deal boosting up sales of the consumer products and others. Business houses also make great use of the newspapers to advertise their products and to reach out to their customers. Newspaper also helps people in investing the money wisely in the stock-market. They play a vital role in life of human beings. Newspapers have a large part to play in providing us with the latest on the national and the international front. During the period of a war newspaper gives an hour to hour report of the war front. Newspapers are a mirror of public opinion too. Through their columns, the public can present their views on subjects of national and international issues. Letters to the Editor is one very important part of a newspaper. Newspaper provides us with information collected from around the globe. It also helps to develops new ideas, and at times guides the common man how to think and discuss. We may say that today we are living in a newspaper culture. Whether in English or other regional languages, almost every man gets benefited from newspaper. The dignity and reputation of a newspaper rests on the degree of their fidelity to truth and fearless reporting. It is our cheapest and most powerful weapon in the last analysis. The whole earth has become like a global village. Newspapers promote commerce and trade. They have become a very powerful means of publicity and advertisement. A businessman can advertise his goods and services in a newspaper. Newspapers serve the cause of education and make us fit to move in a cultured society. The reading of newspapers will keep us in touch with the modern world and its affairs. In them there are articles on various subjects. There are special columns for science and arts. Newspapers are found very useful for competitive examinations. The Sunday issue of the newspaper is very informative and important. In it we find good articles and interesting stories written by great writers. FACTORS FOR DAMAGE OF NEWSPAPERS The most important and the most frequent damaging factors for newspapers are: 1. 2. 3. 4. 5. wear and tear, self-destruction due to the acidity in machine made paper, large size item on low quality paper printed with poor quality ink, poor storage conditions, and air conditions, pollution, etc. PRESERVATION OF NEWSPAPERS The librarianship revolves in four steps which are collection of documents appropriate to library, organization of collected documents, preservation of those documents and dissemination of information in the document and documents as such. 46 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Preservation is one of the most important functions of every library and information centre to ensure the protection of information sources of enduring value for access by present and future generations. There are different ways of preservation of newspapers. Proper Storage of Newspapers/Hard Copy Preservation Earlier there was only one process of physical preservation of printed newspapers. Newspaper preservation is a challenge because newsprint is an inherently unstable paper. Formulated to be inexpensive and expendable, newsprint is manufactured with large percentages of unpurified wood pulp which contains impurities that remain in the paper after processing. These impurities, when exposed to light, high humidity and atmospheric pollutants, promote discoloration and acidic reactions in the paper. Acidity causes the paper fibers to weaken and break, and is the major culprit in causing the paper to become brittle. The Ideal condition for preservation of hard copy of newspapers is 60-70 degree Fahrenheit temperature, 40-50 % relatve humidity, protection from light and storage in non damaging materials. Most of the newspapers do not trust on binding and keeping of old newspapers but some still keep the printed records. Binding has been a frequently used method for organising and storing newspaper files for many decades, but it is not recommended. Apart from the expense, binding of newspapers is often damaging to the text; creates unwieldy volumes that are difficult to handle properly. Space is the main problem for storing bound volume of newspapers. If retrospective files of newspapers used fairly frequently, the recommended method is to store the papers flat in boxes. While buffered custom boxes made to fit each newspaper file would be ideal. Prior to boxing, the newspapers should be stacked neatly, organised in chronological sequence and a finding aid should be prepared that lists the titles and issues held, to prevent excessive handling of the issues themselves. The box label should contain the title(s) and range of dates contained in the box, with a list of missing issues attached to the inside of the box lid for easy reference. The boxes will provide overall support and will protect the newspapers from light, dust, and insects while allowing easy access (Dhiman, 2014). For hard copy preservation of newspapers one side of each paper should be spayed with de-acidification spray. Good storage is especially critical to the preservation of acidic papers. The requirements for proper storage of newspapers are1. 2. 3. 4. 5. A place of cool (room temperature or below), relatively dry (about 35% relative humidity), clean, and with stable environment. Minimal exposure to all kinds of light; no exposure to direct or intense light Distance from radiators and vents, Supportive protective enclosures of thin sheets of alkaline buffered tissue, and Flat storage protected within a rigid box or folder. News Clippings Another way to preserve information of newspapers is to keep news clippings for future reference. Different newspaper archives keep the news clippings in an organised way so that it can answer the queries of the users. Clear polyester sleeves can be useful for clippings and papers that have been deacidified by a conservator. This is known that polyester sleeves carry a static charge that can damage brittle newspapers, do not have an alkaline buffer, which provides a desirable neutralizing effect on acids in paper, and add considerable weight and bulk to storage. Ideal environment for the preservation of newspapers is dark, stable environment of 60-70 ºF and 40-50% relative humidity. Newspaper can also be protected by polyester film encapsulation or plastic sleeves. Encapsulation was developed by the Library of Congress to protect fragile and brittle newspapers. The process involves placing the sheet of newsprint between two clear sheets of polyester film. The film is sealed around the edge with a double stick tape or by machines designed to bond the film. The papers which are encapsulated or ISBN 1-63102-455-8 47 Collection and Preservation of Newspapers: A Case Study placed in plastic sleeves generate acidic gases and will deteriorate the paper. Chemical stabilization of acids in paper called deacidification. This process is designed to neutralize the papers acidity and leave an alkaline salt behind to absorb acids. This chemical treatment does not stop deterioration but it will slow the rate of deterioration. Deacidification is recommended for all papers that are encapsulated or placed in plastic sleeves (Das, 2009). Press Clippings Press clipping is another form of preservation. It is the most important service in the newspaper library. The process involves cutting and pasting of important articles and their organization in such a manner that one can easily get access to the desired article. Good databases of press clippings may be able to answer any query. Different newspapers follow different procedure for organizing newspaper clippings. For example, The Times of India (TOI) follows the Dewey Decimal Classification (DDC) classification system while numbering article for the press clipping database. Earlier press clipping used to be organized in different files and placed in the library shelves (Das, 2009). Microfilming Microfilming is the most important thing in newspaper preservation. Voluminous newspapers can be stored in a little microfilm roll and this remain intact for next 500 years. It is also called microphotography which is done by reducing the images by 25 times. Usually 35 mm 100 ft Microfilm roll is used for newspaper microfilming. Microfilming is one of the most extensively used and common practices in modern reprographic science (Das, 2009). The first newspaper to be microfilmed was the London Evening News, filmed in 1853 to demonstrate the viability of microfilming techniques. Nowadays standardized microfilm base is long lasting. Life expectancy of polyester-based microfilm is approximately 500 years. Microfilm has now become an economical and reliable means of preserving newspapers (Pai and Pujari). There are various institutions that have standardized the microfilm production and preservation. There are number of advantages which made microfilm archivist’s first choice for preservation of newspapers. There is no issue with hardware or software obsolescence and the microfilm reader is a simple mechanical device with a light source and magnification. Storage cost is very low and it is difficult to manipulate the content of microfilm. Film offers excellent compaction and it is lossless. Microfilming is a well researched area so standards for microfilming are available (Das, 2009). There are different bases of microfilms used for last several decades. Cellulose-based acetate microfilms were used for library applications from the 1920s to the 1970s but their life expectancy was not so good. These films were highly susceptible to chemical deterioration. Preservation of acetate films is done by duplication onto polyester-base film and treated with polysulfide solution. Silver lock treatment is prescribed by International Permanence Institute (IPI) as most effective polysulfide treatment. This treatment is a special chemical bath that makes silver film resistant to the effects of atmospheric pollutants by converting most of the metallic silver that makes up the image to silver sulfide. Metallic silver is very susceptible to oxidation. It makes film chemically resistant to damaging atmospheric agents, without altering important film characteristics (Das, 2009). Silver lock treatment is used for restoration of the microfilm. Another important film base is Diazo. This film is used mainly for reference purposes, as it can sustain heavy use without scratching. This is usually used for duplication of microfilm. Diazo film is polyester-based film coated with an emulsion of diazonium salts. Storage requirements are somewhat less demanding than those of silver-halide film; normally stored in a filing cabinet in a climate-controlled office environment (Das, 2009). Acid-free containers are required for microfilm roll preservation. One roll per container is acceptable for archival purpose. Containers are stored in metal cabinets. Separate archive master, print master, service copy should be kept so that master copy cannot be used as service copy. For preservation purpose, microfilm shows very low risk if proper film base, processing, and physical environment is maintained. 48 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education But some challenges are also there. Rework is expensive because it is not just a copy and paste factor. Brittle newsprint is a major concern for microfilming old newspapers. Oversised pages often create problem for taking exposure of the film, and illustrations and colour images filming requires proper density of the images. Microfilms are susceptible to environmental conditions so films should be stored in a cool place. Temperature and relative humidity should be 68 ºF/ 20 ºC and 40-50% respectively (Das, 2009). While microfilming remains the most reliable means of preserving the intellectual content of newspapers, many institutions need to service and store newsprint for long periods of time prior to filming and, in some cases, may wish to store original copies on a permanent basis. Digitization of Newspapers In the age of Internet and information revolution everybody wants information in finger tips. Easy access and quick search is the prime focus for any researcher. Microfilm neither gives easy access nor provides modern search facilities so digital preservation is the way to provide quick and easy access. Different newspapers have started microfilm digitization projects and e-paper archives. Now time has changed and press clippings are being digitised in different database management systems so that one can search these databases even from remote location. Most of the newspapers are nowadays opting for digital press clipping service and maintaining in-house database management systems for keeping records. Important articles are selected, classified, scanned, indexed and then stored in a safe server. Times of India (TOI) have two archival systems namely, Times Archival System (TAS), and DATASCAN. The TAS, an oracle based in-house database which contains digital news clippings of TOI, The Economic Times (ET) and Delhi Times (DT) since 1997 to 2004. This database follows a client server-based architecture model. Data are safe as stored in two different servers located in Delhi and Mumbai. TOI started DATASCAN database management system in 1993. This is a C++ based application. Important news articles of 11 competitive papers like The Hindustan Times (HT), Indian Express etc. are being preserved. The database has vast collection of 10 lakhs news clippings available in the server. Two servers are being devoted for this database and stored in a cool place. Computer professionals take regular backup and look after issues related to protection of digital data (Das, 2009). For digitisation purpose microfilm is scanned. Scanned images are then converted into digital TIFF format. The newspaper is segmented into logical components before XML file is then created for each article or advertisement, and finally index of entire collection is made to make the output searchable. The finished product presents every edition of publication in its original format. Most of the modern newspaper houses are now considering the digitisation of microfilms. Besides the digitisation of old microfilms modern newspapers have come up with e-paper for Internet and for easy archival. Epaper gives access to the publication in its original format, anywhere, anytime, 24X7 with just a Web browser and no client software to download. It offers hybrid print and electronic subscriptions to maximise the value to audience and engage the audiences in multiple formats. It helps in reduction of production and distribution costs for digital subscribers. Users can easily search, print, and email articles and advertisements. E-paper facilitates access to the interactive advertisements and editorials and an online/offline subscription that suits customer’s needs. E-papers have become very popular and most of the newspapers make them available on their websites. TOI has opted Olive software for production and archival of its e-paper. TOI’s e-archive gives total freedom of search and one can access it from remote places also. Digital storage may have low to high risk as format and preservation metadata determines the risk (Kesavan, 2010). COLLECTION AND PRESERVATION IN BANARAS HINDU UNIVERSITY LIBRARY The prime source of information of major population in India is newspaper. Procurement of newspapers in the Banaras Hindu University library is done through local hawker. This library procures 17 newspapers in which 09 are in Hindi and 08 in English. The list of newspapers being procured by this library is given below: 1. ज 2. जा ा ISBN 1-63102-455-8 49 Collection and Preservation of Newspapers: A Case Study 3. का्प्ट 4. दनिक जाग 5. नि्द् ाि 6. ि््ट 7. जिसंद टा ्स 8. जिसता 9. ार सिा ा 10. Business Line 11. Economic Times 12. Hindustan Times 13. Indian Express 14. Pioneer 15. The Hindu 16. The Statesman 17. The Times of India Library is procuring one more copy of each newspaper to be preserved. From 1980 a policy was framed to preserve newspapers and four newspapers are being preserved. These papers are Aaj, Times of India, Economic Times and Navbharat Times. From 2007 only three newspapers are getting bound which are Aaj, Economic Times and Times of India because the publication of ि ा टा ्स ceased from March 2005. The bound records of newspapers are as given below: ज 1. 2. 3. 4. 5. July 1980 to December 2014 ि ा टा ्स Times of India (Hindi) Economic Times Times of India July 1980 to February 2005 March 2004 to January 2005 February 1981 to December 2014 July 1980 to September 2007 (New Delhi) October 2007 to December 2014 (Lucknow) The information sought by information seekers is given from the preserved records. PRECAUTION DURING USE OF NEWSPAPERS One should take proper care when handling newspapers by:       Having clean hands and a clean, large work table on which to use the newspaper, Keeping the newspaper flat and fully supported on the table during use, Keeping food and drink away, Never folding the paper back on itself, Refolding the paper using the original center fold and with the edges neatly aligned, and Not using paper clips, "dog ear" folding, acidic inserts, rubber bands, self-adhesive tape, and/or glue on newspapers and clippings. CONCLUSION The newspapers provide current, retrospective and supplementary information. The researchers, historians, genealogists and others continue to use older newspapers because of immense amount of information is stored in them. To help the scholars the preservation of newspaper is necessary. The preservation methods of newspapers are hard copy preservation, newspaper clippings, press clippings, microfilming and digitisation. The digitization of newspaper presents a wonderful opportunity before the scholars to make available online a rich source of social history of our country, a memory of our culture. The contribution of newspapers to teaching, learning and research in providing information is also important. The Banaras Hindu University Library preserves only few newspapers in bound form which is very useful to scholars in their teaching, learning and research. Although bound form of preservation of newspaper is cheap but by seeing it utility the library must think to digitize it. 50 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education REFERENCES [1] [2] [3] [4] [5] Das, Somnath (2009). Preservation of newspapers. DESIDOC Journal of Library & Information Technology, Vol. 29, No. 1, January 2009, p. 72-75. Dhiman, Anil Kumar (2014). Importance of newspapers in libraries and newspaper preservation: Must for preserving history. Indian Journal of Information, Library & Society, 27(3-4), July-December 2014, p.175-188. Kesavan, R. Venkata, et. al. (2010). Digital preservation and access to print Media resources: experiences at the times archives and knowledge centre, india In Digital Preservation and Access to News and Views: IFLA International Newspaper Conference 2010 held at IFLA Newspaper Section, Indira Gandhi National Centre for Arts, New Delhi from 25-28 February 2010, p. 101-114. Pai, Priya and Pujar, Anita. Newspaper archives – a knowledge asset. Available at file:///I:/Downloaded%20Articles/04.07.2015/Newspaper_Archives_ICIM_2005.pdf (accessed on 14.07.2015). Ugah, Akobundu Dike (2009). Strategies for preservation and increased access to newspapers in Nigerian University libraries. Library Philosophy and Practice, June 2009. Available at: http://digitalcommons.unl.edu/libphilprac/270. ISBN 1-63102-455-8 51 THE ROLE OF COMPUTER AND INTERNET IN EDUCATION Rahul Mittal | Associate Professor | Tecnia Institute of Advanced Studies | Rohini | Delhi | rahul.rahlmus@gmail.com Vipul Partap | Assistant Professor | Maharaja Agresen Institute of Management Studies | Rohini | Delhi | vipulpartap@rediffmail.com Abstract : Computer and Internet play a significant role in education sector. The role of Information communication technology (ICT) in education at present is influencing every aspect of human life. The technology is playing its important role in work places, business, education, and entertainment. ICT is being recognized by the people as catalysts for change; change in working conditions, handling and exchanging information, teaching methods, learning approaches, scientific research, and in accessing information. Therefore, this paper discusses the roles of ICT, the promises, limitations and key challenges of integration to education systems. The paper tells us about the benefits of ICT in education; the existing promises of ICT use in education systems of some developing countries and the limitations and key challenges of ICTs integration to education systems. But regardless of all the limitations, ICT benefits education systems to provide quality education in alignment with constructivism, is a contemporary paradigm of learning. Key words: Computer, Internet, Information, Communication, Technology, Teaching Methods, Education. INTRODUCTION ICTs are making dynamic changes in society. They are influencing all aspects of life. The influences are felt more and more at schools. Because ICTs provide both students and teachers with more opportunities in adapting learning and teaching to individual needs, society is, forcing schools aptly respond to this technical innovation. ICTs greatly facilitate the acquisition and absorption of knowledge, offering developing countries unprecedented opportunities to enhance educational systems, improve policy formulation and execution, and widen the range of opportunities for business and the poor. One of the greatest hardships endured by the poor, and by many others, who live in the poorest countries, in their sense of isolation, and ICTs can open access to knowledge in ways unimaginable not long ago. In Watson’s (2001) description, ICTs have revolutionized the way people work today and are now transforming education systems. As a result, if schools train children in yesterday’s skills and technologies they may not be effective and fit in tomorrow’s world. This is a sufficient reason for ICTs to win global recognition and attention. For instance, ICTs are dependable tools in facilitating the attainment of one of the Millennium Development Goals (MDGs), which is achievement of universal primary education by the year 2015. Kofi Anan, the former United Nations Secretary General, points out that in order to attain the goal of Universal Primary Education by the year 2015; we must ensure that information and communication technologies (ICTs) unlock the door of education systems. This indicates the growing demand and increasingly important place that (ICTs) could receive in education. Since ICTs provide greater opportunity for students and teachers to adjust learning and teaching to individual needs, society is, forcing schools to give appropriate response to this technical innovation. Even though ICT play significant roles in representing equalization strategy for developing countries, the reality of the digital divide- the gap between those who have access to, and control technology and those who do not, make a huge difference in the use of ICT. This means, that the introduction and integration of ICTs at different levels and various types of education is the most challenging undertaking. Failure to meet the challenges would 52 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education mean a further widening of the knowledge gap and deepening of existing economic and social inequalities among the developed and the developing countries. The purpose of this article is to discuss the benefits of ICT use in education, in the enhancement of student learning and experiences of some countries in order to encourage policy makers, school administrators, and teachers pay the required attention to integrate this technology in their education systems. It highlights the benefits of ICT in education, existing promises, and the limitations and challenges of integration to education systems. Operational definition of terms Information Communication Technologies (ICT) refers to the computer and internet connections used to handle and communicate information for learning purpose. E learning: - is a learning program that makes use of an information network- such as the internet, an intranet (LAN) or extranet (WAN) whether wholly or in part, for course delivery, interaction and/or facilitation. Webbased learning is a subset of e learning and refers to learning using an internet browser such as the moodle, blackboard or internet explorer (Tinio, 2002). Blended Learning: - refers to learning models that combines the face-to-face classroom practice with elearning solutions. For example, a teacher may facilitate student learning in class contact and uses the moodle (modular object oriented dynamic learning environment) to facilitate out of class learning. Constructivism: - is a paradigm of learning that assumes learning as a process individuals ‘’construct’’ meaning or new knowledge based on their prior knowledge and experience (Johassen, 1991). Educators also call it the emerging pedagogy in contrast to the long existing behaviorism view of learning. Learner-centered learning environment: - is a learning environment that pays attention to knowledge, skills, attitudes, and beliefs that learners bring with them to the learning process where its impetus is derived from a paradigm of learning called constructivism. It means students personal engagement to the learning task using the computer and or the internet connection. THE BENEFITS OF ICT IN EDUCATION The uses of ICT is making major differences in the learning of students and teaching approaches. Schools in the Western World invested a lot for ICT infrastructures over the last 20 years, and students use computers more often and for a much larger range of applications (Volman, 2005). Several studies reveal that students using ICT facilities mostly show higher learning gains than those who do not use. For instance, Kulik’s (1994) finding across 75 studies in the United States showed the following. Students who used computer tutorials in mathematics, natural science, and social science score significantly higher on tests in these subjects. Students who used simulation software in science also scored higher. The findings also indicated that primary school students who used tutorial software in reading scored significantly higher on reading scores. Very young students who used computers to write their own stories scored significantly higher on measures of reading skill. Moreover, students who used word processors or otherwise used the computer for writing scored higher on measures of writing skill. Furthermore, the use of ICTs in education also shifts the learning approaches. As put by (Bransford, Brown, and Cocking, 1999) cited in Volman (2005), there is a common belief that the use of ICTs in education contributes to a more constructivist learning and an increase in activity and greater responsibility of students. This limits the role of the teacher to supporting, advising, and coaching students rather than merely transmitting knowledge. The gradual progress in using computers changes from learning about computers, to learning computers, and finally to learning with computers (Volman, 2005).With respect to introducing ICT technologies in schools, Olson (2000) advises to explore the following questions as bases for in service teacher education. These are    How can the theoretical ideas tested in practice? What does practice say back to these theoretical ideas? How is useful negative feedbacks obtained? ISBN 1-63102-455-8 53 The Role of Computer and Internet in Education    What might be substantive talking points about the new processes? What is practical from a classroom perspective? What does talking about the new say about the nature of existing technology? Is it adequate? What scaffold needs for the next stage? On the other hand, teachers’ reluctance to adopt innovations need to be seen in the context of existing technology and commitments. Fullen (1989) cited in Watson (2001) states that change or improvement can happen at schools if teachers understand themselves and understood by others. For instance, many teachers are currently not in a position to make informed judgments on ICTs to support their teaching goals. Clearly a variety of factors still do make using ICT in the curriculum problematic (Watson, 2001). Because of this, the influence of ICT did not bring revolutionary changes at schools. For instance, the National ICT survey in the Netherlands shows that most primary-school students use computers less than once a week and there are still many secondary school teachers who do not use ICT at all (Volman, 2005). Most often, they use computers for drilland-practice and word processing. In recent years however, there has been a growing interest to know how computers and internet can best utilized to improve effectiveness and efficiency of education at all levels and in both formal and non formal settings. As there is a shift of theories explaining learning processes, ICTs become handmaiden for learning activities. Voogt’s (2003) description on the major roles, distinguished ICTs as an object for study, an aspect of a discipline or a profession, and a medium of instruction. As a medium of instruction, ICTs fit to realize and implement the emerging pedagogy of constructivism (Davis, 1997; Office of Technology Assessment, 1995; Panel on Educational Technology, 1997; Watson, 1996) in Voogt (2003). Moreover, Voogt (2003) differentiated between traditional learning setting and constructivist approaches. The former considers learning as transmission of knowledge to students, which is the sole responsibility of the teacher. On the other hand, the constructivist approach considers learning as authentic and learner centered. ICT, the computer for example is a great help in the constructivist approach, where one can design simulated and individualized learning environments to students. Tinio (2002) describes each of the pedagogic aspects in the table above in terms of implication for ICT use as follows. Active learning: - ICT-enhanced learning mobilizes tools for examination, calculation and analysis of information in order to provide a platform for student inquiry, analysis and construction of new information. The learners therefore, learn as they do and, whenever appropriate work on real-life problems in-depth. Moreover, ICT makes the learning less abstract and more relevant to their life situations. In contrast to memorization-based or rote learning, that is the feature of traditional pedagogy; ICT-enhanced learning promotes increased learner engagement. ICT-enhanced learning can also be ‘just-in-time’ learning that the learners choose what to learn when they need. Collaborative learning: - ICT-supported learning encourages interaction and cooperation among students, teachers, and experts regardless of where they are. Apart from modeling real world interactions, ICT-supported learning provides opportunity to work with students from different cultures, thereby helping to enhance learners teaming and communication skills as well as their global awareness. It models learning done throughout the learner’s lifetime by expanding the learning pace to include not just peers but also mentors and experts from different fields. Creative learning: - ICT-supported learning promotes the manipulation of existing information and the creation of real-world products rather than the duplication of received information. Integrative learning: - ICT-enhanced learning promotes a thematic integrative approach to teaching and learning. This approach eliminates the artificial separation between the different disciplines and between theory and practice, which characterizes the traditional approach. 54 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Evaluative learning: - ICT-enhanced learning is student-directed and diagnostic. Unlike static, text or printbased education, ICT-enhanced learning recognizes the presence of different learning pathways to explore and discover rather than merely listen and remember. The discussion above clearly elaborates the role of ICTs in facilitating the pedagogy of schools in the information society. As put by (Davis, 1997; Office of Technology Assessment, 1995; panel of Education Technology, 1997; Watson, 1996) in Voogt (2003), ICT is becoming more fitting to realize and implement the emerging pedagogy of constructivism. Nevertheless, an International study by Pelgrum and Anderson (1999) in Voogt (2003) shows a major obstacle for ICT integration in education and that is the difficulty of integrating computers and internet into classroom practices. Teachers’ lack of competence and enthusiasm to use computers in the instructional processes also contribute for the difficulty. However, in order to improve, and make optimal use of ICTs, changes in the pedagogic approaches and classroom strategies as well as integrating ICT in teacher training and staff development practices accompanied by teacher motivation schemes are imperative. Generally, Voogt (2003) describes the following functions of ICT in education.  ICT as object. It refers to learning about ICT. Mostly organized in a specific course. What is being learned depends on the type of education and the level of the students? Education prepares students for the use of ICT in education, future occupation, and social life.  ICT as an ‘assisting tool’. ICT is used as a tool, for example while making assignments, collecting data and documentation, communicating, and conducting research. Typically, ICT is used independently from the subject matter.  ICT as a medium for teaching and learning. This refers to ICT as a tool for teaching and learning itself, the medium through which teachers can teach and learners can learn. It appears in many different forms, such as drill and practice exercises, in simulations and educational networks.  ICT as a tool for organization and management in schools. EXAMPLES OF ICT USE IN EDUCATION SYSTEMS OF DEVELOPED COUNTRIES Most of the developed countries have applied ICTs in the 1980s to the level of K- 12 education for a variety of reasons, which are still valid. Some of the reasons as discussed by Pedro and et.al (2004), are as follows:  A new society requires new skills - ICTs increasingly pervade every aspect of life (work, learning, leisure, and health). Because ICTs are excellent tools for information processing, the new generation needs to become competent in their use, should acquire the necessary skills, and therefore must have access to computers and networks while at school (Kok, 2007). Schools are information and knowledge holding institutions. Therefore, ICT should be fundamental information management tool at all levels of an educational system, from classroom to ministries.  A Quest for Quality learning - Schools should profoundly revise present teaching practices and resources to create effective learning environments and improve life-long learning skills and habits in their students. ICTs are versatile, and powerful tools that can help in this purpose and should therefore present in every classroom, library and teacher room. Developed nations are using ICT in their education systems. For instance, in the United Kingdom, ‘rising of standards’ of teaching and learning has become intertwined with the use of ICTs (Watson, 2001). Using digital technology for improving the delivery of education has enormous potential to raise standards and increase employability. 77% of Swiss students reported using a computer several times a week to prepare their courses and assignments. Only 3% reported never using a computer for course preparation. As indicated in the OECD (2002) document, the average number of students per computer is an indicator of students’ accesses to new technologies. As some data from OECD (2002) shows, the percentage of students with access to computer varies from 25% in Italy to 90% or more in Canada, Finland, and New Zealand. Computer use also varies between students of primary and secondary schools; where the later generally having greater access. Implications of ICT-Enhanced Education for Policy and Planning:- There is a common belief that ICTs ISBN 1-63102-455-8 55 The Role of Computer and Internet in Education have significant contributions to changes in teaching practices, school change and innovations, and community services. Thus, policy makers and project leaders should think in terms of input factors that can work together to observe the right impact of ICT in education. Matching the introduction of computers with national policies and programs related to changes in curriculum, pedagogy, assessment, and teacher training is more likely to result in greater learning of students and other out comes (Kozma, 2005). OECD’s international survey (2002) of upper secondary schools in 17 countries reveals computer availability for students; use of ICTs by teachers; ICTs activities as a part of student assignment; the role of ICTs in teaching and learning; staff development; co-operation with other sch1ools and organizations; and obstacle to using ICTs in schools and found great variations among the countries with respect to the mentioned variables. PROMISES OF ICTS USE IN DEVELOPING COUNTRIES The World Links program The World Links program is a good initiation in the form of a project, originally managed by the World Bank to place internet-connected computers in secondary schools and train teachers in Africa, Latin America, the Middle East, and South and Southeast Asia. The goal of the program is to improve educational outcomes, economic opportunities, and global understanding for youth using information technology and new approaches to learning. Services provided by the program include:      Feasibility studies and consultation on connectivity solutions and telecenter management. Internet connectivity for secondary schools in developing countries. School-to-school partnerships, as well as regional and global partnerships with public, private, and non-governmental organizations. Teacher professional development on issues of technology in the context of innovative pedagogy. Workshops for policy makers on coordination of policies and implementation strategies. With the help of the World Links program, many countries are now using ICTs as ways of providing teachers with new skills and introducing innovative pedagogies in the classroom. For example, teachers in Chile acquired familiarity with computers for professional (eg. student marks, parent reports) and out-of-classroom tasks (e.g. searching for educational content on the web and lesson-planning activities). The program also provides 200 hours of teacher training that include an introduction to ICT, use of the internet for teaching and learning, use of tele-collaborative learning projects, integration of ICTs into the curriculum and teaching, and innovative pedagogical approaches. Because of this, majority of teachers and school principals report that teachers trained with computer and teaching skills gained positive attitudes about technology and about teaching. Moreover, some Asian countries such as India, Thailand, and Indonesia realized the importance of ICT integration to their education policies. They are also investing in ICT infrastructure for schools and creating network links of education institutions. On the other hand, developed countries are now making online education, smart schools, and virtual universities more of a norm. Developing countries are also fast catching. For instance, the Government of India, announced an ambitious program titled ‘Vidya vahini’ that is to create computer laboratories with facilities like internet access, an online library, academic services and web-casting across 60 thousand schools in the country in 2003. Vietnam has also invested to develop a computer based information network system for education called Education Network (EdNet) and improve computer facilities at educational institutions. EdNet is the country’s first step towards developing a computer based information network system for education. Thailand also launched School Net, which has connected 4758 schools throughout the country. School Net Thailand is using the internet to improve the overall standard of education in the country by reducing the gap in quality of education between schools in urban and rural areas. Pakistan invested 5.18 million US dollar to provide connectivity across universities, secondary and primary schools in 2003. ICTs make curriculum implementation learner-centred with a self-learning environment that enables the student customize his/her own learning experiences. In this respect, Malaysia initiated the concept of smart school, a learning institution with objectives to foster self-assessed, self-paced, and self-directed learning through the application of ICTs. The Sri Lankan Government also runs several key initiatives connecting 92 education centres across provinces, regions and sectors to the ministry, and developing computer-training centres at 8 hundred selected schools. In Namibia, integrating ICT into education and training systems, issues of 56 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education access to the local and global knowledge and information found to be important. For this, the education and training sector created the ICT policy for education to enhance the use and development of ICT for education and training. Hence the five distinct development areas for the use of ICT mentioned in the policy are: (1) Investigation and development of appropriate ICT solutions (2) Deployment of ICT (3) Maintenance and support of ICT (4) ICT literacy (5) ICT integration. The policy document also describes the provision and advantages of ICT as follows: ICT provides a great deal of advantage in the delivery of equitable quality education thereby providing an opportunity to improve the lives of our people. The need to use new technologies to raise the quality and efficiency of education cannot be overemphasized. It is imperative that we expose our children, parents, and teachers to ICT to improve the quality of education and technical proficiency of our human resources, thus leading to increased productivity and accelerated development. We must also prepare our citizens to adapt to the global economy and participate in electronic commerce. In addition, we must provide our children with a greater understanding of other peoples and cultures, thus defending our renewed legacy of peace and tolerance. Moreover, few of ICTs benefits to the classroom and the education process mentioned in the document are that ICTs:         Offer the opportunity for more student-centered teaching. Provide greater opportunity for teacher-to-teacher and student-to-student communication and collaboration. Give greater exposure to vocational and workforce skills for students. Provide opportunities for multiple technologies delivered by teachers. Create greater enthusiasm for learning amongst students. Provide teachers with new sources of information and knowledge. Prepare learners for the real world. Provide distance learners country-wide with online educational materials. Provide learners with additional resources to assist resource-based learning. Furthermore, the document states ICTs to cover all the technologies used for holding and communicating information and their use specifically in education with overall policy goals of:  Producing ICT literate citizens.  Producing people capable of working and participating in the new economies and societies arising from ICTs and related developments.  Leveraging ICT to assist and facilitate learning for the benefit of all learners and teachers across the curriculum.  Improving the efficiency of educational administration and management at every level from the classroom, school library, through the school and on to the sector as a whole.  Broadening access to quality educational services for learners at all levels of the education system.  Set specific criteria and targets to help classify and categorize the different development levels of using ICT in education. LIMITATIONS OF ICT USE IN EDUCATION ICT as a modern technology that simplifies and facilitates human activities is not only advantageous in many respects, but also has many limitations. Many people from inside and outside the education system, think of ICT as “Panacea” or the most important solution to school problems and improvements. However, many conditions can be considered as limitations of ICT use in education. The limitations can be categorized as teacher related, student related, and technology related. All of them potentially limit the benefits of ICT to education. ISBN 1-63102-455-8 57 The Role of Computer and Internet in Education Teachers’ attitude plays an important role in the teaching-learning process that utilizes computers and internet connections. Although teachers’ attitude towards use of these technologies is vital, many observations reveal that teachers do not have clarity about how far technology can be beneficial for the facilitation and enhancement of learning. Of course, some teachers may have positive attitudes to the technology, but refrain from using it in teaching due to low self-efficacy, tendency to consider themselves not qualified to teach with technology. In this respect, Bandura (1986) describes self-efficacy as “individual’s opinion of capabilities to organize and perform courses of actions to achieve particular types of performances.” Moreover, as identified by Brosnan (2001), attitude, motivation, computer anxiety, and computer self-efficacy are factors affecting teachers’ use of computers in their lessons. Teacher resistance and lack of enthusiasm to use ICT in education may also be another limitation. Furthermore, many teachers may not have the required IT skills and feel uncomfortable, nor do they have trainings needed to use the technology in their teaching. Unless teachers develop some basic skills and willingness to experiment with students, ICT use in education is in a disadvantage (Brosnan, 2001). On the other hand, the limitation of ICT use in education is related to student behaviour. Appropriate use of computer and the internet by students have significant positive effects on students’ attitude and their achievement. Students tend to misuse the technology for leisure time activities and have less time to learn and study. Yousef and Dahmani (2008) described online gaming, use of face book, chat rooms, and other communication channels as perceived drawbacks of ICT use in education, because, students easily switch to these sites at the expense of their study. Internet access at home, for instance, may be a distraction because of chat rooms and online games, reducing the time spent in doing assignments and learning (Kulik, 1994). Therefore, the impact of availability of ICT on student learning strongly depends on its specific uses. If ICT is not properly used, the disadvantage will overweight the advantage. For example, while students use the internet, it may confuse them by the multiplicity of information to choose from. As a result, the teacher spends much time to control students from websites unrelated to the learning content. The various literature in the area, identify the following limitations of ICT use in education as related to student behaviour.          Computers limit students’ imaginations. Over-reliance on ICT limits student’s critical thinking and analytical skills. Students often have only a superficial understanding of the information they download. Computer-based learning has negative physical side-effects such as vision problem. Students may be easily distracted from their learning and may visit unwanted sites. Students tend to neglect learning resources other than the computer and internet. Students tend to focus on superficial presentations and copying from the internet. Students may have less opportunity to use oral skills and hand writing. Use of ICT may be difficult for weaker students, because they may have problems with working independently and may need more support from the teacher. The other limitation of ICT use in education is technology related. The high cost of the technology and maintenance of the facilities, high cost of spare parts, virus attack of software and the computer, interruptions of internet connections, and poor supply of electric power are among the technology related limitations of ICT use in education. THE KEY CHALLENGES OF ICTS INTEGRATION IN EDUCATION The integration of ICTs in education systems may face various challenges with respect to policy, planning, infrastructure, learning content and language, capacity building and financing. ICT-enhanced education requires clearly stated objectives, mobilization of resources and political commitment of the concerned bodies. Tinio (2002) discusses issues such as analysis of current practices and arrangements, identification of potential drives and barriers, curriculum and pedagogy, infrastructure and capacity building to be considered in the formulation of policy and planning. In addition, it is wise to specify educational goals at different education and training levels as well as the different modalities of ICT use that can facilitate in the pursuit of the goals. Policy makers 58 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education then, need to know the potentials of ICTs in applying different contexts for different purposes. Other challenging points at the level of policy and planning are identification of stakeholders and harmonization of efforts across different interest groups, the piloting of the chosen ICT-based model, and specification of existing sources of financing and the development of strategies for generating financial resources to support ICT use over the long term. The infrastructure challenges that may exist are absence of appropriate buildings and rooms to house the technology, shortage of electric supply and telephone lines, and lack of the different types of ICTs. Because of this, one need to deal with infrastructure related challenges before the planning of ICTs integration to education systems. With respect to challenges of capacity building, we have to develop competencies of teachers and school administrators for the successful integration of ICT in the education system. In fact, one impeding factor of ICTs integration in education systems is the skill gap of people implementing it (Tinio, 2002). For instance, teachers need professional development to gain skills with particular applications of ICT, integration into existing curricula, curricular changes related to its use, changes in teacher role, and on underpinning educational theories such as constructivism/or student-centered learning. Because of this, any attempt of ICT integration in education should parallel with teachers professional development. The school leadership also plays a key role in the integration of ICT in education. Lack of support from the school administration is also a big challenge. Thus, for the effectiveness of ICT integration, administrators must be competent and have a broad understanding of the technical, curricular, administrative, financial, and social dimensions of ICT use in education. Furthermore, learning content and language also challenge the integration of ICT in education. Content development is a critical area that educators overlook. In integrating ICT in education, we have to care for the relevance of the learning content to the target groups. With respect to language, English is the dominant language in many of educational software, while English language proficiency is not high in many of the developing countries, and this is one barrier in the integration of ICT to education. Another great challenge is the financing. ICTs in education programs require large capital investment and developing countries need to predict the benefit of ICT use to balance the cost relative to the existing alternatives. Potential sources of money and resources for ICT use programs suggested are grants, public subsidies, fund-raising events, in kind support from volunteers, community support, revenues earned from core business, and revenues earned from ancillary activities (Tinio, 2002). Overcoming the mentioned challenges may help education systems benefit the most from this technology. SUMMARY AND THE WAY FORWARD Information communication technologies are influencing all aspects of life including education. They are promoting changes in working conditions, handling and exchanging of information, teaching-learning approaches and so on. One area in which the impacts of ICT is significant, is education. ICTs are making major differences in the teaching approaches and the ways students are learning. ICT-enhanced learning environment facilitates active, collaborative, creative, integrative, and evaluative learning as an advantage over the traditional method. In other words, ICT is becoming more appropriate in the realization and implementation of the emerging pedagogy of constructivism that gives greater responsibility of learning for students. Several surveys are showing that ICT use in education systems of developed nations has comparatively advanced than ICT use in education systems of developing nations. In addition, the major promises of ICTs use in education systems of developing countries focus on training teachers in new skills and introducing innovative pedagogies into the classrooms, investing on ICT infrastructure for schools and creating networks among educational institutes, improving overall standard of education by reducing the gap in quality of education between schools in urban and rural areas, initiation of smart school with objectives to foster self-paced, self-assessed, and self-directed learning through the applications of ICTs, and developing ICT policy for education and training. The major limitations of ICT use in education are teacher related, student related, and technology related. In addition, the key challenges of ICTs integration into education systems discussed relate to policy, planning, infrastructure, learning content and language, capacity building and financing. ISBN 1-63102-455-8 59 The Role of Computer and Internet in Education ICTs, despite their known limitations, are believed to be beneficial in this regard. The computer and the internet are especially useful to enhance student engagement in learning and positively impact student performance and achievement. Moreover, their usefulness is more apparent in the 21st century, where the time is an era of information rich that the conventional modes of teaching learning could hardly handle it. This article strongly recommends the mainstreaming of ICT utilization (particularly the computer and internet) in education systems at levels, for they benefit curriculum implementation and enhanced student learning. Therefore, education policy makers, educators and all concerned should evaluate and recognize the roles of ICT in education in order to work for the effective functioning of this technology in their education systems. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] 60 Bandura, A. (1986). Social foundations of thought and action: A Social-Cognitive View. Englewood cliffs, NJ: Prentice-Hall. Brosnan, T. (2001). Teaching Using ICT. University of London: Institute of Education. Carnoy, M. (2002). ICT in Education: Possibilities and Challenges. (Downloaded from: http://www. uoc.edu, 04 March 2011). Hare, H. (2007). Survey of ICT and Education in Africa: Ethiopia Country Report (ICT in Education in Ethiopia). www.infodev.org downloaded February 28. Jonassen, D.H. (1991). Objectivism versus constructivism: Do we need a new philosophical paradigm? Educational Technology Research and development, 39(3), 5-14. Kok, A. (2007). ICT Integration into Classrooms: Unpublished literature review. Kozma, R.B, (2005).National policies that connect ICT-based education reform to economic and social development. An interdisciplinary journal of humans in ICT environment 1(2) 117-156. Kulik, J.A. (1994).Meta-analytic studies of findings on computer-based instruction. In J.E.L.Baker &H.F.O’Neil (Ed.), Technology Assessment in Education and Training. Hillsdale, NJ: Lawrence Erlbaum. OECD. (2002). ICT: Policy Challenges for Education. Planning Meeting, Agenda and Issue Paper. (Retrieved from https://www.oecd.org/LongAbstract on December 2009). Olson, J. (2000). Trojan horse or Teacher’s Pet? Computer and the Culture of the School. Journal of Curriculum Studies, 32 (1), 1-8. Pedro et.al. (2004). Technology in Schools: Education, ICT and the Knowledge Society. (Retrieved from http://www.worldbank.org/education/pdf/ic t_report_oct04.pdf on December 2009). Tinio, V.L. (2002). ICT in Education: UN Development Programme. (Retrieved from http:www.eprmers.org on December 2009). UNDP. (2004). Promoting ICT for Human Development. A Pioneering Regional Human Development Report in Asia in 2004: Realizing the Millennium Development Goals (Retrieved from http://www.apdip.net/projects/rhdr /resources/PDF on December 2009. Volman M. (2005). Variety of roles for a new type of teacher. Educational technology and the teacher profession. Teacher and Teacher Education, 21, 15-31. Voogt, J. (2003). Consequences of ICT for aims, contents, processes, and environments of learning. In J. van den Akker, W. Kuiper & U. Hameyer (Eds.), Curriculum landscapes and trends (pp 217 – 236). Dordrecht: Kluwer Academic Publishers. Watson, D.M. (2001). Pedagogy before Technology: Re-thinking the Relationship between ICT and Teaching. Education and Information Technologies, 6, 4, 251-266. Yousef, A. B. and Dahamini, M. (2008). The Economics of E- Learning: The Impact of ICT on Student Performance in Higher Education: Direct Effects, Indirect Effects and Organizational Change (http://rusc.uoc.edu, downloaded March 4, 2011). Fisseha Mikre, (July, 2011), Ethiop. J. Educ. & Sc. Vol. 6 No 2; The Roles of Information Communication, Technologies in Education, Review Article with Emphasis to the Computer and Internet. ISBN 1-63102-455-8 MOBILE TECHNOLOGY AND APPLICATIONS FOR LIBRARIES Rajeev Kumar | Assistant Librarian | Apeejay School of Management | Dwarka | Delhi | rajapj16@yahoo.in Abstract: This paper highlights an introductory view about library and information services on mobile devices. It attempts to identify key issues including factors affecting implementation of mobile technologies. Mobile technology will bring about a paradigm shift from the traditional methods of information delivery and integrate ICT as an essential component in every days lives. This study may be helpful in identifying and generating Mobile based service for libraries. Keywords: ICT, Mobile Technology, Mobile Applications, Library Services and M-Learning. INTRODUCTION The mobile applications and technology has changed the way one connects and interacts with the world and mobile library services can meet people's needs for information in a fast-paced society. The paper defines what the Mobile Technology is, how the traditional library services are now moving to mobile library information services. A library may reach the remote users effectively by adopting of mobile technology in its services. Now users expecting, or preferring, to do things online that would previously have required a visit to the library in person. Mobile technology is a wireless technology that work with radio waves and can be carried about and used anywhere. The wireless technology and mobile phones are becoming an integral part of everyday life and are changing the way one connects and interacts with the world. Mobile phones have operating systems to run applications, access the internet, allow downloads, support multiple e-mail accounts, create and edit documents, create playlists and even provide location/direction via GPS. Mobile phones capable of accessing the internet to current day ‘super phones’ with capabilities equivalent to minicomputers and laptops. (Wikipedia 2011). We consider mobile technologies; the first device that comes to mind has to be the cell phone or the smart phone. Beginning to the mobile technology in the library can want to have a mobile-based website or a mobile application ‘app’ that reads well on small screens. These sites or apps do not need too much web design knowledge because well-designed mobile sites do not have complicated code or scripting languages and can be designed in-house. Fig.1: Mobile Video Communication Mobile technologies have made communication and information access very convenient and timely to users from the comfort of their own homes and offices, and from wherever they are while on the move with their cellular phone units or PDAs (personal digital assistants). The new ways of working afforded by mobile technologies are often characterized in terms of access to information and people anytime, anywhere. ISBN 1-63102-455-8 61 Mobile Technology And Applications For Libraries With advancements in technology and the rise in mobile phone use, people are taking advantage of being connected to data wherever they are. Mobile phones aren’t just phones anymore: they can access e-mail, search the Web, video chat, and play games. Even mobile devices like iPad and iPod touch can bring social media, productivity tools, and entertainment literally into the palm of your hand. Therefore, libraries should be exploring mobile devices as a way to connect with patrons. Creating a library application (“app”) or mobile Web site that allows patrons to access library hours, view their library account or even search databases is easier than most people think. Mobile technologies are becoming an increasingly important and popular in how we search, access, and interact with information. Libraries around the world are meeting this change head on by adapting our services and collections to the proliferation of mobile devices. Mobile technologies being used in libraries for Library resources that are mobile access to library collections such as e-books, e-journals, and special collections, that are supporting or extending traditional library services like reference enquiries and circulation, using mobile technologies. Mobile technology has changed everyone’s workflows, with many researchers and students now expecting, or preferring, to do things online that would previously have required a visit to the library in person. These activities could include:      Accessing their library account Finding and saving references for reading or citing, now or at a later date Reading the full digital content, such as journal articles or eBooks, that they would normally read on their desktop Reading abstracts Searching OPACs for resources Library professionals provide library services or other assistance via mobile devices through e-mail, chat, instant messaging, or SMS text. Instant messaging, chat, and text lend themselves to mobile access because they are designed for the relatively short exchange that people typically use when communicating with a handheld device. Offering reference services using SMS text and chat in particular are relatively easy for libraries to employ because there are many free services to support them. WHY LIBRARIES GO WITH MOBILE TECHNOLOGY?      It is easier to access It provides content ubiquitous It makes able to access new services It enables patron to connect via new medium It three times more capable than personal computer OBJECTIVE The objective of this paper is to shows the major library and information services provided by using mobile technology to satisfy the information needs of variant users and discusses important mobile devices in library and information services. MOBILE DEVICES IN LIBRARY AND INFORMATION SERVICES Electronic textbooks: E-readers and tablets have new features that allow students to highlight and add annotations to the text, just as they would with paper texts. They give students the capability to link to additional information. E-readers: Due to the popularity of Amazon’s Kindle and Barnes & Noble’s Nook. The latest generation takes content delivery to new levels, allowing for wireless browsing, purchasing, and delivery of content through these devices. 62 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Mobile Phones: The mobile phones are not only a phone portal to mobile outreach. Library and information professionals who used more traditional cell phones can consider text reference for their mobile outreach programs. With Google Voice and library-based options such as MyInfoQuest and Mosio’s Text a Library and information professionals can set up a text reference service that can help in handle ready reference questions or even more complicated questions quickly and easily. MP3 players: An iPod, iPhone or other MP3 player mobile devices can use in library for audio and/or video tours. With an iPod or MP3 player, users can explore the library at their convenience, concentrating on the parts of the collection most relevant to their needs. Tablets: Tablets or Tablet PCs can be used in various activities for example searching databases, downloading articles, and perusing the catalog either through apps or tablet-formatted websites. The overall utility of tablets also makes them an ideal device for accessing a variety of documents, including e-books, e-journals and edatabases etc.                LIBRARY AND INFORMATION SERVICES THROUGH MOBILE TECHNOLOGY A large collection of audio books both free-and subscription based services are available for download and also transferable to mobile devices. Ability to access information from anywhere at any time will be of great help for users who cannot visit library in person and provides a constant link to required information resources. Academic libraries can support distance learning, formal education, and research activities through mobile devices Mobile communication enables libraries to offer location-based services/content through global positioning system (GPS) capabilities. Libraries can guide the users to the location of specific document or service through maps and navigational tools Mobile phones make ILL/document delivery services faster and cut-down the time to request/visit different libraries and complement the geographically remote users. Mobile Optimized Library WebPages Mobile users are using the facilities on mobile phones like SMS, instant messaging, web browsing, email effortlessly to communicate. Most of the features are pre-installed on mobile devices or option for data plan packages. Libraries can enrich OPAC by allowing users to incorporate user created content like notes or images uploaded by users. Limitless access all online resources accessible on their desktop also become accessible through mobiles. The mobile devices can further appreciate the service with instant answers like definitions, meanings and other information from digital libraries and web. Libraries can make use of multimedia messaging service (MMS) on mobile devices to share photos, videos, and audio. One can get today’s news on their mobiles either by accessing the web portals or SMS text messaging on their mobile phones. Library tours, instruction/induction/orientation programs have been quite significant in bringing the nonusers to libraries and also help the remotely located or users located in different geographical locations. Library users, who don’t have time or inclination to attend an on-site workshop, can get access to library tours on their mobile devices. Online Library Catalogs on Mobile Phones. User-friendly aid familiarity with their own devices and technology helps the users in accessing information quickly and does not require orientation and training. LIBRARY AND INFORMATION SERVICES ON MOBILE DEVICES Library mobile services included access to new titles, e-resources updates, catalogue searching, booking rooms and PCs, contacts, events and databases optimized for mobile use, enables users to search for library materials, see the cover image, read a summary, obtain item availability information, find out which bookshelf the item is ISBN 1-63102-455-8 63 Mobile Technology And Applications For Libraries on using floor maps, provide feedback on the item and save the item information for future reference. The Library's opening hours, news, floor plans and subject guides are also easily accessible on mobile phones. SMS service libraries became more interested in using this service when it became possible to send SMS to an email service. This service expected by library users, their SMS reference service was predominantly managed by the library with little or no involvement from their IT department. The use of iPods, iPhones, Tablets, TabletsPc and MP3 players to provide an audio tour. In academic libraries, the commonly demanded services on mobile devices include: catalogue searching, SMS/text a librarian, locating spaces, booking computers and rooms, location based services, payments, mobile emails, instant messaging and videos. Mobile devices are fast becoming users’ first choice of access. (Gartner 2011). The libraries have been quick to concentrate library services through use of mobile devices as SMS service, service lending out eBook readers, the resources to develop its own apps unique to their users, catalogue searching, providing patron account and basic library information, to allowing users to scan a book anywhere, check for availability at their home library and then put a hold on the item.     LIBRARIES CAN PROVIDE THE SERVICES ON MOBILE DEVICES Academic affairs administration: provides the latest news and notices from a university. Users can select a menu and see results that are designed specifically for mobile viewing email notices of new books and journal articles, set up preferences for catalogue searching, etc. e-Contents: offers access to a variety of databases and digital resources such as e-Books, e-Journals,Web databases, dissertations, and article databases. Users can get fast relevant answers whenever needed with e-Contents Search, search designed just for mobile user. Library guide: gives users the best of library guide information such as library use guide, question answering service, and library statistics delivering rich content in a way that works best for users. If users have questions and want to contact the library professionals for help, they can get a fast response from the library via the mobile device and find the appropriate information needed. Mobile-based Library Lending Service: Libraries can formulate regulations for using mobiles for circulation of reading materials and maintenance of users account. Mobile phones make ILL/document delivery services faster and cut-down the time to request/visit different libraries and complement the geographically remote users. Provides the following services such as lending extension/inquiry, return information/inquiry, interlibrary loan requests, SDI service application, email service of academic journals, database use education application, etc. The library is a personal library space where users can find information and resources of their choosing. Users can read alerts, check records, renew resources, request items, track interlibrary loans and document delivery requests, set up future application and work in mobile library services.   64 News and Events: Information on job openings, varieties of scholarly competition, library events such as orientations program, stock verification, book recall, lectures on Fig.2: Mobile based Services special topic, news in relation to scholarly work, awards and so on can be given using mobile devices in order to update the user’s knowledge short messages regarding the library events and news can be sent to the users personally. Notice: provide the latest news, notices and reach users wherever they might be via SMS and MMS from libraries. Users can get notified instantly with notice alerts: alerts on overdue books, outstanding fines, reminders to return library items, library event information, etc. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education                     In-house search: accesses a variety of library-owned resources and databases. Users can just enter search terms and see results that are designed specifically for mobile viewing. This service includes OPAC (online public access catalogue), integrated search, and original document search. SMS Alert Service: Existing e-mail alert services like bringing new books to the notice of users for suggestion, intimation of arrival of indented documents by users, informing availability of reserved documents for collection, appraising about which/when books are overdue, library circulars, e-journals subscribed, change in timings, information about important events, etc., can be upgraded by sending through SMS alert services. Suggest a purchase: Library professionals can receive the suggestions from the users sent via mobile phones. In such cases users need not to visit the libraries and write the requirements in a register. Location of the library: Users might be provided with virtual tours of the library sections and their services. Audio Tour: Libraries even can provide audio tour of a library. New Title Preview: Mobile gadgets can be used to disseminate the information about newly acquired documents which are of irrespective of forms. Image Services: The Image Services in a library might offer a number of high quality, fee based photographic and document imaging services including digitized photographs, diagrams, maps, photos of places of national importance. Research consultation and instruction: It is a kind of customer care service. Research scholars may have an interaction with the library staff to get the consultation and get suggestions via mobile phones. Catalogue search: Libraries can provide their catalogue on the mobile devices. Journal finder: Library Journal Finder provides access to full text journal, magazine, and newspaper content as well as links to titles held in print. Reference service: Library users can ask library professionals anything through the live chat and texting with mobiles. The reference services can be provided with the help of sending and receiving SMS. Immediate feedback is also possible from the user’s side. Wi-fi - Internet Access: Mobile phones are available with 3G facility. Libraries can offer wi-fi facility to access electronic information sources.. MOBILE LIBRARY WEB SITES Adelphi University Libraries Mobile (AU2GO). Offers library hours, library staff contact information, a link to the library’s blog “biBLIOGraphy,” and more. Access: http://m.adelphi.edu/library/. Albertsons Library, Boise State University. Simple text navigation offers various ways to find the library and its contents. An interesting feature is the inclusion of a “Find in Our Building” category, which lists call number locations and popular locations such as study rooms and computers, each linked to an animated floor map. Access: http://library.boisestate.edu/m. North Carolina State University (NCSU) Libraries. Elegant interface with icons representing categories such as room reservations, group finder, and Webcams. Another interesting feature is the ability to view the number of available library computers. Access: http://www.lib.ncsu.edu/m/home/?browse=iphone. PENNLibraries, University of Pennsylvania. A multitude of information at your fingertips, such as mobile versions of databases, image search, library video clips, and more. Access: http://www.library.upenn.edu/m/. Library Weblog (Library Dot Com). It is library professional’s weblog; users can access it through mobile. http://librarydotcom.webs.com It has directory of LIS professionals all over the world. Access: http://www.librarydotcom.webs.com University of California Riverside Libraries. Glossy icons designate many useful categories, including research guides, library workshops, and links to the library’s social media profiles. Access: http://m.library.ucr.edu. Virginia Tech University Libraries. A simple but effective layout offers important information, such as library hours, contact information, catalog search, and library maps. Access: http://m.lib.vt.edu/. ISSUES ISBN 1-63102-455-8 65 Mobile Technology And Applications For Libraries There are still limitations, such as monochrome screens, difficulty with various file formats, and restrictive content licensing. One area of digital content that academic libraries have already had a major presence in has been electronic reserves. The primary challenge that exists in this area is that unless the electronic reserve content is in a layout that can easily be converted to an e-reader format, it can be difficult to make it clearly readable. The greater challenge is to provide access to e-journals through mobile phones as the libraries and publishers prefer authentication limited to campus wide IP address. Libraries must convince the publishers to provide user id and password mode in addition to IP address based authentication to access e-journals on mobiles. However one cannot neglect the policies and standards of information security of the organization. Since, the feature like ‘always on’ and continuous connectivity makes new devices more vulnerable to security threats, the same need to be addressed cautiously before setting up the library services for mobile devices.     SUGGESTIONS When library services provide through mobile devices, the set up should be such a type so that a systems administrator or IT expert can be help in navigation of chat and text services. For instance, when a text message arrives during a time when no one is monitoring the service, a voicemail message automatically appears in library’s e-mail account. Library professionals can find an enormous amount of advice on the web about how to begin offering mobile-friendly reference, how to expand the virtual reference services and how to choose among free and fee-based services for their library’s budget and needs. In the libraries currently provide mobile access to resources, the library catalog is most commonly offered and databases and assistance from library professionals are next most frequently provided services. A few more interesting services as a library locker reservations, a virtual suggestion box, alerts about database trials, an app that lists new books, and using iPads, iphones, smartphones, tablets, tablet pcs or other mobile devices may be include for roving reference. Using the latest mobile technology in libraries will help to provide access to library materials for mobile users. Audio/ virtual library tours can be produced fairly quickly, inexpensively, and could reduce the amount of staff time spent helping new users to orient themselves in the library and explaining the facilities available. It can easily be provided both as downloads from the library website and on mobile devices. Libraries can formulate regulations for using mobiles for circulation of reading materials and maintenance of users account. This wireless solution enables staff to assist patrons in the stacks, checkout materials while off site, such as at community or campus events, and update inventory items while walking around the library. FUTURE POTENTIALS OF MOBILE APPLICATION IN THE LIBRARIES More and more changes are expected within four to five years in the field of mobile technology and its application to the libraries, the day is not far when we will use phone to read barcodes or RFIDs in the library and OPACs will develop GIS sensitivity and be able to communicate with users through their mobiles for holds, fines, late notices, alerts, etc. CONCLUSION Libraries are moving forward in providing access to digital collections via mobile devices. In the near future, more and more people will be able to experience digital collections in the palm of their hand through a mobile phone. Already mobile phones are no longer a luxury, but a necessity not only for simple voice or text communication, but also for accessing the internet. Such connectivity seems to be the wave of the future. Mobile technology has become boon to the libraries. A library may reach the remote users effectively by adopting of mobile technology in its services. Mobile phones are inevitable tools for information communication. Human beings in a society use mobile phone to communicate thoughts, facts, conversations, in general, information. The dissemination of processed information is a common factor in a civilized society. Mobile technology is fast becoming the preferred method for connecting to the Internet, especially for people on the go. Library professionals must keep pace with this trend and integrate themselves into the mobile realm if they wish to deliver enhanced user services. 66 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education REFERENCES [1] Adarsh Bala . (2010).Use of Mo bile Technology in Enhancing Library Services. International Journal of Library Science, (J10), 56-63. Retrieved from http://www.ceser.com/cpjour/index.php?journal=ijls=article&op=view &path%5B%5D=18. [2] Barile, Lori. (2011). Mobile technologies for libraries: A list of mobile applications and resources for development. College & Research Libraries News, 72 (4), 222-228. Retrieved from http://crln.acrl.org/content/72/4/222.full. [3] Choi, Wontae. (2007). Current status of mobile library service. Industrial information programs in Korea: an overview. Inter lending & Document Supply, 35(2): 60 – 65. Retrieved from www.researchgate.net/.../235318748_ Industrial_information_programs_in. [4] Choi, Wontae. (2009). Development and Application of Mobile Technology in South Korean Libraries . Libri, 59, 14 –22. [5] Dresselhaus, Angela & Shrode, Flora. (2012 ). Mobile Technologies & Academics: Do Students Use Mobile Technologies in Their Academic Lives and are Librarians Ready to Meet this Challenge? Information Technology and Libraries, 31, ( 2 ). Retrieved from http://ejournals.bc.edu/ojs/index.php/ital/article/view/2166/pdf_1#. [6] Jharotia, Anil Kumar (2012). “M-Learning is the future of e-learning: A new dimension in library services” Conference proceeding of National conference on beyond librarianship: Search for new frontier held at G.B.U on 2122 Sept. 2012. Vol-1 pp.203-210. [7] Johnson, L. et.al (2011). The New Media Consortium: The 2011 Horizon Report. http://net.educause.edu /ir/library/pdf/HR2011.pdf. [8] Kumar, B.T. Sampath, Kumar, Vinay D. & Prithviraj KR. (2013). Application of Mobile technology in Library services. Retrieved from www.inflibnet.ac.in/caliber2013/ppt/1_7.pptx. [9] Kosturski, Kate & Skornia, Frank. (2011) Using Mobile Technologies in the Academic Library: All the Knowledge of the World in My Hand: Mobile Technologies Mobile phones. Computers in Libraries. Retrieved from http://www.infotoday.com/cilmag/jul11/Kosturski_Skornia.shtml. [10] Malathy S. and Kantha P. (2013). Application of Mobile Technologies to Libraries. DESIDOC Journal of Library & Information Technology, 33, (5), 361-366. Retrieved from http://publications.drdo.gov.in/ojs /index.php/djlit/article/view/5098/2935. [11] Murphy, Joe. (2012)Mobile Technologies In Libraries. Retrieved from http://www.slaagc2012.org/ index.php/workshops/mobile-technologies-in-libraries. [12] Spectrum Mobile Learning, Libraries and Technology. (2011). M-Libraries: Library Success: A Best Practices Wiki. http:// www.libsuccess.org/index.php?title=M-Libraries. [13] The Library In Your Pocket: Practical: Applications of Mobile Technologies. Retrieved from http:/ /librarylinknj.org/content/library-your-pocket-practical-applications-mobile-technologies. ISBN 1-63102-455-8 67 INSTITUTIONAL REPOSITORIES AND DIGITAL PRESERVATION IN LIBRARIES Parvathamma K S | Senior Librarian | Garden City College of Science and Management Studies | Old Madras Road | Bangalore | parvathimlisc@rediffmail.com Abstract: These days Institutional Repositories are increasing because it is essential component for all academic institutions and Research libraries. Institutional Repositories are digital collections that capture and preserve the intellectual output of a single or multi University community. Institutional repositories are very useful in educational institutions or in academic community to archive the long term digital preservation of objects placed within the repository and it is useful for effective preservation. Repositories involve change in the way research is disseminated, preserved, and published. This change requires faculty to deposit their research results, data sets, and other materials in the repository — a new step in the research process. In corporations, management may require staff to deposit items, such as strategic plans, marketing plans, and working papers. An institutional repository (IR) is an online archive for collecting, preserving, and disseminating digital copies of the intellectual output of an institution, particularly a research institution. The article discuss about the role of Institutional Repositories and Digital preservation in libraries. Institutional repository is most essentially an organizational commitment to the stewardship of these digital materials, including long-term preservation where appropriate, as well as organization and access or distribution. Keywords: Institutional Repository, Library, Information Explosion, Research, Technology, Digital Preservation. INTRODUCTION An Institutional Repository is an online locus for collecting, preserving, and disseminating of the intellectual output of an institution. Enhancing the accessibility and visibility of the articles published by the faculty members and research scholar of the Institute. Institutional repositories (IRs) are a development in managing digital objects for effective utilization. IR establishment is a challenge as well as an opportunity for information professionals. It may include a variety of research output of any organization. An IR is a means to ensure that the published work of scholars is available to the academic community even after increases in subscription fees or budget cuts within libraries (Bhardwaj, 2014& Boufarss 2011). The majority of research scholars do not provide free access to their research output to their colleagues in an organization (Ahmed and Al-Baridi 2012). IRs provides scholars with a common platform so that everyone in the institution can contribute scholarly material to promote cross-campus interdisciplinary research. INSTITUTIONAL REPOSITORIES Institutional repositories are digital collections of the outputs created within a university or research institution. An institutional repository can be viewed as an "a set of services that a university offers to members of its community for the management and dissemination of digital materials created by the institution and its community members." For example, University includes materials such as monographs, eprints of academic journal articles undergoing peer review- as well as Electronic Theses and Dissertations (ETDs). An institutional repository might also include other digital assets generated by academics, such as administrative documents, course notes, learning objects, or conference proceedings. Deposit of material in an institutional repository is sometimes mandated by that institution. Repositories adhere to an internationally-agreed set of technical standards that means that they expose the metadata (the bibliographic details such as author names, institutional affiliation, and date, titles of the article, abstract and so forth) of each item in their contents on the Web in the same basic way. In other words, they are ‘interoperable’. This common protocol to which they all adhere is called the open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). The contents of all 68 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education repositories are then indexed by Web search engines such as Google and Google Scholar, creating online Open Access databases of freely-available global research. As the level of self-archiving (the process by which authors deposit their work in repositories) grows the Open Access corpus will represent an increasingly large proportion of the scholarly literature. The rationale for universities and colleges implementing institutional repositories rests on two interrelated propositions—one that supports a broad, pan-institutional effort and another that offers direct and immediate benefits to each institution that implements a repository. OBJECTIVES OF INSTITUTIONAL REPOSITORIES Some of the main objectives for having an institutional repository are to provide        Open access to institutional research output by self-archiving it To create global visibility for an institution's scholarly research To store and preserve other institutional digital assets, including unpublished or otherwise easily lost ("grey") literature such as theses or technical reports. Manages and measures research and teaching activities Facilitates the development and sharing of digital teaching materials and aids Supports students endeavors, providing access to theses and dissertations and a location for the development of e-portals Enables and encourages interdisciplinary approaches to research NEED FOR DIGITAL PRESERVATION According to Jones and Beagrie (2002) Digital preservation refers to the series of managed activities necessary to ensure continued access to digital material for as long as necessary. The challenge for digital preservation is not just the volume of data. The hardware and software is used to store and access digital information are constantly upgraded and superseded. The speed of changes in technology means that the timeframe during which preservation action must be taken is very much shorter then for paper. Institutional repositories as a means to mange and preserve effectively in institution knowledge base and intellectual assets results in the contents of institutional repositories expanding beyond e-print to include research data, e-learning materials and other forms of intellectual outputs, which are generally not published and preserved elsewhere. FUNCTIONS OF DIGITAL PRESERVATION Digital preservation requires new workflows, new skills and cooperation across different professions ranging from traditional preservation management skills and Computer Science. In order to understand the process necessary to archive the long term digital preservation of objects placed within a repository, it is useful to understand the effective preservation. Wheatly (2004) summarized its key functions as follows;    Data is maintained in the repository without being damaged or lost altered This function is a fundamental requirement that must be addressed by any digital repository. Data can be found, extracted and served to a user Repositories needs to support searching and retrieval to improve access to information. This is an area which has received much attention in the last few years and has been greatly facilitated by standards such as Open Archive Initiative Protocol for Metadata Harvesting (OAIPMH), allowing service providers to create discovery services across repositories by recurrent metadata harvesting. Data can be interpreted and understand by the user and can be achieved in the long term. It will give information like what digital preservation needs to achieve and users can access the content that has been ingested into the repository in the past and make sense of its intellectual property, despite hardware and software changes over time. ISBN 1-63102-455-8 69 Institutional Repositories and Digital Preservation in libraries Depositing intellectual assets into institutional repositories requires that all are able to trust the ability of the repository to secure the information over the long term. Repositories will form a permanent and critically important part of the scholarly communication process. The first role is to provide the open access literature. Additionally services may be added to repositories to provide extra functionality. For example a usage reporting service gives author and the institution information on how the content of repository is being used. A search service may help users find specific items more easily. INSTITUTIONAL REPOSITORY AND DIGITAL PRESERVATION IN LIBRARIES The institutional library needs a presence on the Web – a place to describe its print and web-based services, and to bring together the content it makes available to its users. It needs to present its catalogue but also its other finding aids – to its collections of e-journals, its collections of digitized materials from its treasures, and other lists which are most usefully presented separately, such as electronic reserve texts or past exam papers. Institutional libraries also are growing the range of services they can offer via their website. Examples of these include interlibrary loan request – sometimes by electronic full-text delivery; requests to retrieve store items; book loan renewals and electronic reference support. In addition, library services need to be distributed out to other useful environments, such as student virtual learning environments and university portal sites. A repository established for the use of a particular academic department or laboratory is properly called a departmental repository, though the term institutional repository is also used. An example is e-Prints for the School of Electronics and Computer Science, University of Southampton, UK. A repository can also be intended for a particular type of material, such as theses. With digital content increasing exponentially in the current Information Age, libraries have come to realize the importance of digital preservation. Paul Wheatley states that "careful consideration must be given to the preservation needs of materials to be archived within an institutional repository". According to Nancy Y. McGovern and Aprille C. McKay “several significant opportunities for digital preservation offered by IRs in their article published in 2008, including digital content management, opportunities for content to creators to learn about their role in digital preservation, and faculty legacy preservation. With IR software gradually integrating support for preservation, there seems to be more hope for IR managers in implementing digital preservation for IRs. However, it is not sufficient to rely only on software since various facets have to be considered when preserving digital content. The most important roles that IRs is to collect, manage, and disseminate the digital scholarship that their communities produce. Collecting content is the first step to building an IR, and since their inception this is what IR managers have primarily focused their efforts on. Digital scholarship can be collected in different ways, and how it is collected may affect its quality as well as the ability to preserve it. It is worth investigating how content is collected and how quality is ensured since different levels of preservation effort will be made depending on both the initial quality of the content and its format. Software is a key element in the construction of an institutional repository. There are a number of open-source software packages for running a repository including:  DSpace  EPrints  Fedora  Invenio  SobekCM  Greenstone There are also hosted (proprietary) software services, including:   70 Digital Commons, a full-service commercial platform from the Berkeley Electronic Press SimpleDL ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Repository 66 is a mashup which indicates the worldwide locations of open access digital repositories. It is based on data provided by ROAR and the OpenDOAR service developed by SHERPA. The Confederation of Open Access Repositories (COAR) states in its manifesto that "Each individual repository is of limited value for research: the real power of Open Access lies in the possibility of connecting and tying together repositories, which is why we need interoperability. In order to create a seamless layer of content through connected repositories from around the world, open access relies on interoperability, the ability for systems to communicate with each other and pass information back and forth in a usable format. Interoperability allows us to exploit today's computational power so that we can aggregate, data mine, create new tools and services, and generate new knowledge from repository content. Interoperability is achieved in the world of institutional repositories using protocols to which repositories should conform, such as OAI-PMH. This allows search engines and open access aggregators, such as BASE and CORE, to index repository metadata and content and provide value-added services on top of this content. CONCLUSION Digital preservation is a complex process and there are many unsolved organizational, managerial and technical issues that make digital preservation a challenging task for those managing institutional repositories. Digital repositories have been established to support the open-access movement, to provide open access to the institutions’ output. These days increasing the number of research libraries have started to move digital preservation programs ahead by developing preservation policies. Totally while building a successful institutional repository for academic institutions require careful planning from the institution community. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] Charles W. Bailey Jr, (2005) "The role of reference librarians in institutional repositories", Reference Services Review, Vol. 33 Iss: 3, pp.259 - 267 Sheau‐Hwang Chang, (2003) "Institutional repositories: the library’s new role", OCLC Systems & Services: International digital library perspectives, Vol. 19 Iss: 3, pp.77 – 79 Tedd, Lucy, (2006). Institutional Repositories, Emarald Group Publishing Limited: PP. 232-243. (2005). Reference Librarians and Institutional Repositories, Emarald Group Publishing Limited: PP. 283-290 Jones, Richard E, Andrew, Theo and MacColl, John. (2006). The Institutional Repository , Elsevier: PP. 50-75 Johnson, Richard K, (2002). Institutional Repositories, D-Lib Magazine, Vol. 08 Iss: 12. PP. Li, Yuan and Banach, Meghan, (2011). “Institutional Repositories and Digital Preservation: Assessing Current Practices at Research Libraries”, D-Lib Magazine, University of Massachusetts, Vol/ 17 Iss; 5/6, PP. Manjunatha, K and Thandva Moorthy, K. (2011). “Researchers’ Attitudes to Depositing Institutional Repositories of Engineering Colleges in Karnataka state: A Study, PEARL - A Journal of Library and Information Science, Vol. 05, Iss. 02: pp. 50-54. Krishna Murthy, A, Ramesh, L.S.R.C.V and Nagaraju, A.V.S.S. (2010). “Enhancement of Scholarly Communication through Institutional Repositories – A Critical Analysis”, PEARL - A Journal of Library and Information Science, Vol. 04, Iss. 02: pp. 104-108. Hirwade, Anil W. (2006). Institutional Repositories: Challenge and Opportunity for LIS Professionals in Digital Age, Library Herald, Vol. 44, Iss. 02: pp. 146-151. Hockx-yu, Helen. (2006). Digital Preservation in the context of Institutional Repositories, Electronic Library and Information system. Vol. 40, No.03: pp. 232-243. ISBN 1-63102-455-8 71 THE CHANGING NATURE OF THE PUBLIC LIBRARIES WITH EXPANDING LEARNING FRONTIERS WITH ELEARNING Dr. D. K. Shrivastava | Divisional Librarian (I/C) | Govt. Divisional Public Library, Kota, Rajasthan | India | deepakshri1974@yahoo.co.in Abstract: The new wave of e–learning has challenged the status queue of Public libraries and information professionals to learn new skills and follow new ways of creating, developing, managing and disseminating services to learners and instructors. Besides the course contents / material, a wide range of information and communication technologies such as e–mail, video conferencing, discussion forums, instant messaging, chat rooms, etc. Used to connect learners with each other and with teachers or trainers. With this view, the present Research Paper is an attempt to explore how the libraries can play an instrumental role in the promotion of e–learning. This article describes about the evolution of e- learning and the role of Public library and information professionals in the creation, development and management of e-learning resources. With the emergence of ICT, the role of Public libraries and library services has undergone a sea change. It offers an opportunity to Public librarians to institute new environment of learning and develop a mechanism to deliver new services. All traditional practices and services have been replaced with the paperless course contents; disseminate information and documents on the Internet. Delivery of course contents can be accomplished in any electronic medium such as CDROMs, DVDs, intranet and World Wide Web. Keywords: E–Learning, E-Libraries, E- Resources, Information Literacy, Metadata, Portal Technology, Networking, virtual learning environment (VLE), information and communication technology (ICT), CDROMs, DVDs, World Wide Web INTRODUCTION No doubt, Books are the vehicles of the Knowledge and Libraries are the repositories. It is the role of the libraries to collect, store, and organized availability of books to the readers. Library service thus constitutes an important social and educational service which needs supports from society and governments, state and central on a regular basis and Public Library is a social institution and the service that it renders is a social service. It is today regarded as an agency for the communication of ideas. It is an agency for universal and perpetual selfeducation. by universal education ,it means that a library is open to all classes of people ,of all ages without distinction of castle ,creed or sex; it stands for perpetual education because like any institution of formal education – university ,college, school, etc. – it is not restricted to prescribe years of education; it provides for self-education because there is no schooling and no teacher and no class-room type of education involved in it , anyone goes to the library has to learn by himself. Of course a librarian will be a guide and a communicator of information contained in a number of documents available in a library. (Kaula, 1985) but Public Library in Current Century having Urgent Need to involve e-learning to satisfy the intense thurst of More demanding Readers. E- Learning Simply Clarify that Learn on your own time and at your own pace with our online classes or Online Public Library or, prepare for a test with in the following areas and more: civil service, fire fighting, nursing, U.S. citizenship, high school skills improvement, GED, SAT, college entrance exams and graduate school exams. There many different term which are used interchangeably for e -Learning; Technology-based Learning, Technology-based Training, Computer-based Training, Computer-based Instruction, Computer-based Education, Web-based Training, Internet-based Training, Intranet-based Training, Distance education, distance learning, distance training. (Throne, K.2002) The term “e-learning” has only been in existence since 1999, when the word was first utilized at a CBT systems seminar. Other words also began to spring up in search of an accurate description such as “online learning” and 72 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education “virtual learning”. However, the principles behind e-learning have been well documented throughout history, and there is even evidence which suggests that early forms of e-learning existed as far back as the 19th century. The rapid proliferation of information and communication technology (ICT) and digital technologies in the last two decades has reshaped the communication, Teaching and learning techniques, and perceptions of learners and instructors towards the access and use of learning objects. Inventions in the areas of printing and learning, e.g., Johannes Gutenberg’s invention of movable type in Europe in 1452 to contemporary e-publishing and elearning, have challenge the existence of traditional education system.(allen,B.2002) New ways of ICT offers an opportunity of e-learning besides the classroom learning. It has increased competition in the global education market and forced the educational leaders and providers to ponder over the future of higher, vocational and technical education in terms of quality, quantity, and utility in a most dynamic world. E-learning has become popular among the learners. It has scattered its wings in almost all corners of the world whether it is developed, underdeveloped and developing world. E-learning has gained prominent place in the field of education and allied areas in general and tertiary education in particular. ‘E-learning refers to the use of ICT to enhance and / or support learning in tertiary education. It is used in both teaching and learning activities. Today learning organizations are engaged in the enrolment of students, providing, curriculum and reading material to their students on- line, campus-based or other distance-based provision that is supported with the ICT.(Kay,D.2005) Figure: 1 E- Learning in Public Libraries E- Learning is termed as on-line learning, virtual learning, distributed learning, network and Web-based learning. It is becoming increasingly popular among the learners who are in the working capacity in public or private enterprises and want to pursue degree education side by side. Allen Lomax comments on the changes in education as a result of consumer- driven forces. He quotes “We live in a world or rapid and constant change. Higher education, like the rest of our world will be a very different place ten years from now than what it is today. Figure: 2 E- Learning initiative in Govt. Divisional Public Library, Kota ISBN 1-63102-455-8 73 The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning The Internet, distance education, competency-based outcomes, learner – centred systems, and consumer –driven education are by many accounts some of the more prominent forces driving change in the world of education. “Distance education, distance learning, open learning, flexible learning, virtual learning, hybrid or blended learning, and distributed learning are all terms referring to teaching and learning interactions that entail full or partial physical separation between learner and instructor. In recent years, the term distance education has become synonymous with on- line learning, or e-learning. These terms are used interchangeably with, and at times in place of, many others: technology-mediated learning, computer-mediated conferencing, online collaborative learning, computer-supported collaborative learning, tele-learning, virtual learning, Net-based learning, and Web-based learning. Figure: 3 Features of E- Learning Platforms The Public Libraries , which were earlier serving the Knowledge in print form and now serving in mixed mode or single, I.e.,. E-Books or Digital Books. It has opened up new avenues to disseminate Knowledge contents for distance learning. Earlier Books were loaned or you can say sent to learners in print form but after the advent of World Wide Web has made easy access of delivery of course contents. Delivery of course contents can be accomplished in any electronic medium such as CD-ROMs, DVDs, intranets and World Wide Web. Besides the course contents / material, a wide range of information and communication technologies such as e-mail, video conferencing, discussion forums, instant messaging, chat rooms, etc. Are used to connect learners and instructors with each other. It is very cost effective way of transferring knowledge among the learners. In This Concern Govt. Divisional Public Library Kota are serving to their e –learners or e- Readers by their own designed e- library situated in the Campus. E – Learning requires excellent access of information and communications technology to support the needs of the learners and teachers. This demand can only be meeting if the learners and organizations have adequate and latest infrastructure. Lack of ICT infrastructure, trained manpower and financial constraints are some of the major hurdles that hinder in the deployment of e – learning ventures. Figure: 4 Dr D. K. Shrivastava giving training to operate the talking books to our Young Readers : an ELearning initiative in Govt. Divisional Public Library, Kota 74 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education It has emerged from the recent available statistics that e-learning market is growing quickly. Especially in India, we all people are going towards maximum use of e- learning or online learning. Currant Central Govt. is more focussing on the making India as Digital India. Further analysis highlights that 80% of United States institutions impart e-learning courses. It is seen that now senior and religious leaders are becoming more dependent on e- education or e-learning. Figure 5 showing the interest of learning amongst the Saints about elearning instrument like Talking Books. They are learning about use of our Holy Book “Shreemad Bhgawat Geeta” which is in the Talking form. Figure also expresses the feelings of happiness by enjoying use of talking books. Figure: 5 Dr. D. K. Shrivastava Demonstrating about Use of Talking Books to the eminent reader of library, Saint Shri Prabhakar, Chairperson, Kabir Parekh Sansthan and their Disciple are Learning Operation to read through Talking Books: an E- Learning initiative in Govt. Divisional Public Library, Kota DEVELOPMENTAL JOURNEY OF E-LEARNING Long before the internet was launched, distance courses were being offered to provide students with education on particular subjects or skills. In the 1840’s Isaac Pitman taught his pupils shorthand via correspondence. This form of symbolic writing was designed to improve writing speed and was popular amongst secretaries, journalists, and other individuals who did a great deal of note taking or writing. Pitman, who was a qualified teacher, was sent completed assignments by his students via the mail system and he would then send them more work to be finished. In 1924, the first testing machine was invented. This device allowed students to tests themselves. Then, in 1954, BF Skinner, a Harvard Professor, invented the “teaching machine”, which enabled schools to administer programmed instruction to their students. It wasn’t until 1960 however that the first computer based training program was introduced to the world. This computer based training program (or CBT program) was known as PLATO-Programmed Logic for Automated Teaching Operations. It was originally designed for students attending the University of Illinois, but ended up being used in schools throughout the area. With the introduction of the computer and internet in the late 20th century, e-learning tools and delivery methods expanded. The first MAC in the 1980’s enabled individuals to have computers in their homes, making it easier for them to learn about particular subjects and develop certain skill sets. Then, in the following decade, virtual learning environments began to truly thrive, with people gaining access to a wealth of online information and e-learning opportunities. (Jollifa,D,2003) In the 2000’s, businesses began using e-learning to train their employees. New and experienced workers alike now had the opportunity to improve upon their industry knowledge base and expand their skill sets. At home individuals were granted access to programs that offered them the ability to earn online degrees and enrich their lives through expanded knowledge. Today, e-learning is more popular than ever, with countless individuals realizing the benefits that online learning can offer.    ADVANTAGES OF E-LEARNING E-learning is convenient for Public Library Readers and learners to access resources “anytimeanyplace”. E-learning course contents are cheap than printed material since it is economical in printing, postal expenses and preservation. In learning, resources can be recalled several times. ISBN 1-63102-455-8 75 The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning     It reduces the travel time of learners and costs involved in print material. It allows learners to select, retrieve and access their desired learning material. It stimulates the learners to access variety of digital resources on the World Wide Web. E- Learning Knowledge programmes are ate very helpful and useful to the employees of in-service both corporate and public sector undertakings.  E- Learning assists learners to become IT and information literate.  E-learning offers opportunity to develop digital resource centre, knowledge management system and depository of e-resources and encourage libraries to adopt the path of information technology.  If fosters interaction among instructors and learners and provides opportunity to understand the issues of discussions.  More than one user can access resources simultaneously from different platforms and locations.  It is easy to update the resources on the Web and learners can get fast benefit of latest developments in their field. No doubt, there are certain constraints and limitations in the adoption of such programmes such as costly infrastructure and maintenance costs, need IT literacy and training, bound to attend the programmes, feeling of lack of face –to – face interaction, etc. But the emergence of network technologies and developments in ITC has brought revolution in the information access, management and creation and development of teaching and learning resources such as e-resources, e-teaching and e-learning. ROLE OF PUBLIC LIBRARIES AND VALUE OF ONLINE INFORMATION RESOURCES The role of public libraries in India is still misunderstood and hence they remain undeveloped. Libraries need to think of as “Knowledge Centres” rather then mere store houses for Books. Earlier libraries were bound with the responsibility of preserving the literature for future, but today with the gradual growth of published literature, they are now endowed with rather more important functions of acquiring, organizing, preserving, analyzing, interpreting, filtering and communicating information in a meaningful way to the clientele with a variety of needs. These public libraries play a significant role in supporting research and development by acquiring and maintaining the library resources and by rendering effective and a wide range of library and information services to their users. Their main objective is to maximize their utility by expanding the size of library collections and services through the use of ICT. (Moore et.al.2004 ) Figure 6 shows the trends about willingness to pay amount for e-learning. The value and importance of library and organization is judged of its collection, services and the productivity of the organization where researchers and their valuable time and talent. The well – equipped and wellorganized library is the basis of modern research and development of the organization. The strength of a research system is largely dependent upon its capacity to create, organize, and use information. The effectiveness of research and development is dependent upon the information services discharged by the public libraries. Both print and electronic resources can play a significant role in the promotion, development and productivity of the organization.Studies relating to research productivity conducted by Canadian, Figure: 6 Successive Developmental History British and American universities witness that access to of E- Learning library resources are significantly related to research productivity and institutions intended to increase research productivity are advised to pay attention towards their 76 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education library expenditures and new technology. Financial constraints, lack of professionally trained manpower, and shrinking resources and space are also responsible factors for the demolition of productivity and reputation of the organization. If organizations have to sustain all this they have to pay attention towards all those factors, which can strengthen their research productivity. Figure: 7 E-Book Willingness to Pay (N=295) The figure 7 indicates about different type i-councelling modules that can be used to improve e-learning in Public Libraries. The modern public libraries can participate in the promotion of e - learning programmes. They can support the e-learners by digitizing their resources and providing access to their full text resources through the network and web-based options. Moreover, they can extend their support by providing access to documentation and full text services through intranet and Internet. Content creation, development and management are the heart of e-learning. Learners and teachers can access and use right information on the Web through e-contents, whether it could be of books, articles, audio-video segment, images, etc. Libraries can play their effective and efficient role in the selection, creation, management of e-content and developing new services and uploading or linking all the resources to the course management system, i.e., portal or hub of e-learning and eteaching. Mclean and Sanders quote that “E-learning integration Figure: 8 i- Counselling System offers libraries a powerful medium for reaching faculty and Modules students directly as they engage in teaching, learning, research and outreach. In turn, this integration provides enriched services for an academic community that has used traditional library services and it offers a way to reach those faculty and students who have begun to ignore the library and go directly to the Web for their information needs.” CCM (CONTENTS CREATION AND MANAGEMENT) Contents creation and management of resources is a professional activity that requires the expertise of information professional and librarians. Figure: 9 Content Management for E- Learning in Public Libraries ISBN 1-63102-455-8 77 The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning They are proficient to develop procedures for organizing digital contents and services, which assist and instruct e-learners in most efficient and effective way to identify locate access and use information resources. Information professionals’ experience can play a central role by contributing in the area of content creation, resource description, metadata, classification of e-resources, etc, which can be a brilliant job in the area of development, organization and management of eresources? Figure: 10 Content Management Systems ONLINE LIST OF UPCOMING AND NEW RELEASES, CATALOGUES AND SERVICES The E-Learning requires searching of documents from the online databases. In order to meet the requirements of learners, librarians should develop and strengthen the databases of e-documents to support e-learning. Access of these databases must be user-friendly and hit good results without wasting much time of the reader. Public Libraries and information centres must be equipped with online resources to offer access to online campus learners and offline campus learners, Learners would like to read the resources, which are not available in their library or home country, expect to procure the same from other library or other country. Library and information professionals should develop a mechanism to create an environment that must be suitable and attractive for online learners. Figure: 11 Online Lists of Upcoming and New Releases by Amazon Well equipped and well-maintained libraries can play an important role in attracting and retaining the students in online courses. Library staff must engage themselves to generate and deliver proactive library services to support learners and instructors needs in the Virtual learning Environment (VLE). Collection Development and Develop Digital Repositories Public Librarians can play an important role to provide support to virtual learning environments by strengthening the collection of electronic resources, joining consortium of libraries, digitizing their products, and by providing access to electronic resources through the intranet and the Internet. The emergence of ICT, CDROM/DVD technology and e-publishing has expanded the role of librarians in selection, acquisition, processing, storage, retrieval and Figure: 12 Virtual Learning dissemination of learning objects to the learners’ community. It has Environments broadened the role of librarians and has given the responsibility to the librarian to explore and identify the e-products, their utility and quality assurance. 78 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Librarians must share the responsibility to market the organization’s products, join the consortia of libraries, select online and CD-ROM databases, develop digital objects and convert traditional learning objects in digital form and copyright issues. Moreover, they are required to manage needs of their learners and instructors through external sources such as on- line databases of journals, consortia of libraries and electronic document delivery. Librarians must understand the need and utility of electronic resources, exploit the use of acquired and license based databases and provide training to professional staff, learners and instructors to encourage and enhance its use. Figure: 13 Digital Repositories Public Libraries can play an important role to support e-learning and e-teaching by digitizing their products; strengthen the collection of e-resources and by providing their access through the intranet and the Internet. All organizations have their published and unpublished works which deserve an important attention to digitize and preserve for the future use. Librarians must make efforts to develop a mechanism to collect the electronic files (digital documents) from academic community, researchers and project staff to strengthen the knowledge pool of the organization and offer access to learners through the intranet and the internet. ACCESS OF E-DOCUMENTS AND DISSEMINATION OF FULL TEXT RESOURCES E-documents need expertise of information professionals to upload and link the documents on the WWW, which are accessed by the learners and instructors. They need adequate infrastructure to store, access, retrieve and get output. Latest servers like CD mirror stations and other tools play an important role to store; upload the documents on the internet and WWW. Figure: 14 e-Documents All this requires the support of librarians and IT professionals, Moreover libraries can expand their role by extending new services and dissemination of full text resources, which are prepared and released by the publishers and vendors from time to time. These services can be extended to users through forwarding attachments, links, e-contents of periodicals, bibliographic services, literature search, etc. ISBN 1-63102-455-8 79 The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning NETWORKING AND INTEGRATION OF IN-HOUSE AND ONLINE DATABASES More emphasis must be laid on the networking and integration of databases to strengthen to access the Web services. Dempsey says that in the new network environment, libraries need to identify services that go beyond a single institution and remove redundancy, build capacity and allow for collective activity. Think about preservation, storage, tools for analysis, reformatting, transformation, data curation-even a storage framework and logistical network for physical collections. Figure: 15 Having In- House Web Server E – Learning requires all in-house and on-line databases available in the organization should be integrated into learning management systems. These can best be browsed and exploited if the library integrates them on the intranet and internet. Learners and instructors need that access of on-line databases should fulfil the course content lf the programme. Links along with login and passwords of the databases should be provided on the internet and Internet so that learners can go through the desired database. Such integration of databases and services accommodate organizational learning objects successfully and it can be useful for both learners and instructors. TO DEVELOP THE STRATEGY OF DIGITAL REPOSITORIES OR METADATA To develop the strategy of digital repositories, there must be strong alliances between the academic community and librarians to work closely and strengthen the relationships. “These content management systems are capable of incorporating multiple metadata schemas to handle various types of content. Librarians are well-suited to populate these metadata schemas with the appropriate terminology. Their expertise in aggregating content positions them to be active partners with the faculty in accessing content, in planning courses and in using course management applications”. Digital assets need metadata to browse and access the digital documents on the Internet. Several experts and organizations are engaged in the research and development of the application of metadata strategies to organize the digital repositories. IT experts and faculty members are not so much familiar with the creation and use of metadata. Public Librarians and information professionals have the skills to create metadata and develop digital repositories for the use learners and instructors. PORTAL TECHNOLOGY AND INFORMATION LITERACY E-learning needs the portal facilities to upload and store the learning material on the Internet. Universities engaged in e-learning courses have created and developed their portals to place the desired course material on the Internet so that their learners and instructors can get use of the same. Portal facilities help the readers to locate the desired 80 Figure: 16 Portal Technologies ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education material available in the portal of the organization. Information professionals can create and develop the portals or help IT experts in the development if portals and classification of material on the portal. In addition, customized portal facilities must be provided to learners and instructors to store their preferences. E- Learning has challenged the learners and instructors to learn how to access, retrieve and use E-resources and services. Higher education organizations that are engaged in e-learning programmes must pay attention to equip the learners to face growing future challenges of information overload and use of complicated information retrieval techniques. They should prepare their learners and instructors to develop a learning portfolio that can be a good example of information literacy and online learning. Students must learn to develop learning portfolio to capture and store the online information and further reuse for other purposes. E-learning offers opportunities to store, acquire, and preserve e- resources and e-learning objects in the portal technology. It offers opportunities to develop digital objects and convert the printed object in digital formats to deliver and disseminate resources to wide community of learners. It has welcomed the information and communications technology in the teaching and learning perspectives. Librarians can assist the learners to develop the learning portfolio and other information literacy programmes. Such information literacy programmes must be added in the curriculum to make aware the learners about the eresources. They should have liaison with IT experts, instructional designers and multi-media developers besides the learners, instructors and academic community. There are instances in higher education institutions today, where information literacy is included as part of the curriculum in some disciplines, and librarians are involved in the teaching and assessment of the assignments related to this. As Susan McKnight (2006) stated that “librarians will have to work with new teams of professionals, such as instructional designers and multi-media developers, in addition to the academic staff whose subjects are to include assessable information literacy activities, to create learning resources, learner-teacher interactions and assessments that are appropriate in an online learning environment.” 11 These developments will foster the culture of sharing of knowledge and would also benefit learners and instructors. DEVELOP WEB-BASED MODULES TO SUPPORT E-LEARNING E –learning requires Web-based modules for learners and instructors to exploit the learning objects effectively and efficiently. Academic community and librarians with their close association develop the modules for the benefit of learners and instructors. These modules will provide assistance to learners and instructors particularly remote learners to seek their desired information from the read of information resources. In addition to learning modules, there is a need of information literacy among learners and instructors to make effective and efficient use of information resources. Librarians and information professionals must ponder over the prospects and problems of the libraries, methods of acquiring, preserving, disseminating information to users, promotion of elearning and enrich the e-learning resources pool. KEEP THE LEARNERS UPDATE The learning offers a basket of opportunities to the librarians to expand their vision and provide number of services to their readers. Traditional services offer by the libraries can be generated online and disseminated to the readers beyond the wall of the organization. They can generate several online services by forwarding and linking with online courses such as list of additions, list of journals subscribed e-contents of periodicals, literature search facility, electronic delivery of documents, list of online databases, etc. Bibliographic tools and services must be strengthened to provide easy searching and access. Libraries can expose their services and important resources in the course management systems and other learning tools used by learners and instructors’ community and how these are fully explored and reused. DEVELOPMENT OF KNOWLEDGE MANAGEMENT SYSTEM Lytras Pouloudi, and Poulymenakou (2002) identified that there are three stakeholders in an organisational elearning framework that are: the employees or knowledge users, the knowledge providers in the organisation (practitioners, mentors, and experts), and the provider of technology. An integrated knowledge transformation framework for the structured diffusion of knowledge consists of six processes for evaluating,Acquiring organizing, enabling, transferring, and using knowledge in organizations. In e-learning knowledge management ISBN 1-63102-455-8 81 The Changing Nature of the Public Libraries with Expanding Learning Frontiers With E- Learning framework, knowledge management framework, knowledge providers acquire and organize knowledge from diverse sources, which is them suitably formatted and maintained in repositories and databases and is disseminated to users using formal knowledge- transfer mechanisms. Knowledge Management plays an important role in the e-learning system. Libraries can capture the electronic resources available in the organization digitize their print material and make available the same in knowledge pool of the organization. Organizational knowledge in crucial resource for the generation of new knowledge and reuse of existing knowledge. PROACTIVE AND COOPERATIVE PARTNERSHIP WITH PUBLIC COMMUNITY AND KNOWLEDGE WORKERS Increasing demands of academic staff, complexity in the access and use of resources and non-favourable attitude and behaviour of library professionals have focused towards to expand and enhance the partnership between libraries and academic staff. Such partnership can strengthen the culture of fostering research, sharing of tacit and explicit notions and develop environment to create, generate and disseminate information and knowledge to instructors and learners, which are relevant and useful to research and teaching. CONCLUSION If libraries are to remain centres for lifelong learning, then that learning must increasingly by e -learning. But, where can librarians turn for the best ideas and inspiration on how to implement e -learning programs? E-learning strategies need continuous improvement in the framework of learning management systems. It is possible with the cooperation of libraries to digitize their print resources, create metadata and content development. It has given a new path of learning to those who could not access higher education in universities, Colleges, and business and technological institutes. E-learning presents reduced cost of course production, large scope of expansion of potential market, quality improvement and several other benefits. It has also given an opportunity to libraries to develop their e-resources, procure electronic resources in place of print resources digitized available print resources and integrate the same in the learning management system. Libraries and learning centres are creating and developing their portals to integrate e-learning resources. Librarians can contribute their expertise by developing ‘info points’ to meet the readers’ queries and to literate the readers. Future vision of the e-learning library or learning management system will be totally different from the traditional library.This paper describes all about to implementing e learning in public libraries. You’ll find proven, successful ways of introducing online credit-based information literacy instruction, innovative methods for teaching critical thinking skills online, ways of using open source software in interactive learning, step-by-step guidance for instructional screen casting, ways to work with faculty on e-learning solutions through streaming video, and how a school library used e -learning to teach about the Holocaust. These stellar models offer solutions and feature the aspects you and your staff need because they recognize the problems you face. There’s plenty here for all libraries to grab on to and implement to move learning from inside the library to where your users live and work RECOMMENDATIONS It is recommended that:  ICT infrastructure should be improved from time to time to reflect the increasing needs of e-learning services  Public Libraries should enhance access of most library e-services on e-learning systems  Public libraries should setup strategies for increasing the level of usage of e-resources  Public libraries should incorporate a topic on “basics of e-learning” in IT courses taught to first year students  For making e-learning efficient, subscription of more e-resources and bandwidth is inevitable REFERENCES Allan, B. (2002) E-learning and teaching in library and information services. Facet Publishing. Conard, Dianne 2006. E-learning and Social change : An Apparent Contraiction. In : Michael Beaudion (Ed.), Perspectives on Higher Education in the Digital Age,pp.21-33 New York: Nova Science Publishers, Inc,304 [3] Jolliffe A et al. (2000) The Online Learning Handbook: Developing and Using Web-based Learning. Taylor and Francis Ltd. [4] Kaula, P.N. (1985) “Library development and the National Policy on Library and Information Services for India” Indian Libraries: Trends and Perspectives ed. By K.M. George: Hyderabad, Orient Longman, 1985 Pp.218. [1] [2] 82 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] Kay, D. (2003) E-learning: Drivers, Developments, and Decisions. Multimedia Information and Technology, 29 (1), 26-29. Lomax, Allen. From the chair 2006 Academic Support Newsletter. 2:1, Fall 2000. Http://www.myacpa.org/ comm/academic /neswletter 2000.htm (retrived October3) Lytras, M.D., Pouloudi, A. And Poulymenakou 2002, A. Knowledge management convergence: Expanding learning frontiers. Journal of Knowledge Management, 6:1, 40-51. McKnight, Susan 2006. The changing nature of academic libraries in the digital age. In: Michael Beaudoin (Ed.), Perspectives on Higher Education in the Digital Age,pp.66-76. New York: Nova Science Publishers, Inc,304. McLean and Sander, op.cit, 19p. McLean, Neil and Sander,Heidi 2003. Libraries and the enhancement of e-learning. Ohio:OCLC, 19.http://www5.oclc.org/downloads/community/elearining .pdf (retrieved October3,2006) Moore, K. and Aspen, L. (2004) Coping, adapting, evolving: the student experience of e-learning. Library and Information Update, 3 (4), 22-24. Naidu, Dianne 2006 E-learning: A guidebook of principles, Proceures and practices. 2 nd rew ed, New Delhi: Commonwealth Educational Media Centre for Asia (CEMCA),88 Newton, R. (2003) Staff attitudes to the development and delivery of e-learning. New Library World, 104 (10), 412-425. OECD 2005, E-learning in tertiary education: Where do we stand? Paris: Organisation for Economic Co-operation and Development , 289p. Porter , David 2006. Libraries and e-learning : Final report of the CARL e-learning Working Group. Ottawa: Canadian Association of Research Libraries (CARL), 2005. 23p. http://www.carlabrc.ca/projects/e_learning/pdf/final-report.pdf(retrieved October3) Sloan J. (n.d.) E-learning Needs Analysis. (http://www.n-email.net/trimax/elearning_needs_analysis.htm) [Accessed 02/07/15 Time: 3:46] Storey, Tom 2004. E-learning, e-content. OLCE Newsletter, no.256,july-September. Storey, Tom 2006. Moving to the network level. Next Space, no.4, September 6-11. Thakur, D.S.2006, Scientific and technical libraries. New Delhi:ESS ESS Publication. Thorne, K. (2002) Blended Learning: How to Integrate Online and Traditional Learning. Kogan Page. ISBN 1-63102-455-8 83 USE OF SOCIAL NETWORKING SITES IN LIBRARY AND INFORMATION CENTRES “If you’re not networking, you’re not working” Denis Waitley Aslam Ansari | Assit. Librarian | Library, Integral University | Lucknow | mdaslam.dlis@gmail.com Mehfoozul Hasan | Library Assistant | Central Library | Integral University | Lucknow Abstract: Social Networking (SN) just began from late 21st century and growing up rapidly up to date. It verified as a medium of communication with one to another for sharing their experiences and information regarding interest, and also helps to build up long-time relationship between individuals and group. In the field of LIS services, it may be quietly help to promote the services of LIC (Library and Information Centers) to develop the proficiency about technology of professionals and other side like users. Keyword: SNS (Social Networking Sites), LIS Professionals, Online community, Virtual reference, Mass friending. INTRODUCTION Now a day’s Information Communication Technology is approach to transmitting the idea or thought or information between one to another and understanding through the interaction, in other words it is the act of sharing or exchanging information, ideas or feelings. There are various technique to communication that establish through the network, web technologies are creating more friendly, social and fun environments for retrieving and sharing information and one of such Social networking websites are a good example of communication network and it is a social structure that lets the user interact and work collaboratively with other users. Although people have been using the internet to connect with others since the early 1980s, it is only in the last decade that social networking services have proliferated and their use has become a widespread practice – particularly amongst young people and changing the ways in which people use and engage with the internet and with each other. Young people particularly are quick to use the new technology in ways which increasingly blur the boundaries between their online and offline activities. The uniqueness of this social networking is to share information among users ranging from highly personal to academic interests of the participants and it has become one of the largest platform in the world for sharing real time information and its possible uses for LIS Professionals and to assess how much real transformation this technology can deliver, while deflating reaffirmation and singling out the real assessment of these innovations. DEFINITIONS Social networking sites can be broadly defined as an internet or mobile-based social space where people can connect, communicate, and create and share content with others. While we use the term "social network site" to describe this occurrence, the term "social networking sites" also appears in public discourse, and the two terms are often used interchangeably. We chose not to employ the term "networking" for two reasons: emphasis and scope. "Networking" emphasizes relationship initiation, often between strangers. While networking is possible on these sites, it is not the primary practice on many of them, nor is it what differentiates them from other forms of computer‐mediated communication. According to Computing Dictionary (2011), “Social networking site as any website designed to allow multiple users to publish content of them. The information may be on any subject and may be for consumption by friends, mates, employers, employees just to mention a few.” Boyd and Ellison (2007) define “social networking sites as Web-based services that allow individuals to having three common elements (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site”. 84 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Advantages of Social Networking: The significant advantage is: 1. 2. 3. 4. 5. Worldwide Connectivity Commonality of Interest Real-Time Information Sharing Free Advertising Increased News Cycle Speed Disadvantages of Online Social Communities: While up using SNS, there is some negativity is also like: 1. 2. 3. 4. 5. 6. 7. Face to Face Connections are endangered Cyber bullying and Crimes against Children Risks of Fraud or Identity Theft Time Waster Corporate Invasion of Privacy Negative Health Consequences Diminishing Privacy MAJOR CATEGORIES OF SOCIAL NETWORK SNS can be categories as their content types, it is very extensible services, White, Mary Gormandy (2014) describe the major categories like: 1. Social Connections: Keeping in touch with friends and family members is one of the greatest benefits of social networking. Facebook, Twitter, Google + and MySpace are some of the most widely-used websites for building social connections online. 2. Multimedia Sharing: Social networking platform makes it easy to share video and managing digital photography content online. Some of the most popular sites for multimedia sharing are YouTube, Flickr and Picasa etc. 3. Professional: Professional social networks are designed to provide opportunities for career-related growth. These types of networks provide a general forum for professionals to connect, while others are focused on specific occupations or interests. A few examples of professional social networks are LinkedIn, Classroom 2.0 and Nurse Connect. Online community designed to help individuals in the nursing profession connect and communicate with each other. 4. Informational: Informational communities are made up of people seeking answers to everyday problems. For example, when you are thinking about starting a home improvement project or want to learn how to go green at home, you may perform a web search and discover countless blogs, websites, and forums filled with people who are looking for the same kind of information. A few examples include:  Super Green Me : Online community where individuals interested in adopting green living practices can interact.  HGTV Discussion Forums: Connect with individuals interested in home design improvement via the HGTV message boards.  Do-It-Yourself Community: Social media resource to allow do-it-yourself enthusiasts to interact with each other. 5. Educational : Educational networks are where many students go in order to collaborate with other students on academic projects, to conduct research for school, or to interact with professors and teachers via blogs and classroom forums. Educational social networks are becoming extremely popular within the educational system today. Some examples of such educational social networks are The Student Room, The Math Forum and ePALS School Blog etc. 6. Hobbies: One of the most popular reasons many people use the Internet is to conduct research on their favorite projects or topics of interest related to personal hobbies. When people find a website based on their favorite hobby, they discover a whole community of people from around the world who share the same passion for those interests. This is what lies at the heart of what makes social networks work, and this is why social networks that are focused on hobbies are some of the most popular. A few examples of hobbyfocused social networking sites include: ISBN 1-63102-455-8 85 Use of Social Networking Sites in Library and Information Centres  7. Oh My Bloom: Social media site specifically for gardening enthusiasts. It features groups, forums, blogs, video content and more.  My Place at Scrapbook.com: Designed specifically for scrapbooking enthusiasts, users can create profiles, share information, post updates and more.  Sport Shouting: An online destination for sports fans to voice their opinions and connect with other enthusiasts. Academic: Academic researchers who want to share their research and review results achieved by colleagues may find academic-specific social networking to be quite valuable. A few of the most popular online communities for academics are:  Academia.edu : Users of this academic social network can share their own research, as well as follow research submitted by others  Connotea Collaborative Research: Online resource for scientists, researchers and clinical practitioners to find, organize and share useful information. There is another category, which define by Kaplan and Haenlein (2010), are describing the major categorization of social network using by usera. b. c. d. e. f. g. Collaborative Project (for example, Wikipedia), Blogs and micro blogs (for example, Twitter), Social news networking sites (for example, Digg and Leakernet), Content communities (for example, YouTube and DailyMotion), Social networking sites (for example, Facebook), Virtual game-worlds (for example, World of Warcraft), Virtual social worlds (for example, Second Life ). In briefly all the SN has some specific features like: a. b. c. d. e. f. Create profile themselves, Connect with other user sending as “request” (may be accepted or denied), Manage the list of friend and searching related links Sending messages Posting, tagging and sharing object with others and Customize a range of aspects, from layout and design, to function and selective disclosures of information to different user or audience. TYPES OF SOCIAL NETWORKING SERVICES A social networking service or social networking site is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections. It covers the two main formats – sites that are primarily organised around users' profiles and those that are organised around collections of content. However, it’s important to remember that services may be different and characterised by more than one category. Educators setting up private groups in order to make use of collaborative space and tools are a good example of this. Profile-based SNS: Profile-based services are primarily organised around members' profile pages. Bebo, Facebook and MySpace, are all good examples of this. Users often include third party content in order to enhance their profiles, or as a way of including information from other web services and SNS. Content-based SNS: In these services, the user's profile remains an important way of organising connections, but plays a secondary role to the posting of content. Content-based communities include Flickr, Shelfari, and YouTube.com for video-sharing and last.fm, where the content is created by software that monitors and represents the music that users listen to. White-label SNS: Most SNS offer some group-building functionality, which allows users to form their own mini-communities within sites. Platforms such as Ning and PeopleAggregator broadbandmechanics.com. These 86 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education sites offer members the opportunity to create and join communities. This means that users can create their own “mini-MySpace’s”10, small scale social networking sites which support specific interests, events or activities. Multi-User Virtual Environments: Sites such as Second Life, an online virtual world, allow users to interact with each other’s avatars – a virtual representation of the site member. Although the users have profile cards, their functional profiles are the characters they customise or build and control. There are also hybrids of these and social-networking sites, such as Habbo Hotel and Cyworld. Mobile SNS: Many social network sites such as MySpace, MYUBO and Twitter offer mobile phone versions of their services that allowing members to interact with their networks via their phones. Increasingly, too, there are mobile–led and mobile-only based communities allows users to share and view video over mobile networks. Micro-blogging/ Presence updates: Micro-blogging services such as Twitter and Jaiku allow you to publish short (140 characters, including spaces) messages publicly or within contact groups. They are designed to work as mobile services, but are popularly used and read online. Many services offer ‘status updates’ – short messages that can be updated to let people know what mood you are in or what you are doing. These can be checked within the site or exported to be read elsewhere. They engage users in constantly updated conversation and contact with their online networks. People Search: People search is another important web development. There are various kinds of social and people search, but sites like Wink generate results by searching across the public profiles of multiple social network sites allows search by name, interest, location and other information published in profiles and allowing the creation of Web-based "dossiers" on individuals. This type of people search cuts across the traditional boundaries of social network site membership, although the data that are retrieved should already be public. Benefits of Social Networking Service Use There are facts of a broad range of benefits to young people associated with the use of Social Networking Service. Below we summarise these as Media Literacy, Formal Educational Outcomes, Informal Education and Learning, Creativity, Individual Identity and Self-Expression, Strengthening Social Relationships, Belonging and Collective Identity, Building and Strengthening Communities, Civic and Political Participation, SelfEfficacy and Wellbeing UTILIZATION OF SOCIAL NETWORKING AND IT APPLICATION IN LIBRARY User approach towards library is changing gradually; it wants most practical and speedily information in elearning age. But retrieve quick and easy information to user is a big challenge to library professional. Social networking helps library professional to share information with patrons and students in the easiest way for digital library environment. The possible implication of social networking can be successful by conducting maximum research and experiment on social networking from different point of view on library. That social networking tools were helpful in promoting library services was consistent with the finding that the two most reported purposes for which libraries used social networking tools were promotion of library events such as exhibitions, competitions, talks, seminars, workshops, tutorials, training courses and dissemination of news events alert, library updates. Purposes for using social networking tools, which included the following: to offer library resources including answer enquiries, catalogue search and information about new collections and lists, to convey general library information, and to offer online resources. Ezeani, Chinwe Nwogo and Igwesi, U Zoamaka. (2012) suggest, “…library should follow the public conversations, posts, updates, and events of these key individuals, and pro-actively offer advice, resources, and help. He should act as an active participant of the social space and be able to identify the needs of the members of the library communities and to proffer solutions by offering information, links to the websites that are relevant to their information needs; and even direct offers of help. There is an urgent need for libraries to adopt the new social networking tools in their services as a strategy to embrace change while promoting a participatory role for library users in knowledge creation. The growing use of social networking tools calls for librarians to develop 21 st century skills on digital technologies. Libraries can connect their social networking sites with their library Websites to links to their catalog, chat reference pages, research guides, calendar of events, news etc. Some of the roles of the social networking ISBN 1-63102-455-8 87 Use of Social Networking Sites in Library and Information Centres librarian include: understanding and articulating the nature of social networking sites, creating webpage and content, establishing friendly user interface over the network, creating online database management, evaluating and applying information, and assisting users with skill acquisition. Other skills for a social networking literate librarian include: searching and navigating the web, creating social network space, teaching, and providing quality online library services.” Library professional can use in three broad activities in library and information services are Information sharing, Knowledge distribution and knowledge organization. Information sharing: Social networks are a great way to test your commitment to open communication. In this process librarian can keep constant touch and effective interaction with staff, patrons and faculty in online collaborative environment. The social networking tools that can be practiced by the library for the aforementioned purposes are: MySpace, Facebook, Ning, Blog, Meebo, LinkedIn and Twitter etc. Information Distribution: Information sharing is the major part and crucial area where professionals should looks seriously while considering and designing library activities in digital age. Patron’s satisfaction should give first and foremost priority by providing right information at the right time in a right way from anywhere. Library professionals should rethink for implementing technologies in library services from early period. Virtual Reference Desk (VRD) can be performed by Wikipedia that can planed, design and disseminate information to patrons by KM Wiki, Podcast, YouTube, Blogger, SecondLife Flickr, TeacherTube, Wikipedia PBwiki, Footnote, Community Walk, Slide Share, Digg StumbleUpon and Daft Doggy etc. Knowledge Organization: Social networks tools can helps the Library professionals in KO environment for getting handy and Harvesting information from individual users for improving library services, academic research, etc. which can be accessible with the social networking technologies. The following tools can effectively use in library and information centre for patrons as: aNobii, Del.icio.us, Netvibes, Connotea, LibraryThing and lib.rario.us etc. User Risk to using SNS: The following categories risks might be applicable to social media and specifically to SNSs: Crime and violence ; Recreation ;War, security and terrorism; Political, social and financial; Human disease/health ;Occupational and Consumer products but knowing the user risk to user SNS Haynes, David & Robinson, Lyn (2015) find out a graphical representation: There they suggested possible solution of risk to using SNS, “...current regulatory activity is risk based, this approach could provide a means of evaluating different regulatory approaches. For example, it might be possible to consider whether proposed changes in legislation tend to increase or reduce each of the risk categories in terms of probability of occurrence and severity of impact.” CONCLUSION Social networking sites proved a vast area for communication with others, which are online network. SNS in library can be used productively but it has thread to user to using without circumspection. Libraries can proliferate to these networks for reaching out strategy to new generation users at their own space and time but it is also important that to provide quality services and interact with users efficiently. Khan, AM & Ansari, A (2014) find in her study that, Remarkable point is Social networking tools may be used as an interactive 88 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education platform for LIS professionals to reaching out their various categories of user, young generation professionals are more active and feel comfortable through their techno-savvy nature compare than traditional way of serving services. The most of respondent feel this is easy way to communicate with their user group and also may be using SN tools for find out the research contents. The effectively use of SNS in library training and awareness program should be given to users and professionals prospectively about applications, benefits and risks associated with social networking sites. REFERENCES [1] [2] [3] [4] [5] [6] [7] Khan, Abdul Mannan and Ansari, Aslam (2014) "Role of social networks in library and information services in India: a case study of efficiency and effectiveness", Library Hi Tech News, Vol. 31 Iss: 5, pp.11 – 13. Boyd, D. M., & Ellison, N. B. (2007). Social network sites: definition, history, and scholarship. Journal of computermediated communication, 13(1). Available at http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html. Ezeani, Chinwe Nwogo and Igwesi, U zoamaka, "Using Social Media for Dynamic Library Service Delivery: The Nigeria Experience"(2012). Library Philosophy and Practice ( e-journal). Paper 814. Haynes, David & Robinson, Lyn (2015),"Defining user risk in social networking services", ASLIB Journal of Information Management, Vol. 67 Iss 1 pp. 94 – 115. Kaplan Andreas M., Haenlein Michael. (2010)"Users of the world, unite! The challenges and opportunities of social media". Business Horizons 53 (1).p.67. Social Network. (n.d.). The Free On-line Dictionary of Computing. Retrieved June 23, 2011, fromDictionary.com website: http://dictionary.reference.com/browse/social network. White, Mary Gormandy (2014). What Types of Social Networks Exist? Available on : http://socialnetworking.lovetoknow.com/What_Types_of_Social_Networks_Exist (retrieved on : 14.02.2015) Further Readings: [1] Ayiah, Efua Mansa and Kumah, Cynthia Henewaa. (2011). Social Networking: a tool to use for service delivery to clients by African Libraries. World library and information congress. San Juan : IFLA,13-18 August. (Revised on 2012). [2] Charlotte N. Gunawardena , Mary Beth Hermans , Damien Sanchez , Carol Richmond , Maribeth Bohley & Rebekah Tuttle (2009). A theoretical framework for building online communities of practice with social networking tools, Educational Media International, 46(1), 3-16 [3] Charnigo, L. and P. Barnett-Ellis. (2007). Checking Out Facebook.com: The Impact of a Digital Trend on Academic Libraries. Information Technology & Libraries. 26 (1):23-34. [4] Chu , Melanie and Meulemans, Yvonne Nalani . (2008) “The Problems and Potential of MySpace and Facebook usage in academic libraries”, Internet Reference Services Quarterly,Vol 13(1).pp:69-85. [5] Chu, S.K.W. & Du, H. (2013). Social Networking Tools for Academic Libraries. Journal of Librarianship & Information Science, 45(1), 64-75. [6] Connell, R.S.(2009). Academic Libraries, Facebook and MySpace, and Student Outreach: A Survey of Student Opinion. portal: Libraries & the Academy 9 (1):25-36. [7] Kim, Yong-Mi (2010), "User's perceptions of university library websites: a unifying view", Library and Information Science Research, 33(1): 63-72 [8] Madhusudan, M and Nagabhushanam, V.(2012). “Use of web-based library services in select university libraries in India: a study”. International Journal of Library and Information Studies, 2(1):1-20. [9] Naushia Parveen.(2011).”Use of social networking site (facebook) in making awareness among the library and information science professionals of university libraries of U.P: a case study”.International Journal of Digital Library Services.1(1),.available on www.ijodls.in [10] Redmond, Fiona. (2010). Social Networking Sites: Evaluating and investigating their use in Academic Research. Dissertation. Dublin Institute of Technology , [11] Suri, Samiksa.(2013). “Use of Social Networking Sites in higher education”. International Journal of Engineering and Technical Research, 1(8), 7-13. ISBN 1-63102-455-8 89 USAGE OF E-RESOURCES IN ENGINEERING COLLEGES OF GREATER NOIDA, G.B. NAGAR, UTTAR PRADESH: A COMPARATIVE STUDY Deepmala | Research Scholar | School of Library and Information Science | Galgotias University | Greater Noida, Gautam Budh Nagar (U.P.) | deepmala.mlis@gmail.com Ashok Kumar Upadhyay | Assistant Librarian | | School of Library and Information Science | Galgotias University | Greater Noida, Gautam Budh Nagar (U.P.) | ashoka143@gmail.com Abstract: In the information explosion age e-resources play a vital role in all the disciplines and provide current and relevant information to the users on wider range. The paper aims to examine usage of e-resources by undergraduate and post graduates students of Engineering Colleges of Greater Noida, Uttar Pradesh. Survey method was adopted for the study based on a structured questionnaire. It also discusses the purpose of using e-resources, benefit, satisfaction; problems faced by users and perceived impact of e-resources. The study revealed that B.Tech. and M.Tech. students are aware of the resources and using it for their study purpose. There is need to provide high internet speed and subscription of more e-resources for the students. Keywords: Electronic Resources, Engineering Colleges, Greater Noida, User Studies INTRODUCTION In the present digital age, there is a shift from traditional library resources to electronic resources. In the traditional libraries users have to depend on library staff as well as have to spend more time in searching their required information. Bit in the digital age, after using computer they are saving their precious time. Users are using library resources in their colleges’ library. Now a day’s number of e-resources is available in every discipline which covers a huge portion of library collection and day by day its utilization is increasing. These eresources are playing an important role in finding relevant information of the users in very easy and faster way. Slowly and gradually e-resources are replacing the importance of print documents. Today a large amount of scholarly literature is publishing in electronic medium. It has an impact on every part of academic activity. Library users are not habituated to visit the library, even they prefer to use internet to search online databases and browse electronic journals for their work. Therefore there is need to study the different aspects of eresources and issues relating to the utilization of e-resources by users. Galgotia College of Engineering and Technology, Greater Noida, GB Nagar, Uttar Pradesh Galgotia College of Engineering and Technology (GCET) is a co-educational private college in Greater Noida (NCR) in the state of Uttar Pradesh, India. It was approved in 1999 by AICTE, Ministry of HRD, and Government of India and affiliated to Gautam Budh Technical University, Lucknow. GCET library caters adequately to the needs of B.Tech, M.Tech, MCA & MBA students, research students as well as staff members. It provides access of E-journals, E-Books and conference proceedings etc. Noida Institute of Engineering and Technology, Greater Noida, GB Nagar, Uttar Pradesh Noida Institute of Engineering and Technology was established in 2001 by City Educational & Social Welfare Society. It is situated in Greater Noida in the area of 13.90 acres and developing as the Centre of Excellence imparting technical education. The central library of NIET spreader over 14,000 square feet area and provide the facility to a vast repository of resources, including huge collection of books and periodicals and many more to their students. Completely automated library management system provides the services to the users at any time of the day or night, as well as online facility too. 90 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education REVIEW OF LITERATURE A large number of studies have been conducted on the utilization of e-resources. According to Adeniran (2013) revealed in his study that use of e-resources has tremendous impact on the academic performances of the students of Redeemer’s University. Kandpal et. al. (2013) found that students are aware of the e-resources and feels that e-resources provided by the library to the great extent fulfill their requirements. Habiba & Choudhary (2012) confirmed in their study that majority of the users of Dhaka University Library use eresources for their learning purpose and satisfied with these materials. Sakshi & Singh (2012) showed that all the faculty members and research scholars were familiar with e-resources and even 100% faculty members use e-resources for their research and education purpose. Natarajan et. al. (2010) revealed in the study that use of e-resources found to be significant among the users but after having wide range of e-resources, frequency of their use was low due to lack of time, subject coverage, awareness and slow downloading. Satpathy & Rout (2010) found that faculty members are aware of the e-resources. The internet, email and e-resources are utilized by various organizations in India. OBJECTIVES OF THE STUDY This survey was particularly conducted to assess the benefits of the e-resources over conventional sources of information. Some of the major objectives are: 1. To know the different types of e-resources and services available in the libraries. 2. To know the awareness of e-resources among the users. 3. To study the purpose and frequency of using the e-resources available in the library. 4. To find out the impediments encountered by the users while accessing and using the e-resources. 5. To study the impact of e-resources on the academic performance of the users. 6. To provide suitable suggestions and recommendations to improve the e-resources and services for the benefit of the users. LIMITATIONS OF THE STUDY The present study is to find the utilization of electronic resources in engineering colleges of Greater Noida, UP. The investigator was able to identify some of the major limitations such as: 1. The present study consists of only the B-Tech and M-Tech students. 2. The geographical area is restricted in Galgotia College of Engineering and Technology and Noida Institute of Engineering and Technology. DATA COLLECTION PROCEDURE This study is based on survey method and questionnaire tool. As part of the study a structured questionnaire was designed to collect data from the students. Besides questionnaire method, observation and interview methods were also adopted. The target population of this study was B.tech. and M.tech. Proportionate random sampling technique was adopted for deriving sample population. Thus total 250 questionnaires 125 (each) in both engineering colleges were distributed, of which, 215 filled questionnaires were received back from the students, out of which only 200 questionnaires (100 (each) from both the engineering colleges) were usable for the analysis and interpretation of data. DATA ANALYSIS AND INTERPRETATION The collected data was organized and tabulated by using tables and percentages. Awareness GCET NIET Yes 78 (78%) 82 (82%) No 22 (22%) 18 (18%) Table-1 Awareness of E-Resources Galgotia College of Engineering and Technology (GCET), Noida Institute of Engineering and Technology (NIET) ISBN 1-63102-455-8 91 Usage of E-Resources in Engineering Colleges of Greater Noida, G.B. Nagar, Uttar Pradesh: A Comparative Study Table 1 shows that 78% respondents in GCET and 82% respondents in NIET are aware about e-resources. Only 22% respondents in GCET and 18% respondents in NIET are now aware about e-resources. Frequency GCET NIET Daily 20 (20%) 26 (26%) 2/3 times in a week 57 (57%) 50 (50%) 2/3 times in a month 15 (15%) 15 (15%) Occasionally 8 (8%) 9 (9%) Table-2 Frequency of visit the Library The above table shows that 57% users of GCET and 50% of NIET users visit the library 2/3 times in a week followed by 20% respondents of GCET and 26% respondents of NIET visit the library daily where as 15% respondents of GCET and NIET visit the library 2/3 times in a month. Frequency of visit the library 50% 57% 26% 60% 40% 15% 20% 15% 20% 9% NIET 8% GCET 0% Daily 2/3 times in a 2/3 times in a week month GCET Occasionally NIET Reasons GCET NIET To update knowledge 65 (65%) 60 (60%) For academic/study purpose 82 (82%) 80 (80%) For competitive exams 25 (25%) 23 (23%) To write papers 11 (11%) 13 (13%) Table-3 Reasons of Using E-Resources (Multiple answers were permitted) Table 3 shows that 82% respondents of GCET and 80% respondents of NIET use e-resources “For academic/study purpose” whereas 65% respondents of GCET and 60% respondents of NIET use e-resources “To update knowledge”. 25% respondents of GCET and 23% respondents of NIET use e-resources “For competitive exams” followed by 11% respondents of GCET and 13% respondents of NIET use e-resources “To write papers”. 92 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Resources GCET NIET E-Book 19 (19%) 15 (15%) E-Journals 79 (79%) 75 (75%) Online Databases 54 (54%) 59 (59%) CD-ROM Databases 21 (21%) 19 (19%) E-Newspapers/Magazines 13 (13%) 11 (11%) Table-4 Types of E-Resources Accessed (Multiple answers were permitted) Table 4 describes that 79% respondents of GCET and 75% respondents of NIET accessed E-journals frequently whereas 54% respondents of GCET and 59% respondents of NIET accessed Online databases. 21% respondents of GCET and 19% respondents of NIET accessed CD-ROM databases followed by 19% respondents of GCET and 15% respondents of NIET accessed E-Book. GCET NIET ENEWSPAPERS/M AGAZINES CD-ROM DATABASES ONLINE DATABASES E-BOOK E-JOURNALS Types of E-Resources Accessed 80% 70% 60% 50% 40% 30% 20% 10% 0% Criteria GCET NIET Authenticity 19 (19%) 21 (21%) Currency 51 (51%) 55 (55%) Reliability 27 (27%) 23 (23%) Usability 11 (11%) 10 (10%) Table-5 Measures for Selecting & Using E-Resources (Multiple answers were permitted) Table 5 depicts that 51% of GCET respondents and 55% of NIET respondents depend on currency measures for selecting and using e-resources followed by 27% of GCET respondents and 23% of NIET respondents depend on reliability measure for selecting and using e-resources, 19% of GCET respondents and 21% of NIET respondents choose authenticity measure for selecting and using e-resources whereas 11% of GCET respondents and 10% of NIET respondents depend on usability measure for selecting and using e-resources. Problems GCET NIET Limited access terminals 17 (17%) 15 (15%) ISBN 1-63102-455-8 93 Usage of E-Resources in Engineering Colleges of Greater Noida, G.B. Nagar, Uttar Pradesh: A Comparative Study Difficulty in finding relevant information 63 (63%) 59 (59%) Slow download speed 38 (38%) 43 (43%) Lack of training 27 (27%) 25 (25%) Unfamiliar with e-resources 33 (33%) 31 (31%) Table-6 Problems in Accessing E-Resources (Multiple answers were permitted) Table 6 describes that 63% respondents of GCET and 59% respondents of NIET faced difficulty in finding relevant information followed by 38% respondents of GCET and 43% respondents of NIET faced slow download speed. 33% of GCET respondents and 31% of NIET respondents are unfamiliar with e-resources followed by 27% of GCET respondents and 25% of NIET respondents faced lack of training whereas very few i.e. 17% of GCET respondents and 15% of NIET respondents faced limited access terminals. Problems in Accessing E-Resources 80% 60% 40% 20% 0% NIET GCET Limited access terminals Difficulty in finding relevant information Slow downloa speed GCET Lack of training Unfamiliar with eresources NIET Training GCET NIET Yes 74 (74%) 69 (69%) No 26 (26%) 31 (31%) Table-7 Need of user training Table 7 shows that 74% of GCET respondents and 69% of NIET respondents need users training for proper utilization of e-resources. Satisfaction GCET NIET Fully Satisfied 22 (22%) 26 (26%) Partially Satisfied 58 (58%) 53 (53%) Less Satisfied 19 (19%) 21 (21%) Not Satisfied 1 (1%) 1 (1%) Table-8 User Satisfaction with E-Resources 94 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Table 8 depicts that 58% respondents of GCET and 53% respondents of NIET are partially satisfied followed by 22% respondents of GCET and 26% respondents of NIET are fully satisfied whereas 19% respondents of GCET and 21% respondents of NIET are less satisfied. Ways GCET NIET To make training programs 49 (49%) 33 (33%) Through co-operation from staff 67 (67%) 72 (72%) To improve speed 9 (9%) 11 (11%) Table-9 Ways to make E-Resources Facility effective (Multiple answers were permitted) Table 9 depicts that 67% respondents of GCET and 72% respondents of NIET pointed “Through co-operation from staff” to make e-resources facility effective whereas 49% respondents of GCET and 33% respondents of NIET selected “To make training programs” for e-resources facility effective followed by 9% respondents of GCET and 11% respondents of NIET pointed “To improve speed” to make e-resources facility effective. Benefit GCET NIET Access to current information 23 (23%) 29 (29%) Easy accessibility 69 (69%) 63 (63%) Faster access to information 43 (43%) 40 (40%) Access to wider range 9 (9%) 7 (7%) Table-10 Benefit of E-Resources (Multiple answers were permitted) Table 10 shows that 69% of GCET respondents and 63% of NIET respondents stated easy accessibility as the main benefit of using e-resources followed by 43% of GCET respondents and 40% of NIET respondents pointed faster access to information as a benefit of e-resources, whereas 23% of GCET respondents and 29% of NIET respondents stated it access to current information as the another benefit of using e-resources. Benefit of E-Resources 70% 60% 50% 40% 30% 20% 10% 0% NIET GCET Access to current information Easy accessibility Faster access to information GCET ISBN 1-63102-455-8 Access to wider range NIET 95 Usage of E-Resources in Engineering Colleges of Greater Noida, G.B. Nagar, Uttar Pradesh: A Comparative Study FINDINGS AND SUGGESTIONS It is clear from the study that the students appreciate the e-resources facility and they are aware about it but at the same time they expect more e-resources related to their discipline. Most of the students visited the library 2/3 times in a week. They found current, reliable and authentic information from e-resources for their academic/study purposes to update their knowledge. E-journals and online databases fulfill their requirements to great extent. In this study most popular type of e-resources is e-journals followed by online databases. The students are mainly dependent on e-resources for their required information. They pointed the co-operation from staff to make e-resources facility more effective as well as training program for them too. Based on the findings of the study and to improve the quality of education, there is need for the following recommendations: a. b. c. d. Speed of internet and intranet connection should be increased for quick access to available e-resources. Library staff have to create more awareness on e-resources. The library has to arrange various user orientation and training programmes for the students to use the availability of e-resources. Latest and popular websites with their addresses should be displayed on the notice board in the library. CONCLUSION Changes in technology have totally moved the way for accession, storage and retrieval of information. Eresources are the best way of getting and up-to-date information. On the other hand libraries have to play a role as gateway of e-resources and to provide support in retrieving the resources. The e-resources have a vast input on the collections of the libraries, provide information access in cheaper to acquiring information resources, saving in storage and maintenance etc. E-resources provide access to information beyond the geographical boundaries and even most relevant e-resources are now available on the web. Usage of e-resources is increasing day by day in academic libraries. E-resources did not take the place of print format but it has the potential to transforming scholarly communication. In reality it affected every part of library related to each functions, therefore for maximum utilization of e-resources, wide publicity and training programs should be organized. REFERENCES [1] Adeniran, Pauline (2013). Usage of Electronic Resources by undergraduates at the Redeemer’s University, Nigeria. Academic Journals, 5(10), 319-324. Available at http://www.academicjournals.org/IJLIS [2] Kandpal, K. N., Rawat, S. S. and Vithal, K. S. R. (2013). Use of E-resources by Undergraduate Students of NTR College of Veterinary Science, Andhra Pradesh. DESIDOC Journal of Library & Information Technology, 33(5), 394398. [3] Habiba, Umme and Chowdhury, Salma (2012). Use of Electronic Resources and its impact: A study of Dhaka University Library users. The Eastern Librarian, 23 (1), 74-90. Available at http://www.banglajol.info/index.php/EL [4] Sakshi and Singh, Joginder (2012). Use of E-Resources by Chemists and Physicists: A case study of Punjab University, Chandigarh. Library Herald, 50(1), 23-31. [5] Sadia, H. (2011). The use and impact of electronic resources at the University of Lagos. Library Philosophy and Practice, 472. Available at http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article--1490&context=libphilprac [6] Natarajan, K., Suresh, B., Sivaraman, P. and Sevukan, R. (2010). Use and user perception of electronic resources in Annamalai University: A case study. Annals of Library and Information Studies, 57, 59-64. [7] Satapathy, Sunil Kumar and Rout, Biswanath (2010). Use of e-resources by the faculty members with special reference to CVRCE, Bhubaneswar. DESIDOC Journal of Library & Information Technology, 30(4), 11-16. [8] Haridasan, S. and Khan, M. (2009). Impact and use of e-resources by Social Scientists in National Social Science Documentation Centre (NASSDOC), India. The Electronic Library, 27(1), 117-33. [9] Lohar, M.S. and Roopashree, T. N. (2006). Use of Electronic Resources by faculty members in B.I.E.T., Davanagree: A survey. SRELS Journal of Information Management, 43, 101-112. 96 ISBN 1-63102-455-8 THE DECLINING TRADITIONAL PRINT BOOKS READING BEHAVIOUR OF THE PUBLIC LIBRARIES READERS WITH SWITCH TO JUMP WITH IBOOKS AND EBOOKS READING: USER EXPERIENCE Dr. D. K. Shrivastava | Divisional Librarian (I/C) | Govt. Divisional Public Library | Kota | Rajasthan | India | deepakshri1974@yahoo.co.in Shashi Jain | Assistant Librarian | Govt. Divisional Public Library | Kota(Raj.) | jainshashraj@gmail.com Pritima Vyas | Ph.D. Scholar | Carrier Point University | Kota (Raj.) | pritimavyas@gmail.com Sunita Kumari | Ph.D.Scholar | Carrier Point University, Kota (Raj.) | sunitathakur120976@gmail.com Manisha Mudagal | Ph.D. Scholar | Carrier Point University, Kota (Raj.) | manishamudgal26@gmail.com Yogendra Singh Tanwar | Master Scholar of Library Science | Kota (Raj.) | tyogendra01@gmail.com Abstract: This paper is fully based on the Personal observation and interview made with user of the Govt. Divisional Public Library Kota’s and Students of Chemical ITI Kota’s Readers. And we found that almost young’s and seniors are using eBooks and ibooks for recreational and Professional Use while women’s are taking help for professional Carrier development with help of WhatsAap by Making Group like for RAS Preparation. But study also reveals that they all people are not well aware with Technicalities of Reading ibooks and eBooks. Study also exhibits the decline of Print Reading and Jump of ibooks and eBooks. INTRODUCTION Reading on your iPad: How to import books, articles and PDFs When it comes to reading e-books on your iPad, there are tons of free apps out there, but the two most popular are definitely Kindle and ibooks. With everything going digital and the new school year ramping up once again, students are turning to their iPad to take notes, read textbooks, articles and PDFs, and peruse magazines in between studying. In this article, I'll take you through how to use Kindle and ibooks to get and read books, articles and anything else you might want to read on your iPad. ISBN 1-63102-455-8 97 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience Purchasing and importing books on Kindle for iPad The Kindle app is ideal if you prefer to buy your e-books through Amazon (where books are often cheaper). If you are logged into Amazon.com, the system will automatically detect all the devices on which you have the Kindle app installed. To purchase a book and transfer it to the Kindle app for iPad, all you have to do is choose the corresponding option under the "Buy" button, as you can see in the image below: Figure 1: Add to Wish list Within seconds, the book is transferred automatically to the selected device. To view it, just open the Kindle app. Export e-books, ePUBs and PDF files on iBooks for iPad using Dropbox The iBooks e-book reader is installed by default on your iPad, so make sure you don't delete it! It's ideal for those who already have books and magazines in PDF and ePUB format and want to organize them in a clear and intuitive library. You can export PDF e-books to your iPad and drag them to a Dropbox folder on your PC or Mac so that it synchronizes online. Then open up Dropbox on your iPad, open the book or magazine, (if it's an ePUB file, Dropbox will warn you that you can't view it but disregard the warning) and select the command "Open in iBooks", as you can see in the image below: Figure 2: Content Strategy Mobile You only have to wait a few seconds before iBooks imports the book or PDF to the library, where you can organize it however you'd like. Kindle is also available for Android, and it's definitely the best option if you want to read books on an Android tablet. So, which is better: Kindle or iBooks? 98 ISBN 1-63102-455-8 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience If we compare Kindle and iBooks as e-book readers (i.e. not as e-stores, and ignoring the availability of titles), Kindle is better than iBooks for serious readers (and students); while the customization options are virtually identical in both apps, Kindle supports multiple formats (ePUB, PDF, DOC, DOCX, MOBI, TXT, HTML documents and images), includes a dictionary, and has many useful tools to write notes, highlight phrases, and copy quotes. It will even alert you to which phrases have been highlighted by other readers who bought the same book. It offers a truly 'shared' reading experience that, until now, no other app has provided. iBooks, on the other hand, is unbeatable in terms of the clarity of its interface, especially with regards to the library, where you can create your own custom collections and organize your books however you want. Figure 3: iBooks display Reading articles offline using Instapaper There's another really handy app for reading articles that you've collected online using sources like blogs and news sites: Instapaper. Instapaper is the perfect app to organize these articles by topic, without displaying advertisements or other distractions, and with the guarantee of always having them available, even without an internet connection. To use Instapaper, just register for a free account and download the bookmarklet (a kind of additional button for the browser) by dragging it onto the bookmarks bar. Then, every time you read an interesting article, click the button to save it to Instapaper (note: you must be logged in on its web app). All you have to do is download the Instapaper app for iPad to access it. How to Read Library e Books If you are interested to need to read the ibooks in library then you need an Adobe ID and Bluefire Reader to be able to transfer and read library books on your iPad. It’s Procedure having Three Steps which is mentioned below like  Step 1.Create a free Adobe account at Adobe's website if you don't already have one. You will need this account to authorize the Bluefire App on the IPad with your Adobe ID.   Step 2.Download the free Bluefire Reader app from the app store. Open the app and it will prompt you to enter your Adobe ID. If you miss this prompt, you can later authorize it under 'Info' on the Bluefire app. Step 3. Navigate to an EBL eBook through the library catalogue. Click to download the eBook and you will have the option to launch it in the Bluefire app. You can read the eBook on the iPad until the loan expires. If you try to launch the book in Bluefire after it has expired you will see the message 'This item has expired. It can no longer be accessed'. The majority of eBooks available at many universities in abroad are on the EBL platform. These instructions are not tested for other eBook platforms. http://www.bluefirereader.com/using-library-books.html IMPORTANT READERS FOR EBOOKS AND IPAD READINGS There is many more eBooks and IPad Readers are available in Market but few are very important and helpful for healthy and stress free reading. Some of are listed below ISBN 1-63102-455-8 99 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience 1. Bluefire Reader Bluefire Reader for Apple iOS and Android organizes eBooks from libraries, independent bookstores and national retailers into a single reading environment on mobile devices. Figure 4: Bluefire Reader 2. Instapaper Read saved web pages on the go, even offline. Install a bookmark let in your browser on your computers and click to save a whole article into Instapaper for later reading on your iPhone or iPad. Text-only view makes it easy to read without scrolling right and left. Adjust the fonts to a size that works for you. Universal. Figure 5: Instapaper Reader 3. GoodReader Super-robust PDF reader with advanced reading, annotating, markup and highlighting capabilities, excellent file manager, text file reader and editor, audio/video player, Safari-like viewer for MS Office and iWorks files. Syncs with Google Docs, MobileMe, Drop box and more. Create your own hierarchy of folders to save your documents into. Highly recommended for reading & annotating scholarly articles. Figure 6: Instapaper Reader 4. Kindle Access and read your Amazon Kindle books even if you don't have a Kindle. Automatically synchronizes your last page read between devices. Delete a book when you're done and Amazon keeps your copy online for later retrieval. Adjust the text size, add bookmarks, and more. Universal iOS app. Free. Android version available. Figure 7: Kindle Reader 5. Papers Organize, read, annotate, and share your collection of articles and PDFs on iPhone and iPad. Highlight or use sticky notes to comment on text. Search within Papers to find articles, upload PDFs in iTunes, or import PDFs from email, Drop box, or Mobile Me. Figure 8: Papers 100 ISBN 1-63102-455-8 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience 6. Reeder Read Google Reader RSS feeds on a simple and attractive interface on the iPhone or iPad. Scroll through items oneby-one, or swipe items to skip. Star items for reading later. Figure 9: Papers 7. Feedly Similar to Reeder, Feedly is a fun, stylish way to read and share the content of your favorite websites, feeds, & social networks. For iOS & Android. Figure 10: Feedly 8. Flipboard Read content from Face book, Google Reader, Twitter, and more in a magazine-style layout. View everyday content in an alternative way that emphasizes linked content, videos, and photos. Get interested in content that you might typically skip when browsing social media. For iPad & iPhone. Free. Figure 11: Feedly 9. Pulse Similar to Flipboard, Pulse is an elegant news reading application that incorporates colorful panning story bars and fills them with content from popular sources. For iPad, iPhone, &Android. Figure 12: Pulse From 1997-2015, I spent 18 years trying to make beautiful printed books But I can tell you this: the excitement I feel about the iPad as a content creator, designer and publisher — and the potential it brings — must be acknowledged. Acknowledged bluntly and with perspective. With the iPad we finally have a platform for consuming rich-content in digital form. What does that mean? To understand just why the iPad is so exciting we need to think about how we got here. I want to look at where printed books stand in respect to digital publishing, why we historically haven't read long-form text on screens and how the iPad is wedging itself in the middle of everything. In doing so I think we can find the line in the sand to define when content should be printed or digitized. This is a conversation for books-makers, web-heads, content-creators, authors and designers. For people who love beautifully ISBN 1-63102-455-8 101 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience made things. And for the storytellers who are willing to take risks and want to consider the most appropriate shape and media for their yarns. Act of printing something in and of itself has been placed on too high a pedestal. The true value of an object lies in what it says, not its mere existence. And in the case of a book, that value is intrinsically connected with content.et's divide content into two broad groups.   Content without well-defined form (Formless Content (Fig.13) Content with well-defined form (Definite Content (Fig.14) Formless Content can be reflowed into different formats and not lose any intrinsic meaning. Its content divorced from layout. Most novels and works of non-fiction are Formless. Figure: 13 Formless Content- Retaining meaning in any container Definite Content — is almost totally the opposite of Formless Content. Most texts composed with images, charts, graphs or poetry fall under this umbrella. It may be reflowable, but depending on how it’s reflowed, inherent meaning and quality of the text may shift. Figure: 14 Definite Content- meaning shifts with container The start of each printed at opposite ends of the book.A designer may, of course, working in concert with the author, imbue Formless Content with additional meaning in layout. The final combination of design and text becoming Definite Content. For an extreme and ubiquitous contemporary example of Definite Content, see Tufte. Love him or hate him, you have to admit he's a rare combination of author and designer, completely obsessed with final form, meaning and perfection in layout. (Fig. 15) In the context of the book as an object, the key difference between Formless and Definite Content is the interaction between the content and the page. Formless Content doesn’t see the page or its boundaries. Whereas Definite Content is not only aware of the page, but embraces it. It edits, shifts and resizes itself to fit the page. In a sense, 102 ISBN 1-63102-455-8 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience Definite Content approaches the page as a canvas — something with dimensions and limitations — and leverages these attributes to both elevate the object and the content to a more complete whole. Put very simply, Formless Content is unaware of the container. Definite Content embraces the container as a canvas. Formless content is usually only text. Definite content usually has some visual elements along with text. Figure: 15 TUFTE- embracing his canvas Figure: 16 DESINING BOOKS- awareness of physicality Much of what we consume happens to be Formless. The bulk of printed matter — novels and non-fiction — is Formless. In the last two years, devices excelling at displaying Formless Content have multiplied — the Amazon Kindle being most obvious. Less obvious are devices like the iPhone, whose extremely high resolution screen, despite being small, makes longer texts much more comfortable to read than traditional digital displays. In other words, it’s now easier and more comfortable than ever to consume Formless Content in a digital format. Is it as comfortable as reading a printed book? Maybe not. But we’re getting closer. When people lament the loss of the printed book, this — comfort — is usually what they’re talking about. My eyes tire more easily, they say. The batteries run out, the screen is tough to read in sunlight. It doesn’t like bath tubs. Important to note is that these aren’t complaints about the text losing meaning. Books don’t become harder to understand, or confusing just because they’re digital. It’s mainly issues concerning quality. One inevitable property of the quality argument is that technology is closing the gap (through advancements in screens and batteries) and because of additional features (note taking, bookmarking, searching), will inevitably surpass the comfort level of reading on paper. The convenience of digital text — on demand, lightweight (in file size and physicality), searchable — already far trumps that of traditional printed matter. The formula used to be simple: Stop printing Formless Content; only print well-considered Definite Content. The iPad changes this. I P a d . I t i s n o w o n d e r w e l o v e o u r p r i n t e d B o o k we physically cradle them close to our heart. Unlike computer screens, the experience of reading on a Kindle or iPhone (or iPad, one can assume) mimics this familiar maternal ISBN 1-63102-455-8 103 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience embrace. The text is closer to us, the orientation more comfortable. And the seemingly insignificant fact that we touch the text actually plays a very key role in furthering the intimacy of the experience. Figure: 17 DESINING BOOKS- awareness of physicality The iPad changes the experience formula. (Fig. 17) It brings the excellent text readability of the iPhone/Kindle to a larger canvas. It combines the intimacy and comfort of reading on those devices with a canvas both large enough and versatile enough to allow for well considered layouts. Figure:18 THE NEW EQUATION – retaining structural meaning in digital form Figure: 19 DEFINITE CONTENT 1:1 iPAD – a First What does this mean? Well, most obviously that a 1:1 digital adaptation of Definite Content (Fig. 18) books will now be possible. However, I don’t think this is a solution we should blindly embrace. Definite Content in printed books is laid out specifically for that canvas, that page size. While the iPad may be similar in physical scope to those books, duplicating layouts would be a disservice to the new canvas and modes of interaction introduced by the iPad. Take something as fundamental as pages, for example. The metaphor of flipping pages already feels boring and forced on the iPhone. I suspect it will feel even more so on the iPad. The flow of content no longer has to be 104 ISBN 1-63102-455-8 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience chunked into ‘page’ sized bites. One simplistic reimagining of book layout would be to place chapters on the horizontal plane with content on a fluid vertical plane. (Fig.19) Figure: 20 VERTICAL CHAPTORS – Breaking Habits In printed books, the two-page spread was our canvas. It's easy to think similarly about the iPad. Let's not. The canvas of the iPad must be considered in a way that acknowledges the physical boundaries of the device, while also embracing the effective limitlessness of space just beyond those edges. Figure: 21 THE INFINITE CONTENT PLANE This is an opportunity to redefine modes of conversation between reader and content. And that's one hell of an opportunity if making content is your thing. The Books We Make so: are printed Books Dead? Not Quite The rules for iPad content are still ambiguous. None of us has had enough time with the device to confidently define them. I have, however, spent six years thinking about materials, form, physicality and content and to the best of my humble abilities producing printed books. So, for now, here's my take on the print side of things moving forward. ask yourself, "Is your work disposable?" For me, in asking myself this, I only see one obvious rule set:   Formless Content goes digital. Definite Content gets divided between the iPad and printing. Of the books we do print — the books we make — they need rigor. They need to be books where the object is embraced as a canvas by designer, publisher and writer. This is the only way these books as physical objects will carry any meaning moving forward. Figure: 22(a) NOT DISPOSABLE- From 1871 ISBN 1-63102-455-8 105 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience Figure: 22(b) NOT DISPOSABLE- From 1871 I propose the following to be considered whenever we think of printing a book:         The Books We Make embraces their physicality working in concert with the content to illuminate the narrative. The Books We Make is confident in form and usage of material. The Books We Make exploits the advantages of print. The Books We Make is built to last. (Fig. 22a, 22b) The result of this is: The Books We Make will feel whole and solid in the hands. The Books We Make will smell like now forgotten, far away libraries. The Books We Make will be something of which even our children — who have fully embraced all things digital — will understand the worth. The Books We Make will always remind people that the printed book can be a sculpture for thoughts and ideas. DESIGNING BOOKS Figure:23 LAYOUTS — considering page shape BEAUTIFUL EVIDENCE 106 ISBN 1-63102-455-8 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience Figure:24 TUFTE — a well-considered spread VAS: AN OPERA IN FLATLAND AUTHOR + DESIGNER COLLAB. VAS: AN OPERA IN FLATLAND Figure:25 The items are displayed in a layout very similar to that of e-readers like iBooks or Kindle; there are no banners, images or navigation bars, but there's the option of adding page numbers or changing the font size. The most interesting feature of Instapaper, other than the fact that the articles are available offline, is that you can organize them into thematic lists (folders), creating your own collection of articles that can be read all at once or referenced in the future: HOW THE IPAD HELPS SCIENTISTS DO THEIR JOBS It wasn’t so long ago that Chris Grant would regularly take a whole laboratory’s worth of equipment with him into the wilderness. These days, he just takes an iPad. “We navigate to some fairly remote locations that require hiking in. A two-mile one-way hike is not unheard of,” says Grant, a laboratory coordinator for Juniata College in central Pennsylvania. During the summer, he leads teams of students into the state’s wilds to catch fish in local creeks and test them for mercury content. Such hikes used to require a number of different tools: a topography map, a handheld GPS unit, a camera, a rangefinder, even a notebook to write down data. Now? The iPad does all of that for Grant, who utilizes apps like GPS Status, River Reader, and Smart Ruler to find his way around and take measurements in the field.“It’s eliminated at least five different tools,” Grant says. “Just getting a camera out to take a picture while you’re processing a fish, with one hand on a notebook and the other on a camera—well, it’s all right there, in one thing.” ISBN 1-63102-455-8 107 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience Since its introduction just a couple of years ago, the iPad has entered and started to transform many professions, finding a place in classrooms, dealerships, cockpits, and even construction sites. Now it’s starting to transform the work of scientists, as well. Scientists we spoke to say they’ve found three main ways to use the iPad in their work. Following protocols Contrary to all of those old science-fiction films, laboratory research isn’t done by haphazardly mixing chemicals together and seeing what happens. Detailed protocols guide every experiment, protocols that serve as a kind of recipe for researchers. Until recently, that meant that research scientists often found themselves arm-deep in a library of notebooks to guide them. Andrea Holme, a biologist at the University of Eastern Finland, has dispensed with those notebooks, turning instead to LabGuru. She can enter her protocols at the service’s website, then tote her iPad into the lab, open up the LabGuru app, and get to work. The app not only guides her experiments, it lets her record results, and syncs the data back to the web application so she can later analyze information at her computer. “It’s so much more efficient,” Holme says. “Everything is there. I’m not always the most organized person, but this makes you organized by default because you’re putting everything in its proper place.” Figure:26 Chris Grant and crew use an iPad to research fish populations. The iPad can also guide scientists to locations where research must be done. Ben Horton, an associate professor in the University of Pennsylvania’s Department of Earth and Environmental Science, is researching sea-level changes. He uses the Google Earth app ( ) to find locations that need examination, and to begin to compare changes wrought by climate change in North Carolina’s Outer Banks. “It enables us to see features of the landscape in three dimensions you wouldn’t see on a map,” Horton says. “It makes things easier. Instead of having a guess of what the environment looked like, we can look at photos from a satellite.” Collecting data Horton’s Penn colleague, biologist Paul Schmidt, has become a big fan of the iPad in a short time. He’s a prolific user of the Numbers app ( ) to enter data as he researches evolutionary genetics. “The biggest thing we do, where this has saved us a lot of time, is that we do all data entry on the iPads,” Schmidt says. “I would say 90 percent of routine tasks are done with it. For somebody who spends four hours a day recording data, that probably saves them, easily, at least an hour.” Grant, Holme, and Horton also like to use the iPad’s camera to document findings, both in still and video formats. “If I have a gel or an X-ray film, something I can see, I can snap it while I’m looking at it,” Holme says. “We wouldn’t publish with it—with an X-ray film, we’d still do a proper scan of it. But for simple snapping” the iPad works. Keeping up on reading Ronelle Stevens, a doctor of pharmacology at Brigham and Women’s Hospital in Boston, is a fan of the Pubget app—it lets her find and download scientific journal articles quickly, instead of waiting two or three days for a research library to locate them. “I’d rather spend time reading the article than looking for the article,” she says, adding, “I don’t have to carry stacks and stacks of papers. My shoulders are grateful.” Daniel Zurek, a professor of 108 ISBN 1-63102-455-8 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience cellular and molecular biology at Pittsburg State University in southeast Kansas, says that the ability to quickly reference other scientists’ research has made him more efficient in the lab. “It helps me work smarter, and not go down so many dead-end for things that won’t work,” says Zurek, who uses the NEB Tools app in the lab. “One thing about biotech is that there’s always something new out there, and it’s usually created to solve a specific problem. If it’s your specific problem, you’re in luck.” Still new Despite the advantages, iPad adoption appears to be going slowly among scientists. Nearly all of the researchers surveyed by Macworld say they came to the tablet in just the last few months, and most say they are pioneers among their colleagues. “I’m not really seeing iPads issued in my institute,” says Matthew Gorr, a graduate research assistant at Ohio State’s Nationwide Research Hospital, in a statement echoed by the others. “It’s usually somebody’s personal iPad.” Holme, however, is already evangelizing the iPad to her colleagues. “If you’re at a conference and you’re talking to somebody new, you can call up the data (on the iPad) and show it to them,” she says. “Scientists who have access to that will be able to be more competitive.” And others say researchers will be forced to increasingly rely on the iPad—if only to make a connection with tech-savvy college students. “It makes the science more inherently interesting to students if they can connect it back to technology,” Grant says. “We’re at the learning stage with the iPad, and it’s already been very helpful. I hope it will continue to be more helpful with time.” REFERENCES [1] A personal, online virtual library, A book is not one thing 25 a new standard for DRM and content-encoding Ultraviolet would allow users to amass where they can both share it with others, and view it on any device that supports the format. “A movement toward reasonable DRM management? - Andy Ihnatko, Chicago Sun-Times, July 25, 2010 [2] Audience poll #1 Have you read at least one entire book (start to finish) on a mobile ereader? (not on a desktop or laptop) • Yes • No For those who have read an entire book, how many books have you read this way? • 1 – 10 • 11 – 50 • over 50 eBooks [3] Audience poll #2 What eBook devices do you own or have you owned in the past: (check all) • Amazon Kindle • Sony Reader • Nook • iPad • iPhone • other Smartphone, such as Android • other 37 [4] Audience poll #3 what do you like most about your eBook reading experience? • Convenience of having so many books with you in one small device (easy for travel, etc.) • free samples to help decide on purchases • ease of reading because of features such as increased font size, screen color and brightness • immediate purchase & downloads of new books • other 40 [5] Audience poll #4 what do you like least about your eBooks reading experience? • the content I want is often not available • lack of ability to lend books to my friends and family • not so easy to annotate, take notes, compare texts • the illustrations, charts, diagrams, are not big enough or clear enough • other 41 [6] http://www.flickr.com/photos/facelesslibrarian/4294934843/ 31 [7] Not so great in current e-readers - detailed or color illustrations not always easy to view (except with iPad & some Smartphone ) - hard to have a good feel for how far you are into the book, even with indicators or progress bar visible skipping around in the book may cancel out ability to synchronize where you left off between devices - fragmentation of content between different vendors, i.e., much content only readable in one vendor’s software (DRM) 44 [8] Not so great in current e-readers - not every book you want is available - annotating is awkward - not easy to compare multiple books side by side - limited by battery time - lending to friends almost impossible (limited exceptions) 43 [9] novels non-fiction reference books comics graphic novels essays short stories instruction how-to cookbooks art & design books 26 [10] pondering thinking taking notes bookmarking copying quoting defining words underlining highlighting, comparing with other text skipping around skimming looking at photos examining charts/graphs 14 [11] Reading on E-Book Devices: the User Experience Nicole Hennig, MIT Libraries 1 [12] Selected devices E-ink displays - Amazon Kindle and Kindle DX - Sony Reader - Barnes & Noble Nook (many other e-ink based ereaders exist) Tablets & smartphones (LCD screens) - iPhone and other smartphones - iPad and other tablets 38 [13] Selected software - Amazon Kindle - Barnes & Noble - Stanza - Apple iBooks - GoodReader coming soon: - Blio - Copia 39 [14] The E-reader pilot at Princeton Fall semester, 2009 www.princeton.edu/ereaderpilot Their favorite features of the Kindle DX were • The battery life, the wireless connection, and the portability of the Kindle. • The fact that all the course reading was on one device • The ability to search for content • The legibility of the screen, and the fact it could be read in full sunlight The areas in which they felt the Kindle could be best improved were: • The ability to highlight and annotate PDF ISBN 1-63102-455-8 109 The Declining Traditional Print Books Reading Behaviour Of The Public Libraries Readers With Switch To Jump With Ibooks And Ebooks Reading: User Experience files • Improving the annotation tools • Providing a folder structure to keep similar readings together • Improving the highlighting function • Improving the navigation within and between Kindle documents 45 [15] What libraries can do - Get ereaders for your staff to experiment with. - Continue to experiment with loaning ebooks and ereaders to your users. - Become experts who can advise your readers about reading hardware and software. - Negotiate with publishers to make borrowing viable in this new world. - Keep current with developments in this area. 78 [16] What works - small lightweight, carry many books with you - easy to get new books immediately - many free books available - many books are cheaper than print - easy to customize views: larger font sizes, different background colors/fonts - very long free samples available for most books - quick dictionary lookups - read same content on different devices for different situations & sync between devices 42 [17] Where we read http://www.flickr.com/photos/seandreilinger/ 133370210/sizes/o/in/photostream/ 110 ISBN 1-63102-455-8 KNOWLEDGE MANAGEMENT IN KENDRIYA VIDYALAYA LIBRARIES MRS. PARNA GHOSH | Librarian | Kamala Chatterjee School for Girls | Kendriya Vidyalaya Sangathan | mou_lib@yahoo.co.in Abstract: The paper describes various initiatives taken by Kendriya Vidyalaya Sangathan to organize knowledge in school level. Also discusses the role of librarian in this context. Librarian is also working as knowledge manager in the current perspective. Points out the major problem faced by the librarians regarding knowledge management. Keywords: Knowledge Manager, KendriyaVidyalaya, Knowledge sharing, Explicit knowledge, Tacit knowledge. INTRODUCTION “In the digital age, knowledge is our lifeblood. And documents are the DNA of knowledge” ……. Rick Thoman Knowledge is the most important asset of any academic institution. The better management of knowledge will lead to an institution to enhance its best performance. Knowledge management is the new vista to manage internal and external knowledge of an institution. The present age of information explosion is triggering a global knowledge revolution. Most important aspect of knowledge management is to convert tacit knowledge into explicit knowledge, so that it can be accessed. Mapping of knowledge is most challenging and vital part of any institution. Knowledge management determines which knowledge, where, in which form and at which point of time, should be available within an institution. A successful knowledge management programme includes generation, sharing and utilization of knowledge. Hence, libraries and librarians have a key role to play in knowledge management. Knowledge Management is incorporated in libraries to improve its effectiveness. These knowledge management practices can help in capturing, codifying and distributing knowledge in schools through the application of Information and Communication Technology (ICT) so that it can be shared by all the users. Knowledge management also supports innovative teaching and effective learning. What is knowledge? According to Webster’s Dictionary, knowledge is “the fact or condition of knowing something with familiarity gained through experience or association” According to Cambridge Dictionary, “knowledge is understanding of or information about a subject that you get by experience or study, either known by one person or by people generally”. Knowledge can be either explicit or tacit. Tacit knowledge is inexpressible. Tacit knowledge represents what we know in our mind. Explicit knowledge can be stored in databases, books, journals etc. and expressed in some written form. Tacit knowledge is personel, context specific, difficult to formalize and explicit knowledge is packaged, easily codified, transferable and communicable. [2] What is Knowledge Management? Knowledge management can be defined as accessing, filtering and distributing information in a manner that is useful to end user. [5] Knowledge management involves the identification and analysis of available and required knowledge assets and processes, so as to fulfill organizational objectives. ISBN 1-63102-455-8 111 Knowledge Management in Kendriya Vidyalaya Libraries The biggest challenge behind knowledge management is the dissemination of knowledge. Synthesis Flow of Knowledge Knowledge management is about managing the knowledge assets. It is a process, method and technique of presenting available knowledge to the user. In the words of Peter Drucker, it is “the co-ordination and exploitation of organizational knowledge resources, in order to create benefit and competitive advantage.” Knowledge management is the art of creating value from an organization’s intangible assets. The objectives are [1] :       To ensure dissemination of right information to the right people at the right time to make right decision. To reduce the time of the user. Knowledge management opens the door to a new era of collaboration and sharing. To ensure the effective distribution of best knowledge available within the library. To apply knowledge when required. To ensure effective securing of knowledge. Knowledge management may also include new knowledge creation and knowledge sharing, storage and refinement. CONCEPT OF KENDRIYA VIDYALAYA AND ITS LIBRARY Kendriya Vidyalaya is an autonomous organization under the Ministry of H.R.D., Govt. of India. The headquarter is located at 18, Institutional Area, Shaheed Jeet Singh Marg, New Delhi. Kendriya Vidyalaya Sangathan was established way back in 1965. The Sangathan administers its scheme through 26 regional office, 1094 Kendriya Vidyalayas including 03 KVs abroad. Policies of Kendriya Vidyalaya Sangathan are framed through its board of Governors headed by Hon’ble Minister, HRD.; Commissioner, KVS is the executive head of the organization. Salient features of KVS are –   112 All KendriyaVidyalaya are affiliated to CBSE. All K.Vs are co-educational, composite school. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education   Common text-books and bilingual medium of instructions for all KVs. No tuition fee for boys upto class VIII, girls’ upto class XII and SC/ST students and children of KVs employee. Kendriya Vidyalaya has a four-fold mission – 1. To cater to the educational needs of children of transferable central government employees including defence and para-military personnel by providing a common programme of education. 2. To pursue excellence and set the pace in the field of school education. 3. To initiate and promote experimentation and innovations in education in collaboration with other bodies like CBSE, NCERT etc. 4. To develop the spirit of national integration and create a sense of “Indianness” among the children. All Kendriya Vidyalaya should have a well-equipped library and a trained qualified librarian for the best help of the user. The library set-up is mandatory for each and every Kendriya Vidyalaya. Most of the Libraries are wellequipped with documents and bar-code technology is a must for books in Kendriya Vidyalaya Library. PROCESS OF KNOWLEDGE MANAGEMENT IN KVS School, like most organizations, should organize knowledge properly to improve decision making of the user community. There are many sorts of knowledge which need to be managed in schools [6]. Due to increasing knowledge explosion and digitization of knowledge resources, many students have also pointed out the importance of introducing knowledge management into schools. Process : ► Knowledge collection – At first the Vidyalaya Library Management Committee take a plan to identify the knowledge required for the students to meet its short and long term objectives. So, the first step is acquisition of external knowledge by various means. The steps are –     identify the required knowledge locate the source of knowledge acquire the knowledge generate the required knowledge of the pupil by using technology (if needed). ► Knowledge presentation – After acquisition of knowledge, the next steps followed are –   codify the knowledge, represent the knowledge in a refined, organized and user-friendly manner. - Provision of right knowledge to the right person at the right time is the ► Knowledge dissemination main aim of the knowledge dissemination. The acquired knowledge is disseminated to the students and teachens as and when needed. ► Knowledge sharing – The librarian of the Vidyalaya, in most cases, maintain knowledge sharing system and disseminate it to the target group. Knowledge must be distributed to those who can make use of it. ► Monitoring knowledge – The librarian monitors the usage of knowledge. The provision of necessary feedback is there. Students are asked to submit feedback to the librarian. ISBN 1-63102-455-8 113 Knowledge Management in Kendriya Vidyalaya Libraries In KendriyaVidyalaya libraries, the database of books is prepared by using a common software “e-granthelaya”, provided by KendriyaVidyalaya Sangathen to help the user to search information quickly. Web services are available in most of the KendriyaVidyalaya library to acquire knowledge scattered all over the world. A common “Library Policy” is provided to all the librarians andit should be strictly maintained. This is very helpful in data sharing. Bar-code technology for books is the latest advent in KendriyaVidyalaya library. TOOLS FOR KNOWLEDGE MANAGEMENT There are some tools associated with knowledge manage.     Internet Document management system Content management system Tele conferencing etc. LIBRARIAN AS KNOWLEDGE MANAGER 114 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education A Librarian can manage the explicit knowledge quite well. A person having a higher degree of computer literacy, knowledge of information and communication technology, knowledge of transferring tacit knowledge to explicit knowledge can become knowledge manager. [7] Librarian in Kendriya Vidyalaya can take a leading role in the establishment and facilitation of knowledge management of the organisation. The responsibilities are –                      managing knowledge acquisition. providing extensive and highly diverse global knowledge to the user. finding, packaging and disseminating knowledge converting tacit knowledge to explicit one finding, mapping, filtering, packaging and disseminating knowledge integrating internal and external sources. identifying needs and requirements of the user reducing the learning time and to avoid mistake to keep up with new technologies provided by Kendriya Vidyalaya Sangathan Creation of database using a common software provided by Kendriya Vidyalaya Sangathan to provide quick reference service to users. Free flow communication and feedbacks. enabling timely delivery of relevant usable information making design of knowledge bank or knowledge repository designing new information services and products preparation of indexing and databases create metadata provide context rich information in reply to short term request use internet tools to manage information help user to avoid unnecessary data to provide security of data on the internet teaching of user community i.e. user education is a most significant task of a knowledge manager The librarian needs to work as a knowledge worker. Knowledge manager should take steps to shape the knowledge policies, structures, processes and systems that will nurture organised learning [8]. ROLE OF KVS IN HELPING KNOWLEDGE MANAGEMENT THROUGH LIBRARIANS ISBN 1-63102-455-8 115 Knowledge Management in Kendriya Vidyalaya Libraries The Librarian requires a variety of competencies for managing knowledge in a proper and distinct way. So, Kendriya Vidyalaya Sangathan has a pivotal role in the overall development of the librarian as knowledge manager. The Sangathan acts as a friend, philosopher and guide for the librarian/ For that purpose KVS organizes  training programme regularly,  in-service course for librarians,  workshop for the librarians from time to time,  refresher courses also, The above mentioned programmes are very much essential to develop core competencies among the librarian. Training should be given on how to access the database provided by KendriyaVidyalayaSangathen, providing network-based information services and so on. This will help to provide better services to the users. Knowledge manager should be able to extract, filter and disseminate vital external knowledge. Librarian helps the students to develop important digital citizenry attributes to demonstrate the use of information and technology. So, to meet the challenges of knowledge management, librarians need to acquire more I.T. and management skills to transform themselves into knowledge manager.                 PROBLEM FACED BY KVS LIBRARIANS Lack of various information technology based tools Lack of proper idea about knowledge management Lack of documentation from beginning Lack of informal channel to involve students in activities Reluctance of people to share knowledge Lack of willingness among some librarians. KVS focuses much more on preservation of books and maintaining exact number of books in the library Libraries are passive repositions of knowledge Changes may be discontinuous or transformational Need budget flexibility Need to establish a common platform Lack of idea about monitoring and feedback mechanism required to set up Need skills for preservation and maintenance of digital resources No helping hand is there in the library Lack of learning through either formal or informal channels Another problem is teacher’s unwillingness to share their tacit knowledge SUMMARY School knowledge management programme is a new organizational activity that makes optimum use of knowledge to improve Vidyalaya’s behaviour, student learning, teaching processes and collegial relationship that enables the overall improvement of the school. Librarian must take the necessary initiative and leading role in changing the present scenario of the library. The librarian not only procures and processes the resources of the library, but also organises them properly for optimum access by the students. So, knowledge management is essential in the school library also to run the library is a smooth way. The arrangement of training for the library personnel are made by KVS. Professional staffs are improving their efficiency by learning on hands. The librarians only improve the knowledge assets of the school by maintaining proper knowledge management programme. 116 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Knowledge management must be guided by a strategic vision to fulfill the organizational objectives improving knowledge sharing. Yet, there seems to be some lacuna somewhere in our entire struggle to share our knowledge within entire KVS libraries. Overall, knowledge is an important asset to support school’s overall development. So, most urgent task of the day is to create an organisation capable of managing the knowledge properly and this is called knowledge management. REFERENCES [1]. Jena, P. &Rautaray, B (2003). Human Resource Planning for Knowledge Management : A Study on Kalinga Institute of Industrial Technology. In Knowledge Management in Special Libraries in Digital Environment : XXIV All India Conference of IASLIC, 2003, 293-300. Kolkata : IASLIC. [2]. Jose, A (2003). Information Management to Knowledge Management : The Road Ahead for LIS Professionals. In Knowledge Management in Special Libraries in Digital Environment : XXIV All India Conference of IASLIC, 2003, 65-68. Kolkata : IASLIC. [3]. Sirumath, S.S (2003). Knowledge Management : A New Paradigm for Electronic Document Management System in Corporate Libraries. In Knowledge Management in Special Libraries in Digital Environment : XXIV All India Conference of IASLIC, 2003, 57-64. Kolkata : IASLIC. [4]. Swain, C.K. &Satpathy, S.K (2003). Knowledge Management in Digital Library Environment : An Implementation Plan. In Knowledge Management in Special Libraries in Digital Environment : XXIV All India Conference of IASLIC, 2003, 69-72. Kolkata : IASLIC. [5]. Vyas, S.D. & Singh, D.K (2003). Knowledge Management : Challenges for Library and Information Professionals. Library Harald, 41 (1), 15-15. [6]. Chu, K.W & Wang, M. Implementing Knowledge Management in School Environment:Teacher’s Perception. Retrieved from www.kmal-journal/org/ojs/index.php/online-publication/article/view file. [7]. Lee, H.W. Knowledge Management and the Role of Libraries. Retrieved from www.whiteclouds.com/iclc/cliej/cl19lee.htm. [8]. Naikel, A &Paloti, R. Role of Libraries in Knowledge Management. Retrieved from www.academia.edu/3308329. [9]. http://www.kvsangathan.nic.in ISBN 1-63102-455-8 117 SOCIAL NETWORKING AND LIBRARY CONSORTIA Pratibha Gautam | Assistant Librarian | New Delhi Institution of Management |pratibha_xyz@yahoo.com Abstract: Social Networking is a Social Structure that lets the users interact and work collaboratively with other users, including the ability to browse, search, invite friends to connect and interact with web world to share feelings, knowledge’s and experiences. . Social Networking is now a mainstream. People need to know the importance of getting information quickly and present a variety of growing. Various combinations of resources are used. Previously, in 1980s people began to get information through Internet but to very limited network. One of the famous styles of getting information is through Social media or Web 2.0. By rapid development of information and communication technology, the web-based services in particularly social networking services are very useful for the users interact and work collaboratively. The use of social networking services such as Facebook, Twitter and nowadays Whatsup (is being a very popular) has become a popular and integral part of everyday life communication of all educated peoples in India. The aim of this paper is to describe a exploratory study or to examine academic librarians perspective on using social networking services for developing library consortia or collaboration and how are libraries considering social networking as a part of their core communication and engagement strategies?. And also this paper explains how this Social Network will help the major library and information services Such as Information Communication, Information Delivery and Knowledge organization, Resource Sharing with other libraries. Keyword: Social Networking, Internet, Social Media, Web 2.0, Library Consortia, Information Communication, Information Delivery and Resource Sharing. INTRODUCTION The term “Social Networking” refers to a range of web enable software program that allow users to interact and work collaboratively with each others. A Social Network is a Social Structure made of nodes that are generally individuals or organizations. A social network represents relationships and flows between people, groups, organizations, computers or other information/ knowledge processing entities Fig.1 Social Networking Today’s age is an age of advanced technology. With boon of internet reaching almost every corner of the world, there has been an immense transformation in each and every field. Be it setting up a better platform of communication or connecting the globe under a common network. Social Media is referred to define certain websites that facilitate inter-personal communication through certain websites wherein people can create their own profile page and communicate with friends and associates through online messages. The most commonly used websites that have become popular over last couple of years are Twitter, Facebook, LinkedIn, MySpace, 118 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Ding and StumbleUpon etc. Social Media and Social Networking Sites have not only contributed to take interpersonal communication to a different level, but also have been a great marketing tool for the small business. DEFINITION OF SOCIAL NETWORKING SITES Social Networking Sites can be used to describe community-based web sites online discussions forums, chartrooms. Various definitions of social networking websites exist. According to Computer Dictionary (2011) Social Networking Sites as any websites designed to allow multiple users to publish content of them. The information may be on any subject and may be for consumption by friends, mates, employers, employees just to mention a few. Taylor-smith & Linder (2009) stated that wikis, blogs, chat rooms instant messengers, message boards and social book marking are technology applications that have been used to facilitate members, interaction and thus have been referred to as social networking tools. Boroughs (2010) stated that social networking websites allow users to share interests and communicate with others Seufert et al (1999) defines social networking in terms of knowledge networking as signifying a number of people, resources and relationship among them, who are assembled in order to accumulate and used knowledge primarily by means of knowledge creations and transfer processes, for the purpose of creating value. The concept of social networking is one of the tools of web 2.0 which also forms the basis of library 2.0. SOCIAL NETWORKING VS LIBRARY ”The Online world has opened up so many opportunities for us to embed library services into spaces out constituencies may visit. It makes sense to look at what social software sites our patrons frequent and how we can provide services there just like putting a library branch in a strip mall, creating presence in social networking software makes the library more visible and more convenient to access” There are four reasons why libraries should engage in Social Networking:     Communication – Social Media is another way for libraries to get into contact with their patrons, wherever they are. Gathering Positive/Negative Feedback – One of the most important tenets of customer service is to be responsive to users concerns and needs. Marketing/Advertising – An alternative to the traditional way e.g. fliers, bookmarks, announcements in calendars of events, newspaper ads, press releases etc. Understanding users better SOCIAL NETWORKING TOOLS USING IN LIBRARIES Today, in the age of information technology the library users are more techno savvy and need micro information about the subject. For this, now a day’s everyone is connected with each other by means of various social networks medium. Social networking helps librarian to share information with patrons in the easiest way for the digital library environment. The librarian can use in three broad activities those are connected with each other in library and information services. The major three are Information Communication- In this process librarian can keep constant touch and effective interaction with users in online collaborative environment. The social networking tools that can be used by library professionals to fulfill this activity.  MySpace: ISBN 1-63102-455-8 MySpace is a popular social 119 Social Networking and Library Consortia networking sites which primarily have a social function allowing people to make friends, talk online and share resources. Facebook: Another social media site frequented by students, Facebooks is librarian friendly. Group communication among patrons can be possible in web 2.0. LinkedIn: This social networking site for professional is a great way to get library patrons connected with the people that can help them find information. Whether that’s you faculty, authors, historians or other sources, they can find them in your linkedIn network. Ning: Librarian can use this tool to get connected with students, library associations and more, you can also use it to share information with many people at a time. Blog: By creating a blog you will be able to disseminate information to lots of people at one time. Blog are a powerful tool, especially when combined with RSS. Twitter: Use Twitter, a micro blogging application to keep staff and patrons updated on daily activities, like frequently updated collection, new arrival, current content services of library.      Knowledge Organization: The Knowledge Organization is about behavior such as document explanation, indexing and classification performed in information centers, library database, archives etc. these types of activities are done by specialists as well as computer algorithms.  Library Thing: This cataloging networking is great for librarians and you can catalogue along with Amazon, the library of congress and more than 200 other libraries around the world. You will get recommendation and easy tagging as well. aNobii: It helps book lovers to share reviews and recommendation. It also prepare due date alerts, lending and discussions Connotea: It is great reference tool, allowing you to save and organize reference; link and share them with other   Knowledge Distribution- Information/Knowledge sharing is the major part and crucial area where the Library professionals should look seriously while considering and designing library activities in Library Environment. Patron’s satisfaction should give first priority by providing the right information at the right time in a right way. Some social networking tools that help the professional to distribution the information:     Flickr: library can share photo collection of workshops, conference and different program that is organized with the campus through this tool YouTube: Library video and e-learning tutorials, events and other video library services can be effectively promoted and webcast through YouTube Wikipedia: it is an online encyclopedia updated by users. You can you this tool to share your knowledge by editing or simply point in right direction. Digg: It is a great way to find useful content that you would not come across in traditional ways. The use of all these tools which that academics libraries and public libraries don’t only use social media for communication purposes, but had adapted their research strategies to this environment. Libraries with social networking wall, the wall are mostly used to      Announce programmes of the library Give students the opportunity to ask question pertaining to the use of library. Paste new books on the wall to inform the university community. Send brief updates to patrons Ask a Librarian Briefly we can say that the benefits of the social networking tools/sites will librarians and libraries to keep pace with technologies and complete effectively with the developed world. 120 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education CONSORTIA: DEVELOPMENT OF LIBRARY CONSORTIA A library consortium can apply as a library or as a consortium. "A ‘library consortium’ is any local, statewide, regional, or interstate cooperative association of libraries that provides for the systematic and effective coordination of the resources of schools, public, academic, and special libraries and information centers, for improving services to the clientele of such libraries. For the purposes of these rules, references to library will also refer to library consortium." In the late 1980s the first US state-wide consortium –OhioLink–was established. It received widespread attention as they were able to obtain additional state funding for their cooperative work. During this period when libraries started using the term ”Library Consortium” instead of library cooperation and resources sharing to elucidate the present scenario in digital environment. In India: The first limited purpose and successful, consortia-like model can be traced to Tata Institute of Fundamental Research (TIFR) in 2000 , which used the consortia model offered by Springer for multi-site licensing and cross sharing of content among all the libraries falling under TIFR’s affiliation According to Alien and Hirshon the 90s are the period in which “the most of the academic libraries the scenario of activates has been changed and during this decade the libraries move from organizational self-sufficiently to a collaborative survival mode for the growth of library consortia”. Library Consortia – Genesis “Library Consortia” refers to Co-operation, Co-ordination and Collaboration between and among libraries for the purpose of sharing information resources. Libraries have been Co-operating and Collaborating on collection building and resource sharing for many years. The Cooperation between academic libraries has always been at the basis of library activities. The collaboration was based on inter-library loan and preparation and publication of union catalogue. OBJECTIVES OF LIBRARY CONSORTIUM Fig.3 Genesis of Library Consortia with Different Phases Libraries have been cooperating and collaborating on collection building for many years. The main objective of library cooperation and resources sharing is to maximize the availability of and access to information and services at a minimize cost. The library cooperation, networking and resource are synonymous with cooperation and collaborative activities.           To find out the social networking services which are to be used as a collaborative tool n the academic libraries. To measure the perspective on professional user of social networking services among librarian. To facilitate collective acquisition and sharing of traditional and e-resources. To cooperate in processing of information resources. To download and access the required resources remotely by the users of the participating libraries. To help develop a country wide-acquisition policy to avoid unnecessary and waste duplication in purchase. To establish an electronic journal centre to serve as a permanent archive for electronic journals To develop a more sophisticated search engine enabling simultaneous search of multiple database. To provide extensive facilities to use full text database and e-journals. To develop digital resources jointly and to provide access to such materials to the members of the consortium. ISBN 1-63102-455-8 121 Social Networking and Library Consortia THE ROLE OF SOCIAL NETWORKING IN THE LIBRARY CONSORTIUM Library consortia refer to co-operation, coordination and collaboration for the purpose of sharing information resources among libraries. The appreciations of the need for cooperation lead to the formation of library. But the way of cooperation in building resources and access to information resources was not easy and effective library cooperation for access to information resources was limited to the formation of networking among the libraries having homogenous interest. To materialize the concept first of all, several libraries are required to come together for mutual benefit of respective user in the form of library cooperation. Secondly, libraries linked together with the help of communication system in the term of networking and finally they come together to acquire traditional and e-resources under the umbrella of library consortium. Access to Internet connectivity and computers is increasing day by day. In this century no one is interested in printed work. For libraries to make libraries interesting innovations such as social networking site should be introduced to attract them to the library environment. The emergence of internet particularly www is a new medium of information storage and delivery in the 21 st century. In the age of information explosion the most challenging task for the information professionals and information centre all over the world is to share the huge of information. It is impossible for a single library to monitor all the explosion of knowledge field and accumulate for the users. The phenomenon of consortia has become very important last few years. Initially the term used for resource sharing activities was library cooperation. Through cooperation theoretically could embrace almost all library activities and practically it was confined to inter-library loan of library documents. However with the advent of information technology, new opportunities opened up for library for cooperation among libraries. Not only for at international level internet but at national and local level internet several library networks came in vogue and databases create for sharing. Consortium of libraries is well known for sharing of resources as well as e-resources all over the world. By forming a consortium among libraries it becomes possible to purchase information in stabilized and reasonable prices. Although, Social Networking Sites will help in establishing a relationship between librarian and patrons. Social Networking Sites become one of the largest online platforms in the world for sharing real times information. To implement the fourth law of Dr. SR. Ranganathan “Save the Time of the Users” Social Networking Sites is becoming the interesting area of libraries, documentation Centers, for implementing new services in libraries and informing their clientele in short time period. Last but not the least the librarian must take the responsibility of planning, organizing and implementing social networks in library and information centers. NEED OF E- CONSORTIA Technological developments electronic publishing of scholarly journals, prizing model of publishers for consortia gives new opportunities for libraries to provide instant access to information of resources. Following factors justifies the need of consortia development for the management of e-resources.      122 Overloaded Budget – libraries are committing larger portions of their budgetary allocation for either procuring or accessing electronic resources. A consortium facilitates the member of libraries to get the benefit of wider access to electronic resources a affordable cost and at the best terms of licenses. Information Explosion – The developed of new material like books and electronic version of old materials are availability in numerous form not only in available in print form, books are becoming available in online form also. A consortium is better position to resolve the problems of managing, organizing and archiving the electronic resources. Willingness of Publishers – In this factor the publisher helped to get attractive discounted rates and give the best offers to the consortia for purchasing the electronic journals Diversity of user needs – The expectation of researchers is very high. with technology has changed the expectation of researchers are also change because library user want to access the materials as quickly as possible the web based electronic resources fulfill the expectation of users. Quick Access – Consortia provide electronic delivery resources to users that are speedy and easily accessible at remote. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education    Improving quality Standard of research – In this factor the consortia provide access to international electronic databases and full text resources to users for that libraries are to add electronic resources to their collection. Professionalism of library Science – The value of library consortia has enhanced through the invent of information technologies particularly WWW and librarian are called as navigator or disseminator of information because librarian always keep up to date oneself. Future Development – One of important issues related to technologies is stability of system that they develop to store, retrieve and delver to electronic resources Consortia help to have a watchful eye on coming latest technological changing which can affect the libraries directly or indirectly. SOME LIBRARY CONSORTIA DEVELOPED IN INDIA India is a vast country with a total of 665 universities and 35829 colleges and 11443 institutions that provide higher education in all disciplines. Total enrolment in higher education has been estimated to be 29.6 million with 16.3 million boys and 13.3 million girls.(AISHE Survey 2012-13) and the total no. of teachers 1337726. Out of which more than half about 61 % are male teachers and 39 % are female teachers. Academic libraries in India are also facing problems such as increasing demands and high expectations from user budget cuts high cost of library material especially e-journals and a rise in the amount of information. Resources in general. It is impossible for a single library to provide access to all materials to meet their users need library consortia has have been initiated in India in order to overcome these problems and efforts to form library consortia are still in their infancy. At present there are some networks working at national level e.g. INFLIBNET, DELNET. Some in metropolitan area e.g. ADINET in Ahmadabad, CALIBNET at Calcutta and PUNENET in Pune and other covering specific topic areas e.g. HELNET - health libraries and MANLINBET management libraries. Details of four consortia in India are:     UGC: InfoNet e-journal Consortium and INFLIBNET- As stated on its website (www.inflibnet.ac.in) - The Information and Library Network (INFLIBNET) centre is an autonomous body of UGC (India) and is involved in resources and services among academic and research institutions. This is being achieved via the UGC –InfoNet work which aim to provide high speed internet connectivity. CSIR Consortium- The Counsel of Scientific and Industrial Research (CSIR) in India has 40 laboratories involved in basic and applied research in various disciplines. Many of the laboratories have well equipped libraries and some of them act as the main information centers for different subject functioning as consultant libraries at the National level. Access to e-journals though the use of state -of –heart technology is possible in many of the libraries belonging to these laboratories. Each of the laboratories has a well to established library or documentation centre that is also backed up with strategic information support from National Institute of Science Communication and Information Resources (NISCAIR) a constituent establishment of CSIR. INDEST Consortium – The ministry of HRD has set up the Indian National Digital Library in Science and Technology (INDEST) in 2003 ,provide funds required for the subscription to e-resources for 62 core institutions including Indian Institutes of Science (IIScs), Indian Institutes of Technology(IITs), Indian Institutes of Management(IIMs) and a few other centrally funded government institutions through the consortium. FORSA Consortium – The Indian Astrophysics Consortium called Forum for Resource Sharing in Astronomy (FORSA) consist of five members who joined together for negotiating. Licensing for astronomy journals and indentified a subscription agent as a supplier of journal. Subscription for both print and e-format are paid through their supplier. Some other organization such as the Indian Council of Agricultural Research (ICAR) state agricultural universities, Indian Space Research Organization (ISRO), Defense Research and Development Organization (DRDO), AICTE have started working to form different consortia. ISBN 1-63102-455-8 123 Social Networking and Library Consortia CONCLUSION The exchange of thoughts, messages or information as by speech, signals, writing or behavior is called communication. The evaluation of internet and World Wide Web (WWW) has transformed the whole globe and present a new way of communication. The limitless connectivity to create an open social order and system of interaction and collaboration has been made possible only because of information and communication technology. Information and technology are added advantages in the hands of library professional in the current scenario. Social Networking is helpful for Professional development and Professional networking purpose for all specific field those has established their goal. This is particularly true for library and Information Industry. Social Networking can be successful by conducting maximum research and experiment on different point of view on library and also the personal involvement in social networking is usefulness for development of collaboration among the libraries and library professionals. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] 124 http://en.wikipedia.org/wiki/Social_networking_service http://www.ijodls.in/uploads/3/6/0/3/3603729/vol-5,_issue-2.78-87.pdf http://ijiset.com/vol2/v2s3/IJISET_V2_I3_114.pdf http://eprints.rclis.org/17504/3/Implications%20of%20Library%20Consortia.pdf http://collaborativelibrarianship.org/index.php/jocl/article/viewFile/299/259 http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1897&context=libphilprac http://conferences.alia.org.au/alia2012/Papers/18_Crystall.Choi.pdf http://irjlis.com/wp-content/uploads/2014/06/10-IR174.pdf http://www.asis.org/asist2012/proceedings/Submissions/85.pdf http://static.aminer.org/pdf/PDF/000/264/832/developing_a_digital_resources_consortium_for_university_libraries_i n_bangladesh.pdf http://librarydotcom.webs.com/ ISBN 1-63102-455-8 PRESENT STATUS OF CONVERGENCE WEB 2.0 TECHNOLOGY IN TECHNICAL LIBRARIES WEB PAGE: A STUDY OF IIT LIBRARIES IN INDIA Sur Chandra Singha | Research Scholar | DLISc | Assam University | Silchar | surchandrasngh162@gmail.com Sumit Paul | Rabindra Library | Assam University | Silchar | spsumitpaul88@gmail.com Pradip Kumar Singha |Librarian | Janata College | Kabuganj | pradips1087@gmail.com Abstract: Web 2.0 tools acts as information facilitators to provide the essential information not only on demand but also in improvise of its use. These tools through LIS professionals appreciate to meets the library users of information need. The present study has been carrying out with an observation to examine the application of various Web 2.0 tools by the IIT Libraries website. The data used for the present study were collected through intensive content analysis of the library websites of the sixteen IITs in India. It has been revealed that 12 (75%) of IIT Library websites adopted Web 2.0 tools in their library webpages whereas remaining other not adopting still now. Most of the IIT Libraries offers the facility of Web OPAC to search the various information resources available in their libraries. The result indicated that IIT Indore used the highest number of Web 2.0 tools in the library website. Keywords – Web 2.0, IIT, Library, Web OPAC, SNS INTRODUCTION Change within the profession is the most important challenge facing LIS professionals who needs to understand the differences between the old and new cultures. Web 2.0 tools are one of emerging technology as well as best practices to enhance and innovative library services. As well as new demands on libraries, there are new opportunities such as participate, contribute and collaborate in the creation of a new content over the web. The term Web 2.0 is the name given to new capabilities and services offered by the second generation World Wide Web (WWW) that facilitates online collaboration and sharing among users. It provides a space that allows anyone to create and share information online – a space for collaboration, conversation, and interaction; a space that is highly dynamic, flexible, and adaptable. In Web 2.0 environment large numbers of users are creating content using a seemingly ever-increasing variety of tools and devices and this content is made available via a wide variety of commercial Web 2.0 services like Blogs, Wikis, and Social Networking Sites (Kelly et al., 2009). The present study is an effort to determine the use of Web 2.0 tools in IIT libraries website in India. IITs are the top most institutions in India imparting technological expertise in different branches of engineering and each IIT is an autonomous institution, associated to the others through a common IIT Council, which oversees their administration. The Union HRD Minister is the ex-officio Chairperson of IIT Council. PURPOSE AND OBJECTIVE OF RESEARCH The present research paper is an attempt to highlight below: a) To examine the Web 2.0 tools that have been deployed by IIT Libraries as exposed on their websites; b) To evaluate/examine the purpose of Web 2.0 tools use in these libraries; c) To find out how IIT libraries website are answering to the much communicated about newly emergence technology namely SNSs; d) To compare the different features of Web 2.0 tools used in their libraries. ISBN 1-63102-455-8 125 Present Status of Convergence Web 2.0 Technology in Technical Libraries Web Page: A Study of IIT Libraries in India METHODOLOGY EMPLOYED Researcher adopted a webpage survey method. A well structure checklist was designed keeping in mind the listed aforesaid objectives and literature available to examine the various Web 2.0 features of library website. Researcher personally visits to see all IIT Libraries websites to gather the data about using Web 2.0 applications in library as on 26.3.2014. All the available library website links were surveyed and observations were noted down in tabular form and data gathered in the tabular form were then carefully analysed to get a clear picture of the use of Web 2.0 tools in IIT Libraries website. PREVIOUS WORK IN WEB 2.0 THEME Web 2.0 applications are one of current and research interest area among researcher and LIS Professionals. Many studies undertaken worldwide in Web 2.0 related on particular theme. Researcher consults only those literatures which are related and contributed by different experts. The following are some of them. Hussain (2015) undertook a survey on “Adoption of Web 2.0 in library associations in the presence of social media”, which was found that the majority of Web 2.0 tools have been used by American continents library associations. This stands at, 89.86 percent, whereas only a small number of Web 2.0 tools have been used by Asian continent library associations, that is, 25.64 percent. The most of Web 2.0 tools used by library associations, is, Facebook, Twitter, RSS feeds, LinkedIn, Flickr and Blogs. The findings of this study can be utilized to assess the status of assorted Web 2.0 tools used in libraries associations. It may enable future research to investigate other aspects, such as the adoption of Web 2.0 tools in library associations of a particular country as well as continent. Boateng & Liu (2014) made a study on “Web 2.0 applications usage and trends in top US academic libraries.” The results of this exploratory study indicate an overwhelming implementation and usage of Web 2.0 applications in the top 100 US academic libraries. All 100 academic libraries examined had a social media presence on Facebook and Twitter, making SNS the most widely applied Web 2.0 tool. The Wiki was the least used Web 2.0 technology, but it was still used by 34 percent of the academic libraries. Most libraries have adopted multiple Web 2.0 tools including IM, RSS, Blog, Podcast/Vodcast, SNS, Wiki, and social bookmarking/tagging. This trend is a very significant improvement from the earlier studies described in the literature review. Those studies did not find such extensive implementation of Web 2.0 technologies in US academic libraries. These academic libraries are developing strategies for making the best use of social media, recognizing the unique qualities of different applications, and using them to promote and offer enhanced library services. The trend shows that all libraries will adopt a user-participated Web 2.0 tools for enhancing the quality of their services. Gul et. al. (2014) conducted a research entitle on “Emerging Web 2.0 applications in open access scholarly journals in the field of agriculture and food sciences.” Research results also reveal that majority of Web 2.0 enabled journals are from universities, it should be noted that technological research in Brazil is largely carried out in public universities and research institutes, and more than 73 percent of funding for basic research comes from government sources. The USA also leads in terms of Web 2.0 adoption in the journals because it has been a leader in scientific research and technological innovation since the late nineteenth century. Countries and the titles from their domain that have not tested waters with Web 2.0 enabled tools should adopt Web 2.0 interactivity in their journals, which will help in developing a Web 2.0 sensibility in the open access journals, and will then help in achieving a convenient scholarly communication platform. New Web 2.0-based scholarly modes of communication will help in rising like a phoenix that will provide greater accessibility to the open journal content. The editorial staff associated with open access journals should adhere to the adoption of more and more Web 2.0 tools, so that a more interactive environment in the scholarly world can be created. The adoption of Web 2.0 tools in open access journals can help editors to interact with the researchers interested in publishing in open access journals, answer questions and provide information about the various journal services. Web 2.0 technologies, if adapted to a greater level in the open access journals, can provide unique and powerful information sharing and collaborative platform for the scholarly world. Wordofa (2014) conducted a survey on “Adoption of Web 2.0 in academic libraries of top African universities.” The use of the internet in Africa has shown significant growth, the adoption of Web 2.0 technologies by 126 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education academic libraries in Sub-Saharan Africa appears to be still at an early stage. The adoption rate by libraries of the elite universities in Africa was found to be far below that of the developed world. Patron participation in using these web-based technologies was also very low, and the libraries did not have extensive activity on their social websites. However, the indications of Web 2.0 utilization were encouraging as about half of the libraries in this study attempted to use some kind of Web 2.0 tool. The use of social networking sites – largely Facebook and Twitter – was relatively high, followed by Blogs and RSS. Social bookmarking and tagging sites were the least used tools. The libraries mostly used Web 2.0 tools to share library news and announcements, market library services and resources, provide information literacy tutorials, and receive feedback from patrons. Yan et. al. (2014) in their article on “Exploring employee perceptions of Web 2.0 virtual communities from the perspective of knowledge sharing.” The independent samples t-test and one-way ANOVA present the effect of individual differences on knowledge contributing, knowledge seeking, trust and norm of reciprocity. The paired samples t-test suggests that employees are more likely to seek knowledge from than contribute knowledge to Web 2.0 virtual communities. The correlation analysis suggests there are positive correlations between knowledge contributing, knowledge seeking, trust and reciprocity. Based on knowledge quantity and knowledge quality whose significance cannot be over-emphasized in virtual communities, this study explores employee perceptions of Web 2.0 virtual communities from the perspective of knowledge sharing, which the authors think provides a new view for knowledge sharing research and practice alike in China. Shafi et. al. (2013) conducted a study on “Web 2.0 interactivity in open access repositories.” A total of 1,499 open access repositories having English as one of the interface/content languages (75.82 percent of total OA repositories) are developed from 81 nations and only 61 countries have most of their repositories Web 2.0 enabled. About 57 percent (804) repositories make use of Web 2.0 tool/s, 43 percent (608) have yet to avail benefits of Web 2.0 tools while 5.8 percent remain inaccessible (87) during the study period. Though the USA leads in terms of OA repositories, the percentage of Web 2.0 enabled repositories is higher for the UK (75.27 percent) as compared to the USA (51.08 percent). Really Simple Syndication (RSS), a syndication tool, is found in the majority of repositories (736, 91.54 percent) followed respectively by Social Bookmarking and ATOM (syndication tool) in 228 and 160 repositories. RESULTS AND DISCUSSIONS Researcher undertaken a webpage survey and attempted to determine those IIT libraries are not using Web 2.0 applications, to make inform decisions on whether IIT libraries should make use of certain convergence Web 2.0 technology to enhance their excellent library services and facilitate information sharing among generations. Following table and figure shows the entire result of the survey. Table 1: Library Websites of Indian Institute of Technology (IIT) in India Sl. No. Name of IITs Year of Estd. URL of Library Websites 1. IIT Bhubaneswar 2008 http://library.iitbbs.ac.in/ 2. IIT Bombay 1958 http://www.library.iitb.ac.in/ 3. IIT Delhi 1961 http://library.iitd.ac.in/ 4. IIT Gandhinagar 2008 http://www.iitgn.ac.in/library.htm 5. IIT Guwahati 1994 http://www.iitg.ernet.in/lib/ 6. IIT Hyderabad 2008 http://library.iith.ac.in/ 7. IIT Indore 2009 http://library.iiti.ac.in/ 8. IIT Jodhpur 2008 http://library.iitj.ac.in/ ISBN 1-63102-455-8 127 Present Status of Convergence Web 2.0 Technology in Technical Libraries Web Page: A Study of IIT Libraries in India 9. IIT Kanpur 1959 http://pkklib.iitk.ac.in/ 10. IIT Kharagpur 1951 http://www.library.iitkgp.ernet.in/ 11. IIT Madras 1959 http://www.cenlib.iitm.ac.in/docs/library/index. php 12. IIT Mandi 2009 http://library.iitmandi.ac.in/ 13. IIT Patna 2008 http://www.iitp.ac.in/index.php/servicesandamenities/central-library/about-iitplibrary.html 14. IIT Roorkee 1847 http://mgcl.iitr.ac.in/ 15. IIT Ropar 2008 http://www.iitrpr.ac.in/library# 16. IIT Varanasi 1919 http://www.iitbhu.ac.in/library/ Table 1 revealed how many IIT libraries in India and disclosed the year of establishment. In this tables showed that Sixteen IITs in India. Web 2.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 AI Blog - - - - - √ √ - - - - - - - - - 2 SNS - √ - - - - - - - - - - - - - - 1 Wiki - - - - - - √ - - - - - - - - - 1 RSS Feed - - - - - √ √ - - - - - - - - - 2 IM √ √ - - - - - - - - √ - - - - - 3 Mashup - - - - - - √ - - - - - - - - - 1 √ √ √ √ √ - √ √ - - √ √ - √ - √ 11 2 3 1 1 1 2 5 1 0 0 2 1 0 1 0 1 21 Web OPAC Total Table 2: Web 2.0 Features in IIT Library Websites Note: 1. IIT Bhubaneswar 2. IIT Bombay 3. IIT Delhi 4. IIT Gandhinagar 5. IIT Guwahati 6. IIT Hyderabad 7. IIT Indore 8. IIT Jodhpur 9. IIT Kanpur 10. IIT Kharagpur 11. IIT Madras 12. IIT Mandi 13. IIT Patna 14. IIT Roorkee 15. IIT Ropar 16. IIT Varanasi AI – Application Index Table 2 represented the Web 2.0 features in IIT Library Websites. The majority of library website i.e. 11 (68.75%) used Web OPAC for search and retrieve the information, which was followed by 3 (18.75%) of library websites adopted IM for responding particular user query. 2 (12.5%) of library websites deployed Blog and RSS Feed. Only 1 (6.25%) of IIT Libraries used SNS and, Wiki and Mashup. One more noticeable point was that IIT Indore used the highest number of Web 2.0 tools in Library website. 128 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Using 25% 75% Figure 1: Status of Using Web 2.0 Tools In order to know the status of Web 2.0 in IIT Libraries website, Fig. 1 showed the clear picture overall scenario of library website. 12 (75%) of IIT Library websites adopted Web 2.0 tools whereas remaining other not adopting still now. Sl. No. Name of IIT SNS Used Application Index 1. IIT Bhubaneswar Nil 0 2. IIT Bombay Facebook, Twitter, You Tube 3 3. IIT Delhi Nil 0 4. IIT Gandhinagar Nil 0 5. IIT Guwahati Nil 0 6. IIT Hyderabad Twitter 1 7. IIT Indore Nil 0 8. IIT Jodhpur Nil 0 9. IIT Kanpur Nil 0 10. IIT Kharagpur Nil 0 11. IIT Madras Nil 0 12. IIT Mandi Nil 0 13. IIT Patna Nil 0 14. IIT Roorkee Nil 0 15. IIT Ropar Nil 0 16. IIT Varanasi Nil 0 Table 3: Status of SNS (Social Networking Sites) in IIT Libraries ISBN 1-63102-455-8 129 Present Status of Convergence Web 2.0 Technology in Technical Libraries Web Page: A Study of IIT Libraries in India Table 3 showed the status of SNS in IIT Libraries websites. IIT Bombay, library was the highest number of SNS like Facebook, Twitter and You Tube used in library website and only Twitter adopted by IIT Hyderabad, library. CONCLUSION AND RECOMMENDATIONS With the emergence of new technology, users need to find reliable and authentic information, so that they can get the information as instantly as possible. Using these technologies, LIS Professionals can assist the users at any time any moment and anywhere. The result revealed that convergence Web 2.0 technology in present study websites as per checklist found very meager features. In consequence, it can be understood that Web 2.0 tools should implement more additional feature and continued with rich content. Hence, requirements and expectations of its users can be fulfilled with facilitate innovative and excellent library services. Many Web 2.0 technologies are available freely. Thus, there is no financial restriction in using these tools and support in taking advantage of the full potential of information services to the existing users and will also advantage in reaching out to new potential users. Moreover, LIS Professionals should maintain consistency to upload and update the information quickly, so that user can get the advantage of taking these tools. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] Ahmed, W. (2015). Third generation of the web: libraries, librarians and web 3.0. Emerald Group Publishing Limited, 32(4), 6-8. doi: 10.1108/LHTN-11-2014-0100 Boateng, F., & Liu, Y. Q. (2014). Web 2.0 applications’ usage and trends in top us academic libraries. Emerald Group Publishing Limited, 32(1), 120-138. doi: 10.1108/LHT-07-2013-0093 Deodato, J. (2014). The patron as producer: libraries, web 2.0, and participatory culture. Emerald Group Publishing Limited, 70(5), 734-758. doi: 10.1108/JD-10-2012-0127 Gul, S., Shah, T. A., & Nisa, N. T. (2014). Emerging web 2.0 applications in open access scholarly journals in the field of agriculture and food sciences. Emerald Group Publishing Limited, 63(8/9), 670-683. doi: 10.1108/LR-052013-0060 Hussain, A. (2015). Adoption of web 2.0 in library associations in the presence of social media. Emerald Group Publishing Limited, 49(2), 151-169. doi: 10.1108/PROG-02-2013-0007 Kelly, B., Bevan, P., Akerman, R., Alcock, J., & Fraser, J. (2009). Library 2.0: Balancing the risks and benefits to maximize the dividends. Program: electronic library and information systems, 43(3), 311-327. doi: 10.1108/0330330910978608 Shafi, S. M., Gul, S., & Shah, T. A. (2013). Web 2.0 interactivity in open access repositories. Emerald Group Publishing Limited, 31(6), 703-712. doi: 10.1108/EL-08-2011-0121 Wordofa, K. H. (2014). Adoption of web 2.0 in academic libraries of top African universities. Emerald Group Publishing Limited, 32(2), 262-277. doi: 10.1108/EL-07-2012-0077 Yan, Y., Zha, X., & Yan, M. (2014). Exploring employee perceptions of web 2.0 virtual communities from the perspective of knowledge sharing. Emerald Group Publishing Limited,66(4), 381-400. doi: 10.1108/AJIM-082013-0070 WEBSITE VISITED [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] 130 http://mhrd.gov.in/iits http://library.iitbbs.ac.in/ http://www.library.iitb.ac.in/ http://library.iitd.ac.in/ http://www.iitgn.ac.in/library.htm http://www.iitg.ernet.in/lib/ http://library.iith.ac.in/ http://library.iiti.ac.in/ http://library.iitj.ac.in/ http://pkklib.iitk.ac.in/ http://www.library.iitkgp.ernet.in/ http://www.cenlib.iitm.ac.in/docs/library/index.php http://library.iitmandi.ac.in/ http://www.iitp.ac.in/index.php/services-and amenities/central-library/about-iitp-library.html http://mgcl.iitr.ac.in/ http://www.iitrpr.ac.in/library# http://www.iitbhu.ac.in/library/ ISBN 1-63102-455-8 BIG DATA: INTRODUCTION TO APPLICATIONS IN LIBRARIES Ms. Purnima Joshi | Librarian | K. C. Law College | India | kclawlibrary@gmail.com Abstract: Big Data is the digital data that is rapidly increasing on three fronts of volume, velocity and variety. Analysis of big data reveals patterns, trends and associations that can be used by businesses, academic institutions and libraries. This paper introduces the concept of big data. It also discusses in detail, big data applications in libraries especially data mining, data curation and research data management. Keywords: Big Data, Data mining, Data curation, Research data management. INTRODUCTION Sloan Digital Sky Survey project started in 2000. In the first few weeks, its telescope in New Mexico collected more data than that collected in the entire history of astronomy. Now, after a decade, its archive contains 140 terabytes of information. The new telescope that will be installed in Chile in 2016 is expected to gather equivalent amount of data every five days. We also encounter such astronomical amounts of data closer to home. The social networking website Facebook hosts more than 40 billion photos. It also stores almost 800 pages information about each user. All these examples illustrate the huge volume of digital data currently available in the world. This data is constantly increasing at a very rapid pace. The growth of data is such that it has already exceeded the available storage space as shown in the following graphical representation (GSV Capital, 2014). This rapidly increasing volume of data (or information) is called as “Big Data”. According to Diebold (2012), John Mashey and his colleagues at Silicon Graphics Inc. (SGI) were responsible for coining the term ‘Big Data’ in mid-1990s. CHARACTERISTICS OF BIG DATA Generally big data is defined as large data that come from unstructured sources and can be used in real-time. Laney (2001) was the first to identify the three Vs that are the definitive attributes of big data - Volume, Velocity, and Variety: 1. Volume: A primary feature of big data is its huge size. The huge data can neither be stored nor analyzed by conventional methods. Traditional softwares can handle datasets of kilobyte (KB) size, but softwares for big data analysis should be able to handle datasets of terabyte or petabyte sizes i.e., 109 or 1012 KBs of data. Torrent of social media updates due to the internet-mobile revolution and huge growth of e-commerce have resulted in voluminous data. If used correctly, this data can be of immense value. 2. Velocity: The second feature refers to the extremely high speed of data creation and the increasing speed at which it moves around. Currently in one minute, 100 hours of video are being uploaded on Youtube, 3 lakh tweets are posted and more than 200 million mails are sent. The speed of social media interactions is such that these figures become outdated as soon as we read them. This is the phenomenal rate of growth of digital data that is being created. Processing this data in real time helps companies to provide personalized services book recommendations and personalized advertisements based on the person’s search, viewing and purchase history. ISBN 1-63102-455-8 131 Big Data: Introduction to Applications in Libraries 3. Variety: Traditionally, the data collected for research was only structured data, such as that in a spreadsheet with specific rows and columns. Big data sets also contain unstructured data like images, texts, internet posts, email messages, audio and video files, etc. in addition to structured data. These three Vs give an insight into the scale, speed of growth and the challenges posed by big data. Rijmenam (2013) proposed four more Vs to further the understanding of the complex nature of big data. 4. Veracity: High potential value attributed to big data would prove to be worthless if the data is not accurate. It is necessary to understand that big data may contain a lot of “noise” or errors that have to be cleaned and rectified in order to create an accurate dataset for analysis. 5. Variability: Big data can be extremely variable. Variability refers to variance in meaning according to a given context. An adjective can have both positive and negative connotations according to the context in which it is used. For example, ‘terribly nice’ is positive whereas ‘terribly shameful’ is negative. For a proper analysis therefore, the program should be able to understand the context and then decipher the meaning of words in that context. This can be very difficult, but not impossible as such programs do exist. Variability should not be confused with variety. Variety means different types of a single product. Variability means variations or lack of uniformity in a particular product. 6. Visualization: This refers to presentation of processed data in an accessible or understandable manner. Normal presentation tools are various graphical visualizations in the form of bar graph or pie charts. Visualizations for big data are complex graphs that include many variables. Proper analysis and visualization is the most crucial part that makes big data comprehensible and easy to read and interpret. 7. Value: Big data has a huge potential value. Industries can reap huge benefits from it provided they analyze and interpret it accurately. The value of big data lies in the insights that can be derived from data analysis and used in decision making to make the industry information-centric. Raw big data actually has little value. It is very difficult to visualize patterns in raw data without efficient analysis. Analyses help in converting a mass of data into applicable or usable information. Making sense of all the available data is becoming increasingly difficult. Only very powerful computers can manage the available data and provide new insights into it. Advancements in technology have enabled analysis of big data in real time and also making predictions based on it. This is called as ‘Data Mining’ in technical terminology. Various factors that have together enabled effective mining of large datasets are:      Cheaper servers to host the mined data Availability of open source software tools Availability of cloud computing facilities Creation of massive datasets Need for businesses to derive value out of the collected data. APPLICATIONS OF BIG DATA Commercial organizations were the first to adopt big data to identify market trends. Businesses collect huge data about customer needs and experiences and also about the organizational processes. This data is then analyzed to identify emerging market trends and to meet customers’ needs effectively. It can also help in providing better services and more targeted products. In addition, businesses can also involve their customers in the process to bring about improvements in products. For example, the famous toy company LEGO has started Mindstorm community, where buyers of LEGO products can participate in designing future products. When people browse the Internet they leave a trail, which can be followed by companies to create tailor-made services. For example, book recommendations by Amazon, personalized search experience by Google. Such an information-driven approach was not immediately adopted by the education sector. In the academic environment, the following activities of students are sources of enormous potentially valuable information: course or college registration, scholarship and internship arrangements, co-curricular and extracurricular 132 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education activities, online submissions, library usage and online resources usage. This information can be the raw material for big data analysis and it can be repackaged to help the students. Such an application is the SHERPA (Service-oriented Higher Education Recommendation Personalization Assistant) software developed by the Saddleback College in California (Soares, 2011). It can suggest a course of study to the students by analyzing the information about their profile, schedules and past courses undertaken by them that is stored in the college database. The improved version of this software will also add the success stories of students with similar profiles in the big data analysis. Similarly, Course Signals software developed by Purdue University (Arnold and Pistilli, 2012) compares the students’ performance and activity patterns to those of previously successful students. It thus helps them to manage their success throughout their course. APPLICATIONS OF BIG DATA IN LIBRARIES Automation of library circulation systems and development of Worldcat by OCLC can be called as the early applications of big data in libraries. Big data affects libraries both directly and indirectly. Direct effect is in the use of big data tools to analyze big data sets of libraries. Indirect effect is through the library users who are increasingly using big data in their research. In order to deal with big data and data mining, there is no need for librarians to acquire new skills. They need only to refocus on new issues and requirements. Librarians who have practiced cataloguing and metadata creation have the ability of conceptualizing relationships among data. They can therefore, be the best persons to advise the researchers about the data management mechanisms to be adopted from the beginning of a research project so as to make it easier to collect, organize and preserve the data that will be generated. BIG DATA CURATION Librarians can make big data sets more accessible, visible and useful by creating metadata schemes and taxonomies and designing standard retrieval methods. Traditionally librarians have always worked with information sources, which are the finished products. Now they should also understand the value of the ‘raw data’. With the help of new big data analysis tools, one can look at data in different ways. Information Visualization Tools enable mining the raw data for new information different than the purpose for which it was used originally. RESEARCH DATA MANAGEMENT Research data is the data that is produced as a result of any research activity. Such data is very valuable but it is also diverse and heterogeneous in nature and can be huge in a university setup where active research is going on. This research data is a pool of raw data which can be mined by other researchers according to their needs. This will save their precious time that would have been spent in data collection. But, such an activity needs proper planning for infrastructure and policy framework. Researchers are normally focused on their own domains. It is very difficult to imagine how the data collected by them can be useful for others. But a facet of the data that may be useless to the researcher who collected it might be valuable for other researchers. The librarians have to perform the task of data curation in such cases so as to make the data more valuable and available for other future uses, especially because predicting the future uses can be very difficult. What to save and in which format, are some of the crucial decisions to be taken. Data archiving is the library skill that can be reoriented for big data management. For researchers, data management is nothing but data storage. It can be stored locally on their computer disks or in the cloud. But archiving actually means arranging, describing, documenting and preserving the data so as to enhance it and make it easily retrievable. This is very important because storage or preservation of data is meaningless without later access. If research data is archived properly, then it would make the research reproducible and also facilitate new research. ISBN 1-63102-455-8 133 Big Data: Introduction to Applications in Libraries Such initiatives are being undertaken the world over. Their goal is to build large networks and repositories to provide support for effective data management and access. But in order to do this, it is necessary to find out the needs and habits of researchers, to develop powerful data analysis tools or adapt some from the available open source software. Hathi Trust (2015) is one such co-operative effort of more than 100 university libraries. It is administered by Michigan and Indiana universities and is a collaborative repository of digital content from research libraries. It is “committed to the long-term curation and availability of the cultural record”. Its textual data corpus can be used by researchers for text mining according to their needs. The Digital Preservation Network (DPN, 2015) is the newest and one of the most ambitious project with a vision to preserve the complete scholarly record for future generations. It replicates multiple copies of various digital repositories in diverse nodes in order to protect from “the risk of catastrophic loss due to technology, organizational or natural disasters”. For proper functioning of such initiatives for Data mining, Data curation or Research data management, a smart policy framework is a necessity because here, personal research data is being used in new ways giving rise to many information sharing issues. Policy makers therefore, should create proper guidelines for promotion of both – an information sharing environment and researcher privacy. Guidelines should also define the extent and nature of use that can be considered fair dealing. Whether the researchers will be able to opt out or control their research data should also be specified clearly. Funding issues for maintenance of the data repository should also be a major concern. Majority of the initiatives in big data management for preservation and access are headed by the librarians. But university officials are also involved in these projects. Preservation of big data and the cultural heritage should be a joint responsibility of libraries and universities or research institutions. This is because big data management involves social and economic issues in addition to the technology issues. CONCLUSION Big data are extremely large data sets that can be analyzed only with the help of specialized software. This gives rise to complex visualizations regarding patterns and trends in human behavior and interactions. Big data is expanding continually on three fronts of volume, velocity and variety. Consideration of other characteristics like veracity, variability, visualization and value is also very important for developing a big data program. Businesses were the first to adopt big data analysis followed by the education sector. Big data is finding applications in data mining, data curation and research data management. Libraries are at the fore front of such initiatives with administrative and technological support from their universities or institutions. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] 134 Arnold, K. E., and Pistilli, M. D. (2012). Course signals at Purdue: Using learning analytics to increase student success. In S. Buckingham Shum, D. Gašević, & R. Ferguson (Eds.), Proceedings of the 2nd International Conference on Learning Analytics and Knowledge (LAK 2012) (pp. 267-270). New York: ACM Diebold, Francis X. (2012). A personal perspective on the origin(s) and development of ‘Big Data’: the phenomenon, the term, and the discipline. Second version. PIER Working Paper No. 13-003. Retrieved from http://dx.doi.org/10.2139/ssrn.2202843 on 9.7.2015 Digital Preservation Network. (2015). Retrieved from http://www.dpn.org/ on 13.7.2015 GSV Capital (2014). Market commentary. Retrieved from http://gsvcap.com/market-commentary/san-francisco37/ on 9.7.2015 Hathi Trust Digital Library. (2015). Partnership Community. Retrieved from https://www.hathitrust.org/community on 13.7.2015 Laney, Doug. (2001). 3D data management: controlling data volume, variety and velocity. Retrieved from http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-VolumeVelocity-and-Variety.pdf on 22.07.2015 Rijmenam, Mark van. (2013). Why the 3 Vs are not sufficient to describe big data. Retrieved from https://datafloq.com/read/3vs-sufficient-describe-big-data/166 on 22.07.2015 Soares, Louis. (2011). The ‘Personalization’ of Higher Education: Using Technology to Enhance the College Experience. Retrieved from https://www.americanprogress.org/issues/labor/report/2011/10/04/10484/thepersonalization-of-higher-education/ on 10.7.2015 ISBN 1-63102-455-8 PLAGIARISM AND RESEARCH MISCONDUCT: A STUDY Sanjay Kumar Jha | Assistant Librarian | Amity University | Noida | sjha1@amity.edu Pratibha Pritam | Assistant Librarian | Dalmia House | New Delhi Abstract: As the research integrity officer at my university for two years, I handled eight allegations of plagiarism. These eight cases show that initial appearances can be mistaken, that policies for handling allegations of research misconduct cannot cover every contingency, and that many cases can be resolved collegially without resort to formal procedures. Keywords: Plagiarism, research misconduct, research integrity officer INTRODUCTION Plagiarism has become an increasingly serious problem in the University. It is aggravated by the easy access to and the ease of cutting and pasting from a wide range of materials available on the internet. Plagiarism is regarded as a very serious offence in the academic world. It constitutes academic theft - the offender has 'stolen' the work of others and presented the stolen work as if it were his or her own. It goes to the integrity and honesty of a person. It stifles creativity and originality, and defeats the purpose of education. Plagiarism is the unacknowledged use of other people's ideas or work. Plagiarism is often unintentional and can be avoided through careful work habits. Whether intentional or unintentional, plagiarism is recognized as a serious academic offence. I am never forget the day I first meet the great Lobachevsky. In one word he told me secret of success in mathematics: Plagiarize! … Only be sure always to call it please “research” … I am never forget the day my first book is published. Every chapter I stole from somewhere else. Index I copy from old Vladivostok telephone directory. This book was sensational! 1 Since antiquity, writers and artists have borrowed words, images, and ideas from predecessors without attribution. The acceptability of borrowing has varied throughout history and across cultures, but academics in the West have generally taken a strict attitude toward plagiarism.2 In the academy today, plagiarism is wrong because it is the misrepresentation of the ideas and words of someone else as one’s own. By omitting citations, the plagiarist impedes scholarship by preventing readers from tracing Department of Electrical and Computer Engineering, and Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA A preliminary version of this paper was presented at the Eleventh Annual Meeting of the Association for Practical and Professional Ethics, February 28 – March 3, 2002, Cincinnati, Ohio. The views, opinions, and recommendations expressed in this paper are not necessarily those of the University of Illinois at Urbana-Champaign. M. C. Loui Science and Engineering Ethics, Volume 8, Issue 4, 2002backward to identify the sources of an idea.3 Among academics, plagiarism is not “the sincerest form of flattery”—it is a sin. Fig.1 Process of Plagiarism Checking ISBN 1-63102-455-8 135 Plagiarism and Research Misconduct: A Study Plagiarism occurs in research in all academic disciplines: the natural sciences, applied sciences, social sciences, humanities, fine arts, and professions. It appears to be the most commonly reported form of research misconduct.[4] In response to widely publicized cases of scientific fraud, over the last ten years, many universities in the United States have developed policies and procedures to handle allegations of research misconduct, although faculty often do not know about them.5 These policies attempt to ensure that the allegation is handled promptly, confidentially, and effectively, with attention to rights of the initiator of the allegation and the respondent. Due process requires that the respondent be given an opportunity to respond within a reasonable amount of time. If an investigation reveals that the facts do not support an allegation, then the reputation of the respondent must be preserved; those who had heard the allegation must be informed that it was dismissed. Further, the respondent should be protected from malicious charges, while the initiator should not suffer retaliation for bringing an allegation in good faith. Finally, differences in judgment and honest mistakes do not constitute research misconduct. campus. In this paper I recount these cases briefly, with names and other identifiers omitted to protect the innocent and the guilty. I hope that the lessons drawn from these cases will be helpful to other research integrity officers. Seven Ways to Plagiarize: Handling Real Allegations of Research Misconduct Science and Engineering Ethics, Volume 8, Issue 4, 2002 531 WHAT IS PLAGIARISM? Plagiarism is the act of taking another person's writing, conversation, song, or even idea and passing it off as your own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium. Whenever you paraphrase, summarize, or take words, phrases, or sentences from another person's work, it is necessary to indicate the source of the information within your paper using an internal citation. It is not enough to just list the source in a bibliography at the end of your paper. Failing to properly quote, cite or acknowledge someone else's words or ideas with an internal citation is plagiarism. These are some examples of plagiarism. Some are obvious, but some may be new to you:  Misrepresenting someone else's work as your own:  o Copying another student's paper or an article from a journal or website o Buying an essay from a term-paper mill Copying sentences or paragraphs without properly citing their source:  Quoting material without proper use of quotation marks (even if otherwise cited appropriately) Using specific facts without proper attribution (other than information that qualifies as 'common knowledge') o Using a specific argument or logic without crediting the source o Using art, graphs, illustrations, maps, statistics, photographs, etc. without complete and proper citation o Translating a work from one language to another without complete and proper citation Paraphrasing o o o o Paraphrasing or summarizing information from a source without proper acknowledgement Re-writing a section but not making it sufficiently different from the original (even if cited appropriately) WHAT TYPES OF WORK MUST BE CITED? The work of others includes not only written words and ideas, but also "art, graphics, computer programs, music, [. . .] charts, pictures, graphs, diagrams, data, websites, or other communication or recording media," including "formatting," images, statistics, and problem solutions ("Avoiding Plagiarism").* 136 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education WHICH SOURCES MUST BE CITED? Both published (in digital or traditional formats) and unpublished sources must be cited. Published sources include "books, magazines, newspapers, websites, plays, movies, photos, paintings, and textbooks" and online papers; unpublished sources include "class lectures or notes, handouts, speeches, other students' papers, or material from a research service" ("Avoiding Plagiarism"). HOW TO AVOID PLAGIARISM? When you write a research paper, you have to explain where you got your information. Some of the ideas you use will be your own, but many will have come from information you have read and people you have interviewed about the topic. To explain where the information comes from, you have to give (cite) the source correctly. DISTINGUISHING "COMMON KNOWLEDGE" FROM ORIGINAL WORK Facts can be viewed as common knowledge if they are generally known and widely established. The term "common knowledge" implies that the audience and the author have agreed on certain facts, so accepted common knowledge might vary depending on your audience. For example, dates referring to well-known events can be viewed as common knowledge. So, when referring to July 4, 1776 as the date the Declaration of Independence was adopted, you would not need to cite a source for your information—if Americans comprise your target audience. Be wary, however, when treating information as common knowledge. When making this judgment, consider whether the information is both widely known and undisputed. As your expertise within your field grows, your base of common knowledge, as it pertains to that field of expertise, will also grow. When in doubt about the status of a piece of information, err on the side of caution and include a citation. STUDENT MISCONCEPTIONS ABOUT PLAGIARISM AND THE INTERNET Some students view all information on the Internet as equal to common knowledge simply because it is free, publicly shared, widely available, and indeed, quite "common." Nevertheless, the language, ideas, and work in electronic sources, even those without an identifiable author, must be cited. According to the new federal policy on research misconduct, adopted in 1999, [Research misconduct is] fabrication, falsification, or plagiarism in proposing, performing, or reviewing research, or in reporting research results…. Plagiarism is the appropriation of another person’s ideas, processes, results, or words without giving appropriate credit, including those obtained through confidential review of others’ research proposals and manuscripts. Fig.2 Research Misconduct ISBN 1-63102-455-8 137 Plagiarism and Research Misconduct: A Study DEFINITION OF RESEARCH MISCONDUCT Research misconduct means fabrication, falsification, or plagiarism in proposing, performing, or reviewing research, or in reporting research results. 1. Research misconduct does not include honest error or differences of opinion. 2. Fabrication is making up data or results and recording or reporting them. 3. Falsification is manipulating research materials, equipment, or processes, or changing or omitting data or results such that the research is not accurately represented in the research record. 4. Plagiarism is the appropriation of another person's ideas, processes, results, or words without giving appropriate credit. This definition supersedes previous definitions used by the National Science Foundation (NSF) and the federal Office of Research Integrity (ORI), and it applies to all federally supported research in the United States.[8] The new federal definition omits the intent to deceive the reader, previously a part of the ORI definition, as intent is difficult to prove.9 Under the previous ORI definition, the copying of sentences that describe previous research might not constitute research misconduct if the reader were not deceived about the contribution of the author.[10] The new federal definition also omits the phrase “serious deviation from accepted practices”, previously an important part of the NSF definition. Under the “serious deviation” standard, to qualify as research misconduct, the copying must deviate significantly from the norms of the scholarly community; for example, the duplication of a well-known procedure might technically be plagiarism, but would not be considered research misconduct.[10] For McCutchen,[11] the essence of plagiarism is the theft of someone else’s ideas or intellectual contribution. The duplication of words, in itself, is only evidence of possible plagiarism. For example, in mathematical writing the language is highly stylized, and an author can duplicate whole sentences—“Let x be a real variable”—and even short sequences of sentences without plagiarizing. The norms of an academic discipline are relevant in determining what constitutes plagiarism. Different disciplines have different conventions, styles, and expectations for citing previous work.. Some disciplines require quotation marks or indentation, some do not. Thus, in investigating an allegation of plagiarism, a hearing panel should always include members who understand the norms of the academic discipline in which the allegation occurred. It is unnecessary to include citations and references for common knowledge within a discipline. For example, an author today need not cite Darwin’s Origin of Species to introduce the concept of natural selection. In my opinion, if a fact, concept, or theory is in the undergraduate curriculum or a first-year graduate course in the discipline, then it is common knowledge, and no citation is necessary. Plagiarism and Copyright A case of plagiarism is not necessarily a violation of copyright. An author can plagiarize without violating copyright by quoting a document published many years ago that is now in the public domain. Conversely, an author can violate copyright M. C. Loui 532 Science and Engineering Ethics, Volume 8, Issue 4, 2002 without plagiarizing by quoting, with proper attribution, an amount of material that exceeds the “fair use” standard for copyright. A university generally does not hold the copyright to a traditional academic work, such as a paper or a book written by a professor or a student. Consequently, even if a plagiarism case does violate a copyright, the university does not have an interest in protecting the copyright. Using copyright law to obtain redress for plagiarism may not be effective for two reasons. First, few academic publications have significant monetary value; provable monetary damages, if any, would be minimal. Second, a legal action could invite a counter-suit for defamation.5 Most plagiarism cases can be resolved without recourse to a formal legal process. Case #1: The Instant Paper Graduate student X takes a copy of a manuscript written by X’s research advisor Z and replaces the title page with a new title page that includes the name of X. 138 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Case #2: The Unauthorized Translation Professor W publishes a book B1 in language L1 that reconstructs a series of manuscripts published in language L0 some three centuries ago. Professor X translates B1 into X’s own native language L2 . The book B2 written by X states only that W has also worked on these manuscripts, with a citation of B1. Professor W brought the allegation to me because she knew that I handled allegations of research misconduct. Case #3: The Duplicate Publication Professor X publishes a paper P2 in journal J2 in which X includes several long excerpts from a previous paper P1 in journal J1 that X (alone) wrote on a similar subject. Case #4: The Background Section Professor X writes a grant proposal in which the background section duplicates, nearly verbatim, two pages from a paper published by Professor Z. No ideas in this section of the proposal are due to Z. The proposal cites this paper, but does not say that the background section is based on the paper. Case #5: The Review Article In seventeen places in a long review article, Professors X and Y quote nearly verbatim from a book written by Professor Z. The book is listed among the references, but it is not cited in any of these seventeen places. Professor X was the doctoral advisor of Y and Z; Professor Y was primarily responsible for writing the review article. Case #6: The Magazine Surprise Doctoral student W is surprised to see several paragraphs of W’s master’s thesis appear verbatim in an article in magazine M written by Professor X. The article has no citations or references. Case #7: Another Magazine Surprise - In a short article in magazine M, Professor X states a theory originally proposed by Professor Z, but confirmed through independent experiments by research articles that can be included as references journal articles. Case #8: The Professional Manual - In a professional manual written by practitioners X and Y, two pages paraphrase procedures listed in a book written by Professor Z. The manual does not cite the book explicitly, but it does include the book among the references at the end. The manual is published by X and Y themselves, and neither X nor Y is employed by a university. On behalf of Professor Z, I attempted to contact the employers of X and Y to find out The cases that I handled support some of the precepts proposed by Rhoades,6 who derived lessons from cases of scientific misconduct reported to the Office of Research Integrity (ORI) at the federal Public Health Service (PHS). CONCLUSION Plagiarism is the "wrongful appropriation" and "stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own work. The idea remains problematic with unclear definitions and unclear rules The modern concept of plagiarism as immoral and originality as an ideal emerged in Europe only in the 18th century. Now we can check plagiarism of research text, many tools are available on the internet to check the originality of research work. While some facts may be viewed as common knowledge, the presentation of those facts is considered the unique work of an author. Again, when using the language or words of another, you must properly acknowledge his or her work. REFERENCES [1] [2] [3] [4] [5] [6] [7] Lehrer, T. (1981) Lobachevsky, in: Lehrer, T. Too Many Songs by Tom Lehrer, Pantheon Books, New York. Anderson, J. (1998) Plagiarism, Copyright Violation and Other Thefts of Intellectual Property: An Annotated Bibliography with a Lengthy Introduction, McFarland and Company, Jefferson, N.C. Snapper, J.W. (2001) On the Web, Plagiarism Matters More Than Copyright Piracy, in: Spinello, R.A. & Tavani, H.T. (eds) Readings in Cyberethics, Jones and Bartlett, Sudbury, Mass., pp. 280-294. Price, A. (1994) The 1993 ORI/AAAS Conference on Plagiarism and Theft of Ideas. Journal of Information Ethics 3: 54-63. Kock, N. (1999), A case of academic plagiarism. Communications of the ACM 42: 96-104. Rhoades, L.J. (2000) The American experience: lessons learned. Science and Engineering Ethics 6: 95-107. Anderson, C. (1993) Michigan gets an expensive lesson. Science 262 (5130): 23. ISBN 1-63102-455-8 139 Plagiarism and Research Misconduct: A Study [8] [9] [10] [11] [12] [13] [14] [15] Federal Register, October 14, 1999 Bird, S.J., & Dustira, A.K. (2000) New common federal definition of research misconduct in the United States. Science and Engineering Ethics 6: 123-130. Parrish, D. (1995) Scientific misconduct and the plagiarism cases. Journal of College and University Law 21: 517554. McCutchen, C.W. (1994) Plagiarism: a tale of telltale words. Journal of Information Ethics 3: 48-50. Bebeau, M.J. (1995) Moral Reasoning in Scientific Research: Cases for Teaching and Assessment, Poynter Center for the Study of Ethics and American Institutions, Indiana University, Bloomington, IN, USA. LaFollette, M.C. (1992) Stealing into Print: Fraud, Plagiarism, and Misconduct in Scientific Publishing, University of California Press, Berkeley, CA, USA. Gilbert, W.S., and Sullivan, A. (1878) H.M.S. Pinafore, Or the Lass that Loved a Sailor. Gunsalus, C.K. (1998), Preventing the need for whistle blowing: practical advice for university administrators. Science and Engineering Ethics 4: 75-94. WEBSITES [1] https://www.google.co.in/search?q=Plagiarism+and+Research+Misconduct&biw=1352&bih=634&source=lnms& [2] [3] [4] [5] [6] [7] [8] 140 tbm=isch&sa=X&ved=0CAcQ_AUoAmoVChMI39bzgYPxxgIVyYuUCh0WGAsq#imgr=2sFreDbQqOIuiM%3A https://ori.hhs.gov/definition-misconduct http://www.lib.usm.edu/legacy/plag/whatisplag.php http://cai.ucdavis.edu/plagiarism.html https://en.wikipedia.org/wiki/Plagiarism http://www.lib.sfu.ca/help/writing/plagiarism http://www.rss.hku.hk/plagiarism/page2s.htm http://www.concordia.ca/students/academic-integrity/plagiarism.html ISBN 1-63102-455-8 DSPACE: A DAIS FOR DIGITAL RESOURCES Sudha Kaushik | Researcher, DLIS | OPJS University | Churu | Rajasthan | sudhakaushik2@gmail.com Dr. Somvir | Librarian | GITAM | Jhajjar | Haryana | somvirrathee9@gmail.com Abstract- DSpace is an open source institutional repository software developed jointly by MIT libraries and HP labs that is freely available and can be downloaded and installed without any restricted. The code is currently licensed under the BSD open source license. To capture and preserve the digital materials, the DSpace is an excellent dais. This paper deals with the development, features, limitations, architecture and construction of DSpace. In addition it highlight that DSpace is an open archival information system that allows users to use the system and submit their digital content, even the administrator organize and configure the system. In order to be more usable to different types of users, the software provides a configurable submission and workflow process that can be useful for any institution’s information needs. Keywords: DSpace, IR, Construction, Archicture INTRODUCTION Repositories now represent potentially rich sources of information, data, images and valuable research results. The Repositories are powerful systems that allow organizations to store and maintain their digital documents and allow for interaction and collaboration among users in the organizations. There are a number of digital library software available as “Open Source” as well as in “Proprietary format”. Open source software helps libraries mainly in lowering initial and ongoing costs, eliminating vendor lock-in and allowing for greater flexibility. The main advantage of open source software is that it is generally available in free.[1] When we talk about the ‘institutional repository’, we use ‘institution’ to refer the educational or research establishment which is the library’s parent body. Institutional repositories have emerged from universities, but are spreading into other types of educational institutions too, such as colleges and research institutes. The concept of institutionally is an increasingly fragile one when we consider digital content and digital libraries, and therefore we must ask whether we should be developing institutional repositories at all. [2] DSpace is a Digital Institutional Repository System that captures items in different formats and stores in audio, video, data and text. It redistributes it over the web an organization's research material. It indexes the digital resources, so user can search and retrieve that. Research organizations are using the DSpace worldwide for a variety of digital archiving needs from institutional repositories (IRs) to learning object repositories or electronic records management. It preserves digital content for long duration. DSpace is freely available as open source software which can customize and extend.     OBJECTIVES To study the DSpace development and find suitability for use. To study the architecture and construction of DSpace. To study the creation of DSpace IR and workflow. To study hurdles of DSpace. HISTORICAL DEVELOPMENT OF DSPACE The first public version of DSpace was released in November 2002, as a joint effort between developers from MIT and HP Labs. Following the first user group meeting in March 2004, a group of interested institutions formed the DSpace Federation, which determined the governance of future software development by adopting the Apache foundation's community development model as well establishing the DSpace Committer Group. In July 2007 as the DSpace user community grew larger, HP and MIT jointly formed the DSpace foundation, a not-for-profit organization that provided leadership and support. In May 2009 collaboration on related projects and growing synergies between the DSpace Foundation and the Fedora Commons organization led to the joining of the two organizations to pursue their common mission in a not-for-profit called DuraSpace. Currently the ISBN 1-63102-455-8 141 Dspace: A Dais for Digital Resources DSpace software and user community receives leadership and guidance from DuraSpace. The different versions of DSpace with release dates are:    DSpace 1.0.1 2003 DSpace 1.1.1 2005 DSpace 1.2.2 and DSpace 1.3.2 2007 DSpace 1.4.2 2009 DSpace 1.5.2 2010 DSpace 1.6.2 2013 DSpace 1.7.3 and 1.8.3 2015 DSpace 3.4, 4.3, 5.2 and 6.x (unreleased) WHY DSAPCE SHOULD BE CHOOSED? Largest community of users and developers worldwide: DSpace has over 1000 organizations that are currently using the DSpace software in a production or project environment. The most common use is by research libraries as an institutional repository; however there are many organizations using the software to host and manage subject based repositories, dataset repositories or media based repositories. Free open source software: The DSpace open source platform is available for free to anyone and can be downloaded from the source forge open source software repository. The code is currently licensed under the BSD open source license. This means that any organization can use, modify, and even integrate the code into their commercial application without paying any licensing fees. Today there are more than 100 contributors around the world contributing code, bug fixes, etc. DSpace software is managed by a smaller group of volunteer developers (called committers) that work together to plan releases and integrate new features and bug fixes submitted by the community. Completely customizable to fit organization’s needs: DSpace can be customized in the following key ways to suit different needs:     142 2002 Customize or theme the user interface - The users can fully customize the look and feel of their DSpace website so it will integrate seamlessly with the institution's website and can be more intuitive for the users. DSpace provides two main user interface options: JSPUI and XMLUI. Customize the metadata - Dublin Core is the default metadata format within the DSpace application. However users can add or change any field to customize it for the application. DSpace currently supports any non hierarchical, flat name space, although it is possible to ingest other hierarchical metadata schemas into DSpace such as MARC and MODS. This requires using tools such as crosswalk and having some technical capability to map the transfer of data. Configure Browse and Search - Users can decide what fields they would like to display for browsing, such as author, title, date etc. on DSpace website. Users can also select any metadata fields they would like included in the search interface. All of the text within a given item and metadata associated with the item, are indexed for full text search if desired. Local authentication mechanisms - DSpace comes with plugins for most university authentication methods, including: LDAP (and hierarchical LDAP), Shibboleth, X.509, IP-based. In addition, DSpace comes with its own internal authentication method, or can be configured to use multiple authentication methods at once. User can also build their own authentication plugin if he use a custom authentication mechanism. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education       Standards compatibility - DSpace complies with many standard protocols for access, ingest, and export. The standards DSpace supports include: OAI-PMH, OAI-ORE, SWORD, WebDAV, OpenSearch, OpenURL, RSS, and ATOM. Configurable database - Either PostgreSQL or Oracle can be choose for the database where DSpace manages its metadata. Default language -The DSpace web application is multilingual and available in over twenty languages. So, the user can customize the preferred language which DSpace uses. DSpace can be configured to support multiple languages, so that the language of user sees is the 'preferred language' set in their web browser. Used by Educational, Government, Private and Commercial Institutions: The DSpace platform is used by higher education institutions for which the platform was initially developed, while also showing a much broader appeal. The software has been used by museums, state archives, museums, state and National Libraries, journal repositories, consortiums, and commercial companies to manage their digital assets. Can be installed out of the box: DSpace comes with an easily configurable web based interface, which any system administrator can install on a single Linux, Mac OSX or Windows box to get started. Can manage and preserve all types of digital content: The DSpace application can recognize and manage a large number of file format and mime types. Some of the most common formats currently managed within the DSpace environment are PDF, Word, JPEG, MPEG, TIFF files. DSpace also provides a simple file format registry where any unrecognized format can be registered, so that it can be identified in the future. ARCHITECTURE OF DSPACE The DSpace system is organized into three layers, each of which consists of a number of components. DSpace System Architecture The storage layer is responsible for physical storage of metadata and content. The business logic layer deals with managing the content of the archive, users of the archive (e-people), authorization, and workflow. The application layer contains components that communicate with the world outside of the individual DSpace installation, for example the Web user interface and the Open Archives Initiative protocol for metadata harvesting service. Each layer only invokes the layer below it; the application layer may not used the storage layer directly, for example. Each component in the storage and business logic layers has a defined public API. The union of the APIs of those components are referred to as the Storage API (in the case of the storage layer) and the DSpace Public API (in the case of the business logic layer). These APIs are in-process Java classes, objects and methods. ISBN 1-63102-455-8 143 Dspace: A Dais for Digital Resources Each layer is described in a separate section:    Storage Layer   RDBMS Bit stream Store Business Logic Layer  Core Classes  Content Management API  Workflow System  Administration Toolkit  E-person/Group Manager  Authorization  Handle Manager/Handle Plugin  Search  Browse API  History Recorder  Checksum Checker Application Layer  Web User Interface  OAI-PMH Data Provider  Item Importer and Exporter  Transferring Items Between DSpace Instances  Registration  METS Tools  Media Filters  Sub-Community Management WORKFLROW TO CREATE THE IR The DSpace submission workflow system is a critical part of the DSpace architecture that allows submission, processing, and final addition of content to the live repository. DSpace’s underlying model includes E-People, users who have registered with the system and have certain authorizations, roles, rights, and privileges that translate abilities to complete certain tasks within the DSpace system. A typical submission begins with the system asking the user a couple of questions about digital document to be added in the repository and number of files involved in the submission. Then the system guides the user through the different steps, which are: Step 1: Create a Top level Community     Log in as Administrator on instance of DSpace at My DSpace. Click on Communities & Collections (just below Browse). Click on Create Top‐Level Community. Complete the online form describing the Top‐Level Community and click on Create. The new Top‐Level Community will be displayed (also referred to as the ‘Edit Community’ page). Step 2: Create a Sub Community (optional)   144 To create a Sub‐Community, go to the Community home page of the Community that is to be the parent of the new Sub‐Community. Then, click on the Create Sub‐community in the Admin Tools box at the top right‐hand corner of the page. This will create the new Sub‐Community and take us to the home page for that Sub‐Community, also referred to as the ‘Edit Community’ page for that Sub‐Community. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Editing a Top‐level Community or a Sub‐Community       Fill out the forms as needed. Name is required. All other fields are optional. Short Description: Appears on the Community List page below the Community name, and should be one or two sentences of plain text describing the Community. Introductory Text, Side Bar Text, Copyright Text Fields are displayed on the Community’s home page. Introductory Text and Side Bar Text are both HTML fields, which means we should place text in <p> </p>. Upload Logo: Relatively small logo sizes look best due to the design of the Collection home page. Click Create or Update when done with changes. Step 3: Create a Collection    To create a Collection, go to the Community home page of the Community that is to be the parent of the new Collection. Then, click on the Create Collection in the Admin Tools box at the top right‐hand corner of the page. Follow the wizard, and click on Next to move forward each time. [3] WORKFLOW STEP DESCRIPTION Describe User enters metadata about the document (s) they are submitting, including but not limited to author, title, keywords, and a description. Upload The user selects and uploads the files on their local machine that they like to upload as part of the submission. Each file’s type is identified by the system and the user verifies the file type. Verify An overview of all details of the submission is given including a summary of the entered metadata and the files involved in the submission. License The user is shown and must agree to the license the system administrator has assigned to submit content for this collection. Complete The user’s actions in the submission process are complete. Based on the workflow steps set for the collection, the item may immediately be added to the collection or have to be reviewed by system administrators before its addition to the collection. BARRIERS OF DSPACE 1. DSpace software is required high level of technical skills personals to function it properly. ISBN 1-63102-455-8 145 Dspace: A Dais for Digital Resources 2. Institutions do not appoint the IT professionals or experts on regular basis for the library. They just hire them on part time basis. In this situation, if any problem causes, it leads to delay in routine work of library due to unavailability of those professionals. 3. Vendors are also not authorized for DSpace software (FOSS) as compared to commercial softwares. 4. Technical terms are written in manuals which are not easily understandable by the normal users. CONSLUSION The different organizations and academic institutions have been effort to started addressing a growing and their needs by DSpace. MIT Libraries has been running DSpace as a live service at MIT for several months, and several other institutions have successfully installed and started to run DSpace. MIT Libraries remain committed to maintaining the DSpace service and software. The DSpace does not currently address all of the issues of long-term preservation and access of digital material naturally, although it serves as a useful basis for developing and setting up the solutions to those issues. Already, an open source community is forming around DSpace. This exciting development bodes well for the future development and impact of DSpace. Additionally, two further pieces of work are already under way to boost up the DSpace system. This paper has described that Dspac is one of the free, open source and leading software to build the digital institutional repository. The DSpace is most appropriate software for digital library because of content acquisition, content management and information searching & retrieving methods. It can potentially provide value to a great many institutions, and stands to benefit from a large community of developers and information science professionals. REFERENECES [1] [2] [3] [4] [5] 146 Juli Thakuria, Building An Institutional Repository With DSpace, p102-114 https://atmire.com/DSpacelabs3 /bitstream/handle/123456789/22917/DSpace%20paper.pdf?sequence=1. https://www.era.lib.ed.ac.uk/bitstream/handle/1842/858/Chapter_1.pdf;jsessionid=A3771D7C2261009F2B227CB49D7 5D84C?sequence=1, The institutional repository in the digital library. http://wiki.lib.sun.ac.za/images/3/3e/Manual.pdf. https://wiki.duraspace.org/display/DSPACE/User+FAQ#UserFAQ-WhatisDSpace?. http://ir.inflibnet.ac.in/bitstream/1944/1747/1/IR%20Using%20DSpace.pdf. ISBN 1-63102-455-8 ANALYZING OF CLUSTER, GRID & CLOUD COMPUTING Shweta Agrawal | PhD, Research Scholar | Mewar University | Rajasthan | shweta.airen@gmail.com Dr. P. C. Agrawal | PhD, Research Supervisor | Mewar University | Rajasthan Abstract: Cloud computing is rapidly growing as an alternative to conventional computing. However, it is based on models like cluster computing, distributed computing, utility computing and grid computing in general. This paper presents an end-to-end comparison between Cluster Computing, Grid Computing and Cloud Computing, along with the challenges they face. This could help in better understanding these models and to know how they differ from its related concepts, all in one go. It also discusses the ongoing projects and different applications that use these computing models as a platform for execution. An insight into some of the tools which can be used in the three computing models to design and develop applications is given. This could help in bringing out the innovative ideas in the field and can be explored to the needs in the computing world. Keywords—Cluster Computing, Grid Computing, Cloud Computing, Computing Models, Comparison. INTRODUCTION High-performance computing (HPC) was once restricted to institutions that could afford the significantly expensive and dedicated supercomputers of the time. There was a need for HPC in small scale and at a lower cost which lead to cluster computing. The emergence of cluster platforms was driven bya number of academic projects, such as Beowulf [1], Berkeley NOW [2], and HPVM [3]. The popularity of the Internet and the availability of powerful computers and high - speed network technologies has changed the way computers are used. Grid computing originated in academia in the mid 1990s with an aim to facilitate users to remotely utilize idle computing power within other computing centers when the local one is busy [1]. Initially, it only referred to a compute grid and had a rather limited audience. However, after years of development the grid gained momentum and came to mean an effective way for coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations. Cloud computing, is a kind of computing model that came into existence around the end of 2007. It provides a pool of computing resources which the users can access through Internet. The basic principle of cloud computing is to shift the computing done from the local computer into the network [4]. This makes the enterprise use the resource which includes network, server, storage, application, service and so on that is required without huge investment on its purchase, implementation, maintenance rather use it for other significant purpose. A resource is requested on-demand without any prior reservation and hence eliminates over-provisioning and improves resource utilization. To the best of our knowledge, in the literature, only a few comparisons have been appeared in the field of computing. In this paper we bring out a complete comparison of the three computing models. Rest of the paper is organized as follows. The cluster computing, grid computing and cloud computing models are briefly explained in Section II. Issues and challenges related to these computing models are listed in Section III. Section IV compares these three models from different perspectives. Section V discusses projects and applications. Tools and simulation environment are part of Section VI. Concluding remarks is presented in Section VII THREE COMPUTING MODELS In this section, we briefly explain the three computing models: cluster, grid and cloud. A. Cluster Computing For many years supercomputer was the leader in the field of computing. But due to some of the problems faced in the area of science, engineering, and business, could not be effectively dealt with using supercomputers. They were replaced with clusters [5] with the aim of overcoming these problems and also offered a very cheap way for gaining access to potentially huge computing power. Definition: A cluster is a collection of parallel or distributed computers which are interconnected among them using high-speed networks, such as gigabit Ethernet, SCI, Myrinet and Infiniband. They work together in the ISBN 1-63102-455-8 147 National Conference on Library Information Science and Information Technology for Education execution of compute intensive and data intensive tasks that would be not feasible to execute on a single computer. Clusters are used mainly for high availability, load-balancing and for compute purpose. They are used for high availability purpose as they maintain redundant nodes which are used to provide service when system components fail. The performance of the system is improved here because even if one node fails there is another standby node which will carry the task and eliminates single points of failure without any hindrance [5]. When multiple computers are linked together in a cluster, they share computational workload as a single virtual computer. From the users view point they are multiple machines, but they function as a single virtual machine. The user’s request are received and distributed among all the standalone computers to form a cluster. This results in balanced computational work among different machines, improving the performance of the cluster systems. Often clusters are used mainly for computational purposes, than handling IO-based activities. B. Grid Computing Grid computing [6] combines computers from multiple administrative domains to reach a common goal, to solve a single task, and may then disappear just as quickly. It is analogous to the power grid [7]. One of the main strategies of grid computing is to use middleware to divide and apportion pieces of a program among several computers. Grid computing involves computation in a distributed fashion, which may also involve the aggregation of large-scale cluster computing-based systems. The size of a grid may vary from small a network of computer workstations within a corporation to large collaborations across many companies and networks. Some of the definitions on grid computing are given below: Definition: Buyyaet. al. [7] defined grid as a type of parallel and distributed system that enables the sharing, selection, and aggregation of geographically distributed autonomous re-sources dynamically at runtime depending on their availability, capability, performance, cost, and users quality-of-service requirements. Definition: Ian Foster [8] defined grid as a system that coordinates resources which are not subject to centralized control, using standard, open, general-purpose protocols and interfaces to deliver nontrivial qualities of service. C. Cloud Computing Cloud computing [9] refers to both the applications delivered as services over the Internet and the hardware and system software in the data centers that provide those services. Definition: According to Buyyaet. al. [10] a cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreement. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [11]. Cloud computing provides basically three kinds of service: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS.)    SaaS is a kind of services where in many users can make use of the software hosted by the service provider and pay only for time its being used. It will be better than buying the hardware and software as keeps off the burden of updating the software to the latest version, licensing and is of course more economical. Some example service providers are Sales force, Customer Relationships Management (CRM) system and Google Apps. PaaS provides a high-level integrated environment to de-sign, build, test, deploy and update online custom applications. Some example service providers are Google’s App Engine, Microsoft Azure,Right Scale and Sales Force. IaaS refers to the services provided to the users to use processing power, storage, network and other computing resources, to run any software including operating systems and applications. Some of the IaaS providers are AWS, Eucalyptus, Open Stack, Go Grid and Flexi scale. CHALLENGES IN CLUSTER, GRID AND CLOUD COMPUTING Every computing model has similar or unique challenges, needs to convert challenges into opportunities and 148 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education has scope for further research. In this section, we highlight some of the challenges of the three computing models considered. A. Challenges in the Cluster Computing The research challenges of cluster computing are as follows: 1) Middleware: To produce software environments that pro-vides an illusion of a single system image, rather than a collection of independent computers. 2) Program: The applications that run on the clusters must be explicitly written which incorporates the division of tasks between nodes; also the communication between them should be taken care of. 3) Elasticity: The variance in real-time response time when the number of service requests changes dramatically. 4) Scalability: To meet the additional requirements of a resource thus effecting the performance of the system. B. Challenges in grid computing The research challenges faced in grids include: 1) Dynamicity: Resources in grid are owned and managed by more than one organization which may enter and leave the grid at any time causing burden on the grid. 2) Administration: To form a unified resource pool, a heavy system administration burden is raised along with other maintenance work to coordinate local administration policies with global ones. 3) Development: Problems are concerned with ways of writing software to run on grid-computing platforms, which includes decomposing and distributing to processing elements, and then assembling solutions. 4) Accounting: Finding ways to support different accounting infrastructure, economic model and application models that can cope well with tasks that communicate frequently and are interdependent. 5) Heterogeneity: Finding ways to create a wide area data intensive programming and scheduling framework in heterogeneous set of resources. 6) Programming: The low-coupling between nodes and the distributed nature of processing make the programming of applications over grids more complex. C . Challenges in the cloud computing The challenges of cloud computing includes the following: 1) Dynamic scalability: The compute nodes are scaled up and down dynamically by the application according to the response time of the user’s queries. The scheduling delays involved are real concern which leads to the need of effective and dynamic load management system. 2) Multi-tenancy: When the number of applications running on the same compute node increases, it will reduce the amount of bandwidth allocated to each application which may lead to performance degradation. 3) Querying and access: Scalable provenance querying and secure access of provenance information are open problems for both grid and cloud environment. 4) Standardization: As every organization has their own APIs and protocols used which makes the user data or vendor lock-in. Thus integration and interoperability of all the services and application is a challenge. 5) Reliability and fault-tolerance: Tools for testing the application against fault tolerance and compute failures are required which help in developing a reliable system. 6) Debugging and profiling: Parallel and remote debugging has always been a problem for developing HPC programs and is an issue in cloud computing also. 7) Security and Privacy: The user has no idea where data is stored and who will use it as there are more hackers than developers. 8) Power: Though cloud computing offers many type of services finally to meet the needs of users, enormous amount of power is consumed. An autonomic energy aware resource management is very much required. ISBN 1-63102-455-8 149 National Conference on Library Information Science and Information Technology for Education COMPARISON OF CLUSTER, GRID AND CLOUD COMPUTING Viewed in a broad sense, the concepts of cluster, grid and cloud computing seems to have similar features. This section puts light to differentiate in different perspectives and give an end-to-end comparison. It could be understood easily when represented in a tabular form as given in table I. Clusters Grids Clouds SLA Limited Yes Yes Allocation Centralized Decentralized Both Resource Handling Centralized Distributed Both Loose coupling No Both Yes Protocols/API MPI, MPI,MPICH-G, TCP/IP,SOAP, Parallel Virtual GIS,GRAM REST,AJAX Reliability No Half Full Security Yes Half No User friendliness No half Yes Virtualization Half Half Yes Interoperability Yes Yes Half Standardized Yes Yes No Business Model No No Yes Task Size Single large Single large Small & medium SOA No Yes Yes Multitenancy No Yes Yes System Performance Improves Improves Improves Self service No Yes Yes Computation service Computing Max. Computing On demand Heterogeneity No Yes Yes Scalable No Half Yes Inexpensive No No Yes Data Locality Exploited No No Yes Application HPC,HTC HPC, HTC, Batch SME interactive apps. Switching cost Low Low High Value Added Services No Half Yes Table-1: Comparison of Cluster, Grid and Cloud Computing PROJECTS AND APPLICATIONS IN CLUSTER, GRID AND CLOUD COMPUTING In this section, we present some of the projects and applications in cluster, grid and cloud computing. A. Cluster computing projects and applications Some of the projects in the field of cluster computing are: 1) Condor [12]: It is a multifaceted project engaged in five primary activities. a) Research in distributed computing. b) Participation in the scientific community. c) Engineering of complex software. d) Maintenance of production environments. e) Education of students. 2) ShaRCS (Shared Research Computing Services) [13]: This pilot project has been designed to define, demonstrate and measure how shared computing and storage clusters residing in regional data centers can provide computing services to investigators. Some of the applications in the field of cluster computing are: 1) The Weather Research and Forecast (WRF) is a collaborative project by several institutions to develop a 150 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education next-generation regional forecast model and data assimilation system for operational numerical weather prediction and atmospheric research. 2) Hadoop [14] is an open-source framework for running data-intensive applications in a processing cluster built from commodity server hardware. Some customers use Hadoop clustering to analyze customer search patterns for targeted advertising. Other applications include filtering and indexing of web listings, facial recognition algorithms to search for images in a large database. 3) Clusters were also used for solving grand challenging applications such as weather modeling, automobile crash simulations, life sciences, computational fluid dynamics, nuclear simulations, image processing, electromagnetic, data mining, aerodynamics and astrophysics. Clusters were used as a platform for data mining applications which involve both compute and data intensive operations. They are also used for commercial applications like in banking sector to have achieved high availability and for backup. Clusters are used to host many new Internet service sites like Hotmail, web applications, database, and other commercial applications. B. Grid Projects and applications Some of the projects in grid computing are briefed here 1) Globus[15][16]: It is an open source grid software that addresses most challenging problems in distributed resource sharing. The first release of Globus Demo Grid [17], a tool that will build an instructional grid environment that can be deployed using virtual machines on a cloud or on physical resources. The main goal of Demo Grid is to provide easy access to an environment with various grid tools, without having to install the tools themselves or needing an account on an existing grid. 2) EGI-InSPIRE[18] project (Integrated Sustainable Pan-European Infrastructure for Researchers in Europe): Started in 2010, co-funded by the European Commission for four years, as a collaborative effort involving more than 50 institutions in over 40 countries. Its mission is to establish a sustainable European Grid Infrastructure (EGI) to join together the new Distributed Computing Infrastructures (DCIs) such as clouds, supercomputing networks and desktop grids, for the benefit of user communities within the European Research Area. The ultimate goal of EGI-InSPIRE is to provide European scientists and their international partners with a sustain-able, reliable Infrastructure that can support their needs for large-scale data analysis. 3) Some other grid projects are the NSFs National Technology Grid, NASAs Information Power Grid , GriPhyN, NEESgrid, Particle Physics Data Grid and the European Data Grid. Some of the applications in grid computing are briefed here The grid applications range from advanced manufacturing, numerical wind tunnel, oil reservoir simulation, particle physics research, High Energy Nuclear Physics (HENP), weather modeling, bio-informatics, terrain analysis of nature observation, scientific database, and popular science web services. 1) MammoGrid [19]: It is a service-oriented architecture based medical grid application. The aim is to deliver a set of evolutionary prototypes to demonstrate the mammogram analysts, specialist radiologists working in breast cancer screening who can use the grid information infrastructure to resolve common image analysis problems. 2) DDGrid (Drug Discovery Grid) [20]: This project aims to build a collaboration platform for drug discovery using the state-of-the-art P2P and grid computing technology. This project intends to solve large-scale computation and data intensive scientific applications in the field of medicine chemistry and molecular biology with the help of grid middleware. Over 10 6 compounds database with 3-D structure and physiochemical properties are also provided to identify potential drug candidates C. Cloud Projects and Applications Some of the initiative projects in the area of cloud computing are briefly presented below: ISBN 1-63102-455-8 151 National Conference on Library Information Science and Information Technology for Education 1) CERN: The European organization for Nuclear Research is developing a mega computing cloud to distribute data to scientists around the world as part of the LHC project. 2) Unified Cloud Interface (UCI): This project is proposed by the Cloud Computing Interoperability Forum (CCIF) working on the development of standard APIs which can be used by all cloud service providers to overcome the interoperability issues. 3) Cloud-Enabled Space Weather Platform (CESWP): The purpose is to bring the power and flexibility of cloud computing to space weather physicists. The goal is to lower the barriers for the physicists to conduct their science, i.e., to make it easier to collaborate with other scientists, develop space weather models, run simulations, produce visualizations and enable provenance. 4) Open Nebula: This project is successful with the release of the most advanced and flexible enterpriseready cloud management tool, and the growth of an active open-source community. They aim to develop the most-advanced, highly-scalable and adaptable software toolkit for cloud computing management. They plan for operation network to simplify the management of Open Nebula cloud instances, fault tolerance functionality to maximize uptime in the cloud, enhanced management of images and templates, new security functionality, enhanced sup-port for federation of data centers and support for multi-tier architectures. 5) TClouds [21] : The goal of the project is to proto type an advanced cloud infrastructure that can deliver a new level of secure, private and resilient computing and storage that is cost-efficient, simple and scalable. To achieve security, resiliency and scalability needed when outsourcing critical IT-systems to a cloud; scientists will build an advanced Cloud of Clouds framework for the project. This framework provides multiple back-ups of the TClouds data and applications in case of a hardware failure or intrusion. Some of the applications that can be deployed on cloud include web hosting, media hosting, multi-tenant service, HPC, distributed storage, multi-enterprise integration, etc. 1) With the expansion of cloud computing and establishing a pubic cloud among many University libraries, it can conserve library resources and improve its user satisfaction. Although there are OPAC (Online Public Access Catalog) and ILL (Inter-library loan) services, access to the shared resources through an uniform access platform is difficult which can be made possible with the adoption of cloud computing in such libraries [22] [23]. 2) RoboEarthis a European project led by the Eindhoven University of Technology, Netherlands, to develop a WWW for robots, a giant database where robots can share information about objects, environments, and tasks. Researchers at ASORO (A-Star Social Robotics Laboratory, Singapore) have built a cloudcomputing infrastructure that allows robots to generate 3-D maps of their environments much faster than they could with their onboard computers [25]. 3) Cloudo, a free computer that lives on the Internet, right in the web browser. It allows accessing documents, photos, music, movies and all other files from any computer or mobile phone. 4) Panda Cloud antivirus [26], the first free antivirus from the cloud. Regular updates are not a problem and it occupies very little system resources, uses collective intelligence servers for fast detection, simple interface and protects PC offline. TOOLS AND SIMULATION ENVIRONMENT In this section, we highlight some of the tools and simulators that can be used to develop applications on the three computing models. A. Tools for cluster computing Nimrod [27] is a tool for parametric computing on clusters and it provides a simple declarative parametric modeling language for expressing a parametric experiment. By using this it can be easy to create a plan for a parametric computing and use the Nimrod runtime system to submit, run, and collect the results from multiple cluster nodes. 1) PARMON [28] is a tool that allows the monitoring of system resource and their activities at three different 152 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education levels: system, node and component. It is used to monitor C-DAC PARAM 10000 supercomputer, a cluster of 48 Ultra-4 workstations powered by Solaris. 2) Condor [12][29] is a specialized job and resource management system for compute intensive jobs. It provides a job management mechanism, scheduling policy, priority scheme, and resource monitoring and management. Users submit their jobs, tool chooses when and where to run them based upon a policy, monitors their progress, and ultimately informs the user upon completion. 3) MPI and OpenMP[30]: Message passing libraries pro-vide a high-level means of passing data between process executing on distributed memory systems. They help to achieve high performance out of collections of individual cluster nodes. MPI I is the de facto standard for parallel programming on clusters which consists of a rich set of library functions to do both point-to-point and collective communication among parallel tasks. 4) Other cluster simulators include Flexi-Cluster a simulator for a single compute cluster, VERITAS a cluster server simulator, etc. The tools used in the field of grid computing for resource discovery, management and performance analysis are: 1) Paradyn, a performance analysis tool supports performance experiment management through techniques for quantitatively comparing several experiments and performance diagnosis based on dynamic instrumentation. Experiments have to be set up manually, whereas performance analysis is done automatically. 2) Nimrod-G [27] uses the Globus middleware services for dynamic resource discovery and dispatching jobs over computational grids. It allows scientists and engineers to model parametric experiments and transparently stage the data and program at remote sites, run the program on each element of a data set on different machines and finally gathers results from remote sites to the user site. 3) Condor-G [12] represents the work of Globus and Condor projects which enables the utilization of large collections of resources that span across multiple domains as if they all belonged to the user’s personal domain. From Globus comes the use of protocols for secure inter domain communications and standardized access to remote batch systems. From Condor comes the concern of job submission, job allocation, error recovery, and creation of a friendly execution environment. 4) Globus, an open source software toolkit that facilitates construction of computational grids and grid based applications, across corporate, institutional and geographic boundaries. 5) Gridbus(GRID computing and Business) [31] toolkit project is associated with the design and development of cluster and grid middleware technologies for service-oriented computing. It provides endto-end services to aggregate or lease services of distributed resources de-pending on their availability, capability, performance, cost, and QoS requirements. 6) Legion [32] is an object-based meta-system that supports transparent core scheduling, data management, fault tolerance, site autonomy, and a middleware with a wide range of security options. 7) Other simulators used in grid computing include Grid-sim [40], ZENTURIO, Optorsim, Chicsim, etc. B. Tools used in Cloud Computing Various tools and products which provide assistance in development applications on cloud computing are: 1) Zenossa single, integrated product that monitors the en-tire IT infrastructure, wherever it is deployed (physical, virtual, or in cloud). It manages the networks, servers, virtual devices, storage, and cloud deployments. 2) Spring Roois a next generation rapid application development tool, combined with the power of Google Web Toolkit (GWT) that enables developers to build rich browser apps in enterprise production environments. 3) CloudSimandCloudAnalystare important for developers to evaluate the requirements of large scale cloud applications in terms of geographic distribution of both. 4) Cloudera[41], an open-source Hadoop software frame-work is increasingly used in cloud computing deployments due to its flexibility with cluster-based, data-intensive queries and other tasks. It allows ISBN 1-63102-455-8 153 National Conference on Library Information Science and Information Technology for Education exploring complex, non-relational data in its native form. CONCLUSION In this paper, we have presented a detailed comparison on the three computing models, cluster, grid and cloud computing. The issues and challenges related to these computing models are highlighted. The projects and applications in various fields are briefly discussed. Also the tools and simulation environments useful for development of applications are highlighted. Such a comparison in different perspectives will make easy to understand the computing models since the features of these computing models seems to be similar conceptually. It also helps in identifying the similarities and differences from each other. Grid and cloud computing appears to be a promising model especially focusing on standardizing APIs, security, interoperability, new business models, and dynamic pricing systems for complex services. Hence there is a scope for further research in these areas. REFERENCES [1] Beowulf, http://www.beowulf.org [2] High Performance Virtual Machine, http://www-csag.ucsd.edu/projects/hpvm.html. [3] T. Anderson, D. Culler, and D. Patterson, “A Case for Network of Workstations”, IEEE Micro, 15(1), pp. 54-64, 1995. [4] I. Foster, C. Kesselman, S. Tuecke, “The Grid: Blueprint for a New Com-puting Infrastructure”, Intl. Jr. of Supercomputer Applications, 15(3), 2001. [5] “Cluster Computing”, http://en.wikipedia.org/wiki/Cluster computing. [6] K. Krauter, R. Buyya, and M. Maheswaran, “A Taxonomy and Survey of Grid Resource Management Systems for Distributed Computing”, Jr.of Software Practice and Experience, 32,(2), pp. 135-164, 2002. [7] M.Chetty and R. Buyya, “Weaving Computational Grids: How Anal-ogous Are They with Electrical Grids?”,Computing in Science andEngineering (CiSE),4, pp. 61-71, 2002. [8] I. Foster, “What is the Grid? A Three Point Checklist”, 2002. [9] M. Armburst et al., “Above the Clouds: A Berkeley View of Cloud Computing”, Tech. report, Univ. of California, Berkeley, 2009. [10] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype, and reality for de-livering computing as the 5th utility, Future Gener”, Computer Systems, 25(6), pp. 599-616, 2009. [11] NIST, http://csrc.nist.gov/groups/SNS/cloud-computing/. [12] “Condor toolkit”, http://www.cs.wisc.edu/condor/condorg. [13] “ShaRCS”, http://srcs.ucop.edu/pilot.php. [14] “Hadoop”, http://hadoop.apache.org. [15] “Globus”, http://www.globus.org/ogsa/. [16] Ian Foster and C. Kesselman, “Globus: A Metacomputing Infrastructure Toolkit”, Intl. Jr. of Supercomputer Applications, 11(2), 1997. [17] “Globus project”, http://www.globus.org/demogrid/. [18] “EGI-InSPIRE”, http://www.egi.eu/projects/egi-inspire/. [19] “MammoGrid”, http://mammogrid.vitamib.com. [20] “DDGrid”, http://www.ddgrid.ac.cn. [21] “Cloud Security Alliance (CSA)”, http://www.cloudsecurityalliance.org/trustedcloud.html. [22] Fan Bingsi, “Cloud Computing and Libraries: Defense for Research on the Cloud Computing”, Jr. of Library and Information Service, 21, 2009. [23] FengXiaona, BaoLingyun, “Application of Cloud Computing”, 3rd Intl.Conf. on Advanced Computer Theory and Engineering (ICACTE), 2010. [24] Aiwu Shi, Youfu Xia and Haiyan Zhan, “Applying Cloud Computing in Financial Service Industry”, Intl. Conf. on Intelligent Control andInformation Processing, 2010. [25] EricoGuizzo, “Robots with their heads in the cloud”, IEEE Spectrum, 2011. [26] “Panda Cloud”, www.cloudantivirus.com/ [27] R. Buyya, D. Abramson and J. Giddy, “Nimrod/G: An Architecture for a Resource Management and Scheduling System in a Global Computa-tional Grid”, IEEE Intl. Conf. on High Performance Computing (HPCASIA) 2000. [28] “PARMON”, http://www.cloudbus.org/course/parmon.php. [29] D. Thain, T. Tannenbaum, and M. Livny, “Distributed computing in, practice: The Condor Experience”, Concurrency and Computation: Prac-tice and Experience, 17, pp. 323-356, 2005. [30] N. Karonis, B. Toonen, and I. Foster, “MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface”, Jr. of Parallel andDistributed Computing,63, pp.551-563, 2003. [31] “Gridbus toolkit”, http://www.gridbus.org. [32] “Legion toolkit”, http://www.legion.virginia.edu. [33] R. Prodan, T. Fahringer, “On Using ZENTURIO for Performance and Parameter Studies on Cluster and Grid Architectures”, Proc. of the 11thEuromicro Conf. on Parallel, Distributed and Network-Based Processing (EuroPDP’03), 2003. [34] F. Berman, A. Hey and G. Fox, “Grid Computing: Making the Global Infrastructure a Reality”, John Wiley and Sons, 2003. [35] RaduProdan and Thomas Fahringer, “ZENTURIO: An Experiment Management System for Cluster and Grid 154 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Computing”, Proc. of the IEEEIntl. Conf. on Cluster Computing (CLUSTER’02). [36] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition”, SIGCOMM Computer Comm.Review, 39(1), pp. 50-55, 2009. [37] Luis M. V., Luis R-M, R. Buyya, “Dynamically Scaling Applications in the Cloud”, ACM SIGCOMM Comp. Comm. Review, 41(1), 2011. [38] I. Foster, Y. Zhao, I. Raicu and S. Lu, “Cloud Computing and Grid Computing 360-Degree Compared”, Proc. IEEE Grid Computing Envi-ronments Workshop, pp. 1-10, 2008. [39] Yi Wei and M. Brian Blake, “Service-Oriented Computing and Cloud Computing Challenges and Opportunities”, IEEE Comp. Society, 2010. [40] R. Buyya and M. Murshed, “GridSim: A Toolkit for Modeling and Simulation of Distributed Resource”, Concurrency and Computation:Practice and Experiance, 14, pp. 1175-1220, 2002. [41] “Cloudera”, http://www.cloudera.com. [42] Won Kim. “Cloud Computing: Today and Tomorrow”, Jr. of ObjectTechnology, 8(1), 2009. [43] M. J. Chin, S. Harvey, S. Jha, and P. V. Coveney, “Scientific Grid Com-puting: The First Generation”, Computing in Science and Engineering, 7, pp. 24-32, 2005. [44] Vecchiola, M. Kirley, and R. Buyya, “Multi-Objective problem solving with Offspring on Enterprise Clouds”, Proc. 10th Intl. Conf. on HighPerformance Computing (HPC Asia’09), 2009. [45] R. Buyya (Ed.), “High Performance Cluster Computing: Architectures and Systems”, 1, 1999. [46] B. Allcock, et. al. “Data Management and Transfer in High Performance Computational Grid Environments”, Parallel Computing Jr., 28(5), pp. 749-771, 2002. [47] I. Foster and C. Kesselman, “Globus: A Metacomputing Infrastructure Toolkit”, Intl. Jr. Supercomputer Applications, 11(2), pp.115-128, 1997. [48] I. Foster, C. Kesselman and S. Tuecke, “The anatomy of the Grid: Enabling Scalable Virtual Organization”, Intl. Jr. of High PerformanceComputing Applications, 15(3), pp. 200-222, 2001. [49] Y. Zhao, I. Raicu, I. Foster, “Scientific Workflow Systems for 21st Century, New Bottle or New Wine?”,IEEE Workshop on ScientificWorkflows, 2008. [50] Q. Chen and Q. N. Deng, “Cloud Computing and its Key Techniques”, Jr. of Computer Applications, 4, pp. 25-62, 2009. ISBN 1-63102-455-8 155 INFORMATION LITERACY IN INDIA: ENHANCING SERVICES TO THE RESEARCH COMMUNITY IN THE DIGITAL ENVIRONMENT Rajeev Mishra | Research Scholar | School of Library and Information Science | Galgotias University, Greater Noida | Gautam Budh Nagar | Uttar Pradesh | rajeev.mishra2008@gmail.com Dr. Ashok Kumar Upadhyay | Assistant Librarian | Galgotias University | Greater Noida | Gautam Budh Nagar | Uttar Pradesh | ashok.upadhyay@galgotiasuniversity.edu.in Abstract: The rapid use of Information Communication Technologies has changed the way of information generation, organization, storage, retrieval and dissemination. The libraries are nowa-days more concerned with identifying the increasing information needs of its users and provide them the latest information resources to meet analyze, evaluate, synthesize, and communicate the resulting knowledge. The purpose of this paper is to outline the development of these digital resources and how the resources have been shares, reused and repurposed to enhance IL progression. The information professionals need to possess the right skills in appropriate areas, as well as having a wide range of knowledge of various sources of information and teaching skills. Keywords: Information Literacy, Digital Information Literacy, Information Literacy Programme, INTRODUCTION Information Literacy is a survival skill in the information age. Instead of drowning in the abundance of information that floods their lives, information-literate people know how to find evaluate, and use information effectively to solve a particular problem or make a decision, whether the information they select comes from a computer, a book, a government agency or any of a number of other possible resources. Information users may be bewildered by a variety of digitized information. The process of identifying and selecting information has become complex. It is critical to promote Information Literacy (IL) in the digital age. Librarianship in the present digital age is not restrained to the documents rather; the profession has now amalgamated to multifarious, subfields. Advancement of technologies and its application in library services, multifarious, multidimensional needs of the users due to inter-disciplinary research are some of the factors which are responsible for the librarian to accept and adapt to the changing situations causing thereby, change in library profession. In the developing scenario, the dimension of the profession has been extended to content developer, knowledge creator, content manager, etc. Information Literacy happens to be one of the important sub-fields of librarianship that has now been recognized as an independent and indispensable field of librarianship. Librarians justify information literacy as increasing democratic participation by all users. Has Library and Information Science professionals has developed and redesigned the user education program. Various issues involved haves been presented in this paper in order to clarify the concept of information literacy. It’s not important only the competency of information but the skill of tools for handling information is also more significant. However, the competency of information technology cannot help user access to information successfully without the knowledge of information. In this situation the users must understand both the information itself and technology as tools for accessing information. DEFINITIONS To be information literate, a person must be able to recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information. (American Library Association) Information literacy is knowing when and why you need information, where to find it, and how to evaluate, use and communicate it in an ethical manner. (CILIP) 156 ISBN 1-63102-455-8 Information Literacy In India: Enhancing Services To The Research Community In The Digital Environment LITERATURE REVIEW Foster, M. (2015) Stated that in the study appeared to show that Information Literacy for users are always an experience of contextual knowledge creation, of the development of the knowledge and knowledge based decision-making abilities that users need in the specific contexts of their practices. Buehler, Marianne A. (2013) suggest that Information Literacy can be understood on multiple levels, that is as a knowledge/competency domain and as an educational process expressive of the library’s educational ambition. The strategies and structures used to build information literacy into curricula and student learning experiences are as important a focus as the content itself. Helen Foster (2003) study focuses on the embedded tasks of information retrieval and how instructors can use reflection, pre-selected sources, and internet-connected classrooms to support teaching these tasks. DIMENSIONS OF INFORMATION LITERACY Information Literacy is a comprehensive and never ending life long process. It has a wide range of fields which can be summarized as follows: Media Literacy: It is the ability to decode, analyze, evaluate, and produce communication in a variety of forms. Network Literacy: It is the ability to manage, connect and organize to assess, evaluate and get information in a right manner. Web Literacy: Web literacy is a subset of information literacy requires the ability to access, search, utilize, communicate and create information on the World Wide Web. Digital Literacy: It is the ability to assess, collect, organize, evaluate of digital resources and services in an effective manner. Visual Literacy: Visual literacy as a set of competencies that enable a visually literate to thinking, learning, and expressing oneself in terms of image. Photographs, cartoons, line drawing, diagrams, concept maps, and other visual representations are all important in visual literacy. Scientific Literacy: Scientific literacy is the knowledge and understanding of scientific concepts and processes which are required for personal decision making, participation in civic and cultural affairs, and economic productivity. Critical Literacy: It is the ability to evaluate critically the human, intellectual and social strengths, benefits and costs of information technology. INFORMATION LITERACY PROGRAMMES INITIATIVES IN INDIA Some noteworthy Library networks and higher learning institutions are conducting information literacy programmes in India are: A. Information literacy programmes by the Library Networks and Documentation Centres DELNET was started at the India International Centre Library in January 1988 and was registered as a society in 1992. It was initially supported by the National Information System for Science and Technology (NISSAT), Department of Scientific and Industrial Research, Government of India. It was subsequently supported by the National Informatics Centre, Department of Information Technology, Ministry of Communications and Information Technology, Government of India and the Ministry of Culture, Government of India. DELNET is organising several orientation programme across the country to develop professional skills in the field of Library Science. The National Convention on Knowledge, Library and Information Networking (NACLIN) is also organised by the DELNET every year collaboration with different institutions. Information and Library Network (INFLIBNET) has taken number of steps so as to update the knowledge of LIS professionals and for keeping them abreast with new information technology. The Centre provides proactive ISBN 1-63102-455-8 157 Information Literacy In India: Enhancing Services To The Research Community In The Digital Environment help in automating libraries in the country through INFLIBNET Regional Training Programme on Library Automation (IRTPLA). The major activities of the Centre include development of software for automating libraries, development of web-based union database of the library resources, promoting library automation, creation of ICT infrastructure in the universities through UGC-Infonet programme, facilitate access to e-resources to universities and colleges, promotion of usage of e-resources by developing online search aids and tutorials. As such, the Centre has a lot to offer to personnels working in libraries and educational institutions. National Informatics Centre (NIC) is a premier science and technology institution of the Government of India, established in 1976. NIC has taken serious view to setup a Libraries Network to bring all the libraries under an umbrella. NIC is keen to extend ICT support to these libraries, especially the ministries, departments and Public Libraries in India. NIC is organising short-term training, conferences and seminars for library professionals time to time on various topics. National Social Science Documentation Centre (NASSDOC), a constituent unit of the Indian Council of Social Science Research (ICSSR) was established in the year 1970, to provide library and information support services to social science researchers. NASSDOC is organising short term training workshops for over 30 years for information professionals, researchers and others working in academia in social science sector. The training workshops as easy way to refine the information locating skills of the users. National Information on Science Communication and Research (NISCAIR) formerly known as India National Science Documentation Centre (INSDOC) is organises and oversees the activities related to the Associateship in Information Science (AIS) programme which is a two year advances Master’s degree level academic course in information science & documentation. In addition, the Education and Training Division (ETD) conduct various short-term courses and attachment training programmes in various areas of information technology and computer applications of library and information science. Documentation Research and Training Centre (DRTC) was established in January 1962. DRTC grown into a centre of higher learning, today the centre is organising workshops, Conferences, training programmes for research and development of libraries. DRTC has taken number of steps so as to update the knowledge of LIS professionals and for keeping them with new information technology. B. Information literacy programmes by the some Higher Learning Institutions University Libraries in India are also offering several information literacy programmes. Sayaji Rao Gaekwad Central Library of Banaras Hindu University has started the information literacy program, as scheduled every year on the occasion of new session, to aware the students, research scholars and teachers about the e-resources made available through the Central Library since 1st September, 2014. In the first phase of this programme, more than 500 students and research scholars of Institute of Agricultural sciences has trained with the help of computer and multimedia instructions. The Central Library provides more than 1 lakh e-books, approximately 13 thousand e-journals and about 10 databases on various subjects by notable publishers like sage, Springer, Nature, web of Knowledge etc for advocacy and research. Information Literacy Program is scheduled every year by Central Library in different subjects to enhance the usefulness of available knowledge. Delhi University Library System (DULS) has huge print collections, DULS also subscribes to a valuable number of databases. Besides, DULS is regularly researching on open access initiatives to reap the full benefit of Public Domain Electronic Resources. In, addition to with a view to educate the users and enhance their capabilities about electronic and make them competent for retrieving precise and relevant through Internet, DULS has offered regular Information Literacy Programme since 2006. In continuation DULS has recently organised a two-days Training The Trainers: Workshop on Information Literacy and Competency for University and College Library Professionals. The aim is to train the library and information professionals for onward transmission of the skills to end user. Jawaharlal Nehru University, Central Library, is a knowledge hub for JNU research community. Library provides comprehensive access to books, journals, theses and dissertations, reports, newspaper clippings to the 158 ISBN 1-63102-455-8 Information Literacy In India: Enhancing Services To The Research Community In The Digital Environment users. As the part of Information Literacy Programme, the Central Library has organised number of lectures for faculty, researchers and students in collaboration with various academic institutions, publishers and database producers in JNU. Jamia Milia Islamia Universty Library has been organizing a Information literacy programme for the fresher and trained them for digital resource i.e. e-journals and other in-house digitized e-resources. The Library is also provides support to visually impaired students through assistive technology. Jamia Hamdard University Library is offered Library orientation programme for the students and research scholars and introduce them to the online journals and database subscribed by the library through the UGC Infonet Digital Library Consortia. Guru Govind Singh Indraprastha University Library has separate University Information Resource Centre (UIRC). The centre has number of e-journals, e-books, databases for the users for their teaching, study and research activities. UIRC is also organised orientation programme for the new users in the Library. Indian Institute of Technology, Delhi central library is organising every year orientation and information literacy programme for U.G., P.G. students and research scholars for the library e-resources and services. Delhi technological University Library has rich collections of more than 123000 books and a large numbers of foreign and Indian journals to facilitate the ongoing research activities and to expand the areas of future research activities. The Library has prepared a manual for exposing the library activities to the new users. This manual is provided at the time of enrolment as member of the library. This is also available on the digital library for reference. Library organises information Literacy programmes under the title “explore the library” for the users. SUGGESTIONS TO ACHIEVE INFORMATION LITERACY: 1. 2. 3. 4. 5. 6. 7. Digital libraries need to be open access with flexible boundaries and effective services. Access to information as a basic right. There is a need of proper guidance, training and assistance on use of Internet, followed by Computer training, use of print and electronic resources and databases. Workshop on fair use and plagiarism needs to be organised regular basis. A uniform policy of ILP should have for all institutions. All Institutions should have well stocked, active libraries equipped with ICT. All higher education institutions and documentation centres unify and undertake a ILP and make it compulsory for all users whether undergraduates, postgraduates, and research scholars. CONCLUSION Library and Information centres have a important role to collect organize and manage information for the users. It is not only helps to empower the user but also act as lifelong learning for capacity building. Library & Information science professionals has crucial role to organise scattered and unorganised information to provide the refined and tailored made information to the research scholars. The distance between user and librarian should be bridged so that user can feel free to clear his doubts to enrich his knowledge. Information literacy is very essential to promote maximum utilization of information resources. Therefore, ongoing information literacy both the Libraries and Documentation Centres have become indispensable so as to coup with the emerging changing situations. REFERENCES [1] [2] [3] [4] [5] [6] [7] Barefoot, Betsy. Bridging the Chasm: First-Year Students and the Library. Chronicle of Higher Education 52 (2006). Brodsky, Karen. Information Competence in the Freshman Seminar. Academic Exchange (2002): 46-51. Buehler, Marianne A. At the Nexus of scholarly communication and Information Literacy, 2013 pages 215.235. Fitzgerald, Mary Ann. Making the Leap from High School to College. Knowledge Quest. 32 (2004): 19-24. Foster, M. Journal of Information Literacy, Vol. 9 (1), June, 2015. Pages 62-73. Anderson, K., and May, F.A., 2010. Does the method of instruction matter? an experimental examination of information literacy instruction in the online, blended, and face-to-face Classrooms. The Journal of Academic Librarianship, 36 (6), pp.495-500. http://delnet.nic.in/index.htm (Accessed on 21.07.2015) ISBN 1-63102-455-8 159 Information Literacy In India: Enhancing Services To The Research Community In The Digital Environment [8] [9] [10] [11] [12] [13] 160 http://www.cilip.org.uk/ (Accessed on 17.07.2015) http://www.du.ac.in/du/ (Accessed on 14.07.2015) http://jmi.ac.in/ (Accessed on 14.07.2015) http://www.jnu.ac.in/library/ (Accessed on 14.07.2015) http://www.dce.edu/ (Accessed on 13.07.2015) http://www.ipu.ac.in/urc/digital.htm (Accessed on 13.07.2015) ISBN 1-63102-455-8 INFORMATION LITERACY KNOWLEDGE MANAGEMENT Bhupender Kumar | Assistant Librarian | Ashoka University | Haryana | bhupen_20@rediffmail.com Anil Kumar Singh | Assistant Librarian | Central Library | Amity University | NOIDA | aksingh5@amity.edu Abstract: With liberalization, privatization and globalization the entire human activities has been changed drastically. With the development of science, infrastructure, techniques, new issues and problems also emerged. It was the time when the concept of ‘Knowledge Management’ was also developed. In such a changing scenario Knowledge Management works as a tool, which helps in managing the vast flow of information and knowledge not only in libraries but in all type of organizations. It increases the efficiency and effectiveness of the organization and improves the quality of services, which result in satisfaction of both, service providers and service receivers. The paper deals with the Knowledge Management, which is very important for libraries and all other type of organizations. KEY WORDS: Knowledge, Knowledge Management (KM), Information Management (IM), Libraries, Knowledge Creation (KC), Knowledge Capturing and Acquisition (KCA), Knowledge Analysis (KA). INTRODUCTION Knowledge Management (KM) is a very broad area. It is the collection of process that governs the creation, dissemination and utilization of knowledge information. But, what is the importance and benefits of KM? What role does it play in today’s information age? Infect, these process exit whether we acknowledge them or not. It has a profound effect on the decisions we make and the actions we take. Both of these, decisions and actions are enabled by some type of knowledge. If this is the case, and we agree that many of our decision and action have profound and long lasting effects, it makes sense to recognize and understand the processes that effect our decisions or actions. It also calls for possible steps to improve the quality of these processes, with which we can also improve the quality of actions and decisions which we take. KM is not just a technology type of thing or a computerized sort of mechanism. But, it is a vast and continuing process, with which we move forward. If we accept the premise that KM is concerned with entire processes of discovery, creation of knowledge, dissemination of knowledge and the utilization of knowledge, then we would strongly accept that KM is much more than a technology thing and it’s elements exits in all spares of organizational activities. It's important to note that some definitions might say nothing about technology, while KM is often facilitated by IT. Therefore, technology by itself is not KM. It is the process through which organizations generate value from their intellectual and knowledge-based assets. Most often, generating value from such assets involves codifying what employees, partners and customers know, and sharing that information among employees, departments and even with other companies in an effort to devise best practices. The entire Knowledge process is equally applicable for libraries, as libraries are also organizations and they need to cop up with the current trends and changes. CONCEPT OF INFORMATION LITERACY KNOWLEDGE MANAGEMENT Before discussing Knowledge Management (KM), it’s important to know if there is any difference between knowledge and information. According to Marc Portal, “Information is data that has been organized and communicated.” As far as knowledge is concerned Daniel Bell defines knowledge as “a set of organized statements of facts or ideas, presenting a reasoned judgment or an experimental result, which is transmitted to others through some communication medium in some systematic form. Whereas, Stephen Abram sees the process for knowledge creation and use as a continuum where data transforms into information, information transforms into knowledge and knowledge drives and underpins behavior and decision-making. The management of information has long been regarded as the domain of librarians and libraries. Librarians and information professionals are trained to be experts in information searching, selecting, acquiring, organizing, preserving, repackaging, disseminating and serving. People often use information and knowledge ISBN 1-63102-455-8 161 National Conference on Library Information Science and Information Technology for Education interchangeably because we are unable to clearly distinguish between the two as they are very much related. KM involves not only all activities of IM, but some more specialized activities centered around creation and recording of new knowledge and sharing it. IM basically deals with information present in the documents while KM deals not only with the information content of documents but also with the knowledge present in the employee’s brain. In IM coded information becomes knowledge for the future use but in KM, coded knowledge becomes information for future knowledge base. Therefore, KM is much broader than IM. In the KM literature, knowledge is most commonly categorized as either explicit or tacit. This characterization is however rather too simple, but a more important point, and a criticism, is that it is misleading. A much more nuanced and useful characterization is to describe knowledge as explicit, implicit, and tacit.   Explicit Knowledge: information or knowledge that is set out in tangible form. (Knowledge that is documented and public: structured, fixed-content, externalized, and conscious). Tacit Knowledge: information or knowledge that one would have extreme difficulty operationally setting out in tangible form. (Personal, undocumented knowledge: context-sensitive, dynamicallycreated and derived, internalized, and experience-based) Today, we deal with huge amount of data and information. Data and information is not knowledge until we know how to dig the value out of it. This is the reason we need KM. Unfortunately, there's no universal or all acceptable definition of KM. ORIGIN AND DEFINITION OF INFORMATION LITERACY K.M Knowledge Management (KM) is a concept and a term that arose approximately two decades ago, roughly in 1990. But, there are various early thinkers and philosophers who have written tremendous amount of literature on knowledge. Here it’s necessary talk about Peter Drucker who has already pointed out in 1965, that ‘knowledge’ would replace land, labor, capital, machines, etc. to become the chief source of production. His vision was not given much attention at that time. It 1991, Ikujiro Nonaka raised the concept of ‘tacit’ and ‘explicit’ knowledge, as well as the theory of ‘spiral of knowledge’ in the Harvard Business Review. It was the time when ‘knowledge-based competition’ finally came out. Very early on in the KM movement, Thomas H. Davenport offered the still widely quoted definition. According to Davenport, “KM is the process of capturing, distributing, and effectively using knowledge.” This definition is very simple and to the point. The operational origin of KM, as the term is understood today, arose within the consulting community and from there the principles of KM were rather rapidly spread by the consulting organizations to other disciplines. The consulting firms quickly realized the potential of the Intranet flavor of the Internet for linking together their own geographically dispersed and knowledge-based organizations. Once having gained expertise in how to take advantage of intranets to connect across their organizations and to share and manage information and knowledge, they then understood that the expertise they had gained was a ‘product’ that could be sold to other organizations. It was like a new product which was given name ‘Knowledge Management’. Therefore, the term KM came out when people realized that information is a resource and product, which can and needs to be managed. A few years later, the Gartner Group created another second definition which sought to take a process view to define KM. According to this view, “KM is a discipline that promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise's information assets. These assets may include databases, documents, policies, procedures, and previously un-captured expertise and experience in individual workers.” According to Jennifer Rowley, “KM is concerned with the exploitation and development of the knowledge assets of an organization with a view to furthering the organization’s objectives. The knowledge to be managed includes both explicit (documented knowledge) and tacit (subjective knowledge). Management entails all of those processes associated with the identification, sharing and creation of knowledge. This requires systems for the creation and maintenance of knowledge repositories, and to cultivate and facilitate the sharing of 162 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education knowledge and organizational learning. Organizations that succeed in KM are likely to view knowledge as an asset and to develop organizational norms and values, which support the creation and sharing of knowledge.” In today’s movement towards KM, organizations are trying to best leverage their knowledge internally in the organization and externally to their customers and stakeholders. They are trying to capitalize on their organizational intelligence to maintain their competitive edge. In simple, the KM refers to a multidisciplined approach to achieving organizational objectives by making the best use of knowledge. KM focuses on processes such as acquiring, creating and sharing knowledge and the cultural and technical foundations that support them. TECHNIQUES OF INFORMATION LITERACY K.M IN LIBRARIES With KM the ideas of information analysis and information planning came out. Libraries and other organizations have started considering ‘knowledge’ as resource. It means we also need ways and methods for managing the knowledge in an organization. We can use techniques and methods that were developed as part of knowledge technology to analyze the knowledge sources. Using these techniques we can perform knowledge.        Knowledge Analysis (KA): It is a very useful step. In this the usefulness, weakness and appropriateness of knowledge within the organization is analyzed. It is a necessary step which increases the ability of a library. It increases the efficiency of a library and alerts a library about less important or unnecessary resources. In short, it is also a process of managing knowledge. Knowledge Planning (KP): Planning is another very important component in all activities of libraries. It is done when a library or an organization has performed KA. With this an organization or library could develop a multi-year knowledge plan that defines how to view and develop its knowledge resource. Only with effective knowledge planning a library can achieve its aims and objectives, and utilize its human and material resources in a much better way. Knowledge Sharing (KS): It is based on internal and external experiences in an organization for problem solving and decision making. For academic libraries it is essential that they have to behave and work as knowledge based organization. KS capability of the librarians is concerned to identify, integrate and acquire external knowledge, which is most important. It increases the internal knowledge and provides better and quick services to the users. In result it leads towards satisfaction of both libraries and its users. Knowledge Technology (KT): This is also another step in libraries where librarians and library professionals play important roles. It is the application of techniques and methods, which makes the field of analysis more specific. It is the form of expert system and decision support system. Computer Support Work System (CSWS): This is a formal and informal activity system, within an organization where the (human) agents are supported by computer system. As the economy becomes more global and the use of PCs more pervasive, there has been a dramatic increase in e-learning, also known as computer based learning and training. E-learning can be an effective medium for KM. Knowledge Creation (KC): In libraries, various type of knowledge process must be put together, which includes knowledge of library - operations, users and their needs, collections, facilities and technologies available. With the help of this new knowledge is created which leads to the development and improvement of the library services. KC is basically an interactive process that involves a number of information and individuals. Knowledge Capturing and Acquisition (KCA): It is very important to capture knowledge. The libraries capture knowledge from internal and external sources. It is a process where libraries should be very careful while identifying knowledge based on correct information and its importance. Only after such identification the knowledge can be captured, otherwise there would be extra flow of un-useful or less important knowledge. IMPORTANCE OF INFORMATION LITERACY KNOWLEDGE MANAGEMENT No doubt the KM is of prime importance today. The impact of globalization on information, service providers and service receivers is very vast. The overload of data is making KM increasingly more important. Following are some of the reasons with which KM becomes more important in libraries and all other organizations: ISBN 1-63102-455-8 163 National Conference on Library Information Science and Information Technology for Education         It facilitates and improves decision-making capabilities in libraries and organizations. It builds learning organizations by making learning a routine. It increases the efficiency of the libraries and organizations. It helps in providing satisfaction to the users or clients. It helps to fulfill aims and objectives of libraries and organizations. It stimulates change (regarding product and services). It stimulates innovations and new ideas (regarding product and services) much faster Finally it helps in transforming a library or organization into a more successful one. BENEFITS OF INFORMATION LITERACY KNOWLEDGE MANAGEMENT What are the real benefits that can be gained from the effective KM for the individual, organization, community, nation or even entire earth? KM is far reaching, may be its about developing one’s personal KM competencies to become a more effective player in the global knowledge economy or becoming a more competitive knowledge leader and knowledge driven organization. One may even wish to develop and apply KM strategies to world peace, people’s welfare, good governance, global poverty eradication, international disaster management, global climate change and many more. KM is applied today across the world, in all public, private, industrial sectors, and non-governmental sectors. KM is now recognized to be the key driven of new knowledge and new ideas. Effective KM will greatly contribute to improve excellence by:       Improve product and services. Increasingly product and services are becoming smarter and more knowledge based. Reduce costs of products and services. Increase value and/or profitability. Provide potential to expand and grow. Far reachable. Respond faster. CONLUSION The objectives of academic, public and research libraries are different from the objectives of corporate libraries and knowledge centers. Both have a different orientation and value based structure. The objective of public, academic, and research libraries is to expand the access of knowledge for all users whereas, the other, is based on little sharing of knowledge, and for internal use only. Therefore, the role and responsibilities of academic, public and research libraries are much higher than the other one. In these libraries KM is needed to improve library services, record information, create knowledge and enables users to share and learn by providing user friendly approach in all the activities. It is a tool with which libraries can cop up with current changes. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] 164 Abram, Stephen. (1997). “Post Information Age Positioning for Special Librarians: Is Knowledge Management the Answer?” Information Outlook. June 1997. Bell, Daniel. (1973). The Coming of Post-industrial Society: A Venture in Social Forecasting. New York: Basic Books. C. Lal and K. Kumar. (2007) “Descriptive Questions in Library and Information Science. New Delhi: Ess Ess Publications. Liebowitz, Jay. (2000). Building Organizational Intelligence: A Knowledge Management Primer. Boca Raton, FL: CRC Press. Jack M. Maness MLS, University of Colorado at Boulder Libraries, Libraries 2.0 Theory: Web 2.0 and its applications for Libraries Prashant Kumar and Anvita Srivastava : Implementation of Web 2.0 Technology in Library Environment paper published in a book title Digital Library Management and Challenges by Dr. Satyapraksh Singh Asian Book Pvt Ltd. New Delhi Davenport, Thomas H. (1994), Saving IT's Soul: Human Centered Information Management. Harvard Business Review, March-April, 72 (2). Drucker, Peter. (1993). Post-capitalism Society. Oxford, Great Britain: Butterworth-Heinemann. Duffy, Jan Duffy. (2000). “Knowledge Management: To Be or Not to Be?” Information Management Journal. Duhon, Bryant (1998), It's All in our Heads. Inform, September, 12 (8).; also see 11 Bair, Jim. (1999). “Knowledge Management is About Cooperation and Context,” Gartner Advisory Services Research Note (May 14). ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education [11] [12] [13] [14] [15] [16] [17] Nonaka, Ikujiro. (1991). “The Knowledge-Creating Company,” Harvard Business Review (Nov.-Dec. 1991).; Also, Nonaka, Ikujiro and Takeuchi, Hirotaka. (1995). The Knowledge-creating Company: How Japanese Companies Create the Dynamics of Innovation. New York: Oxford University Press. Porat, Marc. (1977). The Information Economy: Definition and Measurement. Washington, D.C.: U.S. Department of Commerce, Office of Telecommunications. Rowley, Jennifer. (1999). “What is Knowledge Management?” Library Management. 20 (8). http://www.unc.edu/~sunnyliu/inls258/Introduction_to_Knowledge_Management.html http://www.2.unescobkk.org/education/ict/v2_2/info.asp http://en.wikipedia.org/wiki/web_2.0 http://crl.du.ac.in/ical09/papers/index_file/ical-98_130_287_1rv.pdf ISBN 1-63102-455-8 165 ACCESSING KNOWLEDGE THROUGH THE ATTRIBUTES AND POPULARITY OF SEARCH ENGINES Mrs. Uma Pandey | Assistant Librarian | Central Library | Integral University | Lucknow | umaraj.lib@gmail.com Dr. (Ms.) Shiva Kanaujia Sukula | Dy. Librarian | Central Library | Jawaharlal Nehru University | New Delhi | shivajrf@rediffmail.com Abstract: This paper present a review of recent litereature related to Web search and search engine and nature of search. The major factors that influence user evaluation, quality of search results are discussed. The usefulness of search engines for accessing knowledge is outlined by contrasting search engines against meta-search engines with evaluation and comparative study of the effect of web searching on online public access catalogue (OPAC) users. A technique for assessing search results retrieved from different sources is described. It is also demonstrated how personalization helps in finding the right information in the shortest time with the least effort. Intensive training for students and faculty members in order for them to acquire the essential search strategies for effective information retrieval was made is recommended so that Indian academics can use these searching strategies for retrieving information. The impact of search engines can be enhanced by for designing a user friendly OPAC that entails simplistic search strategies for university libraries of India and other developing countries were made. Recommendation is made as to which aspects to be considered when evaluating web search engines’ accessibility for people with disabilities. Need for intensive training for students and faculty members in order for them to acquire the essential search strategies for effective information retrieval by search engines by the Indian academics can be made. Keywords: Search Engines, Accessing, Knowledge, Usefulness, Impact. INTRODUCTION The facts related to Web search and search engine have also showed new perspectives on Web searching research from different perspectives and these need to be integrated into a more cohesive perspective. There have been various aspects of search engines, but emphasis on emerging areas of Web searching and search engine evaluation going beyond traditional methods and is part of this study (Lewandowski, 2012). Rall ( 2012) reviewed the concept of truth claim. Stating the framework for four research traditions namely science, social science, law, and judgments of excellence. "Truth claim” as connected to traditional research methods was initially presented by Rall himself before in 2002 and 2004. The operational mechanisms of networks and sufficient definitions for how truth claims are built in four established research traditions. There has been idea of most Internet scholars neglecting the philosophy of research methodologies. This was the reason for Rall to review the “truth claim’ concept. The literature shows the focus on r research work on information seekers as well as on the politics of search engines and the computational problems in search engine results. There has been following aspects to consider the nature of search: i. Aesthetic theory of indexing, ii. Study perceives search from the psychology of learning, and iii. Examination of the relationship between performance and recent economic models of how data accumulates in today's world. The previous studies help library and information science (LIS) scholars to reframe Web search that permit linkages to the established research traditions. The insights into the development and use of alternative search engine interfaces their search outcomes in terms of retrieving high-quality, credible information supports the progress (Kammerer and Gerjets, (2012). The effects of alternative Search Engine Result Pages or popularly called SERP- layouts on searchers' information quality or credibility assessments of search results has been of great help to researchers, search engine developers, educators, and students. The alternative search engine 166 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education interfaces might affect Web users' search and evaluation strategies in Web searching. Markus and Christain (2012) defined social search, different from other interpretations of the social search concept, by unifying some existing definitions with view to ambiguity and vagueness of the term social search. Classification of the heterogeneous landscape of social search implementations on the WWW leads towards extensive literature review to unify and enhance existing ideas and concepts was performed. The existing social search engines by their specific features and social aspects present the illustration of social search the discussion of social search as well as a comparison of existing social search engines. The in-depth information provides many ways people can search the web together. There has always been a need to make an assessment of future developments in this area. The evaluation of search engines by developing a conceptual model has presented a path to follow (Palanisamy, 2013). This effort pursues and presents following facets: i. The attributes that determine a good search engine and why users repeatedly visit their favorite search engines. ii. The reasons why users change search engines. iii. Identification of key factors that influence user evaluation of search engines, effective and efficient criteria for evaluation by considering user satisfaction and usage as the search engine success variables. The research issues, evolved out of the conceptual model play a great role to identify the implications that are useful for searchers and search engine providers are given. The factors which matter for search engine popularity are given as following: i. ii. Key design issues to access through search engine. Attributes including aesthetics These aspects determine and shape the popularity of a good search engine. The users repeatedly visit their favorite search engines due to certain features. The reasons as users change search engines also exist. These key factors that influence user evaluation of search engines must meet effective and efficient criteria by: i. Considering user satisfaction and usage as the search engine success variables. ii. Indexing as well as perceiving search from the psychology of learning. iii. Examination of the relationship between performance and recent economic models of how data accumulates in today's world. Suggestions by researchers are that LIS scholars must cater to reframe Web search that permit linkages to the established research traditions. The developers also have to play their role by design alternative search engine interfaces as these alternative search engine interfaces might affect Web users' search and evaluation strategies in Web searching. Definition of social search and the comparison of social search engines summarize the many ways people can search the web together. USEFULNESS OF SEARCH ENGINES FOR ACCESSING KNOWLEDGE The usefulness of search engines for accessing knowledge can be enhanced by including the modern features of present search engines to improve practices of OPACs. Shiv (2011) identified the comparison of the effect of web searching on online public access catalogue (OPAC) users in the libraries of the three universities in the Union Territory of Chandigarh and Punjab state in India was carried out. Unawareness of users regarding the difference between internal–search methodology of OPAC and common search engines such as Google was observed. This effort makes following recommendations: i. ii. University libraries should share user expectations with OPAC designers and Library community. Collaboration with OPAC designers must be put in place so as to develop a user-friendly OPAC system. The expectations of library users while searching OPAC are high. As well as, ready access to information through search engines became considerably straightforward. Also, like popular search engines, that majority of searches were performed on OPAC therefore Web searching influenced their OPAC searching process greatly. The Comparison of search engines against meta-search engines was made. This effort which used the physics field as information retrieval domain demonstrated that measured the overlapping degree of retrieved ISBN 1-63102-455-8 167 Accessing Knowledge Through The Attributes And Popularity Of Search Engines information from search engines against meta-search engines. Six search engines and six public meta-search engines from the "searchenginewatch.com" website were used for the experiment (Esmaeil and Kiaie, 2011). The following measurements were used: i. ii. Averages, percentages and other statistical measures such as, frequency distribution MS Excel for drawing tables and graphs. The major findings are as follows: i. ii. "Yahoo" retrieved 40% whereas "CurryGuide" retrieved maximum 77.1%, of physics documents in search engine category. The maximum overlapping degree with various other search engines i.e. 39% was found with "AOL" search engine had search engines. The geographic information community often discusses about the use of digital libraries of search engines for the discovery of geographic information resources (Fransico...[et.al.] 2011). This research measured and compared the performance of major search engines in the discovery of geographic web services. The performances of Bing previously known as Microsoft Live Search, Google and Yahoo! in searching standardized XML documents that describe, identify and locate geographic web services were compared. Automated evaluation of three search engines using their API (application programming interfaces)-library functions. The queries submitted for XML documents contained geographic web services, and documents containing links to those documents. Relevant XML documents linked from the documents found in the search results were also included in the evaluation results. The results suggested the following specifics: i. Search engines are a feasible alternative for searching geographic web services. ii. Resource- oriented search should combine simple queries with the exploration of the pages linked from the search results of the search engines. In addition, the findings show that: i. The discovery of geographic web services in search engines does not require the use of advanced search operators. Research also disclosed that some technical advances in search engines could harm resourceorientation. ii. No significant difference was observed in the precision for Google and three NL search engines whilst retrieving the exact answer documents for NL queries. iii. The performance of natural language (NL) search engines in retrieving exact answers to the natural language (NL) queries differs from that of keyword searching search engines. In terms of the precision of exact answer and relevant documents showed that Ask.com retrieved exact answer document descriptions at the top of the results list in 60 percent of searches better than the other search engines. The mean value of the number of exact answer top list documents for three NL search engines (20.67) was a little less than Google's (21) (Hariri, 2013). The research was carried out to determine the implications of gender in awareness and use of search engines by private south Nigerian university lecturers. Anyira (2013) investigated the gender in awareness and use of search engines. This investigation was related to the university library usage by Lecturers in private universities. The T-test results indicated following observations: (i) The awareness-level of search-engines between male and female lecturers’ 3.69 is significantly different with t (df.73) =at 0.001. (ii) Utilization-extent of Google search engine 4.80 is also significantly different with t (df.73) at .0000. (iii) Utilization-extent of Yahoo search engine is 1.16 and this did not indicate a significant difference between male and female lecturers with t (df: 73) at 0.0500. The recommendations made on the basis of the above observations that university libraries should put up an ICT policy document that promotes gender impartiality in the delivery of library and information services to users. The studies focus on the finding the factors: 168 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education i. ii. Contrasting differences between search engines against meta-search engines were observed which effect overlapping degree of retrieved information from search engines against meta-search engines. Answers to the natural language (NL) queries differ from that resource of keyword searching search engines. The research effort helped in outlining the steps needed for increasing the usefulness of search engines for accessing knowledge: i. ii. An ICT policy document is a must for university libraries. Gender impartiality must be a key clause in the ICT policy document that promotes in the delivery of library and information services to users. iii. University libraries should share user expectations with OPAC designers and Library community. iv. Use of digital libraries of search engines for the discovery of geographic information resources. Another only drawback visible was that certain technical advances in search engines could influence MOST POPULAR SEARCH ENGINES FOR SCHOLARLY COMMUNICATION Two new automatic methods for the performance evaluation of Ask.com, Bing and Google search engines were used. , This performance evaluation can help users to select a truly effective search engine. The results of the evaluation are of great assistance to vendors of web search engines for improving their technology. Experimentally the search engines performance is assessed based on the 2002 TREC web track’s 50 topics. To compute the similarity degree between the lists two measures called the “tendency degree” and “coverage degree” is introduced. The “tendency degree” assessed a search engine in terms of results presentation and the “coverage degree” evaluated it in terms of retrieval effectiveness (Sadeghi, 2011). Investigation’s findings show that Google outperformed the others, followed by Bing and Ask.com. In addition, significant degrees of consistency about 92.87 percent for automatic approach and 91.93 percent for human-based approaches were found For verification of searching and for developing an evaluation criteria system for search engines using the Delphi method, Chinese search engines were taken up (Zhu, Du, Meng and Sun (2011). The evaluation criteria system also helped in establishing the analytic hierarchy process. Systematically comparison the major search engines was done by Major web search engines are tested on their performance on navigational queries, i.e. Searches for homepages. The comparisons are performed on navigational queries. Six search engines namely, Google, Yahoo!, MSN, Ask, Seekport, and Exalead were submitted with 100 user queries. Users described the desired pages, and the results position of these was recorded (Lewandowski, 2011). The performance of the major search engines Google, Yahoo!, and MSN was found to be the best and around 90 per cent of queries were answered correctly. But the Ask and Exalead were worst performers but received good scores as well. And the findings suggested the following: (i) Care should be taken on the performance on navigational queries while designing a search engine so that designed search engine may compete with the major search engines. (ii) Users can be influenced easily in their quality ratings of search engines based on this performance. The results are limited by the fact that only German-language interfaces of all the search engines were used and all the queries were in German. Therefore, the results are only valid for German queries. The search engine performance and characteristics of different search engines were compared. This comparison was done on parameters such as, quality, accuracy, appearance and significance of the search results that are produced upon searching. Many a information retrieval systems (IRS) were evaluated. Librarians' behavior in the application of search engines is analyzed. The detailed view on international and Greek search engines as an information retrieval tool and their utilization is presented (Garoufallou, 2012). The factors that results gratified the librarians were identified as: (i) Search results’ significance i.e. Precision and hence the quality and value of result (ii) Presentation and the visualization, ISBN 1-63102-455-8 169 Accessing Knowledge Through The Attributes And Popularity Of Search Engines Librarians favored using international search engines rather than Greek ones. A pioneering analysis of search engine queries used to locate the ETDs collection with the purpose to find out the search engine queries and variation in different locations. To answer these questions, search engine queries used to locate the AUETDs collection were obtained from Google Analytics and were separated into groups based on user location. Implications indicated following trends: Most local users’ queries contained person names, variation for thesis or dissertation, and variants. The definiteness of their queries indicates that full-text indexing will be more helpful to users than metadata indexing alone. iii. Queries from users located within the state but outside of the local area were intermediate between these groups. Nearly all out-of-state users’ queries contained title and subject keywords and appeared to be seeking specific research studies. iv. Repository content must be indexed by search engines such as Google as this is an important factor to be considered while designing. (Coates, 2014) i. ii. The researchers have concluded users can be influenced easily in their quality ratings of search engines based on this performance. The popularity-comparison of the search engines for scholarly communication can be performed by new automatic methods performance evaluation methods. Specifically web-based Delphi method was quite responsive in popularity-comparison Implications of these performance comparison shows: (a) Out of available popular search engines Ask.com, Bing and Google gave the best performance. The results of the researches showed that Google outperformed the others, followed by Bing and Ask.com. Performance of the major search engines Google, Yahoo!, and MSN was found to be the best and around 90 per cent of queries were answered correctly. (b) The parameters “tendency degree” assessed a search engine in terms of results presentation and the “coverage degree” evaluated it in terms of retrieval effectiveness. (c) Care should be taken on the performance on navigational queries while designing a search engine so that designed search engine may compete with the major search engines. The effort of studies suggests that most local users’ queries contained person names, variation for thesis or dissertation, and variants for Auburn University. Nearly all out-of-state users’ queries contained title and subject keywords and appeared to be seeking specific research studies. EFFECTIVE SEARCHING METHODS AND TECHNOLOGY MAKE SEARCH ENGINES AS EFFECTIVE INFORMATION RETRIEVAL TOOL By drawing upon the patterns of web search behavior effective searching methods can be formulated. The use of social search taxonomy and a user-centered social search method was tested by MacDonnell and Shiri (2011). There is the value and power of “collective intelligence” in web search. Analysis of the notion of social search and proposed taxonomy of social search by using socially enhanced web-based tools such as, social bookmarking systems, social tagging services and social media sites improved general web searches. A dual set phase methodology was used for comparing and evaluating search results from different sources was formulated. lan and Levene (2011) developed this methodology. Analysis of important similarities and differences disclosed several disparities in social search approaches. A practical method was proposed that allows users to directly leverage social search without special features built into search engines. Results showed that local Google interface, was preferred by a group of users i. e. Google succeeded in the country specific customization of search results.. Live search was much less successful in this aspect. Recommendations are for preferring country specific customization design of search engines, digital libraries and the browser add-ons. The research on general search engines such as Google and Yahoo!, was first of its kind, in dynamic online information environments, provided useful insights for search engine designers by examining the indexing quality and ranking of XML (Dublin Core and MARC 21 metadata elements) based content objects. Results showed that the XML-based Dublin Core Metadata Initiative and MARC 21 both do not demonstrate any preference regarding access. Google made full retrieval of all the content objects via its Dublin Core and MARC 21 metadata elements and surprisingly. Yahoo! search engine did not respond at all. All Dublin Core and MARC 21 metadata elements were indexed by Google search engine Farajpahlou and Tabatabai (2011) Li, 170 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Wang and Yu (2012) presented search engine evaluation models that can be personalized. This personalization is achieved by enabling a particular Web searcher choose an appropriate search engine for his/her informational requirements and hence finding the right information in the shortest time with the least effort. This customizable evaluation model for comparing search engines was designed as a hierarchy of weighted parameters thus enabling customization by simply changing the weights and modifying the features considered. This customization is not possible in other evaluation models. As the other models are user oriented and focus on relevance issues. Identifiable statistical patterns are found in performance measures of search engines. Search engine features and performance measures were given quantitative and qualitative ratings by an individual user. The results show: i. ii. The precision and recall are the fundamental measures used in many search engine evaluations due to their simplicity, evenhandedness and reliability. Histograms based on three metrics enable user to perceive the characteristics of a search engine quickly using the quantitative measure of histogram patterns that represent the search performance metrics introduced. Further refinement of specific parameters used in the evaluation model can be done. A larger scale search engine evaluation is required to confirm the validity and usefulness of the model. The three performance measures presented give a reasonably informative overview of the characteristics of a search engine. Other performance parameters and their resulting statistical patterns would make the methodology more valuable to the users. For the purpose of using search engines, a detailed observation was made on the usage of various search engines. This was done for Meta search engines by Indian academics for retrieving information on the web as well . The observation also looked into the learning mechanisms of various search strategies by Indian academics (Sampath and G. T., 2013). The results show: i. Google usage was 91.93 percent and Yahoo usage came 43.85 percent while Dogpile and Ixquick came 35.78 percent each. ii. 65.26 percent of respondents used the search strategy for retrieving information. A significant relationship was inferred between the respondent's profession and use of search engines (p=0.018) as well use search strategies o search engine (p=0.028). iii. Method of learning the search strategies of search engines is also associated with the respondent's profession (p=0.008). These implications are clearly for information literacy instruction in the context of search engines. Need for intensive training for students and faculty members in order for them to acquire the essential search strategies for effective information retrieval was felt. The findings can assist to concerned authorities to enhance the effective and efficient use of search engines by the Indian academics. Factors affecting the analyzing patterns of web search behavior. There several effective searching methods and technology that make search engines useful as effective information retrieval tool .There are patterns of web search behavior. The value and power of “collective intelligence” in web searching. Analysis of the notion of social search and proposed taxonomy of social search by using socially enhanced web-based tools such as social bookmarking systems, Social tagging services and media sites improved general web searchers. There are group of users who prefer specific customization of search results. Live Search was much less successful in this aspect. The XML-based Dublin Core Metadata Initiative and MARC 21 both do not demonstrate any preference regarding access. Google made full retrieval of all the content objects via its Dublin Core and MARC 21 metadata elements and surprisingly. Yahoo! search engine did not respond at all. The fundamental measures used in many search engine evaluations are precision and recall due to their simplicity, evenhandedness and reliability. IMPACT OF SEARCH ENGINES FOR KNOWLEDGE ACCESSING The influence of user’s demographic characteristics on the impact of web searching is noticeable. This impact is seen with regard to OPAC in the context of an Indian university setting (Shiv 2012). There are certain characteristics which definitively impact the web searching in some limited activities. Following significant relationships were observed: ISBN 1-63102-455-8 171 Accessing Knowledge Through The Attributes And Popularity Of Search Engines (1) Relationship between male and female users regarding their perception of unsuccessful searches. (2) There were significant differences between OPAC usage patterns and demographic characteristics of user categories and age groups. (3) Significant variations were noticed in awareness among user age groups about the differences between web search engines. In addition, certain variations were also observed among academic majors with regard to perceptions of users after failed searches. Impact assessment of web searching on OPAC users of the Punjabi university library Punjab Patiyala (India) was carried out. Shiv Kumar, (2012) made following conclusions : (1) Search engines not only affected OPAC users in developed countries but also less developed countries like India. (2) OPAC and web search engines compete for survival and sustainability. (3) The information searching behavior of academicians was changing significantly in the web environment. (4) A large number of users explored the web to garner relevant information for academic purposes. The majority of researchers were influenced by search engines because they also used OPAC. Recommendations for designing a user friendly OPAC that entails simplistic search strategies for university libraries of India and other developing countries were made. Relation of ‘Rank-correlation’ to the documentation on search engine evaluation was performed by Melucci (2012). This presentation is done in a practical way for the researcher’s active in the different domains of search engines. A model for the application of rank correlation within scientific experimentation or item/service recommendation has inferred that Rank correlation analyses impact on the success or failure of a search engine in performing the tasks for which it has been designed and hence on the people's daily life activities. Rank correlation analyses has impact on the success or failure of a search engine in performing the tasks for which it has been designed and hence on the people's daily life activities. There are significant differences observed between OPAC usage patterns and demographic characteristics of user categories and age groups. RECOMMENDATIONS FOR IMPROVEMENT IN SEARCH ENGINES Several improvements are suggested in the search engines. Real barriers of web search engines and criteria of satisfaction for people with disabilities do not exist as of yet. Insights are provided into the principles of disability studies and the idea of inclusion is described. The W3C Web Accessibility Initiative’s (WAI) evaluation model is helpful in evaluating accessibility features of search engines. Kerkmann, and Lewandowski (2012) suggested WAI Methodology for accessibility review of search engines in a comprehensive manner. The WAI methodology consists of three-steps: i. Preliminary review to quickly identify potential accessibility problems; ii. Conformance evaluation to determine whether a website meets established accessibility standards; iii. User testing to include real people with disabilities in a practical use. There are various aspects to be considered when evaluating web search engines’ accessibility for people with disabilities. A theoretical framework outline for a comprehensive accessibility review of web search engines does also have practical implications for web search engine developers to improve accessibility of their product. Various measurements of several accessibility aspects and as well impertinence of accessibility of web search engines for people with disabilities and for the elderly or temporarily handicapped people are mentioned. The paper is of great help for the researches, search engine developers and educators in practice, with reference to the aspects of disability studies. Research is limited as it describes a theoretical concept and also that the model is not tested so far. A variety of diversification approaches are available. Web provides a rich source of a variety of information mainly in unstructured textual form. New challenges to make the user aware of the diversification of content i.e. variety of content available. It is also hard to satisfy users best with such manifold content (Denecke, 2012). Diversification issue from two angles: i. 172 Diversity is introduced with its notions and dimensions. This diversity is a SERPs/ result set's coverage of multiple interpretations of a query. and ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education ii. The organization and classification of content within diversification become increasingly important. Objective of the web search is diversity. As the diversification of content increases ranking, methods to assess diversity within web search are presented. Approaches for diversification are extremely important. Web search tries to address this problem from different perspectives. For the future, following recommendations are made: i. ii. Combination of text search with image search result is important in achieving diversification. Benchmarks and standard data sets for evaluations need to be established to ensure comparability of results from various approaches. The general computer searching behaviors demonstrated that digital natives are different from older age groups (Zimerman, 2012). Digital natives were different in Bing. More emphasis needs to be placed on the digital natives' search habits to find out how best to serve. More emphasis needs to be placed on the digital natives' search habits to find out how best to serve this population and that it will be a great disservice to digital natives. Research efforts on the computer searching behaviors suggested about disservice to digital natives unless they are taught how to search academic databases. Several ways are provided to reach out to the users by exploiting present day mighty web search engines. Vinit (2012) identified problems related to unfriendliness of library OPACs and the reasons behind these problems. The author recommended: i. ii. Use of sitemaps to expose the bibliographic records to search engines. Creation, upload, and submission of sitemaps options to search engines. It is also established that Web OPACs architecture does not help search engine robots or crawlers to index the huge library data. Therefore by exploiting some of the best practices of information architects and webmasters, libraries can also open their huge data to the search engines. This will greatly help in getting listed in the top results by getting more visibility. Adoption of empirical approach was made for the examination of characteristics of relevant libraries' website. This approach helped in two ways: i. ii. Determining the visibility performance of search engine result pages (SERPs). Proved the advantage of using search engine optimization (SEO) phenomenon asfor improving libraries' digital content search-ability on the web. Libraries' application of SEO is very important factor for scholarly academic research. In addition, several website characteristics are identified that can be optimized for higher SERP rankings. There is an impact of following factors on higher SERP rankings i. External links ii. The number of indexed web pages by search engines on iii. Application of web analytical tools, such as Alexa.com The concepts from the Integrated IS&R Research Framework are applied to analyze SEO as an element within the Framework. The findings confirmed the following: i. ii. Effect of certain characteristics of websites on ranking of libraries’ websites) by search engines. Reputation of a library's website and the number of its search engine indexed web pages also increased its ranking on SERPs These findings can help in the search-ability of libraries’ digital content. Herbert and Mellius (2013) recommended designing content oriented website with high quality, well-written content. These three biggest search engines interpret keyword stuffing has been considered as a negative design element. Although keyword stuffing is likely to lead to search engine rankings increase, it could deter human visitors and reduce website value. Spam-dexing, characterized by different keyword density measurements in the body text of a webpage play a role too. Upon monitoring of three major search engines, namely Google, Bing and Yahoo!, the claims of high keyword densities leading to blacklisting by search engines have been disproved (Taheri, Hariri and Fattahi (2014). The research has helped and some patterns are identified to the metadata creators and the ISBN 1-63102-455-8 173 Accessing Knowledge Through The Attributes And Popularity Of Search Engines end users for better indexing and retrieval. With the help of data island method for creating the metadata records, it is suggested that metadata records based on DCXML, MARCXML, and MODS are effective for better indexing and increased visibility of the metadata element tag names. Following implications are derived: i. ii. All the tag names of the metadata records created based on the data island method relating to the experimental group indexed by Google and Bing were visible in the search results. But the tag names in the control group’s metadata records were not indexed by the search engines. It is possible to index and retrieve the metadata records by their tag name in the search engines. Whereas, the records of the control group are accessible by the element values only. For increasing search engine visibility of websites / portals the website must be content oriented with high quality well-written content. The WAI methodology includes real people with disabilities, helps in describing the aspects to be considered when evaluating web search engines’ accessibility. To be successfully qualified the WAI testing, two aspects are very important: i. ii. The organization and classification of the website content, Diversification of the content, Approaches for diversification are extremely important. Several website characteristics were identified that can be optimized for higher SERP rankings: i. ii. iii. iv. The search-ability of digital content of library's website Reputation of a library's website. The number of library's website search engine indexed web pages. The tag names of the metadata records created based on the data island method. CONCLUSION The conclusions derived from the review on knowledge-access through search engines are overwhelming. Many factors are responsible users repeatedly visit their favorite search engines and also there are reasons why users change search engines. Aesthetic theory of indexing must be considered as the attributes including aesthetics that determine a good search engine. Due importance to the satisfaction and usage must be given. As the satisfaction and usage variables determine search engine success. The alternative search engine interfaces might affect Web users' search and evaluation strategies in Web searching. Users can be influenced easily in their quality ratings of search engines based on this performance. The definiteness of full-text indexing will be more helpful to users than metadata indexing alone. Socially enhanced web-based tools such as social bookmarking systems, social tagging services and social media sites must be used while designing as consideration to this result in improved general web searches. SUGGESTIONS i. The design of search engines, digital libraries and the browser add-ons must be done keeping in consideration the web search behavior patterns. ii. Local interface must be made available to academic researchers, as Google succeeded in its country‐specific customization of search results. That’s why country‐specific customization of search engines is preferred. iii. Fundamental parameters of search engines must be evaluated along with, precision and recall due to their simplicity, evenhandedness and reliability, as Google also made full retrieval of all the content objects via its Dublin Core and MARC 21 metadata elements, these elements can be useful for designers. iv. OPAC usage patterns and demographic characteristics of user categories and age groups are important while designing search engines. v. There is need for intensive training for students and faculty members in order for them to acquire the essential search strategies. This is necessary for the effective information retrieval by the Indian academics. A user friendly OPAC must be designed that entails simplistic search strategies for university libraries of India and other developing countries were made. 174 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education vi. Diversification makes the ranking in a way that the top results are diverse. Methods to assess diversity within web search must be exploited by information architects and webmasters, vii. Libraries can also open their huge data to the search engines and can get listed in the top results to get more visibility. viii. It is also recommended designing content oriented website with high quality, well-written content. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] Esmaeil, Sedigheh Mohammad, Kiaie & Robabeh Mansour. (2011). A Comparison between Search Engines and Meta-Search Engines in Retrieving Information Related to Physics and the Extent of Their Overlap. Faslname-Ye Ketab/Library and Information Studies, 22(3), 130-140. Shiv Kumar (2011). Effect of web searching on the OPAC: a comparison of selected university libraries. Library Hi Tech News, 28(6), 14-21. Mc Donnell, Michael &Ali Shiri (2011).Social search: A taxonomy of, and a user‐centered approach to, social web search. Program, 45(1), 6 – 28. Sadeghi, Hamid. (2011).Automatic performance evaluation of web search engines using judgments of metasearch engines. Online Information Review, 35(6), 957-971. DOI: http://dx.doi.org/10.1108/14684521111193229. Zhu, Qingua. [et.all.] (2011). Using a Delphi method and the analytic hierarchy process to evaluate Chinese search engines: A case study on Chinese search engines. Online Information Review, 35(6), 942-956. DOI: http://dx.doi.org/10.1108/14684521111193210. Lewandowski, Drik. (2011). The retrieval effectiveness of search engines on navigational queries. Aslib Proceedings, 63(4), 354-363. DOI: http://dx.doi.org/10.1108/00012531111148949. Lopez-Pellicer, Francisco J., Florczyk, Aneta J., Bejar, Ruben , Muro-Medrano&Pedro R., Zarazaga-Soria. (2011). Discovering geographic web services in search engines. Online Information Review, 35(6), 909-927. DOI: http://dx.doi.org/10.1108/14684521111193193. Access on 17/04/2015 Ilan, Judit Bar&Levene Mark. (2011). A method to assess search engine results. Online Information Review, 35(6), 854-868. DOI: http://dx.doi.org/10.1108/14684521111193166. Faraipahlou, A Hossein & Faeze, Tabatabai . (2011). How are XML-based Marc 21 and Dublin Core records indexed and ranked by general search engines in dynamic online environments?Aslib Proceedings: New Information Perspectives , 63(6) , 586-592. Garoufallou, Emmanouel.(2012). Evaluating search engines: A comparative study between international and Greek SE by Greek librarians. Program: Electronic Library and Information Systems, 46(20), 182-198. Kerkmann, Friederike & Lewandowski, Dirk (2012). Accessibility of web search engines: Towards a deeper understanding of barriers for people with disabilities. Library Review, 61 (8/9), 608-621. DOI: http://dx.doi.org/ 10.1108/00242531211292105. Shiv Kumar, (2012), The impact of demographic characteristics of users on patterns of usage on search engines and OPAC, Library Review, 61 (3), 172 – 187. DOI: http://dx.doi.org/10.1108/00242531211259300. Shiv Kumar, (2012). Impact of internet search engines on OPAC users: a study of Punjabi University,Patiala(India).Program,46(1),56-70. DOI: http://www.emeraldinsight.com/doi/abs/10.1108/00330331211204566 Lewandowski, Drik (2012). Chapter 1 New Perspectives on Web Search Engine Research, in. Lewandowski, Dirk (ed.): Web Search Engine Research. Bingley: Emerald Group Publishing, 2012. DOI: http://books.emeraldinsight.com/display.asp?K=9781780526362. Rall, Denise N. (2012). Chapter 11 What Would Kant Think? Testing Truth Claims in Research Traditions, and Proposing Deeper Meanings for the Concept of “Search". Lewandowski, Drik (ed.). Web Search Engine Research (Library and Information Science, Volume 4). Emerald Group Publishing Limited, 281 – 307 DOI – 10.1108/S1876-0562(2012)002012a013. Kammerer, Yvonne&Gejets, Peter (2012). Chapter 10 How Search Engine Users Evaluate and Select Web Search Results: The Impact of the Search Engine Interface on Credibility Assessments, in Lewandowski, Drik (ed.) Web Search Engine Research (Library and Information Science, Volume 4) Emerald Group Publishing Limited,.251279. DOI: 10.1108/S1876-0562(2012)002012a012. Denecke, Kerstin (2012). Chapter 6 Diversity-Aware Search: New Possibilities and Challenges for Web Search, in Lewandowski, Drik (ed.) Web Search Engine Research (Library and Information Science, Volume 4) Emerald Group Publishing Limited, 139 – 162.DOI: 10.1108/S1876-0562(2012)002012a008. Li, Kin Fun, Wang, Yali &Yu, Wei (2012).Chapter 7 Personalised Search Engine Evaluation: Methodologies and Metrics, inLewandowski, Drik (ed.)Web Search Engine Research (Library and Information Science, Volume 4) Emerald Group Publishing Limited, 163 – 202. 101108/S1876-0562(2012)002012a009. Melucci, Massimo (2012). Chapter 8 Search Engines and Rank Correlation, inLewandowski, Drik (ed.) (ed.) Web Search Engine Research (Library and Information Science, Volume 4) Emrald Group Publishing Limited,203 – 224. DOI: 10.1108/S1876-0562(2012)002012a010. Markus, Heckner&Christain, Wolff (2012) Chapter 2 The Many Ways of Searching the Web Together: A Comparison of Social Search Engines , Lewandowski, Drik (ed.)Web Search Engine Research (Library and Information Science, Volume 4) Emrald Group Publishing Limited, 19 – 46. 10.1108/S18760562(2012)002012a004 Zimerman, Martin (2012). Digital natives, searching behavior and the library. New Library World, 113(3/4), 174 – 201. DOI: http:/dx.doi.org/10.1108/03074801211218552. ISBN 1-63102-455-8 175 Accessing Knowledge Through The Attributes And Popularity Of Search Engines [22] [23] [24] [25] [26] [27] [28] [29] 176 Vinit Kumar (2012). Exposing Library Catalogues to Search Engines. DESIDOC Journal of Library & Information Technology , 32( 6), 493-498. Onaifo, Daniel & Rasmussen, Diane (2013). Increasing libraries' content find ability on the web with search engine optimization. Library Hi Tech, 31(1), 87 – 108. doi: http://dx.doi.org/10.1108/07378831311303958. Sampath Kumara&G.T Kumar.(2013). Search engines and their search strategies: the effective use by Indian academics. Program: electronic library and information systems, 47(4), 437 – 449. DOI:http://www.emeraldinsight.com/doi/abs/10.1108/PROG-03-2012-0009. Hariri, Nadjla. (2013). Do natural language search engines really understand what users want? A comparative study n three natural language search engines and Google. Online Information Review,37 (2), .287 – 303..DOIhttp://dx.doi.org/10.1108/OIR-12-2011-0210 Zuze, Herbert & Weideman, Mellius. (2013). Keyword stuffing and the big three search engines. Online Information Review, 37(2), 268 – 286. DOI:http://dx.doi.org/10.1108/OIR-11-2011-0193 Anyira, Isaac E. (2013). Gender implication in awareness and use of search engines by the private university lecturers in south- south Nigeria. Library Philosophy and Practice (e-journal). Paper 1039.DOI: http://digitalcommons.unl.edu/libphilprac/1039 Coates, Mildred (2014). Search engine queries used to locate electronic theses and dissertations: Differences for local and non-local users. Library Hi Tech, 32 ( 4), 667 – 686. doi: http://dx.doi.org/10.1108/LHT-02-2014-0022 Taheri, Sayyed Mahdi, Hariri, Nadila & Fattahi, Sayyed Rahmatillah (2014) . Using data island method for creating metadata records with index ability and visibility of tag names in web search engines. Library Hi Tech, 32 (1), 83-97. DOI: 10.1108/LHT-06-2013-0065. ISBN 1-63102-455-8 REINVENTING LIBRARY AS GREEN LIBRARY: BEGINNING OF GREAT TRANSFORMATION Dr. (Mrs) KusumLata Malik | Chief Librarian | K.V.M.M.(P.G) College | CSJM University | Kanpur | U.P | latamalikkusum@gmail.com Abstract: A green or eco-friendly library is designed to minimize negative impact on the natural environment and maximize indoor environmental quality by means of careful site selection, use of natural construction materials and biodegradable products, conservation of resources (water, energy, paper), and responsible waste disposal (recycling, etc.). The paper presents the LEED (Leadership in Energy and Environment Design) rating system for green building criteria. The green libraries are measured by this LEED system which was developed by U.S. Green Building Council. The paper also suggested that like LEED, Indian Green Building Council (IGBC) is a way that should choose by Indian libraries to becoming green and sustainable. The paper concluded that the big challenges as energy depletion, water restoration, and indoor air quality, building material, information resources and environmental changes can be solve through green libraries. Keywords: Green, Sustainable, Libraries, Programs, LEED, Environment and Design etc. INTRODUCTION The Green Library Movement has been in existence since last 15 years. The Movement started in the early 1990s and became popular in the library profession around 2003. This innovation is happening by building green library buildings, by greening existing library facilities, providing green library services, and embracing environmentally supportive and sustainable practices within the library. Despite the fact that there are many paths to sustainable design, the emergence of the trend has created a demand for quantifiability. In the United States, the non-profit organization the United States Green Building Council (USGBC) developed the Leadership in Energy and Environmental Design (LEED) rating system in the year 2000. It is a point-based system in which projects earn LEED points for meeting green building criteria. The six credit categories for new building construction are sustainable sites, water efficiency, energy and atmosphere, materials and resources, indoor environmental quality, and innovation in design. The LEED has the point based rating a total of 100 base points possible, and buildings can be categorized as with four level of certification certified (40 points), silver (50), gold (60), or platinum (80+). LEED uses five different categories to judge a building's sustainability; 1) site location (sustainable site), 2) water conservation (water efficiency), 3) energy efficiency, 4) resources and materials, 5) indoor air quality or indoor environment, and a bonus category for innovation and design (Brown, 2003). There are currently Six type of certification as LEED for New Construction (LEED-NC), LEED for Commercial Interiors (LEED-CI), LEED for Core and Shell (LEED-CS), LEED for Existing Buildings (LEED-EB), LEED for Neighborhood Development (LEED-ND), and LEED for Homes (LEED-H) (Yudelson, 2007). The LEED rating system is progressive with four levels of certification: Certified, Silver, Gold and Platinum. Each certification level has 32 categories of environmental design and energy concerns for a maximum point value of 69. Sustainable library design is strongly tied to the overall green building movement, but libraries have specific needs that present some extra challenges for green builders. WHAT ARE GREEN LIBRARIES? According to the Oxford English Dictionary the term green is defined as pertaining to, or supporting environmentalism and the term sustainable relates to forms of human economic activity and culture that do not lead to environmental degradation, especially avoiding the long-term depletion of natural resources. When imaging about green libraries the simple question comes to mind that what are green library buildings? It may be defines as a green or sustainable building which is designed, built, renovated, operated, or reused in an ISBN 1-63102-455-8 177 Reinventing Library as Green Library: Beginning of Great Transformation ecological and resource efficiently. Interest in green library design intensified in December 2007 when the Library Journal Design Institute hosted the Going Green seminar in Chicago, Illinois. At the event architects, city planners, and librarians shared the latest developments and cutting-edge solutions being adopted in green library buildings (Library Journal, 2007). There is no universal definition on green library. But actually, green library is that library which minimizes the negative effect and maximizes the positive effects and the building will have on the local environment. Green libraries reduce the use of water and energy by designing the building to maximize the use of natural and renewable resources. These libraries also integrate actual plants greenery and vegetation into the building and site design, preferably with drought resistant and/or native vegetation. They also maintain high standards of indoor air quality to help ensure the health of the people who inhabit the building. Green library, also known as a sustainable library, is a library built with environmental concerns in mind. Green libraries are a part of the larger green building movement. Libraries are not only repositories of knowledge, but are also important information resources for raising awareness about environmental concerns. Green libraries educate the public about environmental issues through their collections, sustainable and environmentally friendly facilities, and public library programs. Among other things, green libraries maximize the effects of natural sun light and natural air flow. Green libraries are thoughtfully designed while taking into account site selection to structural design, water conservation energy use, use of materials in buildings, indoor air quality and human health effects. (Antonelli, 2008) HOW CAN LIBRARIES BECOMING GREEN? Green design is an integrated process. Without proper integration from the earliest moments of the planning phase, redundancies can occur, eliminating many of the potential benefits of sustainable design. Good sustainable design capitalizes on the synergistic relationships that occur between the various design elements. LEED groups these elements into five categories. Buildings can be designed in a way in which, good design in one category helps another category fulfill its goal. FIVE CATEGORIES OF GREEN DESIGN: Site selection: Before building can start, a site must be chosen. The selection of the site has a large impact on how ecologically friendly the library will be. LEED has a number of guidelines to help the site selection process. There are a number of questions to consider that will help guide the site selection process, including, what kind of impact will construction have on the local environment, will there be erosion, what can be done with storm runoff, and is the site already green? Also, the library should be located in a densely populated area, near a number of other service related buildings. People should be able to reach the building via public transportation and the parking lots should give priority parking to those driving energy efficient automobiles. The heat island effect can be reduced by shading hard surfaces, putting them underground, or by implementing a vegetative roof (LEED, 2005) Water conservation: There are many different ways for libraries to conserve water. A number of them rely on proper site selection. If a site is selected properly strategies can be used to capture rainwater runoff to be used in irrigation. Another strategy is to use low flow fixtures, and waterless urinals. Energy conservation: Energy efficiency is considered by many to be the most important category in becoming sustainable. In the LEED rating system it is the heaviest weighted of all the categories. Energy efficient design is in many ways a return to passive design principles that evolved over thousands of years, until the advent of air conditioning and cheap energy made those strategies appear to be unnecessary. After air conditioning became widely available, buildings were designed to eliminate influences of the outside environment. As environmental awareness increases, as well as the cost of fossil fuels needed to operate giant heating, air conditioning, and ventilation [HVAC] systems, building designers are beginning to recognize that the outside environment cannot be ignored, and should be taken advantage of. What 21st-century designers are beginning to do is implement ancient passive design principles, while taking advantage of the most advanced technology available. 178 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education The passive strategies vary according to location, but they are always implemented to capitalize on the natural elements, mostly wind and sun, to manage the temperature and to provide ventilation and light. Active strategies are more technologically advanced solutions that include using various forms of renewable energy resources and using sensors to adjust lighting. Using photovoltaic cells that turn sunlight into energy is becoming an increasingly popular way to reduce energy dependence. In order to fully maximize energy efficiency and comfort, libraries are combining passive and active strategies (LEED, 2005). Building materials: The primary responsibility in selecting materials for the library is to contribute as little waste as possible. Another responsibility is to choose materials that can be produced without causing too much damage to the natural environment. In order to fulfill the first responsibility, post-industrial and post-consumer recycled materials are being used. When purchasing materials claiming to be made from recycled goods it is important to investigate what their claims mean. Such materials should be chosen that will going to be able to be reused or recycled 50–100 years down the road when the library building has reached the end of its useful life (Tseng, 2007). As non-renewable resources decrease, reusing and recycling are going to become increasingly necessary in the future. It is also important to consider what type of materials are using as certify wood based on a number of factors regarding how it was produced; rights of indigenous peoples, environmental impact, workers’ rights, efficiency, management, and conservation (Forest Stewardship Council, FSC, 1996). Another material option is using quickly renewable materials such as bamboo in place of wood whenever possible. Indoor air quality: Along with energy inefficiency, poor air quality has been another side-effect of the post air conditioning building design. Because most modern buildings are temperature controlled, they are designed to be airtight. The lack of ventilation can not only make buildings expensive to cool, it also traps harmful toxins that can do serious damage to people's respiratory systems. Toxins come from a variety of sources. Materials that make up the library, including paints and carpeting; have volatile organic compounds (VOC's), which produce a ground-level ozone after reacting with sunlight and nitrogen. The carbon dioxide that people breathe into the atmosphere is another toxin. To improve air quality, materials can be bought that have a low VOC content, and CO2 monitors can be installed to ensure that CO2 levels remain at a safe level. On average, people spend about 90% of their time indoors. Therefore, green buildings need to be designed in a way in which the air gets recycled, and does not stay stagnant. A green library is not just about taking care of the environment, it is about taking care of the health and well-being of those who work in it and patronize it. SOME IMPORTANT GREEN DESIGN ELEMENTS FOR LIBRARIES: Green libraries combine the needs of a library, sustainable design, and real cost savings in energy consumption (Brown, 2003). The main goal of green buildings is to develop and use sustainable energy-efficient resources in construction, maintenance, and overall life of the structure. Libraries considering green design will often look at the Leadership in Energy and Environmental Design (LEED) rating system. Brown (2003) identifies the following green design elements, which can be incorporated into libraries:          Community collaboration – makes sure that community assets are efficiently used and helps to maintain public support Daylight – pair daylight with artificial lighting to reduce energy costs Green materials – use renewable materials like wood, linoleum, bamboo, and cork Green roofs Raised floor systems Energy efficiency Natural ventilation Green power and renewable energy Indoor environmental quality (Wikipedia, 2015) ISBN 1-63102-455-8 179 Reinventing Library as Green Library: Beginning of Great Transformation WHAT FORCED LIBRARIES BECOMING GREEN? First, libraries have been expanding the scope of their mission statements, to include working for the betterment of mankind. Second, technology is to increase awareness energy and environmental issues. Third, greenery is great for the image of the library. Finally, sustainability offers the library a degree of independence, because cost of maintenance goes down, as do as reliance on the volatile fossil fuels market. (Wikipedia, 2015) Mission: All libraries have mission statement to preserve knowledge so that it can be passed on to the future generations and to improve the condition of humankind. The Buildings produce about 40% of the dangerous greenhouse gasses emitted into the atmosphere (Anisko& Willoughby, 2006). Libraries are an investment in the future of our society, so libraries have a responsibility to not contribute to the destruction of the environment, to educate the people regarding our current situation, and empower them to make a difference. Libraries are discovering that their green building gives them a great opportunity to educate the citizenry (Tseng, 2007). Technology: The technology and knowledge to build green buildings has passed a tipping point. The diversity of green technology, it is necessary to capitalize on the local natural resources available, and customize the building to most efficiently operate in the local environment. Along with the advancement of technology, the increasing awareness of environmental issues decreases the burden on the green builder. With these advances, sustainable construction is no longer a utopian fantasy, but is simply becoming the way good buildings are being built. Image: Today, the library is undergoing an identity transformation and struggling to stay relevant, while its image as an outdated institution is not entirely deserved, it is trying to assert itself as an irreplaceable part of the community that plans on being an assertive force for good in the twenty-first century. Green design helps it do that three different ways. First, a sustainable building makes a statement that the library is investing in the future of the community. Second, sustainable buildings are smartly designed, aesthetically pleasing, and are powered by state-of-the-art technology. When people see these emerald marvels they will no longer be able to maintain false stereotypes regarding libraries as anachronistic relics from an analog age. Finally, as more people take environmentalism seriously, a green image can improve an institution's image. Independence: Libraries are constantly battling with budget issues. Sustainable design offers libraries a way to reduce maintenance and energy costs, providing them with a degree of independence (Boyden & Weiner, 2000). One of the most important features of green design is a shift from the reliance on depleting fossil fuels to renewable energy resources. The independence from fossil fuels will save the library large sums of money, and it will relish its independence if prices continue to rise. Because of the long-term nature of the library, green design is potentially less expensive than standard design, as heavy up-front costs often pay for themselves, waste is reduced, efficiency is increased, and energy and water are conserved. Evolving libraries of the 21st century are integrating sustainable practices, because it is becoming the most cost-effective way to do things (Boyden & Weiner, 2001). EXAMPLE OF FAMOUS GREEN LIBRARIES Fayetteville (AR) Public Library: The Fayetteville Public Library designed by Meyer, Scherer and Rockcastle Ltd. in Minneapolis opened in October 2004. The library, Library Journal's 2005 Library of the Year, was the first building in Arkansas to register with the U.S. Green Building Council and achieved the silver LEED designation in 2006. To earn this designation the library employed many green-design techniques. The library was built on an empty lot a few blocks away from the city's bustling square, making it a textbook infill project. During construction, any trees removed were harvested and used for furniture or donated to local parks. Throughout the project, almost 99% of the construction waste was recycled or reused. More than 65% of the materials used to build the library were made within 500 miles (800 km) of the city. By incorporating a green roof and using alternative roofing materials, the design team reduced air temperature as much as 20 degrees. Water collected on the roof is reused for landscape irrigation. The library's green roof saves about $4,000 a year in energy savings. The building's reading spaces and circulation desks were situated to take advantage of the natural sunlight without over- 180 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education working the building's air conditioners, reducing energy costs by 25% and the overall building's energy consumption by 30%. Sunlight streams through 75% of the building's public spaces. Seattle Central Library: The Seattle Central Library designed by Rem Koolhaas opened in May 2004. It employs a number of innovative techniques to achieve the status of a green library. It is located in a dense urban area, accessible by public transportation. Rainwater runoff is stored in a 40,000 gallon tank, and used to irrigate the landscape. It has triple glazed glass, used to reduce heat buildup. Seventy-five percent of the demolition and construction waste was recycled (Fox, 2004). National Library, Singapore: The Singapore National Library has been called the greenest building on the planet. Designed by Ken Yeang, it opened in July 2005. It is designed using light shelves that allow the light to filter into the library, without having any harsh effects. During the moments that the sun is either to bright or not bright enough, sensors are programmed to dim or brighten the lights, and raise and lower the shades to maximize comfort and reduce costs (Anisko& Willoughby, 2006) Minneapolis Public Library (MPL): The Central Branch of the Minneapolis Public Library System was designed by Cesar Pelli, and it opened in May 2006. It has a 18,560-square-foot (1,724 m2) green roof. The green roof is planted with vegetation that does well in Minnesota's harsh climate, and it reduces rainwater runoff, reduces the building's heating and cooling load, reduces the buildings heat island effect, and adds green space to the downtown cityscape (MPL, 2006). Merced Kolligian Library: This library opened in August 2005 in university of California and awarded Gold Leeds Certification in 2007. The 180,000-square-foot (17,000 m2) glass-and-concrete building uses 42% less water and 50% less energy than comparable buildings. The building's carpet contains 37% recycled content, while its acoustical ceiling tiles contain 66% recycled content that includes telephone books and newspapers. Nearly 30% of the materials used to construct the building were manufactured locally, resulting in significant transportation and energy savings. WHY SHOULD GREEN LIBRARIES? There may be several reasons to build green libraries. First, the cost of constructing green buildings has become affordable. It is now possible for libraries to build green buildings on conventional budgets. Second, most readily available energy resources are finite resources. It is vital to the health of the planet and our libraries’ budgets that we use these energy sources prudently. Third, it is important that we reduce the carbon footprint of our buildings. The carbon footprint means the total amount of greenhouse gases produced to directly and indirectly support human activities. A simple green libraries can improve the health of the planet and their employees is by quit to use of toxic chemical cleaners because these cleaners can trigger allergies and asthma attack in users and switch the environmentally friendly certified green cleaning products that emit fewer fumes. Now internet has become the medium of choice for many. The concept of a Green Library is spreading all around the world. It isn’t only a matter of sustainable buildings, but it is also a library management issue. In order to survive the technologic challenge, many libraries around the globe are re-discussing their identity in order to live up to the challenge of our times and to users’ high expectations. By reducing paper waste energy inefficiency and promoting recycling of used material, green libraries are developing a new idea of the Library as a sustainable service. By providing sustainable services and values within their walls, Green Libraries claim to keep faith with the task they were born for: the betterment of humankind. Digital information is producing less carbon than paper based information that is why digital collections are a main point of Green Libraries’ agenda. Green Environmental movement can be stand as thinks globally but acts locally. Green Library movement, which is comprised of librarians, libraries, cities, towns, college and university campuses committed to greening libraries and reducing their environmental impact. Constructing a green library building using performance ISBN 1-63102-455-8 181 Reinventing Library as Green Library: Beginning of Great Transformation standards like Leadership in Energy and Environment Design (LEED) & Indian Green Building Council (IGBC) is a way that some libraries are choosing to become green and sustainable. To strengthen global consistency of the LEED rating system, effective June 2014, GBIC (Green Building Council of India) began managing the certification system process of all LEED rating system in India, which has previously managed by Indian Green Building Council (IGBC). Environmental challenges like energy depletion and climate change will influence the type of information resources and programs libraries will provide to their communities. A green library minimizes the negative impact that builds on the local environment, and maximizes the positive impact. Reduce the use of water and energy by designing in a way that maximizes the use of natural and renewable resources. Integrating actual greenery and vegetation into the building and site design; preferably, using drought resistant and/or native vegetation. And, maintaining high standards of indoor air quality to help ensure the health of the user who inhabit the building. GREEN LIBRARY CHALLENGES While green libraries are concern with the overall green building movement, libraries have specific needs that face some extra challenges: The biggest challenge in front of green libraries is preservation of books must be kept away from sunlight, moisture as well as temperature changes. However, many individuals find sunlight to be the most enjoyable light for reading. Sunlight also plays a major role in green design, because it can be used to reduce the reliance on artificial lighting. For a long time, libraries needed to protect the collection from the damaging ultra-violet rays of the sun. New developments in glass technology over the past ten years have given designers more flexibility in their ability to place collections (Mcabe, 2003). Another, often overlooked, challenge the library presents is the weight of the books. A common strategy in green design is to raise the floors to increase circulation, but the weight of the stacks can be an impediment to this strategy. To deal with this challenge, many designers have resorted to zoning the library into designated areas, so these strategies can be enacted in certain areas and alternatives can be used in others (Lamis, 2003). Library buildings are long term investments made to benefit the community, so when designing them architects need to be looking 50 or 100 years into the future. These obstacles by no means present insurmountable challenges to green libraries. The special needs of the library just need to be taken into consideration from the beginning of the project. CONCLUSION Because of the long-term nature of the library, green design is potentially less expensive than standard design, as heavy up-front costs often pay for themselves, waste is reduced, efficiency is increased, and energy and water are conserved so, libraries should designing in a way that maximizes the use of natural and renewable resources. Constructing a green library building using performance standards like Leadership in Energy and Environment Design (LEED) and Indian Green Building Council (IGBC) is a way some libraries are choosing to become green and sustainable. The amount of information available on green libraries and green library practices is limited but continues to grow. These libraries are distinct over other libraries not only in the physical appearance but it is also in the concept of services offered. REFERENCES [1] [2] [3] [4] [5] [6] 182 http://in.usgbc.org/help/how-leed-certification-india-administered http://in.usgbc.org/about?gclid=COT5-K7a-sYCFQNwvAodWQ0HFg B. Brown,“The new green standard: With the LEED rating system in place it is easier to make sure your new library saves money as it treads lightly on natural resources” in Library Journal, Vol. 128(20),2003,pp. 61-64. Retrieved from http://members.cruzio.com/~dolson/FLF/green2.pdf Monica, Antonelli , 2008. “The Green library movement: An overview of green library literature and actions from 1979 to the future of green libraries”in Green Journal, Vol. 27, 2008, pp. 1-11. Retrieved fromhttps://green.nd.edu/assets/24828/escholarship_uc_item_39d3v236.pdf retrieved on 26.07.15 https://en.wikipedia.org/wiki/Green_library retrieved on 24.07.2015. E. Anisko, and M. Willoughby, Producers,“Deeper shades of green”, Television mini-series episode, directed by Tad Fettig, narrated by Brad Pitt and Ken Yeang, Arlington, VA: Public Broadcasting Station, 2006. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] Tseng, S.H. (2007) An eco-building, a healthy life, and good service: A new Century in public library architecture [Electronic Journal] Retrieved on 25.07.2015. Forest Stewardship Council [FSC], 1996. Retrieved from http://www.fscus.org/standards_criteria/ on 24.07.2015 L. Boyden and J. Weiner, “Sustainable libraries: Teaching environmental responsibility to communities” [Electronic version] in The Bottom Line, Vol. 13(2), 2000, pp. 74-82. L. Boyden and J. Weiner,“For the public good: Sustainability demonstration in public library building projects” [Electronic version] in Public Libraries, Vol. 40(6), 2001, pp. 44-6. H. Fox, “Seattle central library: Water conservation,” 2004 [Web Video]. Retrieved fromhttp://www.seattlechannel.org/videos/video.asp?ID=2205 New Minneapolis Central Library, MPL, 2006. Retrieved from https://en.wikipedia.org/wiki/Minneapolis_Public_Library http://libraries.universityofcalifornia.edu/groups/files/uc-circ/docs/merced.pdf Retrieved on 26.07.2015. McCabe, G.B. (2003). “New Concepts for Technology in Library Design.” In planning the modern public building, G.B. McCabe and J.R. Kennedy Eds,Westport, CN: Libraries Unlimited, 2003, pp. 31-45. A.P. Lamis, "Greening the library: An overview of sustainable design." In planning the modern public building, G.B. McCabe and J.R. Kennedy Eds, Westport, CN Willoughby (Producers). 2006. Deeper shades of green [Television mini-series episode]. Directed by Tad Fettig,: Libraries Unlimited, 2003, pp.31-45. ISBN 0313321558 ISBN 9780313321559. LEED, Reference Guide, Version 2.2. US Green Building Council, 2005. Retrieved fromhttp://www.usgbc.org/DisplayPage.aspx?CategoryID=19 http://www.usgbc.org/Docs/Archive/General/Docs1095.pdf http://ecil2014.ilconf.org/wp-content/uploads/2014/11/kurbanoglu_boustany.pdf http://www.manlibnet.in/ConventionReport/MANLIBNET2012-Conf-Report.pdf ISBN 1-63102-455-8 183 CLOUD COMPUTING AND ITS APPLICATIONS IN LIBRARY SERVICES Rajpal Singh Rajpurohit | Sr. Librarian | Lachoo Memorial College of Science & Technology | Rajasthan | sidhartrajpal77@gmail.com Abstract: Cloud computing is an evolving technological paradigm that facilitates conveniently, on-demand network access to a shared pool of configured computing resources like network, servers, storage, retrieval, applications and services etc. Information and Communication Technology (ICT) have forced the libraries & Librarians to change in its functioning and processing of the information retrieval system. At present, libraries are moving in advanced level called cloud computing. In cloud computing, the libraries not required the software, operating system and applications in the premises, which will be provided by the service providers. Through this technology, the users can retrieve the information from any part of the world any time, and helps to save the money, time and resources. The future librarians can provide the services effectively without bothering about the technical problems of software, hardware. This paper tries to explore cloud computing origin, different types, its impact in libraries, advantages and disadvantages in library services. Keywords: Cloud Computing; Library Services; Information and Communication Technologies; Information Retrieval; Database Storage; Resource Sharing INTRODUCTION Cloud computing will be the one stop solution to share the information virtually emerged as on- demand computing tool for network access in the form of shared computing concept. Nowadays, cloud computing is the key term is being used in the world of Information Technology and it is the new kind of computing where the virtual resources are shared among the users1. Through the cloud computing, it is possible to share the network, servers, software, applications, storage, and services. The user need not buy all the software, hardware, applications, networks and so on and need not depend on the traditional library. Instead, they can log in to the system and get only required services, for which only they have to pay. In this method, the users will pay for what they have used i.e. pay-per-use model. Cloud computing helps the academic libraries to save the money, time and resources without having the software, OS, hardware in the library premises, which are must to access the information at present. The future libraries may be in the cloud so that libraries can focus directly for materials and services if the libraries hardware and software are directly controlled by the could computing. In this study, the authors have made an attempt to study about the cloud computing, its origin, types, its application in libraries and features. Cloud computing can transform the way systems are built and services delivered, providing libraries with an opportunity to extend their impacts2. Cloud computing offers a new dimension in computing, it Changes how we invent, develop, scale, update, maintain and pay for applications and the Infrastructure on which they are run. In cloud computing data and services reside in massively scalable data centers in the cloud and can be accessed from a web browser. Cloud computing is away of providing various services on virtual machines allocated on top of a large physical pool which reside in the cloud, in other words cloud computers is capable of collecting large quantity of information and resources stored in personal computers, mobile phones and other equipment and integrate them and put them on the cloud for serving users. WHAT IS CLOUD COMPUTING? Cloud computing is not a new technology that suddenly appeared on the web but it is a new form of computing. Cloud computing is a kind of computing technology which facilitates in sharing the resources and services over the internet rather than having these services and resources on local servers/ nodes or personal devices. The 184 ISBN 1-63102-455-8 Cloud Computing And Its Applicationa In Library Services combination of servers, networks, connection, applications and resources is defined as 'cloud'. Cloud computing is acting as a resources pooling technology for accessing infinite computing services and resources as per demand of users and can be compare with models of pay as you use or utility model same as used for mobile services usages and electricity consumption. According to Wikipedia, cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). U.S. National Institute of Standards and Technology (NIST) defines Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources(e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. Buyya3 defined 'Cloud computing is a parallel and distributed computing system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on Service Level Agreements (SLA) established through negotiation between the service provider and consumers.' Origins of Cloud Computing The present state of cloud computing starts with emergence of Internet. The implementation of Virtual Machine came in 1970s, when IBM released VM, allowed distinct computers processing with same environment. In this method, each user will have computer with processor, memory and other peripherals, but majority of the resources will be shared by others. Telecommunication network enabled to start ARPANET (Advanced Research Projects Agency Network), which is the forerunner for the today’s Internet. In 1971 first e-Mail was sent. In 1971, CompuServe and Source both went online showing that commercial service providers can also host Internet. 1993, Mosaic, a graphicalbased browser emerged and soon after netscape, which was used and managed by average users. During 2000, Salesforge.com is the pioneer in delivering enterprise-class applications over a web site. In 2002, Amazon web services gave option to users to access, store and solution through Internet and in 2006, they went even elastic compute cloud (EC2), in which developers may rent space for running their applications. In 2009, Google and Microsoft delivered applications to common users and business companies in the form of simple services5. IBM and Soft Layer were the leading in the cloud-based services. Types of cloud computing Deployment Models Deploying cloud computing can differ depending on requirements, and the following four deployment models that have been identified4, each with specific characteristics that support the needs of the services and users of the clouds in particular ways. Private Cloud: The cloud infrastructure has been deployed, and is maintained and operated for a specific organization. The Operation may be in-house or with a third party on the premises. Community Cloud: The cloud infrastructure is shared among a number of organizations with similar interests and requirements. This may help limit the capital expenditure costs for its establishment as the costs are shared among the organizations. The operation may be in-house or with a third party on the premises. Public Cloud: The cloud infrastructure is available to the public on a commercial basis by a cloud service provider. This enables a consumer to develop and deploy a service in the cloud with very little financial outlay compared to the capital expenditure requirements normally associated with other deployment options. Hybrid Cloud: The cloud infrastructure consists of a number of clouds of any type, but the clouds have the ability through their interfaces to allow data and/or applications to be moved from one cloud to another. This ISBN 1-63102-455-8 185 Cloud Computing And Its Applicationa In Library Services can be a combination of private and public clouds that support the requirement to retain some data in an organization, and also the need to offer services in the cloud. LITERATURE REVIEW Various studies were conducted on cloud computing and libraries related issues such as Khan5 provided the concept of cloud computing and also highlighted that how libraries can be benefited using cloud computing technology by providing some live examples. Pandya6 investigated the implication issues of cloud computing in libraries on the basis of SOWAT analysis and pointed out the strengths, weaknesses, opportunities, and threats associated with cloud computing and libraries. Goldner 7 expressed the view with regard to cloud computing, how cloud computing is differed from the other computing and its advantages to libraries in three basic areas: Technology, data and community. Srivastava8 presented the vision of cloud computing with various commercially cloud services available on the Infrastructure as-a-Service (IaaS) and found that cloud computing is changing the way towards hardware and software for on-demand capacity fulfillment and development of web applications to make business decisions. Sasikala9 argued the concept of cloud computing from the perspectives of diverse technologists, services and models available, cloud standards, cloud in government, enterprises and higher education, along with opportunities, challenges and implications on the basis past, present and future situation. Wang10 examined the trends of cloud computing on the basis of extant information systems literature, industry reports and practical experience reflections and also pointed out the significance of cloud computing and its implications for practitioner and academics.    OBJECTIVES To define the concept of cloud computing. To discover the library services that are clubbing with cloud computing technology. To investigate advantage and Limitations to adopt cloud computing into library services. TYPES OF CLOUD COMPUTING SERVICES Cloud Providers offer services that can be grouped into three categories:Software as a Service (SaaS): In this model, a complete application is offered to the customer, as a service on demand. A single instance of the service runs on the cloud & multiple end users are serviced. On the customers side, there is no need for upfront investment in servers or software licenses, while for the provider, the costs are lowered, since only a single application needs to be hosted & maintained. Today SaaS is offered by companies such as Google, Sales force, Microsoft, Zoho, etc. Platform as a Service (Paas): Here, a layer of software, or development environment is encapsulated & offered as a service, upon which other higher levels of service can be built. The customer has the freedom to build his own applications, which run on the providers infrastructure. To meet manageability and scalability requirements of the applications, PaaS providers offer a predefined combination of OS and application servers, such as LAMP platform (Linux, Apache, MySql and PHP), restricted J2EE, Ruby etc. Google s App Engine, Force.com, etc are some of the popular PaaS examples. Infrastructure as a Service (Iaas): IaaS provides basic storage and computing capabilities as standardized services over the network. Servers, storage systems, networking equipment, data centre space etc. are pooled and made available to handle workloads. The customer would typically deploy his own software on the infrastructure. Some common examples are Amazon, GoGrid, 3 Tera, etc. ADVANTAGES OF COULD COMPUTING IN LIBRARY SERVICES Following are the advantages of using cloud computing 1. 2. 186 Service oriented architecture: the cloud is provided access to resources, software, networks, applications through web, which is controlled by remotely located data centres. Pay per use model: it works on demand. We can demand the service for certain period like for few days or few weeks or months. ISBN 1-63102-455-8 Cloud Computing And Its Applicationa In Library Services 3. 4. 5. 6. 7. 8. 9. Cost effective: The resources, services, software etc are shared by group of institutions by cutting down the individual institutes cost. Comparing to the traditional method of computing, cloud computing billing may be comparatively less. Portability: since the service is available over the web, the service can be availed through browser from any part of the world. Eco-friendly: since it is pay for use model, consumption of electricity will be minimum. Hence, it helps green computing. Adjustable storage: in the traditional system, if the server is less than what we have. The server should be replaced with the new one. In this computing, the storage capacity can be adjusted according to the needs of the institute, since the storage is controlled by the service provider Flexible and Innovative: new technologies will be informed as and when available with the service provider and the service utilized will be more flexible when comparing with the traditional computing Cloud OPAC: Most of the institutes in the world are having the catalogue over the web. These catalogues are available with their institutes local server made it available over the web. If the catalogue of the institutes made it available through cloud, it will be more benefit to the users to find out the availability of materials. When the data comes to cloud, the data becomes cloud, which can be shared among the users. The need for storage in local server, installation, maintenance and backup is removed so that the librarians can concentrate on innovative services. LIMITATIONS OF COULD COMPUTING IN LIBRARY SERVICES Any technology will have its own limitations. Below mentioned are some of the limitations in Cloud Computing. 1. 2. 3. 4. Moving to the trusted cloud computing service will become a challenging task. Security: Library deals with information and has large volume of information. In order to have cloud computing the data has to be uploaded to the cloud machine. Hence, there should be strict service level agreement before entering into the process. Reliability: reliability is the big question in cloud computing. Once entered in to cloud computing, if the companies satisfy as per the service agreements, it will be good. Data back up, intellectual property rights are the other problems which has to be taken care before. CONCLUSION This study provides cloud computing concepts and implications of cloud based applications in libraries in order to enhance their services in a more efficient manner. No doubt, libraries are moving towards cloud computing technology in present time and taking advantages of cloud based services especially in building digital libraries, social networking and information communication with manifold flexibilities but some issues related to security, privacy, trustworthiness and legal issues were still not fully resolved. Therefore it is time for libraries think seriously before clubbing libraries services with cloud based technologies and provide reliable and rapid services to their users. Another role of LIS professionals in this virtual era is to make cloud based services as a reliable medium to disseminate library services to their target users with ease of use and trustworthiness. REFERENCES [1] Tuncay Ercan, “Effective use of clod computing in educational institutions”, Procedia Social and Behavioral Sciences, 2, (2010): 938-942. [2] G. Matt. (Winds of change: Libraries and cloud computing. OCLC Online Computer Library Center. (2010). [Online]. pp. 5. Available: http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-windsof-change-paper.pdf [3] Buyya, R., Yeo, C.S., Venugopal , S., Broberg, J. & Brandic, I. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing asthe 5th utility. Future Generation Computer Systems, 25, (2009): 599616. [4] Dialogic Making Innovation Thrives. A White Paper on Introduction to Cloud Computing. [Online]. Available: https://www.dialogic.com/~/media/products/docs/whitepapers/12023-cloud-computing-wp.pdf [5] Khan, S., Khan, S. & Galibeen, S. Cloud computing an emerging technology: Changing ways of libraries collaboration. International Research: Journal of Library andInformation Science, 1(2). (2011). [6] Pandya, M. Cloud computing for libraries: A SWOT analysis. 8th Convention PLANNER-2012 Sikkim University, Gangtok, (2012). 387-394 ISBN 1-63102-455-8 187 Cloud Computing And Its Applicationa In Library Services [7] Goldner, M.R. Wind of change: Libraries and cloud computing. BIBLIOTHEK Forschung und Praxis, 34(3), (2010):270-275. [8] Srivastav, K. & Kuma, A. A new approach of cloud: Computing infrastructure on demand. TRIM, 7(2), (2011):145153. [9] Sasikala, P. Cloud computing: Present status and future implications. International Journal Cloud Computing, 1(1), (2011): 23-36. [10] Wang, W.Y.C., Rasid, A. & Chung, H.M. Toward the trend of cloud computing. Journal of Electronic Commerce Research, 12(4), (2011):238-241. [11] Anna Kaushik and Ashok Kumar, “Application of Cloud Computing in Libraries”, International Journal of Information Dissemination and Technology, 3 no. 4, (Oct.-Dec. 2013): 270-73. [12] Kulveen Kaur, “Moving libraries to the cloud”, International Journal of Information Dissemination and Technology 4, no.1, (2013): 28-30. 188 ISBN 1-63102-455-8 ROLE OF E- RESOURCE MANAGEMENT IN ACADEMIC LIBRARIES Dr. Pankaj Kumar | Assistant Professor – Library | A.K.P. (P.G.) College | Khurja | Bulandshahr | U.P. | pankaj.lib123@gmail.com Abstract: Academic system largely relies on teaching, learning and research. Eternally, education depends on information resources. These resources are the driving forces for making an educated society. The educated society can exit only when information is stored, shared and utilized properly in an academic arrangement; both ‘education’ and ‘library’ are inseparableindivisible concepts. Working for the promotion and evolution of teaching, learning and research for greater use of academia. It is the age of information, every person, and industry also a country that has information is powerful. But every of the person who has current information is more powerful than others; that can be solved through electronic sources it is because e-resources can accessed with short time throughout the world. Electronic resources are one of the emerging environment in libraries & information communication in the competitive service. E- Recourses usually consist of e-books, e- journals, articles, newspaper, thesis, dissertation, databases and CD-ROMs, which are likely to be the alternative to the print media. Emerald, Ebsco, Scopus are some of the examples of online databases. All updated information is published in these eresources. The familiarity and use of electronic information resources in the libraries for rapid development is necessary and important. This paper explains types of E-resources, need of Eresources as well as features of E-resources. This paper also discusses about the advantages and disadvantages of E-resources. Keywords: Electronic Resources, Electronic Resource Management (ERM), E- Journals, E- Books, Features of E- Resources. INTRODUCTION Electronic Resource Management (ERM) is the practices and software systems used by libraries to keep track of important information about electronic information resources, especially internet-bases resources such as electronic journals, databases, and electronics books. The most time consuming and labor intensive aspect of populating an electronic resource management system is the input of terms and conditions from license agreements. Meridian and other commercial ERM systems provide pre- defined fields to documents usages rights and restrictions. The capability to store an entire license agreement and link to the full text of terms and conditions housed on vendor websites is also available. An electronic resource is defined as a resource which requires computer access or any electronic product that delivers a collection of dada, be it text referring to full text bases, electronic journals, image collections, other multimedia products and numerical, graphical or time bases, as a commercially available title that has been published with an aim to being marketed. These may be delivered on CD- ROM, on tape, via internet and so on. Over the past few years, a number of techniques about related standards have been developed which allow documents to be created and distributed in electronic form. The e- resource on magnetic and optical media has a vast impact on the collections of university libraries. E-resources starting get developed during year 2001-2002 as a result carry out by Tim Jewell at the University of Washington. The digital library federation and NISO began a continued effort in May 2002 to develop electronic data. These standards were published in 2004 as electronic resources management; report of DLF ERM initiatives. Science the publication of the report several vendors of integrated library system have released ERM products. Till them the contribution of E- resources in literary field is increasing day by day. “Electronic resources includes website, online databases, e-journals, e-books, electronic integrating resources and physical carriers in all formats, whether free of fee based, required to support research in the subject covered, may be audio, visual or text files etc.” ISBN 1-63102-455-8 189 Role of E- Resource Management in Academic Libraries TYPES OF E- RESOURCES Types of E-resources are: E-Books: An e-book is an electronic version of book that can be read by using a personal computer or by using e-book reader. User can purchase an e-book on diskette or CD. A e-book available fully electronically via a web site on the internet; E- books are preferred by the users for their features like portability, upgradability, note making, citation, changeable font size, references links to other relevant sites, searching etc. E-Journals: E-Journals are available in the electronic form and can be accessed using computer and communication technology. It could be available free or as part of a paid service. E- Journals have now become a major source of information delivery for scholars and researchers. Their timely production, delivery, Incorporation of multimedia, hyper linking and searching facility has attracted the interest of people. Library catalogs: Most libraries now provide access to their catalogs from their web sites. Many others provide information about their holding into larger databases such as World Cat or the RLG Union Catalog the Library provides links to these catalogs under the “Catalogs” section on its web site. Reference sources: Many dictionaries, almanacs, encyclopedias, and other reference sources are now available online in full-text; you can locate these resources through the Library’s Database Finder, the Library Catalog or through many of the Library’s Research Guides by Subject. Statistical Sources: The library has access to a variety of subscription databases which provide economic data or statistics. You can locate these resources through the Library’s Database, the Library Catalog, or through many of the Library’s Research Guides by subject. Be aware that there are many statistical sources available in print which cannot be found online. CD-ROM: CD-ROM is a non volatile optical data storage medium using the same physical format such as audio, compact discs, readable by a computer with a CD-ROM drive. Various dictionaries, directories, year books are available on CD/DVD ROM. Sound Recording: There are only a few Library databases which provide access to sound recordings. If you are looking for music online, start at the Music Subject Guide for the resources which are available to the University of Chicago Community. Image Databases (Art, Maps, Medical, etc.): Some databases include graphic or images, such as photos, paintings or maps. You can use the Database Finder page to locate these. The art subject guide also provides extensive information about locating images. Hard Disk: It includes Hard Disk of Library Server or Organization Server. It provides 24x7 accessibility of eresources. Other Portable Devices: It include pen drive, we can easily shift huge data in electronic form from one place to another place.       NEED OF E- RESOURCES To providing current information. To find the objectives of the organization. Save the time of users and staff. Users can find his/her desired information. To solve the problem like space in library. To solve the problem like information explosion. FEATURES OF E-RESOURCES: There are some important features of E- resources:     190 E- resources can be used by multiple users at a time E-resources can be accessed very fast. We can access desired information through online within minute. Electronic resources are having remarkable effect on information value chain. Electronic resources are used for the modernization of the library and information centers. ISBN 1-63102-455-8 Role of E- Resource Management in Academic Libraries        It can be used for optimum utilization of library resources. The open sources electronic resources can be used for the content management. They are supporting in archiving and preservation of cultural and heritage knowledge. Electronic resources can be utilized for the electronic publishing. Digital resources are facilitating information storage and retrieval. E-resources can be storage easily. It can be secured on CD, DVD, Pen Drive and Hard Disk. It covers minimum space. E-resources are not time bound. It can be accessed in 24x7 at any place. ADVANTAGES OF E- RESOURCES: Main advantages of E- Resources are:            Save the Time of Users: E- Resources save the time of the users; in past times whenever any user of the library want to get any information from the library, then most of the time of the user was spent on getting the information within the library. But now users can get any desired information within or outside the library in electronic form through online at any time and any place. Quick Retrieval: Library users can retrieval needed information in less time in the form of E-resources on computer screen. It is available quickly. Common platform: E- resources provide common platform for all users, because all e-resources are available on library sever in online mode and users are free to use this service without any cost. Therefore huge e-collection can be used by users on common platform. Multi access: A networked product can provide multiple point of access at multiple points in time (24 hours a day & 356 days in a year) and to multiple simultaneous users. Flexibility: E- Journals evolved quickly. They are not tied to a format, printer and distribution network. Space: E- Resources solve the space problem. Library collections in printed form cover the maximum space of the library but e-resources covers minimum space. Budget: E-Resources are less expensive than printed form. It includes cheap and best collections. Download: E-resources can be easily downloaded through internet at nay place of the world at 24x7. Speed: - An electronic user is a lot quicker to browse or search, to exact information form and to integrate that information into other material and to cross search or reference between different publications. Easily searchable: each journal can be searched quick and easy often through the complete full text or articles and via online index. Links: Hypertext format should be exploited and links to related articles, information on other web sites, stable URLs for individual articles and email alerts when latest issue loaded. DISADVANTAGES OF E- RESOURCES Main Disadvantages of E- Resources are:       E-resources are very costly. If any library wants to subscribe, it individually it will be managed very costly. Difficulty reading computer screens. Limitations of computer monitor. Some users of the library prefer printed books therefore they can’t prefer e-resources. Search engine ignores PDF files. Accessibility of e-resources always depends upon internet connections. ISBN 1-63102-455-8 191 Role of E- Resource Management in Academic Libraries CONCLUSION To conclude we can say that in near future impact of E- resources will increase and information will become like the meal. It is because scientists, teachers and research scholar as well as general society are depending on E- resources. E-resources are important part of the library collection. Any library can't satisfy in users without purchase or subscribe E- resources. Today library users are more aware they want to get required document or information in less time and their demands can be fulfilled through E-resources. REFERENCES [1] Bhataini, Suamn. (2013). E- resources: usage in Delhi University Library System www.nlist.inflibnet.ac.in/(accessed on 26/03/2013) [2] Govindaraju, Nemani. (2010). Use and user awareness of E-resources in Andhra University Library: A study. PEARL: A journal of library and information science, 4(3), pp.183-188. [3] Narayana, Pooranima. (2005). E- Resources Management through portal: A case study of technical information center. International conference of knowledge management (ICIM 2005), 222-25 Feb 2005, pp.17-19. [4] Singh, Pravin Kumar and Prasad, H.N. (2011) Access web-based electronic resources in agricultural research. Trends in Biosciences, Kanpur, 4(1), pp. 5-7. [5] Sinha, Manoj Kumar; Sinha, Gauri and Sinha, Bimal. (2011). Usage of e-resources available under UGCINFONET digital library consortium by Asaam University Library Users. 8th international caliber-2011, Goa University, Goa. March 02.04.2011. [6] Vishakhi, P. (2009). Consortium for e-resources in agriculture. DESIDOC Journal of library & information technology, 29 (5), pp.24-30. [7] http://inflibnet.ac.in/econ/ (accessed on 30 March 2013). [8] http://en.wikipedia.org/ wiki/library. 192 ISBN 1-63102-455-8 TOTAL QUALITY MANAGEMENT IS NOT A QUICK FIX FOR LIBRARIES Dr. MANGE RAM |Deputy Librarian & Incharge | Central Library | Dayalbagh Educational Institute | Dayalbagh, Agra | U.P. | mram721@rediffmail.com Abstract: The present paper explores the concept of Total Quality Management in general and application to libraries. TQM is not a quick fix solution for the libraries, it takes time for application. TQM means quality in all aspects, operations, services, personnel and products of any organisation or company. Measurement of application of TQM in libraries is not an easy task as its measurement comes from library personnel’s satisfaction and most form the users of the libraries. Users are different kind nature and satisfaction of all users in libraries is not an easy task. The present paper explores above all concepts of Total quality Management. Keywords: Total Quality Management, Library, Library Process. INTRODUCTION Total Quality Management is a management approach that initiated in the 1950-51 and has gradually become more popular since the early 1980-81. In the aftermath of the Second World War, American industry, basking in success, did not want to listen to Dr. Edward Deming’s quality philosophy. In 1950 he was sent to explode postwar Japan by the MacArthur Government- as an adviser to the Japanese census. While he was there, he met some of the members of the Japanese Union of Scientists and Engineers (JUSE) with the intention of helping them to rebuild their industry. He spoke to some 100 (hundred) Japanese senior managers about his quality philosophy. At the same time, Dr Joseph Juran was also stressing to Japanese the customers’ point of view of a product’s fitness for use, and was advocating extensive training and hands-on management to satisfy customer’ requirements. The Japanese industrialists listened to Deming and Juran and learned from their teaching. The result was that they apprehended markets all over the world and today, Japanese companies are not just competitive but they dominate the world market and, true to Dr Deming’s predication’ the rest of the world is seeking protection from them. In 1970, Oil crisis forced Japan to eliminate waste in the use of all resources as a matter of survival. This involved the involvement of all organization personal to work towards one common objective. In the true sense, then, TQM was launched providing an ultimate way of quality thinking shared by everyday in the organization. Some of the companies who have implemented TQM include Ford Motor Company, Phillips Semiconductor, SGL Carbon, Motorola and Toyota Motor Company. TQM DEFINED Total Quality Management, TQM, is a method by which management and employees can become involved in the continuous improvement of the production of goods and services. It is a combination of quality and management tools aimed at increasing business and reducing losses due to wasteful practices. The modern concept of quality is defined as conformance to requirements, and requirements are defined as the task to be accomplished in meeting customer needs. Quality cannot be examined into the products or services; the customer satisfaction must be designed into the whole system. The confirmation check then makes sure that things according to plan. In general, TQM is defined as follows: • • • Quality is to satisfy agreed customer requirements continually. Total quality is to achieve quality at low lost. Total quality management is to obtain total quality by involving everyone’s daily commitment. Some of the management experts like Jurow & Barnard define TQM as “a system of continuous improvement employing participative management and centred on the needs of customers. ISBN 1-63102-455-8 193 Total Quality Management Is Not A Quick Fix For Libraries According to ISO definitions Total Quality Management is “management approach of an organisation centred on quality, based on participation of all its members and aiming at long terms success through customer satisfaction and benefits to all members of the organisation and society. ” J. L. Riggs (1979) says that “Today quality control is taking on the emphasis of quality assurance the means to achieving true product reliability. Reliability cannot be inspected into a product; it must be designed and built in” TQM is a management philosophy that seeks to integrate all organizational functions (marketing, finance, design, engineering, and production, customer service, etc.) to focus on meeting customer needs and organizational objectives. The ability to fulfil customer requirements is essential not only between companies but within the same company. In every organisation, every department, every section and even every small unit is a series of customers and suppliers. The secretary of a department is a supplier to the head of the department. He/She has to meet his/her customer‘s requirements. FACTS OF TQM The quality philosophies of Deeming which have given birth to TQM and have created the second industrial revolution in the world. They are the following list of 14 points for management (see Deeming, 1986; Neave, 1987) which created revolution: • • • • • • • • • • • • • • Constancy of purpose: create constancy of purpose for continual improvement of product and service. The new philosophy: adopt the new philosophy. We are a new economic age, created in Japan. Cease dependence on inspection: eliminate the need for mass inspection as a way to achieve quality. End ‘lowest tender’ contracts: end the practice of awarding business solely on the basis of price tag. Improve every process: improve constantly and for every process for planning, production and service. Institute training on the job: institute modern methods of training on the job. Institute leadership: adopt and institute leadership aimed at helping people and mechanics to do a better job. Drive out fear: encourage effective two-way communication and other means to drive out fear throughout the organization. Break down barrier: break down barrier between department and staff areas. Eliminate exhortations: eliminate the use of slogans, posters and exhortations. Eliminate targets: eliminate work standards that prescribe numerical quotas for the workforce and numerical goals for people in management. Permit pride of workmanship: remove the barriers that rob hourly workers, and people in management, of the right to pride of workmanship. Encourage education: institute a vigorous programme of education and encourage self-improvement for everyman. Top management commitment: clearly define top management’s permanent commitment to everimproving quality and productivity. APPLICATION OF TOTAL QUALITY MANAGEMENT IN LIBRARIES A universal misinterpretation about quality is that it is only concerned with objects in industries and companies. This is not true, as we know that hospital, banks, hotels and retail shops already documented the facts that quality of service is an essential factor in the customer’s decision to be a regular customer. Manufacturing companies are also beginning to understand the necessity of quality of service to retain customer, and the need for well-trained, obliging and well-informed staff to maintain quality of service. It is not only the person with direct involvement with the customer who has to establish these qualities, but also the support staff who must have the same goals of fulfilling customer needs in any organisation. Now service provider organisation are also taking much interest in application of TQM as it prove its impotence in an efficient way. Now, libraries are also starting to understand the requirement of quality of service to retain customer, and the need for well-trained, obliging and well-informed staff to maintain quality of service in the library. Now the entire environment of libraries has changed from traditionally to electronically in a modern 194 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education way of technology. The physical form of collection has changed drastically as result of recent developments in resources of libraries transformed into e-resources and in this environment the application of TQM may support to library manager to justify their roles. The application of Information Technology compels library personals to shift from the traditional form of library practices to the one which delivers the best of services conforming to the user’s requirements. User is most important to a library; if he /she is not satisfied with the library services then he/she looks certainly another alternative. User is the main determinant of the standard for quality of service in library and information centres. The librarian/information officer should identify reader’s requirements and set certain goals to be achieved, thus reducing the dissatisfaction of the readers. TQM in Collection of Library Library should be design standard and well defined “acquisition policy” for ensuring qualitative (rather than quantities) and balanced (rather than uneven) growth of their library collection through joint efforts with their respective users community. Library manager should keep the following points in mind: • • • • Qualitative approach to acquisition rather than quantitative. Selection of material should be based on user’s requirements rather than on approval. Promptness in delivering and payments etc. Neatness in budget keeping. TQM in Library Process Now, users have approach to OPAC (Online Public Access Catalogue) and WebOPAC instead of manual searching of documents. We may no longer be fussy about punctuation marks and other such little useful aspects prescribed by the catalogue codes rather should instruct the machines to do all sorts of permutation and combinations in doing all such jobs for our patrons in desired fashions. TQM in Library Services TQM should be applicable in all services of library (reference service, scanning, printing, reprography, internet service, user education, e-journal and eBook services etc.) in an efficient way to facilitate user in qualitative way instead of quantified way. Library personnel should create the awareness about the resources, services and facilities provided by their libraries. There should be maximum utilization of library resources with the provision of information literacy program. Circulation TQM presuppose that the systems in operation should by and large provide for quick and accurate information on 1) Where a particular document is at any given point of time; 2) it when due for return, if issued 3) how to reserve it 4) subject wise issue/return statistics, etc. so essential indicators for ensuring judicious & optimum use of the collection; and further enriching the collection. Now, we may justify the application of TQM in circulation service with the application of ICT. ROLE OF LIBRARY PERSONNEL IN TQM Quality is not just the responsibility of one person in the organisation. This is the message. Everyone involved directly or indirectly in the production of an item or in the performance of a service is responsible. Unfortunately, something that is viewed as everyone’s responsibility can fall apart in the implementation phase because one person may feel that someone else will follow the appropriate procedures . Library personnel play any important role in application of TQM, they the basic and important assets of any library. Any thinking on the TQM would be incomplete if the most crucial element-the people (staff), responsible for the making it happen are not given due attention. Quality will definitely come up when every individual in the library is taken into self-assurance and when all of them are made clear about the library’s mission, goals and objectives. This element presupposes that the pursuit of quality must begin from the top down. Training and retraining employees is an essential element in the quality process in any library. ISBN 1-63102-455-8 195 Total Quality Management Is Not A Quick Fix For Libraries TQM IS NOT A QUICK FIX TQM is a continuous process of any organization like libraries, it takes time. There are many stages in application of Total Quality Management. The process of TQM in any organisation can be developed in the following four stages: a) Documentation and preparation • Identifying and collecting information about the organisation in the prime areas where improvement will have most impact on the organisation’s performance. • Preparing the detailed basic work for improvement of all the organisation’s activities. b) Management understanding and commitment • Making sure that the management understands the objectives and methodology of TQM and are prepared to adopt them all the time. c) Arrangement for improvement • Identifying and resolving quality issues by involving all management and supervision in a proper scheme of training and communication. d) New creativity , new target and critical examination • Starting new initiative with new targets and taking the complete improvement process to everybody, indicating suppliers and customer links in the quality chain. • Obtaining information about progress and consolidating success. Total quality improvement can be achieved rapidly by the proper use of appropriate quality techniques. Choosing the right kind of techniques for the TQM process is one of the vital roles of senior management and the degree of success will depend on their skill. TQM is Continuous Process TQM is mainly concerned with continuous improvement in all stages, from high level strategic planning and decision-making, to detailed execution of work elements on the shop floor. It stems from the belief that mistakes can be avoided and faults can be prevented. It leads to continuously improving results, in all aspects of work, as a result of continuously improving capabilities, people, processes, new technology and machine capabilities. Continuous improvement must deal not only with improving results, but more importantly with improving capabilities to produce better results in the future. The five major areas of focus for capability improvement are demand generation, supply generation, technology, operations and people capability. A central principle of TQM is that mistakes may be made by people, but most of them are caused, or at least permitted, by faulty systems and processes. This means that the origin cause of such mistakes can be identified and removed, and repetition can be prevented by changing the process. It is clear that TQM is a continuous process for the improvement and it takes time. TQM does not come in a day or month or one year, TQM is not a quick fix, it takes time for application in any organization. TQM MEASUREMENT There are many tools and approaches to measuring the quality, some of them as follow: (i) (ii) (iii) (iv) (v) 196 User/Customer Survey User’s/Customer complaints Suggestion Boxes Organisation Culture Human Resource management ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education BARRIERS OF TQM There are some barriers of TQM which comes time to time in all stages in application of TQM. While TQM clearly has positive aspects, implementing it can have potential challenges as well. Jurow and Barnard (1993) identified four barriers to the adoption of TQM in libraries: 1) vocabulary: objections to terms such as “total,” “quality,” and “management” which imply that high standards are not already being met; 2) commitment: TQM takes several years to implement and require a long-term commitment by library managers; 3) process: our culture tends to be impatient and we try to solve problems quickly, contrary to TQM’s careful process analysis; and 4) Professionalization: profession staff can be resistant to turning over their practices and services to what they are perceive as the “uniformed whims of the customer.” Sirkin (1993) also notes that it is not possible to satisfy everyone’s demand s; choices will need to be made. CONCLUSION Total Quality Managements was initiated basically for profit making organisation, industries and companies etc., after the success of TQM in these organisation, it gradually entered in service provider organisation like hospital, railways, education and libraries etc. Libraries are idyllic place to implement total quality management. Libraries are service organisations dedicated to their customers, the patrons. By formulating a strategic plan, and following it with a commitment to continuous quality improvement, library managers can convert and improve their organisations (Riggs 1992) summarizes the notable principles of TQM: 1) manage by fact: make library decision after careful analysis of data gathered with tools 2) eliminate rework: library work is often labour intensive-simplify it and make sure it is done properly the first time; 3) respect people and ideas: staff are the library’s most valuable resources, and they should be encouraged to point out problems without fear of management; and 4)empower people: trust library staff to act responsibly and give them the appropriate authority to make decisions that can improve the quality of work they do. Finally, remember that TQM is not a “quick fix”. It needs to implement gradually over a two –to- three year period. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] Jurow, S and Barnard, S.B., Ed. (1993) Integrating total quality management in a library setting. Binghamton, NY, Haworth Press. Daleja, Suresh & Saurabh (1999). ISO 9000: A manual for total quality management, documentation and certification for ISO 9000. New Delhi, S. Chand. Ahluwalia, JS (1997). Total quality management: the transforming role of quality in a turbulent world. New Delhi, Tata McGraw-Hill. Mitra, Amitava. (1998) Fundamentals of quality control and improvement 2 nd ed. Delhi, Pearson. Jurow, S. and Barnard, S.B. (1993). Introduction: TQM fundamentals and overview of the contents. “Journals of Library Administration” 18 (1/2). 1-13 Sikrin, A.F. (1993). Customer service: Another side of TQM. “Journal of Library Administration,” 18 (1/2), 71-83 Riggs, D.E. (1992). TQM: quality improvement in new clothes. “College & Research Libraries” 53 (6), 481-483 (Ej 454720) ISBN 1-63102-455-8 197 DIGITIZATION PROCESS IN LIBRARY AND INFORMATION CENTER: PROBLEMATIC APPROACH Kasifa Khatoon | Library Assistant | Integral University | Lucknow | kashifa.khatoon96@gmail.com Aslam Ansari | Library Assistant | Integral University | Lucknow | aslam.dlis@gmail.com Abstract: This paper examines the concept of digitization. The cognitive flexibility, relational communication and non-verbal immediacy communication theories were used for illustration. It also discusses the challenges often encountered during digitization and the implications for planning and policy. It also revealed that the purposes of digitalization are: to enhance access and improve preservation of library materials. A number of challenges are encountered in the process of digitizing library materials. These challenges include human and technical problems, which have implications for planning and policy. It was concluded that digitization is an essential task in modern day libraries, because of the current challenges, and the need to go digital, that is, provide online services. The new activities, methods and technology used in digitization and formation of digital libraries. Digital Libraries are being created today for diverse communities and in different fields e.g. education, science, culture, development, health, governance and so on. With the availability of several free digital Library software packages at the recent time, the creation and sharing of information through the digital library collections has become an attractive and feasible proposition for library and information professionals around the world. Digitization and digital preservation are very vital to preserve cultural heritage collections, and also make them accessible to the scholars and public. There are document resources, especially manuscripts and rare books, which are very valuable, but they are not allowed to be accessed due to concerns of damage to original documents. By digitization, the originals can be safely secured and the copies used by researchers for any required information. Keywords: Digitization, Digital Preservation, Digital Library, Library and information Center. INTRODUCTION In recent years Technologies are changing very fast .Library professionals are searching for the new roles in order to fit themselves into space that is referred to as digital world Librarians. So, there should be improved processes and additional technological tools that will help to manage information. The most important one is to preserve the documents through digitization and making them accessible on demand or when needed. “Digital Preservation” refers broadly to the series of managed activities necessary to ensure continued access to digital materials for as long as necessary, such as collection, description, migration and redundant storage. The materials subjects to digital preservation may be born digital or be the products of digitization projects. Digital preservation activities are undertaken by a range of preservation institutions, including libraries, archives and museums. Such institution may operate independently or may be located within other bodies, such as educational institutions or government entities. Traditional preservation strategies, such as providing appropriate storage and environmental conditions, are still necessary in the digital environment, but they are not enough to ensure that digital information is preserved. DIGITIZATION Digitization is the process of converting analog information into digital format. The Materials to be converted could be letters, manuscripts, books, maps, audio recordings, microform etc. Three dimensional objects can also be digitized. The goal of digitization is to improve access to the materials. To that end, most digitized materials become searchable via databases on the internet. 198 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Libraries collect and preserve sources of information in order to serve the relevant among them to information seekers. The most obvious benefit of digitization is to preserve and provide the aggregation of various resources, in digital form, using digital technology. Resources are preserved for future generation and simultaneously these are made accessible for the current use also. In order that the materials to be digitized, they may be converted using a method to capture the materials digitally with the help of scanning, digital photography, digital recording, without altering the information that the materials contains. That means the digital representation contains the same information /data as the analog representation. A wide variety of equipment is available to assist in this process. Standards and guidelines exits in order to ensure that the conversion processes used are consistent and correct so that the results are of a high quality. DEFINITION Digitization implies conversion of documents and art works into digital images. Digital images here mean electronic copies of documents. It is a process in which materials are converted from the hard copies to electronic copies. According to Arora (2009) digitization and digital preservation are related to each other in a number of ways. One of the main goals of digitization is to preserve rare and fragile materials by making them accessible to multiple numbers of users simultaneously. In India, digitization and preservation are a major focus of libraries, which have been building their in-house databases and have begun subscribing to electronic resources and other computer-based services since the mid-1980s. The author discusses the challenges involved in preserving digital content and looks at a number of digital preservation strategies. Witten & David (2003) defined digitization as the process of taking traditional library materials, that are in the form of books and papers and converting them to the electronic form, where they can be stored and manipulated by a computer. This basically involves changing analog data into a digital form, so that it is easier to access and also has a long study life. According to Bist (2009) digitization is an important aspect of developing digital libraries, as it opens up new avenues of access, use, research and preservation of valued information resources. The goal of digital preservation is the accurate rendering of authenticated content over time. STEPS FOR DIGITIZATION & DIGITAL PRESERVATION The following points need to be considered:      Selection of samples and producing test images. Preservation quality images- its types and resolution enhancement, grayscale and color Image compression Defining and deriving access quality images Hardware for scanning The Actual works starts for the digitization of the document. The document is scanned with the suggested type and resolution and then the images are compressed and stored in the archival storage. To link the images from point to point, programmers are prepared using HTML, and Microsoft Front Page packages. The access is given by WWW browser to the users. Tools: Primary tools required for digitization of documents can be categorized into:   Hardware Software Hardware: 1. 2. 3. 4. Computer: Since the power of digital images creation lies in computer, speed of computer is of vital concern. Storage Devices Monitors Digitizing devices  Scanners ISBN 1-63102-455-8 199 Digitization Process In Library And Information Center: Problematic Approach 5.  Digital Camera Output Devices  Printers  Modem and CD/DVS Software There are number of software, which can be used for different functions      For Editing images For Page layout programmes, to integrate text and graphics File transferring utilities, to share files between computer platforms. File translation programmes, to convert files from graphics. File compression software DIGITIZATION VERSUS DIGITAL PRESERVATION There is a common misconception that to digitize something is the same as digital preservation. To digitize something is to convert something from an analog into a digital format. An example would be scanning a photograph and having a digital copy on a computer. This is essentially the first step in digital preservation. To digitally preserve something is to maintain it over a long period of time Digital preservation is more complicated because technology changes so quickly that a format that was used to save something years ago may become obsolete, like a 5 1/4” floppy drive. Computers are no longer made with them, and obtaining the hardware to convert a file from an obsolete format to a newer one can be expensive. As a result, the upgrading process must take place every 2 to 5 years or as newer technology becomes affordable, but before older technology becomes unobtainable. The Library of Congress provides numerous resources and tips for individuals looking to practice digitization and digital preservation for their personal collections. Digital preservation can also apply to born-digital material. An example of something that is born-digital is a Microsoft Word document saved as a .docx file or a post to a social media site. In contrast, digitization only applies exclusively to analog materials. Born-digital materials present a unique challenge to digital preservation not only due to technological obsolescence but also because of the inherently unstable nature of digital storage and maintenance. Most websites last between 2.5 and 5 years, depending on the purpose for which they were designed Many libraries, archives, and museums, as well as other institutions struggle with catching up and staying current in regards to both digitization and digital preservation. Digitization is a time-consuming process, particularly depending on the condition of the holdings prior to being digitized. Some materials are so fragile that undergoing the process of digitization could damage them irreparably; light from a scanner can damage old photographs and documents. Despite potential damage, one reason for digitizing some materials is because they are so heavily used that digitization will help to preserve the original copy long past what its life would have been as a physical holding. Digitization can also be quite expensive. Institutions want the best image quality in digital copies so that when they are converted from one format to another over time only a high-quality copy is maintained. Smaller institutions may not be able to afford such equipment. Manpower at many facilities also limits how much material can be digitized. Archivists and librarians must have an idea of what their patrons wish to see most and try to prioritize and meet those needs digitally PROBLEMS IN DIGITIZATION A number of challenges are encountered in the process of digitizing library materials. These challenges include human and technical problems, which have implications for planning and policy. It was concluded that digitization is an essential task in modern day libraries, because of the current challenges, and the need to go digital, that is, provide online services, the new activities, methods and technology used in digitization and 200 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education formation of digital libraries. It set out some key points involved and the detailed plans required in the process, offers pieces of advice and guidance for the practicing Librarians and Information scientists. Even though libraries and librarians all over the world are marching towards digitization, there exist some constraints in the process and their maintenance. The problems facing digitization are Longevity of Storage media Many of the storage media praised by people all over the world may become less useful only long after they become unreadable. Thus documents digitized and stored in such media become useless and their maintenance will be more difficult than print media. The digital archival media today used are magnetic tapes, CD-ROM discs and DVDs. From the scene magnetic tapes disappeared because of their short life due to demagnetization, material decay and oxidation. During 1980’s CD-ROMS emerged into the field and boasted of a longer life span of 30-100 years. Now a day’s most of the CD’s go to the way of 51/4 diskettes. DVD having several standards pushed CD’s behind the screen. The changes and improvements of storage medium put serious questions about the future of digitized materials and their alteration. Technology obsolescence The technology behind digitization is undergoing drastic changes continuously. The computer hardware, software, storage media etc are undergoing great revolution. The digitized materials become unreadable if the background devices become obsolete as time passes by which ultimately results in the loss of Digitization. Migrations The periodic change of digital systems from one configuration to another to overcome the problem caused by technological obsolescence is termed as migration. Migration to a new storage system is more expensive and this will ultimately result in the loss of data. Selections of Documents In an age of information explosion and information pollution, librarians are in a dilemma about ‘what types of records are to be digitized’ and ‘what type of records not to be digitized’. The documents in high demand today may become obsolete even tomorrow because of the vast developments in the subject and printing and publishing industry. A digitized document deselected from the collection is lost forever. To overcome the problem, librarians should seek the advice of subject experts in each field and users of the library about the importance of each and every record and from this list selection of records for digitization can be done. Copyright The issues regarding copyright raise serious matters before librarians in digitization. Research scholars usually include graphs, data from books and journals without prior permission of the author. In a digital library users are always demanding back issues of journals and rare historical archives for which the library has no copyright. This may lead to serious dissatisfaction about digitization among users. As a final solution to this matter, librarians must be given permission to digitize copyright works in connection with digitization The main problems faced by Indian libraries were human resource and IT support, while inadequate funding was the main problem for a majority of Iranian libraries. A large segment of Indian libraries stored digitized material on local computers and CDROMs, DVDs, while a majority of Iran libraries stored digitized materials on departmental servers and central institution servers. CONCLUSION A large majority of Indian libraries used 'AC with low temperature' and 'chemical treatment' for preservation, whereas a majority of libraries used 'anti-termite' and 'chemical treatment' for preservation of heritage collection. Microfilming was the most preferable method among libraries for preservation of heritage collections for the ISBN 1-63102-455-8 201 Digitization Process In Library And Information Center: Problematic Approach development of digital preservation; a large majority of Indian libraries preferred 'an in-house digital repository. Many studies also revealed that, there was demand for using digitized manuscripts and rare books, by the respondents. Hence, it is opined that libraries should digitize more of their resources based on the materials that are in demand. Most of the respondents preferred online open access for using of digitized materials. Hence, it is recommended that access to digital material in the field of heritage resources should be made on-line and free of charge. It can be concluded that digitization will help to preserve heritage resources as well as retrieval of information. What is most important is augmenting the existing programme of sharing the resources in the holdings of these libraries in the networked environment with scholars and the general public. The heritage holdings libraries have to be freely accessed and shared for mutual and reciprocal benefits. It therefore now common, to find more and more information being digitized, and uploaded into the internet or on compact discs so that it is globally accessible, easily and quickly The digitization of collection of a library opens its doors to the world so that local collections get a wider exposition. In the field of Science and Technology, there is emergence of interdisciplinary and multidisciplinary subjects and research reports. Articles are being published in science journals in a huge amount than in the parts. The escalating price of the journals is not affordable to each library. The emergence of E-journals and digitization of journals abstracts and indices reduce the burden of their procurement and save storage of space. Although there are drastic changes in digital technology, finance, Staff training, manpower, infrastructure etc are serious problems to be tackled before libraries attempt for digitization. In a country like India having great history in traditional medicine, ancient art, culture, architecture, etc, the information that our great ancestors gave us through inscriptions, archives, and through rare books is to be digitized for our future generation. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] 202 Arora, J. (2009). Digitisation and digital preservation. DESIDOC Journal of Library and Information Technology, 29(2), 82-84. Bist, R. S. (2009). Digitization initiatives of LBSNAA library: A case study. SRELS Journal of Information Management, 46(3), 267-275. Digital Library Federation. (2001), Registry of Digitized Books and serial publication. (accessed June 10, 2015) http://shodhganga.inflibnet.ac.in/ (accessed June 10, 2015) http://www.ala.org/alcts/resources/preserv/defdigpres0408(accessed June 12, 2015) http://www.dpconline.org/(accessed June 20, 2015) https://en.wikipedia.org/wiki/Digitizing#cite_note-30(accessed July 10, 2015) https://en.wikipedia.org/wiki/Digitizing#cite_note-31(accessed June 23, 2015) https://www.google.co.in(accessed June 15, 2015) Prasher, R. G, and Sharma, R.K(2012)ICT Based Information Management in Indian Libraries. Bookwell, New Delhi. Witten, I. H. & David, B. (2003). How to Build a Digital Library. London: Morgan Kaufman, Publishers. ISBN 1-63102-455-8 LIBRARY REACH TO USER THROUGH SOCIAL MEDIA: PROSPECTS AND PROBLEMS A PRACTICAL APPROACH TO LPU Jitu Mani Das | Central Library | Deputy Librarian | Lovely Professional University | Phagwara | Punjab | dasjitumani7@gmail.com Abstracts: Social Networking tools such as Facebook, Blog, Tweeter, Orkut, Google+, LisLink are popular among the young generation. It attracts users to communicate with similar interest people through networking and information in the form of blogging and social networking. It has become evident that our services will need to change to meet the growing needs of our ends users. Libraries have an important role to play to support these endeavors using these tools. As Facebook has become dominating in the Social Networking sites arena, more libraries have created their own library web-Pages on Facebook to create library awareness and to function as a marketing tool of the library, its resources and services as well. Social media is seen as the transforming power of 21st century librarianship. With innovative application of web 2.0 and 3.0 features. Social networkings become an interactive and intellectual platform for innovative services in various spheres of human life and library is not an exception for this. With its innovative application social networking could enable librarians to make library services more interactive, responsive, and innovative. In this paper I have made an attempt to examine how libraries can make use of social networking and social media skills to provide innovative and intelligent library services to meet the changing and dynamic needs of the users with unlimited economic resources. Key Words: Social Network, Social Media, Internet, Web 2.0, Innovative Library Services INTRODUCTION Library as social institution brings to relation the writer, publisher, librarians and reader. This relationship can also be viewed in terms of producers, intermediary and consumer. Social Networking tools such as Facebook, Blog, Twitter, Orkut, watsapp, Google+, LisLink are popular among the young generation. Libraries and library professionals are not legging behind to use these SNS for the better library service to users. Libraries have an important role to play to support these endeavors using these tools. As Facebook has become dominating in the Social Networking sites arena, more libraries have created their own library web-Pages on Facebook to create library awareness and to function as a marketing tool of the library, its resources and services as well. Social media is seen as the transforming power of 21st century librarianship. With innovative application of web 2.0 and 3.0 features. Social networking’s become an interactive and intellectual platform for innovative services in various spheres of human life and library is not an exception for this. With its innovative application social networking could enable librarians to make library services more interactive, responsive, and innovative. Among all facebook and blog playing most vital role in this case. OBJECTIVES OF LIBRARY 1. 2. 3. To assemble, preserve and administer books and related educational materials in order to promote, through guidance and stimulation, an enlightened citizenship and enriched personal lives. To serve the community as a general center of reliable information. To provide opportunity and encouragement for children, young people men and women to educate themselves continuously. FUNCTIONS OF LIBRARY 1. To increase economic resources of humanity to the extent necessary to maintain the ever increasing population in comfort and free from want of any kind and also. 2. To help in the elevating, self-independent use of leisure with the aid of freely served books, pictures, sounds records and graphic materials. ISBN 1-63102-455-8 203 Library Reach To User Through Social Media: Prospects And Problems A Practical Approach To LPU 3. To help in increasing the opportunity for the spiritual awakening of one and all of the numbers of humanity. 4. Services towards user community. Library Services: Libraries help the user to get the information they want. For this purpose the library staff has developed a number of tools and techniques. In addition the reference library staff provider personalized services, whenever the user is in difficulty. Services other than these normal services one can call as reference services. Social Networking: Network is a set of nodes, points or locations connected by means of data, voice and video communications for the purpose of exchange. A social network is a social structure made up of a set of action such as individuals or organizations with the harmonious lies between these actors. Social networking is a recent invention that has the interact still at the edge of its seat due to its popularity with people. Bringing every kind of social group together in one place and letting them interact and share information is really a big revolution. Research in a number of academic fields has shown that social networks operates on many levels, from families up to the level of nations and play a critical role in determining the way problems are solved, organizations are run and the degree to which individuals succeed in achieving their goals. Interest in social network has grown exponentially with the development and spread of online social networks sites. Social Networks sites are web-based services that allow individuals to (a) conduct a public and semi-public profile within a bounded system, (b) articulate a list of other users with whom they share a connection and (c) view and traverse their list of connection and these made by others within the system. SNSs are commonly viewed as part of the overall Web 2.0 revolution that aimed to enhance creativity, communications, secure information sharing, collaboration and functionality of the Web. WHY SOCIAL NETWORKS FOR LIBRARIES 21st century Libraries are the agents of the growth in the knowledge driven society, being the agent of change they are providing various innovative services with high technical skills. Social networking the way of communication in 21st century. The term social networking refers to a process of relationship building among a group of people who have a common interest with this features it is proved that social networking an innovative platform for re-engineering the Library Services. Services through Social Networking allow users to share ideas, activities, events and interests. Major aims and purposes of Social networking in library are:         To provide a platform to share news and information. To share links to recommended Internet resources. To provide alerts services like SDI and CAS. To provide a platform for students to improve their writing skills through blogs. Building the special interest groups in various subjects to share and discuss their views. To share the AV materials related to various subjects. To assess the needs of the users through social networks. To educate the users about new and innovative services in the library. Social Networking Sites Social Networking Sites are web- based services that allow individual to construct a public or semi-public profile within a bounded system to articulate a list of other users with whom they share a connection and those made by others within the system. USE OF SOCIAL NETWORKING SITES FOR LIBRARY SERVICES Today, libraries are using the latest technologies and trends to make their services popular and user friendly. The concept of a library as physical place where one can visit to get information is rapidly changing to a social cyberspace where users access, communicate and contribute to existing knowledge. 204 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education If libraries have a Facebook profile one can update most of the activities, which of course will be related with the information and its sources easily, and users can also check easily. Some of the library services which can be provided via Facebook to its users connected with Facebook are: 1. 2. Regular update of arrival of new books, documents, journals etc in the library. Providing links of different e-resources, like e-Book, e-Journals, and many other useful websites, which can be providing by directing the users to the links by simply posting on the wall. Whenever a new source becomes available it can be posted instantly and can be updated time to time. 3. Reference services can be provided through instant massages and on chats, which will help the users in selecting the appropriate internet based resources without wasting mush time. 4. It the library and its user group in the Facebook keep active in communication and prepare good user profile with their information interest libraries can provide Current Awareness Services to the particular users. 5. Online open help desk for all the internet users not only for the profile users can also be provided, where guidance may be given in information search process by guiding to the proper search option, proper website and the selection of proper information with good source. 6. Most students are not aware of the different services offered in the library such as reservation of books, reference services and Strategic Dissemination of Information (SDI). The awareness can be given to the student users by providing maximum information of the library in the profile. Since visiting a Facebook profile is considered more appropriate than visiting a library to get the information about the library. 7. The library can create a discussion forum or group for its users so that the user share their knowledge’s and thoughts regarding the library, its services, collection, and any other related topics or even a feedback from its users which will help in the further development of the library. 8. The user will also be able to provide any new information if available which may be of the education related or the institution also. 9. Facebook can be used as a platform for the marketing of the library and regular updates of activities etc. 10. OPAC can be directly link with the Facebook profile. One of the most important aim of librarians is to make library resources available to its users and information seekers so if social networking; Facebook can help achieve this goal then it should be pursued vigorously. 11. The use of Facebook as a tool does not require any special equipment apart from computer, Internet connectivity and a trained professional to manage, which is affordable in most of the Academic libraries at present. 12. Using Facebook as a tool for library services may be more effective for Distance Education students. PROBLEMS OF USING SOCIAL NETWORKING TOOL FOR LIBRARY SERVICES When we discuss about the problems of using social networking, they are not exactly the technical problems but problem from the professional point of view. Being in Facebook require a lot of activeness from the libraries and its professionals side. Librarians must be aware that using social networking as a tool requires a lot of attention both technically and professionally. Though we have to mention that this tool does not require much except for some equipment only but it may be too much for some libraries in certain condition, especially in Developing country like India. There will be need of constant and regular update of profile or the Facebook page at least once a week or more. If not updated it will become useless which require regular monitoring of the page and the library also. In such a case it may not be suitable for very small on convectional libraries instead may be helpful for large and active libraries that host a lot of events, exhibitions, workshops and other activities and having large amount of data’s in its collection. Though it is a good medium for communicating with the users but the library professional should not get too attached to Facebook as there will always be a next or better tool coming up for the purpose. Every technology ISBN 1-63102-455-8 205 Library Reach To User Through Social Media: Prospects And Problems A Practical Approach To LPU changes quickly and the internet is constantly changing; and the libraries and the library professionals should be prepared to leave current tool strategy to jump to the next tool quickly. Another problem from the users side is that most of the Facebook users including the academicians for socializing and recreational purpose and they might not like the idea of combining the education with their recreation, it may take time to adapt the new changes. There will be constant requirement of some professionals to attend the web queries and have to give full time on that which may affect the regular work of the library. Apart from these problems there are some other noticeable problems that may affect, especially in India use of computer and internet is restricted to only a group of people of students though efforts have put to made available of these facilities, but the process is rather slow. LOVELY PROFESSIONAL UNIVERSITY Lovely Professional University is Recognized by UGC under Section2 (f) of the University Grants Commission Act, 1956 by Notification No. F9-10/(CPP-1). LPU recognize as one the India’s largest University with 600+ acres hitech campus, State of the art infrastructure. LPU have combined more than 25000 students from the 29 states of India and 26 countries of the Globe. Around 18000 students are accommodated in the Wi-Fi connected hostels. LIBRARIES OF LPU: LPU is a large university with combination of total 11 libraries including the Knowledge Resource Center (Central Library) and 10 different School Libraries. 1. Knowledge Resource Center (Central Library) , Block No-37 2. Lovely School of Hotel, Tourism and Airlines Management Library 3. Lovely School of Education Library 4. Lovely School of Law Library 5. Lovely School of Business Library 6. Lovely School of Architecture Library 7. Lovely School of Pharmacy Library 8. Lovely School of Polytechnic Library 9. Lovely School of Physical Education Library 10. Lovely School of Physiotherapy USERS VIEWS There are about 15000 days scholars and 5000 night scholars using these Libraries of LPU. I had a survey randomly the different types of user: students, research scholars, teaching staff and non-teaching staff. Numbers of Responds % respond questionnaire Faculties 100 80 80% Non- teaching staff 50 38 76% Research Scholars 50 88 88% Students 200 150 75% Total/ Average 400 356 79.75% Table 1: Number of respondents and Average of response Categories % Non-responds 20% 24% 12% 25% 20.25% L.P.U. is a Higher Academic institution with around 30000, peoples with different kinds- teaching staff, nonteaching staff, Research Scholars, Post Graduate, Undergraduate and diploma students. For this paper I have randomly did survey of the Users to find their view in library use in wireless environment. For this study I have gone through 100 faculties, 50 non-teachings, 50 research Scholars and 200 students (post graduate, undergraduate and diploma). From the total of 400 users I have got back responds from 401 users i.e. 79.75%. 206 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Categories Faculties Android Mobile Laptop Tablet       Non- teaching staff    Research Scholars    Students Table 2: System used by various categories of users Desktop  It is found from the study that 100% of the users are using web connection i.e. internet or Wi-Fi and 100% of the users are using Android Mobile Cell Phone and Laptops and around in each category of users are having Tablets. And users of Desktop in minimum out of all categories, maximum from the non-teaching are technical and office assistants staff they have desktop in the respective office so they used the system for availing the services. As LPU has fully wi-fi campus there is no problem of internet connection so most of the user have android application mobile, tablet and laptop. All the members are having a group in facebook or in watsapp. Services/ Categories Facebook Twitter Blog Watsapp Google+ Lis link LinkedIn Mobile applications SNS Faculties Non Teaching              Research Scholars Students               Table 3: SNS used by different users From the survey conducted though questionnaire methods, it is come to know that all most all the mention SNS are used by user categories. But twitter is use very rare and LIS LINK is used by only few library professional only. From the above mention popular SNS facebook and watsapp are common in the user community. Faculties Non Teaching Research Scholars    Chat    Upload information    Share information    Seeking information    Fun Table 4: SNS used by different users for different purpose Students      From the above tables it is found that all categories of users using SNS for Chatting, upload information, sharing information, seeking different information and for fun. Mostly facebook and watsapp are using for fun as well as they are using for sharing of information also. 1. 2. SNS USING BY LIBRARIES FOR LIBRARY SERVICES TO USER New Arrival: Upload the cover page of new arrivals in the library. Content Page of Print Journals: Content pages are uploading in the facebook group; from there users came to know about the articles in the respective journals. ISBN 1-63102-455-8 207 Library Reach To User Through Social Media: Prospects And Problems A Practical Approach To LPU 3. 4. New Rules: if any new rule of policy is amended by the library committee than it is upload in the facebook page, Lost and Found: If any lost and found happen than the users update the matter in the facebook page. CONCLUSION Though Facebook has been considered as the most recent tool for Library services out of other social networking sites, we cannot deny the availability of various other tools for the purpose. But it has come to the fact that the dimension of a modern library has changed a lot from time to time so as the approach of the information user seekers towards information sources. Especially the students of this new academic environment have different strategy regarding information and acquisition of knowledge. And here Facebook become a prominent amongst its group as based on different study based documents. The emergence of online social networks and its expanding user base demand immediate attention from the side of academic libraries. The library’s profiles on these networks facilitate the reaching out strategy to the new generation users at their own space and time. Using Facebook as a tool has both positive and negative sides but being new in the field still can be considered. REFERENCES [1] [2] [3] [4] [5] [6] [7] 208 Faisal, S.L. (nd). Blogs and Online Social Networks as User Centric Service Tools in Academic Libraries: An Indian Library Experience. Kendriya Vidyalaya, Pattom: India. (Retrieved from http://slfaisal.wordpress.com). Praveen., & Noushia. (2011). International Journal of Digital Library services. Use of Social Networking Site(Facebook) In Making Awareness Among The Library And Information Science Professionals Of University Libraries Of U.P: A Case Study. (Retrieved From www.ijodls.in). Ayiah, Efua Mansa., & Kumah, Cynthia Henewaa. (2011). IFLA 2011. Social Networking: a tool to use for effective service delivery to clients by African Libraries. (Retrieved from http://conference.ifla.org/ifla77). Penzhorn Cecilia., & Pienaar Heila (nd). The use of social networking tools for innovative service delivery at the University of Pretoria Library. (Retrieved from http://www.arl.org). Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites [Electronic Version]. Journal of Computer-Mediated Communication, 12, 1143–1168 (Retrieved from http://jcmc.indiana.edu/vol12/issue4/ellison.html). https://idv.sagapub.com/cgi/content/abstract/23/4/266. Seufert, Andreas, Von Krogh Georg., & Bach. ISBN 1-63102-455-8 RFID TECHNOLOGY: A GATEKEEPER TO LIBRARY SECURITY Dr. Raj Bala Gaur | Sarojini Nagar | New Delhi | rajgaur1975@gmail.com Abstract: As per fifth law of library science library is a growing organism. As the organization grows there are many functional ability and security issues also grows with it naturally. It becomes difficult to handle these responsibilities manually. Similarly library security has always been an area of almost concern for safety for management. But today’s technological world there are many technologies are available for the libraries to resolve any kind of problems whether automation, functioning security issues. Radio Frequency Identification (RFID) is an emerging technology that has been explored and successfully applied in many different areas in the libraries such as document security, circulation of the library collection, time saving service to the users, self-check in and check-out etc. Radio Frequency Identification (RFID) is a technology that identifies objects through a tag containing a microchip and a radio antenna and has been applied in libraries to meet needs for security, self-service and stock management. This paper is describing a technique for deploying RFID systems, how it works and its application in present era in the libraries and also introduce the advantages and disadvantages of RFID. Key Word: RFID, Transmitter, receiver, frequency. INTRODUCTION RFID is a technology that facilitates non line of sight identification. Basic elements of comprehensive RFID systems for library kind of environment are tags, readers, and library management System. RFID streamlines work flow in the area of self service, book return, shelf management and inventory. RFID stands for Radio Frequency Identification technology. Radio Frequency Identification technology is the latest technologyto make their security strong and automated identification surveillance system in the libraries.Radio-frequency identification (RFID) is a technologywhich is used to automatically identifying an object, person and a package by using radio signals. For this,its depends onRFID tags. RFID is a complement for distant reading of codes. These are small transponders combined radio receiver and transmitter that will transmit identity information over a short distance, when asked. RFID Design and its Components 1. RFID Tags 2. Readers 3. Antenna 4. Server  RFID Tags: RFID tags play a very significant role in the system.Tags are not required any electric power to function. These tags can be fixed on an object in the library like books; CDs DVDs. Theses tags are prepared with a programmable chip and an antenna. There are three types of tags available i.e. read only tagswhich are encoded at the time of manufacturing and the information cannot be changed by rewriting, WORM tags are write-once-read –many programmed by the organization but without using the capacity to rewrite them later and Read/ Write tags are usedin libraries in which the stored information can be changed or rewrite as its common practice to secure the information e.g. the identification number of books/CDs/DVDs.  Readers:Reader is also a component of RFID technology. It works as a receiver device, detect the signal as it enters into its radio range and decode the number for interpretation. There are two types of RFID readers available i.e. (ARPT) An Active Reader Passive Tag system has an active reader, which transmits interrogator signals and also receives authentication replies from passive tags. And second one (ARAT) An Active Reader Active Tag system uses active tags awoken with an interrogator signal from the active reader. Fixed readers are set up to create a specific interrogation zone which can be ISBN 1-63102-455-8 209 RFID Technology: A Gatekeeper To Library Security tightly controlled. This allows a highly defined reading area for when tags go in and out of the interrogation zone.  Antenna:An antenna does the work of receiving and transmitting the signal. The antenna produce radio signals to activate the tag and read write data to it. These antenna works as a channel between a tag and the reader which control the systems data acquisition and communication. Signaling between the reader and the tag is done in several different incompatible ways, depending on the frequency band used by the tag.  Server: The server is the heart of some comprehensive RFID Systems. It is the communication gateway among the various components (Boss2004). Optional Components of RFID Optional RFID system includes the following components:  RFID Label Printer: It is used to print the labels with an individual barcode, library property slip etc when the print is applied, it simultaneously programs the data in to the chip. After the processes, the RFID label is taken from the printer.  Handheld Reader: It is basically used in stock verification, used in search for individual book on request asit is handy and easily movable.  External Book Return/ Book Drop Station: It is machine with a slot with a chip RFID reader integrated into a wall. User identifies him or her then put the books into the slot. After completion of return, user gets a receipt showing his details of books retuned.  Self-checkout station: It is a touch screen computer and built in RFID reader, software for personal identification, document handling and circulation.  Anti-theft Detection Gates : RFID EAS Gates is the anti-theft part of the Library RFID Management System using the same RFID tags embedded in the library items. Each lane is able to track items of about 1 meter and would trigger the alarm system when an un-borrowed item passed through them. The alarm will sound and lights on the gate will flash as patron passes through with the un-borrowed library material BENEFITS OF RFID USE IN LIBRARY  RFID improves library workflow by reducing non-value added work processes  Improves staff productivity: library staff can focus on other value added services  Improves customer service: manual system limit patrons for wait in a long queue but RFID technology reduce this limitation which results in improved service.  Assist inventory check with ease with help of RFID Technology  Easy book identification for shelving process  Assist traceability of book allocation  Enhance book return processes by full automation of check-in, EAS activation and system updates completed simultaneously in the self-return chute  Allow better accuracy in book collection management, resulting in reduced book purchase  More than one item can be checked out or checked in at the same time.  Items can be placed on reader without careful placement that it is required for line of sight system.  Faster inventory process.  Ability to locate specific items RFID SYSTEM WORKING IN LIBRARY In the library context, RFID works by placing a one-inch passive tag, without power supply, in each library item ( book,CD,DVD, etc.). Each tag contains only barcode information for that item. When library patrons place items to be checked out on or near a receiver pad and insert their library card, the items are checked out to them. This occurs when the minute electrical current induced in the antenna by the incoming radio frequency scan (from the transmitters/receiver) provides enough power for the tag to send a response to the receiver. Items can also be checked back in easily, saving time and energy and simplifying up- to- date inventory tasks.RFID in the check-out/check-in system in intended to promote efficiency and help free library workers to have more contact 210 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education with the public. By allowing patrons to check out their own materials and by making the library’s check-in process more efficient, RFID allows Library workers to help patrons seek information, find materials and use library equipment such as Internet computers and copy machines. Those friendly conversations across the check-out desk will now take place throughout the library. No library staff members were or will be laid off due to the implementation of RFID. RFID tags are already being used on individual books in pilot program in libraries in the U.S. and Canada. In these cases, grants are covering the cost of implementation by companies like VTL. The fact that books circulate drops the cost per book use to a reasonable level. Once a person is identified as a library patron, check-out is easy. The patron walks past the check-out reader station and without stopping the books are recorded as checked out. Similarly, patrons can check in any time just by dumping the books down the return chute, where a reader automatically records their return. A special wand that reads every chip on every book on the shelf allows librarians to know instantly which books are in or out or improperly shelved. ADVANTAGES OF RFID IN LIBRARIES  Rapid Check in/out: RFID technology's ability to read ID tags regardless of position or orientation, as well as detect signals through physical materials, is particularly advantageous for library circulation processes. Since several items can be read at once, checkout procedures can be accomplished much more rapid. RFID can be equally advantageous for check in processes.Implementation of RFID in libraries generally leads to greatly-reduced queues at the checkout counter, enhanced customer service, and less repetitive strain injuries for library staff [1].  Self charging/discharging: Patron self-discharging shift that work from staffs to patrons and library staff can utilize their time in value added services.  Reliability:Correctly operating readers and tags can have near 100% detection rates. Since the tags and sensors communicate with the Integrated Library System (ILS) it is possible to know exactly which items are moving out of the library. The high reliability is especially important when RFID is used in theft detection.  Streamlined Inventory Management: RFID also has had a significant impact on inventory processes in libraries. With a fully-tagged collection, inventory can be taken with a portable, hand-held wand which is passed alongside the books on the shelves; the reader picks up the individual signals from each item's tag, without needing to remove or even tip the books outward from the shelves.  Long Tag life: RFID tags lastlonger than barcodes. The term RFID describe the use of radio frequency signals to provide automatic identification of terms. RFID vendors claim a minimum of 1, 00,000 transactions before a tag may need to be replaced.  Reduction in workplace injuries: Karen Schneider, director of Library’s Index to the internet, states that the repetitive motion required by bar code scanners, including flipping an item and angling it correctly, cost libraries millions of dollars a year in work place injuries. Some libraries, including the San Francisco Public Libraries, look to RFID as a way to reduce the repetitive stress injuries caused by sustained and repetitive motion connected to circulation duties especially. Research varies as to the amount of workman’s compensation claims that are connected to repetitive stress injuries caused by circulation duties and to what level RFID technology will reduce these injuries and claims.  Automated materials handling: Another application of RFID technology is automated material handling. This significantly reduces the amount of staff time required to ready material for shelving as itssorting system that can move library material and sort them category wise. DISADVANTAGES OF RFID IN LIBRARIES  High Cost: The major disadvantages of RFID technology is its cost. While the readers and gate sensors used to read the information typically cost around $2,000 to $3,500 each and the tags cost $ 40 to $75 each. RFID Technology is very costly affair to implement in as budget of libraries is already shrinking.  Accessibility to compromise: It is possible to compromise RFID system by placing two items against one another so that one tag overlays another. That may cancel out the signals. This requires knowledge of the technology and careful alignment. ISBN 1-63102-455-8 211 RFID Technology: A Gatekeeper To Library Security  Chances of removal of exposed tags : RFID tags are typically affixed to the inside back cover and are exposed for removal. This means that there would be problem when users become more familiar with the role of the tags. In Indian libraries, it is a major challenge to keep the tags intact.  User Privacy concern:Privacy concerns associated with item- level tagging is another significant barrier to library use of RFID tags. The problem with today’s library RFID system is that the tags contain static information that can be relatively easily read by unauthorized tag readers. This allows for privacy issues described as “tracking” and “hot listing”. Tracking refers to the ability to track the movements of a book( or person carrying the book) by “correlating multiple observations of the book’s bar code” or RFID tag. Hot listing refers to the process of building a database of books and their associated tag numbers (the hotlist) and then using an unauthorized reader to determine who is checking out items in the hotlist.  Reader collision: The signal from one reader can interfere with the signal from another where coverage overlaps. This is called reader collision. One way to avoid the problem is to use a technique called time division multiple access.  Tag collision: Another problem readers have is reading a lot of chips in the same field. Tag clash occurs when more than one chip reflects back a signal at the same time, confusing the reader. Different vendors have developed different system for having the tags respond to the reader one at a time. Since they can be read in milliseconds, it appears that all the tags are being read simultaneously. CONCLUSION It is quite clear from the above discussion that an RFID system may be Comprehensive system that addresses both the security and materials tracking needs of a library. RFID in the library is not a threat if best practices guidelines followed religiously, that is speeds up book borrowing and inventories and frees staff to do more user-service tasks. The technology saves money too and quickly gives a return on investment. If is important to educate library staff and library users about RFID technology before implementing a program. In this technology, libraries do not have to depend on one single supplier for tags. As libraries make a long -term investment, which mainly consists of the quantity of tags needed this is a very important requirement. All the works of library done quickly and correctly by this RFID technology. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] 212 Bansode, S.Y and Desale, S.K. (2009). Implementation of RFID technology in the University of Pune library. Program: electronic library and information system, 43(2), pp. 202-14. Chan, P.Y. and ying, Z. (2005). Application of RFID technology with the establishment of book drop in library. Bulletin of Library and information Science, 55(6), pp. 101-8. Golding, P. and Tennant, V.(2008). Evaluation of a radio frequency identification (RFID) library system: preliminary results. International journal of Multimedia and Ubiquitous Engineering, 3(1), pp. 1-18 Hopkinson, A. (2007). State of the art in RFID technology. INFOTECH- Journal of informatics and librarianship, 8(1/2),pp. 17-23. Hopkinson, A. and Chandrakar, R. (2006). Introducing RFID at Middlesex University learning resources. Program: electronic library and information system, 40(1), pp. 89-97. Jose, A; Chand, B.B. and Rao, M.N. (2005).RFID applications in libraries. SRELS Journal of Information Management, 42(4), pp. 427-39. Iyer, Sridhar (2005). RFID: technology and application. IIT Bombay. Maheta, M. and Jani, J. (2007). RFID technology: a changing scenario and new pilgrim for libraries. Paper presented at the 5th International CALIBER Conference, 8-10 Feb, Punjab University, Chandigarh, pp. 46876. Rafiq, Muhammad (2004). Radio Frequency Identification (RFID): Its usage and Libraries. Weinstein, Ron (2005). RFID: A Technical Overview and its Application to the Enterprise. IT PRO. IEEE Computer Society. www.tagsys.net. http://www.google.com http://www.zebrasoultions.com http://www.RFIDsoulutions.com ISBN 1-63102-455-8 CLOUD COMPUTING: AN INNOVATIVE TOOL FOR LIBRARY SERVICES Rekhraj Sahu | Assistant Librarian | TCB College of Agriculture & Research Station | Indira Gandhi Krishi Vishwavidyalaya | Bilaspur (C.G.) | India | rekhrajsahu@gmail.com Abstract: Cloud computing is a new technique of Information Communication Technology because of its potential benefits such as reduced cost, accessible anywhere anytime as well as its elasticity and flexibility. In this Paper defines cloud Computing, Definition, Essential Characteristics, model of Cloud Computing, Components of Cloud, Advantages & Drawbacks of Cloud Computing and also describe cloud computing in libraries. Keywords: Cloud Computing, SaaS, PaaS, IaaS, Components of Cloud, Models of Cloud Computing, Libraries and Cloud. INTRODUCTION Cloud computing is making it possible to separate the process of building an infrastructure for service provisioning from the library of providing end user services. Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Cloud computing share distributed resources via the network in the open environment. It is a virtual pool of computing resources through internet. Cloud computing provides people the way to share distributed resources and services that belong to different Organizations or sites. Many companies, such as Amazon, Google, and Microsoft and so on, accelerate their paces in developing Cloud Computing systems and enhancing their services to provide for a larger amount of users. Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each segment serves a different purpose and offers different products for businesses and individuals around the world. Libraries are using computers for run ning services such as Integrated Library Management Software (ILMS), website or portal, digital library or institutional repository, etc. These are either maintained by parent organization’s computer staff or library staff. It involves investment on hardware, software, and staff to maintain these services and undertake backup and upgrade as and when new version of the software gets released. Library professionals in most cases not being trained in maintaining servers find it difficult to undertake some of these activities without the support of IT staff from within or outside the organization. Now cloud computing has become a new buzzword in the field of libraries, which is blessing in disguise to run different ICT services without much of a problem as third-party services will manage servers and undertake upgrades and take backup of data. WHAT IS CLOUD COMPUTING? Cloud computing is a new technology model for IT services which many organizations and individuals are adopting. Cloud computing can transform the way systems are built and services delivered, providing libraries with an opportunity to extend their impact. Cloud Computing is internet based computing where virtual shared servers provide software, infrastructure, platform devices and other resources and hosting to customers on a pay-as-you-use basis. All information that a digitized system has to offer is provided as a service in the cloud computing model. Users can access these services available on the “Internet Cloud” without having any previous know- how on managing the resources involved. DEFINITION OF CLOUD COMPUTING According to National Institute of Standards and Technology (NIST) “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., ISBN 1-63102-455-8 213 Cloud Computing: An Innovative Tool For Library Services networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” According to the Gartner Group cloud computing as “a style of computing in which massively scalable and elastic IT-enabled capabilities are delivered as a service to external customers using Internet technologies.” According to the Forrester defines cloud computing as “A pool of abstracted, highly scalable, and managed compute infrastructure capable of hosting end-customer applications and billed by consumption.” Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Essential Characteristics of Cloud Computing NIST has identified five essential characteristics of cloud computing: on-demand service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches: On-demand self-service: A consumer can unilaterally provision computing capabilities such as server time and network storage as needed automatically, without requiring human interaction with a service provider. Broad network access: Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs) as well as other traditional or cloud based software services. Resource pooling: The provider’s computing resources are pooled to serve multiple consumers using a multitenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a degree of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources, but may be able to specify location at a higher level of abstraction (e.g., country, state, or data center). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines. Even private clouds tend to pool resources between different parts of the same organization. Rapid elasticity: Capabilities can be rapidly and elastically provisioned in some cases automatically to quickly scale out; and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. Measured service: Cloud systems automatically control and optimize resource usage by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, or active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the service. Multi Tenacity: It is the 6th characteristics of cloud computing advocated by the Cloud Security Alliance. It refers to the need for policy driven enforcement, segmentation, isolation, governance, service levels, and chargeback/ billing models for different consumer constituencies. It is important to recognize that cloud services are often but not always utilized in conjunction with, and enabled by, virtualization technologies. There is no requirement, however, that ties the abstraction of resources to virtualization technologies and in many offerings virtualization by hypervisor or operating system container is not utilized. CLOUD COMPUTING MODELS Cloud Providers offer services that can be grouped into three categories. Software as a Service (SaaS): In this model, a complete application is offered to the customer, as a service on demand. A single instance of the service runs on the cloud & multiple end users are serviced. On the customers‟ 214 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education side, there is no need for upfront investment in servers or software licenses, while for the provider, the costs are lowered, since only a single application needs to be hosted & maintained. Today SaaS is offered by companies such as Google, Salesforce, Microsoft, Zoho, etc. Platform as a Service (PaaS): Here, a layer of software, or development environment is encapsulated & offered as a service, upon which other higher levels of service can be built. The customer has the freedom to build his own applications, which run on the provider’s infrastructure. To meet manageability and scalability requirements of the applications, PaaS providers offer a predefined combination of OS and application servers, such as LAMP platform (Linux, Apache, MySql and PHP), restricted J2EE, Ruby etc. Google’s App Engine, Force.com, etc are some of the popular PaaS examples. Infrastructure as a Service (IaaS): IaaS provides basic storage and computing capabilities as standardized services over the network. Servers, storage systems, networking equipment, data centre space etc. are pooled and made available to handle workloads. The customer would typically deploy his own software on the infrastructure. Some common examples are Amazon, GoGrid, 3 Tera, etc. Cloud computing is defined to have several deployment models, each of which provides distinct trade-offs for agencies which are migrating applications to a cloud environment. NIST defines the cloud deployment models as follows: Private cloud: The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Community cloud: The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations).It may be managed by the organizations or a third party and may exist on premise or off premise. Public cloud: The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.,bascvffr4u7= Hybrid cloud: The cloud infrastructure is a composition of two or more clouds (private, com¬munity, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). COMPONENTS OF CLOUD A Cloud system consists of three major components such as clients, data centre and distributed servers. Each element has a definite purpose and plays a specific role. Clients: Clients are in a cloud computing architecture are similar to the clients of everyday local area network (LAN). These are the computers which are residing on the desk of the end users. This is where the front-end applications are installed. They can be laptops, tablet computers, mobile phones or PDAs. In short clients are the devices at the user side and used to manage client information. The physical specification brings the client into the following three categories. • • • Mobile- Mobile devices include smart phones, Tablets or PDAs. Thin-These are the dump terminals having no hard disk space rather it let the servers do all processing activities. It simply displays the information. Thick- This type of client is a regular computer, using a web browser like Firefox or Internet Explorer to connect to the cloud. Data Centre: The data centre is the collection of servers where the applications to which the user subscribes are hosted. A data centre server can be virtualized in nature where the software can be installed in the main physical server but appeared as separate server identity to the user. In this way, one can have half a dozen virtual servers running on one physical server. ISBN 1-63102-455-8 215 Cloud Computing: An Innovative Tool For Library Services Distributed Servers: It is not necessary that the data centre always contains only one server in our place. Sometimes servers are placed in geographically disparate locations in the globe. But from the end user perspective it seems that data is coming from a central server. In this approach if one server is down or instantly not available to a client request, may be due to congestions etc., the other services activate to cater the clients. In order to provide seamless service to the client, the data in these servers are synchronized frequently. ADVANTAGES OF CLOUD COMPUTING IN LIBRARY SERVICE • • • • • • • • Cost reduction- Ability to increase or decrease the consumption of hardware or software resources immediately and in some cases automatically. Scalability- “Pay as you go” allowing a more efficient control of expenditures. Lower investment, reduced risk- Immediate access to the improvements in the resource proposed (hardware and software) and debugging. Support included- Enjoyment of the most advanced security procedures, availability and performance of providers with experience and knowledge in this type of service. Greater security and accessibility- Access to resources from any geographical point and the ability to test and evaluate resources at no cost. Portability- since the service is available over the web, the service can be availed through browser from any part of the world. Adjustable storage- In the traditional system, if the server is less than what we have. The server should be replaced with the new one. In this computing, the storage capacity can be adjusted according to the needs of the library, since the storage is controlled by the service provider. Cloud OPAC- Most of the libraries in the world are having the catalogue over the web. These catalogues are available with their libraries local server made it available over the web. If the catalogue of the libraries made it available through cloud, it will be more benefit to the users to find out the availability of materials. DRAWBACKS OF CLOUD COMPUTING The drawbacks are actually the same as those encountered by institutions that have information hosted outside of the entity. Whereas, in the case of hard-copy document files and at the enterprise level, this fear disappeared years ago, given the benefits of cost reduction in infrastructure management and security, in the case of digital data there is still a huge fear of putting our information in the hands of third parties. This fear arises due to issues such as confidentiality, theft, loss etc. Yet people are increasingly more likely to do so now that the use of Web 2.0 and social networks has become so widespread. There is nothing more sensitive than banking or personal data, yet this data is stored in servers over which we have no domain or ownership. An institution might take the decision to progressively move towards Cloud Computing by uploading applications which are not very sensitive such as: messaging, the booking of rooms, meeting management, the liquidation of costs, and holiday management. Following this learning process, more valuable information involving the corpus of the institution, i.e. “Business intelligence” might be uploaded to the cloud. In the case of libraries and information centers, this information would include management funds and network transactions. LIBRARIES AND CLOUDS Today we are living in the age of information. Information technology plays a very vital role in handing library resources ranges from collection, storage, organization, processing, and analysis of information dissemination. Library field facing many challenges in the profession due to applications of information technology. New concepts and technologies are being added to ease the practices in the libraries and satisfy the needs of the knowledge society. With the advent of information technology, libraries have become automated which is the basic need towards advancement followed by networks and more effort are towards virtual libraries. The emergence of digital library, internet usage, web tools application for libraries, consortium practices leads to the advancement in library profession. Cloud computing is a completely new IT technology and it is known as the third revolution after PC and internet in IT. The later technology trend in library science is use of cloud computing for various purposes and for achieving economy in library functions. Since cloud computing is a new 216 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education and core area the professionals should be aware of it and also the application of cloud computing in library science. CONCLUSION Libraries are moving towards cloud computing technology in present time and taking advantages of cloud based services especially in digital libraries, social networking and information communication. Therefore it is time for libraries think seriously for libraries services with cloud based technologies and provide reliable and rapid services to their users. Another role of LIS professionals in this virtual era is to make cloud based services as a reliable medium to disseminate library services to their users with ease of use and save the time of users. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] http://www.thbs.com/downloads/Cloud-Computing-Overview.pdf https://www.priv.gc.ca/resource/fs-fi/02_05_d_51_cc_e.pdf https://www.nsa.gov/research/_files/publications/cloud_computing_overview.pdf http://www.tutorialspoint.com/cloud_computing/cloud_computing_tutorial.pdf http://broadcast.rackspace.com/hosting_knowledge/whitepapers/Understanding-the-Cloud-Computing-Stack.pdf http://www.journalofcloudcomputing.com/content/pdf/s13677-014-0021-5.pdf http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-winds-of-change-paper.pdf http://www.ijidt.com/index.php/ijidt/article/viewFile/3.4.9/pdf http://www.kiit.ac.in/centrallibrary/pdf/pdf_presentation/Impact_of_Cloud_Computing_on_Library_Services.pdf http://www.ijodls.in/uploads/3/6/0/3/3603729/vol._2_july_-_sept._2012_part-2.pdf http://www.emeraldinsight.com/journals.htm?issn=0888045X&volume=25&issue=3&articleid=17062886&show= html&PHPSESSID=ufq4bgqsp3hpbd70rru9dfc8t4 http://www.webopedia.com/TERM/C/cloud_computing.html http://csrc.nist.gov/publications/nistpubs/800- 145/ SP800-145.pdf Journal of Commerce & Management Thought IV – 2 ISSN 0975-623X(print)0976-478X(online) Cloud Computing : An Innovative Tool for Business Progress Manju Mittal Prathiba L. http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-winds-of-change-paper.pdf Bhattacharjee, Nilratan and Purkayastha, Sriparna Das (2013), CLOUD COMPUTING AND ITS APPLICATIONS IN LIBRARIES, e-Library Science Research Journal Vol.1,Issue.7 May, 2013. DAS Amit Kumar and Sukumar Mandal (2013), Development of cloud computing in integrated library management and retrieval system , International Journal of Library and Information Science Vol. 5(10), pp. 394400, November, 2013. ISBN 1-63102-455-8 217 MOBILE TECHNOLOGY: USE IN LIBRARY Sonali Malhotra | Senior Library Information Assistant | Indian Institute of Technology | Mandi | H.P. | sonali@iitmandi.ac.in Harpreet Kaur | Assistant Library Information Officer | Indian Institute of Technology | Ropar | Punjabharpreet.iitrpr@gmail.com Abstract: When we started to move from computerized to web based mobile services in libraries, our first motive was to provide information to the users with the technology available. The 2009 “Horizon Report” called mobile technologies “an opportunity for higher education to reach its constituents in new and compelling ways.” The report implied that academic libraries would find them to be the ideal tools for bringing reluctant researchers to the library, mainly for their convenience. The International Telecommunication Union (ITU) estimated that more than 5 billion mobile subscriptions would exist worldwide by the end of 2010, which more than tripled home Internet access. ITU also predicts Web access from mobile devices will exceed access from desktop computers within the next five years. These statistics are hardly surprising; with advancements in technology and the rise in Smartphone use, people are taking advantage of being connected to data wherever they are. Mobile phones aren’t just phones anymore: they can access e-mail, search the Web, video chat, and play games. Even mobile devices like I Pad and iPod touch can bring social media, productivity tools, and entertainment literally into the palm of your hand. Therefore, libraries should be exploring mobile devices as a way to connect with patrons. Creating a library application (“app”) or mobile Web site that allows patrons to access library hours, view their library account or even search databases is easier than most people think. This paper explores the need of mobile technology in libraries. Keywords: Mobile technology, SMS, Library services, Smart phones and electronic resources. INTRODUCTION In the era of information technology the use of mobile technology is growing very fast most of the information is now available over the internet, so there is a difficulties for libraries to ensure the proper utilization of library resources to their users. As technology develops, communication protocol also develops. Now a day Mobile takes an important place in every one life. Mobile phones are wireless devices. It is very helpful in automated library system. Wireless always provides new services to its users to keep them up to date. Mostly library users are using their cell phones and other devices for searching and browsing the web & other things to do by computers & laptop. Mobile technology has brought major impact on higher education. It is observed that library users depend on mobile devices for latest information regarding their studies and research areas. The report of New Medias Consortium, 2009, p.9 commented’ Over the past several years, we have watched mobiles become ever more capable and more common. The rapid pace off innovation in this arena continues to increase the potential off these little devices, challenging our ideas of how they should be used and presenting additional options with each new generation off mobiles”. MOBILE TECHNOLOGY ITS NEED Now a day’s people are increasingly dependent on their mobiles. Most of them use mobiles as dairies, for making notes and other internet based works. So it’s the demand of every user that “libraries in hand” they needed that libraries will provide some mobile services. Libraries can offer a communication channel for user to connect with the library with a device that they always with them. Easy and quick sharing of information is possible through mobile phones. Libraries today are covering most of the technologies given by mobile industry 218 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education like PDA’s, Blackberry, iPod, Cell phones, UM PC’s (Ultra Mobile PC) and mobilizing library contents in a portable form suitable or small screen and delivering short services in the form of contents/ information with device’s multiple searching features. Mobile services provide users. Mobile technologies are very helpful in feedback mechanism in libraries and information centers. There are so many benefits of Web based mobile services like: A. B. C. D. E. Access information any time Unlimited access Time saving User Friendly To access current information SERVICES PROVIDED BY THE LIBRARY The main objective of the library is to provide better services to its users with current technology implemented in the library. There are some helpful tools which satisfied the need of the user. Firstly communication with the users plays an important role. Regular interaction with the users through email, telephonically, by using Mobile applications etc. is helpful to satisfy their needs. We will provide them the clear instruction about library, bay guides in stack area, user guide, threw the audio/video tour of library. With the help of Mobile based library services OPAC facility fulfill their needs and saves the time of the users as well as library staff also. Users want the services very fast and in easy mode. Some time library professional provide orientation to the users time to time to know which the latest technology use in the library is some suggestions & their expectations also. They can use library in anywhere. SKILL REQUIRED FOR EMERGING MOBILE TECHNOLOGY LIS professionals should require some technological skills to provide mobile based services. They should have knowledge of mobile devices. LIS Professional should familiar with web based services. They should have knowledge about mobile applications as well as mobile web applications. Librarian should give the training to provide current information related to mobile services and its application through user orientation programme. Librarian should acquire skills relating to training & user orientation to familiar these mobile services to users. There are so many mobile library web sites available on web which is listed below: NAME OF MOBILE LIBRARY AND WEB SITES S. No. 1 2 3 4 5 6 7 Mobile Library University of California Riverside Libraries American University Library Virginia Tech University Library New York University Libraries Adelphi university libraries (AU2GO Albertsons library ( Boise State University) Ball State University Library Websites http://library.ucr.edu/m/ http://www.american.edu/library/ http://m.lib.vt.edu/ http://library.nyu.edu/ http://it.adelphi.edu/catalog/mobile/ http://library.boisestate.edu/ http://cms.bsu.edu/academics/libraries BARRIER TO IMPLEMENTING MOBILE TECHNOLOGIES AMONG LIBRARY PROFESSIONAL Mobile technology has so many advantages in libraries but there are various challenges to implement these technologies also. It is not an easy task or to use and implement in libraries with the enormous growth of electronic resources and products it becomes difficult to handle these resources. To maintain the campus Network facilities with fast access is another barrier to Lib professionals. New technology brings new role and responsibilities to new tools and techniques of information handling create some problems. There are some important barriers to adopt mobile technology which is given here:- ISBN 1-63102-455-8 219 Mobile Technology: Use In Library • • • • • Budget for all libraries Many new technologies are also adopted by the libraries. Security Issues Lack of staff Lack of suitable studies indicating efficiency o mobile based information. With the enormous growth of electronic resources and products it becomes difficult to manage resources for use. To maintain the campus network facilities with accurate and fast access is another barrier to LIS professionals. A new technology brings new roles and responsibilities new tools and techniques of information handling create some problems to LIS processionals. Access to online materials beside OPAC .The main barriers is to create, maintain and authorization of resources in library. To avoid such kind of barriers in implement the mobiles technologies in library, the LIS professional should have some skills to overcome these difficulties. UPCOMING MOBILE UTILITIES Mobile Library Directions:- libraries distribute their knowledge and materials by audio and video files that users can take with them threw mobile devices. • • • • • SMS Services - Libraries can provide speedy notices as aided services to the users. Threw library SMS notification, library professional can provide announcements reminders about important events. Reference Service- According to the need of the users anywhere, anytime. OPAC on mobile- Library OPAC system can be mobilize by facility of text SMS to check the availability and cataloguing details of reading materials in the library. Log in by mobile-Library can send a SMS reminder if the book is due or for renewing books and outstanding fine, etc Cloud computing by mobile- Google drive, Drop box, Mega Cloud Drive, One Drive, Apple i cloud, Amazon cloud drive etc. CONCLUSION In conclusion we can say that the main objective of mobile based service is to provide information to the user according to his approach quick and fast with the current information. Use of Mobile in libraries give a new look to the library and it also create the awareness, they can use, search information. LIS professionals should require some technological skills to provide mobile based services. Mobile technology has brought major impact on higher education. Librarian should acquire skills relating to training & user orientation to familiar these mobile services to users. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] Andrew Walsh. "Using mobile technology to deliver library services: a handbook".2012, p.106 Gaur, Babita http://www.inflibnet.ac.in/caliber2009/CaliberPDF/33.pdf http://ijecs.in/issue/v2-i6/10%20ijecs.pdf https://www.asis.org/Bulletin/Oct-11/OctNov11_Thomas.pdf http://www.yeedao.net/iccse2014/cd/data/papers/13676.pdf http://www.inflibnet.ac.in/caliber2009/CaliberPDF/33.pdf http://libraries.pewinternet.org/2013/01/22/part-5-the-present-and-future-of-libraries/ http://eprints.rclis.org/15228/1/Innovative%20use%20of%20SMS%20technology%20for%20the%20excellence%20i n%20library%20services%20in%20Kerala..pdf [9] http://www.community-of-knowledge.de/fileadmin/user_upload/attachments/ Application_of_Mobile_Technology_among_Engineering_College_Library_Users_A_Study.pdf 220 ISBN 1-63102-455-8 A PERSPECTIVE ON ICT-IMPLEMENTATION AT KARNATAKA JUDICIAL SYSTEM Meera B J | Librarian | Seshadripuram Law college | Bangalore | bjmeera@rediffmail.com Abstract: Judicial service centers are part of e-court project. Providing individual lap tops with broad band facility has made it possible to have access to internet and to have the window open to the world at large to have a broader vision in deciding a case in an effective manner. In fact this is a part of e-courts implementation project as projected by the National Informatics Centre. Application features are made available as per there functions and defined roles and responsibilities provided imaging solutions for evidences and documents to court. Application features are made available as per there functions and defined roles and responsibilities provided imaging solutions for evidences and documents to court. E-court concept the amount of data that needs to be managed and protect will be an ultimate challenge for the judiciary. It is of no doubt that ICT can reduce the duplicity of the paper world and make courts greener through electronic case filing and video conferencing. Further development of artificial intelligence could be used to impose appropriate sentence in a criminal case, speedy disposal of cases. Keywords: ICT, Internet, E-Courts, E-Judiciary, Cases INTRODUCTION The rapid accumulation & slow disposal rate of pending cases has increased burden on our judicial system tremendously. Courts had to maintain all the records in physical manner i.e. either in files or registers and to keep such large data in paper form is not easy to retrieve and also not even safe and is prone to physical tempering & environmental degradation. The case takes long time to solve, apart from this Cases/Judges/Court keep on changing during the course of judgments. The back-log of cases have grown and ultimately it is virtually over-burdening the judiciary. India has 15,000 judges, including 630 High Court Judges. The mounting arrears of cases in Courts, particularly in District Courts and High Courts, have been a cause of great concern When computerization was started the Bar members were much relented to use the technology but now the things are changing gradually and are now coming out with an openness that ICT is to be considered as a part of life. Major privileged areas are inter - linked with courtroom operations. They are Judge, administrator, courtroom staff and public prosecutor, lawyers. Application features are made available as per there functions, roles defined and responsibilities, provided in imaging solutions for evidences and documents to court. The images from police, hospitals reports etc. can be uploaded from camera or any other imaging solutions as evidences and documents to the court.          FEATURE Roles based on access to authorized users. Uploading the scanned files/evidence and adding appropriate metadata. Allows Judges to see recording of proceeding for review and why case was rescheduled last time. Making the knowledge and information content available on 24x7 online environments. Appropriate Searching of case records. Provision to provide case CD/DVD to authorized person. Provision for taking record backup at a specified backup site. Live webcast of case proceedings through web portal. Can be used by court reporters if in case a word or statement is missed out. Need for a New Look: Ex. President Bharataratna Dr.A.P.J.Abdul Kalam stated: Let me unfold the scenario. A litigant comes with his documentary evidence which he possesses. E-Court Service Centre helps electronically to identify a civil lawyer to present his case. The objective in bringing the reduction in the time period of disposal of cases and to reduce the existing pendency of cases in a time bound period is of paramount ISBN 1-63102-455-8 221 A Perspective on ICT-Implementation At Karnataka Judicial System importance. The judges are to decide not only on the disputes but also have to act as administrators in administering the affairs of his court and should act as good managers. The E-courts project was established in the year 2005. According to the project, all the courts including taluk courts will get computerised. As per the project in 2008, all the District courts were initialised under the project. In 2010, all the District court was computerised. The entry of back log case has started. The IT department had one system officer and two system assistants in each court. They initiated the services in the Supreme Court in June 2011. The case lists and the judgements of most district courts are available in http://lobis.nic.in. in http://judis.nic.in, which is used to connect all High Courts and Supreme Court judgements and cause list. They are updated daily by a technical team. Now the establishment work is going on, in taluk courts. The project also includes in producing witnesses through video conferencing. Filing cases, proceedings, and all other details will be on computers. Each district court contains 1 system officer and 2 system assistants. This technical manpower is involved in training the staff, updating web sites. Establishment of e-courts in India is in infancy stage till the month of October 2014 we are still waiting for the establishment of first e-court of India. The Public as well as the advocates can walk in directly and ask for the case status, stage and next hearing dates. This service is provided for free. E-court project, the access to online journals like that of All India report, Supreme Court Cases are provided. The judgments of the Supreme Court are available on line. The judgments from 1950 till the date are now available at the click of mouse. Implementation of ICT - High Court of Karnataka: The e-judiciary electronically facilitates the decision making process in a transparent manner. In an e-judiciary environment, a case object is traveling into various stages of judicial process and creates a Meta data in each stage of the judicial process, thereby creating a foot print of data about the case. There was a complete automation from filing a case and to grant a certified copy. Digital production of under-trial prisoners by video-conferencing was made possible in all the three courtcomplexes at Bangalore, which was later extended to six more districts in Karnataka. Through the Karnataka judiciary website, cause lists of the High Courts and district courts was made available online, a day before, for the first time in the country. The system thus created, has subsequently been adopted in different states in India. In State of Karnataka, the steps are taken at many of the courts to have dedicated line. The services of Indian telephones are availed of. The best utilization of technology in developing LAN, WAN, State Wide area network has been put in to an effective use. ICT – Criminal Case: Section 154 of Criminal procedure code deals with reference to First Information Report. F I R is a document prepared by police in India, or a report lodged with police by any person having social concern. ICT helps in performing the task without any delay which may give rise to unwanted arguments and also prevent wastage of time. In due course the steps have to be taken to transmit them from the jurisdictional police station to the court within whose limit the offence had been reported. Providing individual lap tops with broad band facility has made it possible to have access to internet and to have the window open to the world at large to have a broader vision in deciding a case in an effective manner. In fact this is a part of e-courts implementation project as projected by the National Informatics Centre. Karnataka at the level of High Court, the practice of scanning the judgments and archiving. On the other hand the digitized copies are now stored with authentication. Causelist system is now gradually dispensed with at the level of high courts. Karnataka high court has saved nearly utilization of lakhs together sheets of paper every day. Maximum utilization of e-banking should be provided, instead of asking the litigant public to make any payment either by way of demand draft. Cause list through SMS: This service is available for providing customized delivery of causelist through SMS on the mobile. The causelist which is web hosted or put in front of the Court Hall should be verified. Neither High Court nor NIC Karnataka will be responsible for the non-delivery of the SMS on the mobile. The Causelist through SMS service is available for the cases filed in the High Court of Karnataka and the Circuit Benches at Dharwad and Gulbarga. The service is open for general public to register the court cases which they want to track when they appear in the causelist and receive an alert whenever the main case is posted in the court and appears in the causelist for that day. The service is free of cost. If the credentials are not received within 1 hr, the 222 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education user can send an SMS from the same mobile number to 9243355223 to receive the credentials with the message text as KARHCCL 5. Once the user registers the cases, the SMS will be received after the daily causelist is generated. If the number of cases is more, it will be received as multiple SMS messages. Kiosks: The High Court of Karnataka has developed the facility to know the status of the case filed in the High Court and its Circuit Benches, status of the Application filed for Certified Copy of the Orders and Judgments and the current case being heard in a Court Hall through Cell phone SMS messages for the benefit of the litigant public. Further, he High Court has installed 4 information KIOSKs at the premises of the High Court to provide information to the Advocates and Litigant public regarding the Cause list, Status of a case, Status of application for certified copy, Judicial Deposits and all other information that is available over the Website. Both the facilities stand dedicated to the public as per the directions of the honorable Chief Justice. The suggestions and feedback if any may be sent to The Registrar General, High Court of Karnataka, Bangalore or through e-Mail at shhcourt@nic.in. The facility is being provided with technical assistance of NIC Bangalore and the SMS Gateway provided through NIC, Delhi. The same facility is also being provided at the Circuit Benches, with technical assistance of NIC Bangalore Touch Screen Information Kiosk for High Court of Karnataka an application has been developed by NIC, Bangalore to use an Unmanned, Touch Screen Information Kiosk which provides the following information to the advocates and the litigant public 1. Status of the cases for a given case number 1. 2. 3. 4. 5. 6. Status of the Certified Copies for the given CR Number or Case Number Caveat details for the given Caveat Number or the Case Number Application filing details for a given case number Party details for given Case Number Cheque deposited details for the given Case Number Cause list by Court hall Numbers The user interface is kept simple and the components in the User Interface are made Touch Screen friendly. The application can be used with the touch of the screen as the only input mechanism and there is no need for mouse and key-board for normal operation by the end user. Context based On-screen keypad is used to enable the user to input the data. Since the keyboard is not provided, an on screen keypad is provided to enter the data. The application connects to the live High Court Litigant Management System database that is running in the respective location (Principal Bench & Two Circuit Benches) and provides up-to-date information as in the case of the Query Counters. High Court of Karnataka at Bengaluru Bench (Online Display Board) Note: Click on Court Hall No. [CH No.] To View the Corresponding Court Hall Cause List Place a Mouse Cursor on Hall No. [CH No.] to View the Passed Over Cases for the Corresponding Court Hall CH No. List No. Sl. No. Stage Case No.* CH No. List No. Sl. No. Stage Case No.* Transparency-Decision making process- E-judiciary ICT legal expert system assists the advocates and the judges with the legal provisions, previous case history, and previous judgment details in various courts thereby helping them to arrive at a decision based on the spirit of the legal provisions. Hence a fully operational eGovernance GRID is vital for the success of E-Judiciary. List of Business Information System, Filing Counter Computerization, COURTNIC, JUDIS, Supreme Court and High Courts pending Cases on IVR, display boards, and Cause Lists on Internet, are some of the positive steps which were taken in a consistent manner over a period of time. These things indeed have a very high impact in not only making the institution of judiciary at higher level a people friendly but also has cut the expenditure on the exchequer. One more major aspect to be covered under e-courts project is Videoconferencing technique through which courts will be connected to the Jail by ISDN lines and at both ends a camera unit and a display unit will be ISBN 1-63102-455-8 223 A Perspective on ICT-Implementation At Karnataka Judicial System provided with recording facility at the court’s end. Under trial is produced at the Jail end. The Judge, Lawyers and witnesses etc. remain present in the court and regular trial is conducted. The judicial remand of the undertrial can also be extended without physically producing him in the court. The benefits of Videoconferencing includes evidence of witnesses unable to come to court can be recorded, the trial is expedited with use of this facility, cost and manpower in producing under-trials only for remand extension can be saved, dreaded criminals can be tried without risks, multiple trials of an accused lodged in one jail is possible in different states. Videoconferencing is the wave of the future. In case of virtual court rooms videoconferencing will have a major role to play. During video conferencing any person can give his/her deposition from remote place. He/she just needs a video conferencing setup either hardware or software based with internet connection. Initially police stations and jail are connected to e-court for video conferencing. Producing accused/witness every time in court consumes enormous amount of resources (transportation cost, security time and manpower etc) of the government, using Video conferencing, they can give their deposition from jails itself. Eg: Disproportionate Assets case against Jayalalithaa- she had even offered to get her statement recorded through video-conferencing. Virtual courts will have no court hall, no timing of a specific nature, but will have an environment of lawyers, judges, parties and witnesses having meeting and exchange of documents by utilizing the facility of video conference, exchange of documents through Electronic Documents interchange, use of digital signatures. The technological improvements like Skype, Google Hangouts which could be used to have one to one look among different parties of the case, to have discussions, exchange of documents could be done by interrogatories, and admissions which are available in the existing laws. C as investment on building, storage, management of time in a modern racing society, it functions on 24x7x365.The first e court established at New Delhi as a paperless court is not a virtual court but a real court; where in the use of paper is dispensed with. ICT leads to : -Enable greatly expanded access to legal information for both advocates and clients through internet and email technologies -expansion to access for clients by using telephones for screening, obtaining basic client information, referrals, and providing brief advice and services, and also by posting information on the Internet -enables better case management and data collection, along with automated templates for document creation –Improvisation of communication between lawyers and clients through new telephone technologies, cell phones, and video conferencing - recruitment through e-mail and the Internet -Provides new avenues for outreach to clients and the public - Increased training opportunities for advocates- creates a greater sense of community through e-services. When computerization was started the Bar members were much relented to use the technology but now the things are changing gradually and are now coming out with an openness that ICT is to be considered as a part of life. Indeed justice Ram Mohan Reddy of Karnataka High court had lamented that to the effect that how can we think of e-courts if advocates are not ready to adopt, cause-list provided in electronic form and object to the stopping of supply of cause list in printed form. Use of lap tops, I-Pads, e-books, and other devises have brought in a concept of having mobile libraries by using the digital media. OUTCOME OF THE E-COURT There is a provision of a document visualize and any document can be projected on the LCD Screens installed in the e-court, so that the same are visible to the accused, witnesses or the prosecutor in the same court, as well as when they are connected through video-conferencing. Parties of the case can have access to e-Files using secure login and password. Court has been digitized and a touch screen has been installed on the dais of Judge. He can view any file of the e-Court in digitized form by searching for the same date-wise, name-wise or Act/Section wise. The overall impact of establishment of E-Court will result in quick disposal of cases, ease of record maintenance, reliability of the evidence recorded and to bring more transparency in the functioning of the District Courts. Reduce the paper work. Ease of record maintenance Judges can review the case. Use as a backup by concern persons who have some doubt about the authenticity of the documents. Courts are able to share the information online. 224 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education         ADVANTAGES Registration of cases: by auto generated unique case number. Copies of Judgments: judgments will be made available through web. Preparation and delivery of decrees: decree should be made available to the concerned parties by email, wherever applicable. Generation of automated causelist. Generation of automated court diaries. Availability of case status: online case status right from filing of case till it gets disposed. Generation of daily orders. Website for each court. DISADVANTAGES Online case-filing services may unintentionally, due to cost or lack of awareness, erect further barriers to justice for individuals who traditionally remained outside of the sphere of access. In the same vein, if ICT is favored for use in criminal rather than civil courts, technology may simply become a tool used to sentence people, more quickly. This scenario sits quite polemic to visions of technology serving as a tool to empower individuals to better assert their rights and seek justice. Foreshadowing the role ICT may play in the future of India's judicial reform process. Technologies are currently piloting the use of video technology in criminal courts. India's judiciary has made several attempts to insulate itself from the provisions of the RTI act, indicating that new laws, and even new technologies, may not be able to change practice. There are also strong doubts looming that the Gramin Nyayalayas Act will be successful in leveraging the required financial support needed to construct civil courts in rural areas. Even within a favorable legal framework, may not necessarily spell a more accessible, transparent and accountable justice system. FUTURE With the arrival of e-Court concept the amount of data that needs to be managed and protect will be an ultimate challenge for the judiciary. Based on data generated in the established e-Court, huge data will be generated per year. System can’t afford to lose even a single file as it makes the entire records unreliable and invalid in judicial terms currently H.264 video format has been used with AES encryption for video recording which may be change/upgrade in the future therefore it is required to develop methodology for interoperability of ever changing media formats/codes and building decision support system for Judiciary. CONCLUSION As e-government initiatives continue to transform the nature of India's bureaucracy and enhance the quality of government services, there is a mood of great optimism that ICT will also come to play a central role in judicial reform efforts. Strategies may be designed and implemented from an access perspective, seeking to restore faith in the justice system by increasing transparency and accountability. This could be done, for example, by installing video technology in court rooms, or publishing legal information online. It is of no doubt that ICT can reduce the duplicity of the paper world and make courts greener through electronic case filing and video conferencing. Online case filing systems can increase speed in which citizens can have their cases heard, and real time access to online repositories of legal information drastically expedites the case cycle. Features of this newly envisioned e-justice system include the use of video hearings to reduce transportation costs, case filing operation systems, RFID based file tracking, and the creation of a publicly accessible and easily searchable elibrary is important that the use of technology remains complimentary to a sound national judicial reform strategy. Some critics say that the judiciary in India is over burdened and the days are not too far that it may collapse on account of its overweight unless some remedial steps are taken. The design utilize to help our judicial system, to streamline and expedite their operation and case disposal rate in secure and cost effective manner. The information technology has paved its way and has made a firm in road in to the judicial field of the country. In this context how far the further development of artificial intelligence could be used to impose appropriate sentence in a criminal case, speedy disposal of cases by using proper software are all the area which needs consideration. Rule of Law a reality than to allow the things to be governed by Rule by law. ISBN 1-63102-455-8 225 A Perspective on ICT-Implementation At Karnataka Judicial System REFERENCES [1] (2009),E -Justice: Practical Guide for the Bench and the Bar, Universal Law Publishing. [2] 2.Cerrillo I Martinez Agustí (editor) (2009), E-Justice: Using Information Communication Technologies in the Court System [3] 3.Investigation and Development of an E Judiciary Service for a Citizen Oriented Judiciary System for Rural Communities (2010), University of Fort Hare, [4] 4. Prakash Rishi (2011) ICT in Indian Court Challenges & Solution, International Journal of internet Computing (IJIC), Vol-1, Issue-2 [5] 5. Dr. Setlur B N Prakash (2014) E Judiciary: a step towards modernization in Indian legal system, Journal of Education & Social Policy, Vol.1 No.1 [6] http://en.Wikipedia.org/Wiki/Judiciary_of_India [7] http://cis-india.org/The Role of ICT in Judicial Reform- An Exploration [8] karnatakajudiciary.kar.nic.in/ 226 ISBN 1-63102-455-8 A STUDY ON DETERMINING THE USER AWARENESS TO EVALUATE THE EFFECTIVENESS OF DIGITAL REFERENCE SERVICES PROVIDED BY ACADEMIC LIBRARY OF ENGINEERING AND TECHNOLOGY INSTITUTIONS IN TAMILNADU K. Chandraprabha | Research Scholar | DLIS | SIT | Madurai Kamaraj University | Madurai | jcp378@gmail.com Dr.K.Chinnasamy | Associate Professor and Head DLIS SIT | Madurai Kamaraj University | Madurai Dr.S.Janakiraman | Assistant Professor | DBT | Pondicherry | University | Puducherry Abstract: Digital Reference Service is a very essential component of every Academic Digital Libraries. It is an advanced version of the traditional reference services that is need of the hour to meet the user's information requirements in this dynamic and changing environment. This study is to measure the effectiveness of Digital Reference Services (DRS) being provided by the Academic libraries of Engineering and Technology institutions in Tamilnadu based on user's awareness and perception. It focuses on the user awareness of DRS provided by academic libraries of various categories of Engineering and Technology institutions. The research methodology employed was a case study approach that combined two data collection methods: questionnaires, and content analysis. This paper discusses the strength and weakness of existing digital reference services being provided by the academic libraries under study, and also concludes with some specific suggestions for improvement of digital reference services in Academic Libraries under study. Keywords: Reference services, Digital Reference Services, academic libraries INTRODUCTION Historically, libraries have been a part of social milieu. Most of the human activities like education and training, research and development, socio-economic growth, industry and business, trade and commerce, politics and international relations, arts and culture, government administration, need active support of libraries. Academic Libraries support learning, teaching, research and other educational functions appropriate to the parent institutions. These libraries play at different levels of educational process. Libraries are considered only as the storehouses of knowledge, have got a new outlook in the modern Information Communication Technology (ICT) era. The activities like reference services, which were carried manually in libraries with so much of pain and strain are being carried out smoothly with the help of ICT with greater effectiveness. The impact of ICT on traditional libraries evolves digital libraries, which is consisting of digital materials and services. In current trends Digital libraries are a key connector to the information resources. LITERATURE REVIEW Literature review is done based on the Indian experience on ICT in academic libraries. Salma Khan and J. Dominic (2009) analyze the patterns of internet use, the internet skills of professionals, the perceived impact of the internet on their academic efficiency and problems faced by them in using the Internet among Engineering colleges of Moradabad, Uttar Pradesh. The study reveals that the use of conventional document is decreasing and dependency on internet is increasing. It expedite the research process and also improve the professional competency. Sampath Kumar and Biradar (2010) observe the use of information communication technology in 31 college libraries in Karnataka, India by analyzing the ICT infrastructure, status of library automation, barriers to implementation of library automation and librarians' attitudes towards the use of ICT. The survey shows that ISBN 1-63102-455-8 227 A Study On Determining The User Awareness To Evaluate The Effectiveness of Digital Reference Services Provided By Academic Library Of Engineering And Technology Institutions In Tamil Nadu lack of budget, lack of manpower, lack of skilled staff and lack of training are the main constraints for not automating library activities. Mohamed Haneefa and Shukoor (2010) observe the Information and Communication Technology (ICT) literacy among the library professionals of Calicut University. The study reveals that the use of digital library and institutional repository software is very low among the library professionals. Majority of the professionals had confidence in routine ICT and Internet tasks, and need training or orientation in library automation, digital library and institutional repository software. Dhanavandan, Esmail and Nagarajan (2011) analyse the ICT infrastructure facilities with reference to selffinancing engineering college libraries in Tamil Nadu. The study traces out the status of electronic resources in terms of topology of library network, electronic access points, electronic database, e-journals, and electronic resources in the libraries. The study reveals that most of the engineering colleges in Tamil Nadu use the library application software in their libraries. The establishment of ICT infrastructure facilities in the self financing college libraries in Tamil Nadu can improve the efficiency of information support, the information retrieval and quality of education also. It is clear that technological change clearly affects library staff and there is a need to develop guidelines and policies to train the professionals in providing frontline services in academic libraries of India. Kalra, Harinder Pal Singh. (2011) concluded that the Digital reference services constitute a rapidly growing extension of the traditional reference service offered to library users. The study highlighted real-time architecture is the latest technological supports that enable the libraries to provide reference services beyond traditional walk-ins, appointments, and telephone reference. For years, libraries have responded to questions via e-mail, however, e-mail can only answer unambiguous where step-by-step instructions are not required. It fails to work when the user and the librarian have to follow a series of steps to explain the scope and nature of the question. M.Magamma (2013) highlighted the present status of Digital reference service in the engineering college libraries of Visakhapatnam, as well as discusses the strength and weakness of existing reference service being provided in engineering college libraries under study. The study revealed that all the ten selected engineering college libraries are providing online /digital services including Library Websites, Web-OPAC, Subject Portals, Web-Database, Collaboration with National International Network and Links to e-resources. Archana Saxena and Dr. T. N. Dubey (2014) discussed the impact of digital technology and role of libraries in the age of knowledge and information societies. This paper also highlights the problems faced by the academic libraries in India in implementation of digital technology. Based on the literature in today's academic library environment the role of reference librarians is totally transformed and need to be more teaching centred rather than stereotyped service centred. Now a days in academic libraries educating and guiding students in terms of accessing information through digital communication is the primary responsibility of reference librarians. The librarians would not be able to perform their duties well if they do not have sufficient knowledge on ICT and training on appropriate and up to date methods of library instruction and practices. STATEMENT OF THE PROBLEM The total number of Engineering and Technology Institutions are around 573 in Tamilnadu state in the year 2015, including Anna University Constituent Engineering Colleges, Government Engineering Colleges, Government Aided Institutions, Self -financing Institutions. The 28 institutions out of 573 are autonomous and are affiliated to Anna University Chennai, Tamilnadu. And also most of the deemed universities out of 30 deemed universities in Tamilnadu are offering Engineering and Technology programmes. Every year more than 200000 students are joining undergraduate and post graduate engineering and technology programmes in these institutions in Tamilnadu. For the past few years Government of Tamilnadu is issuing free laptops for all higher secondary school students. Most of the students of engineering and technology institutions are having their own individual laptops. 228 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education According to World Internet Usage Statistics News and World Population Statistics which were updated in June 2014, there are about 3.035 billion users on the Internet. . The total number of Internet users in Tamilnadu is 20,416,458, as on 11.08.2014 (Source: Lok Sabha Unstarred Question No. 4636, dated 11.08.2014). According to IAMAI-IMRB report, usage of social media in rural India has grown by 100 percent during the last one year with 25 million users residing in that belt. However, urban India registered a relatively lower growth of 35 percent with the total number of users at 118 million as on April 2015, says the 'Social Media in India 2014' report by the Internet and Mobile Association of India (IAMAI) and Indian Market Research Bureau (IMRB) International. There are 143 million social media users in India as on April 2015. The report stated that the top four metros continue to account for almost half of the social media users in urban India. The report said the largest segment accessing social media consists of the college going students with 34 percent followed by young men at 27 percent. School-going children constitute 12 percent of the social media users. College-going students and young men still form the 60 percent of the social media users in urban India. The report further stated that 61 percent of these users access social media on their mobile device. The report highlights that "The fact that almost two-thirds of the users are already accessing social media through their mobile is a promising sign. With the expected increase in mobile traffic the number of users accessing social media on mobile is only bound to increase". The number for rural India stood at 25 million, up from close 12 million last year, showing a growth of 100 percent. The ability that is necessary for the growth of research to disseminate and promote one's work and research is an important component of managing and communicating information. Digital Reference Service is an advancement of the traditional reference services that is emerging as natural solution to meet the user's information needs in the changing environment The Digital libraries and the Web have brought enormously powerful search mechanisms to the desktops or laptops of many researchers to do vast research, Magamma (2013). There is a huge requirement from the students, research scholars and faculty members to search for references such as articles, e-books, journals, magazines, etc., after the office hours of the institutions academic libraries. This study is the need of the hour to measure the effectiveness of Digital Reference Services provided by the academic libraries under study based on the feedback and perception of their users. And also this study is to find the research gap and to provide suggestions for improvement of Digital Reference Services in the Academic Libraries under study. SCOPE OF THE STUDY This study categorised various modes of Digital Reference Services such as e-mail, web-form, AskA Librarian, online or instant chat, teleconferencing and video conferencing, and collaborative digital reference, digital robots, remote login over 24/7, social media into five categories namely E-mail based Reference Services, Realtime reference services, Web-based reference services, Collaborative reference services, and Social network based reference services. The scope of this study is to describe Digital reference service with its new features and various forms like VoIP Service, Collaborative reference service, and Social network based services. The study will include the comparison of digital reference service is being provided by Academic Libraries of Engineering and Technology Institutions in Tamilnadu. In this study, institutions under study are classified into four categories namely Universities, Deemed to be universities, Autonomous affiliated institutions, and nonautonomous affiliated institutions. The questionnaire set 1000 copies are sent to users of academic libraries of all engineering and technology institutions in Tamilnadu. This study is based on the sample that is based on responses received from users, since till the responses are being received from users. OBJECTIVES OF THE STUDY The main objective of this study is to explore and to measure the effectiveness of Digital Reference Services in the Academic libraries of Engineering and Technology institutions in Tamilnadu based on users perception. The objectives of the study can be summarized as follows: a) To identify the status of user awareness about digital reference services being provided by academic libraries of engineering and technology institutions under study. ISBN 1-63102-455-8 229 A Study On Determining The User Awareness To Evaluate The Effectiveness of Digital Reference Services Provided By Academic Library Of Engineering And Technology Institutions In Tamil Nadu b To determine how demographic variables are related to awareness, usage, and the perceived needs of digital reference services. Demographic variables in this context refer to category of institution, gender, age, user education level, stay. c) Comparative analysis of Digital reference service being provided by the academic libraries of various categories of institutions under study d) To recommend solutions pertaining to digital reference services in academic libraries. METHODOLOGY Case study is a valuable method of research, with distinctive characteristics that make it ideal for many types of investigations. Eisenhardt (1999) noted that case studies typically combine data collection methods such as questionnaires, interviews, observation, and archives. The case study is a specific field or qualitative research method and thus is an investigation "of phenomena as they occur without any significant intervention of the investigators". In this study questionnaire method is used. Questionnaire is designed according to the information required for this study and data analysis. Around 1500 questionnaire are distributed to selected engineering and technology institutions in Tamilnadu, In this study, engineering and technology institutions in Tamilnadu are categorized in to four categories and about 1500 questionnaire were distributed to each categories of institution as follows - Universities (300) / Deemed to be University (300) / Autonomous Affiliated Institutions (300) / Non-autonomous Affiliated Institutions (600). The reason for more number of questionnaire were distributed to Non-autonomous affiliated institutions is the number of institutions in this category is high that is 545, where as other categories only around 30. The relevant and required data are collected by fixing an evaluation criterion such as availability of Dedicated web-site for library, Online Public Access Catalogue, E-mail, Chat, Video Conferencing, Instant Messaging, DSpace Repository, Remote login, Social networking, collaborating networking etc., from the users of libraries under study. The data thus obtained were categorized, analyzed, tabulated and interpreted for comparing digital reference services provided by selected academic libraries. Modes of digital reference service and Online Service criteria are selected for systematic evaluation of digital reference service in the libraries included in the study. The purposive sampling method is used in this for data collection. Sekaran (2000) stressed that purposive sampling is confined to specific types of people who can provide the desired information either because they are the only ones who possess it or they conform to some criteria set by the researcher. According to Sekaran's (2000) statement, it is justified that the purposive sampling approach is suitable for this study. The users in this context include teaching staff, research scholars, undergraduate and postgraduate students of the departments of Computer Science & Engineering and Information Technology in the institutions under study were chosen. The departments also have a similar structure in terms of staffing and resources, as well as physical facilities as per the general guidelines of regulatory bodies like All India Council for Technical Education (AICTE) and University Grants Commission (UGC). The data collected were analyzed using SPSS version 22.0 for Windows. DATA ANALYSIS AND FINDINGS The data collected from the users' of academic libraries of approximately 600 engineering and technology institutions (including deemed universities and colleges) in Tamilnadu has been prepared in the form of Tables and analysed using statistical software. The comparative analysis on Digital Reference Services provided by the institutions under study is made on the basis of various categories of institutions. Following tables and graphs shows the comparison between academic libraries of different categories of institutions under study according to the online services and various modes of digital reference services. Demographic Data of Users The summary of the Demographic Data of users as follows; Demographic variables are category of institution, user education level, users' gender, users' age, and stay. Users include teaching staff, research scholars, postgraduate students and under-graduate students. Engineering and Technology institutions in Tamilnadu are categorized into four namely Universities, Deemed to be universities, autonomous affiliated institutions, nonautonomous affiliated institutions. 230 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Institutions University Deemed to be university Questionnaire Distributed (QD) 300 300 No. of responses received (RR) 113 187 300 600 1500 141 307 748 Autonomous and affiliated Institutions Non-autonomous and affiliated institutions Table 1 : Number of Responses for Questionnaire - Institution wise PG Students UG Students Male Female RR* 113 187 Teaching staff, Scholars RR* 15 21 RR* RR* RR* RR* 29 55 69 111 46 106 67 81 141 12 32 97 65 76 307 39 69 199 134 173 748 87 185 476 351 397 Total Institutions University Deemed to be university Autonomous and affiliated Institutions Non-autonomous and affiliated institutions Table 2: Number of Responses for Questionnaire - User level and Gender wise *RR - Number of Responses Received Table 2 shows the details of number of respondents that is user level wise and gender wise. In user level, 87(11.63%) were teaching staff and research scholars, 185(24.73%) were post-graduate students, 476(63.64%) the majority were under-graduate students. The number of female respondents 397(53.07%) are more than the number of male respondents 351(46.93%). Institutions University Deemed to be university Autonomous and affiliated Institutions Non-autonomous and affiliated institutions 21 - 24 Age > 24 Hostel RR* 66 101 RR* RR* RR* Outside the campus RR* 31 57 16 29 61 82 52 105 141 89 30 22 53 88 307 188 72 47 92 215 748 444 190 114 288 460 Total Age < 21 RR* 113 187 Table 3 : Number of Responses for Questionnaire - Users' Age and Stay wise *RR - Number of responses received Table 3 shows that most of the respondents that is 444 (59.36%) were age below 21 years, followed by 190 (25.4%) were 21 to 24 years, followed by 114 (15.24%) were more than 24 years. And also it shows that most of the students 460 (61.5%) were staying off-campus and 288 (38.5%) were staying on-campus. Awareness of DRS Respondents were asked whether they were aware of their academic library offering DRS. As can be seen in Table 4, totally 339 (45.32%) respondents were aware of their institution academic library offering DRS out of 748 users responded. The analyses of cross tabulations and Chi-square tests were performed to identify the (a) significance of the awareness of DRS and Users from different categories of Institutions, (b) significance of the awareness of DRS and Users Education Levels, (c) significance of the awareness of DRS and Gender of User, (d) significance of ISBN 1-63102-455-8 231 A Study On Determining The User Awareness To Evaluate The Effectiveness of Digital Reference Services Provided By Academic Library Of Engineering And Technology Institutions In Tamil Nadu the awareness of DRS and Users' Age, and (e) significance of awareness of DRS and Users' stay. The summary of results and findings from Chi-square tests of demographic variables are shown in Tables 4 - 8. Users in Universities are well aware of DRS that is 92(81.42%) users are aware of DRS and 21(18.58% ) of users are unaware of the DRS, whereas in Deemed to be universities and autonomous affiliated institutions user awareness of DRS are 55.08% and 57.45% respectively. In case of Non-autonomous affiliated institutions, very few that is 20.52% of users are aware of DRS provided by their institutions' academic library. The reason is most of the Non-autonomous affiliated Engineering and Technology institutions in Tamilnadu are not providing DRS (K.Chandraprabha, 2015). Type of Institution Universities Deemed to be universities Autonomous affiliated institutions Non-autonomous affiliated institutions Type of Institution Vs Awareness YES YES* - Frequency NO* - Frequency % 92 (51.21) [32.48] 81.42 21 (61.79) [26.92] 103 (84.75) [3.93] 55.08 84 (102.25) [3.26] NO % 18.58 44.92 Row Totals 113 187 81 (63.90) [4.57] 57.45 60 (77.10) [3.79] 42.55 141 63 (139.14) [41.66] 20.52 244 (167.86) [34.53] 79.48 307 748 (Grand Total) The chi-square statistic is 151.1551. The P-Value is < 0.00001. The result is significant at p < 0.05. *Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell]. 339 Column Totals 45.32 409 54.68 Table 4: Type of Institutions Vs Awareness The Chi-square value is calculated on the data collected from the questionnaire about the awareness of Digital Reference Services provided by the academic libraries using SPSS 22.0 software. The Chi-square value is 151.155, Probability value is less than 0.00001. Hence the Type of Institution and the Awareness of DRS is significant at p < 0.05. Users' level Vs Awareness YES* - Frequency YES % NO* - Frequency NO % Row Totals Teaching staff and Research Scholar 73 (39.43) [28.58] 83.91 14 (47.57) [23.69] 16.09 87 Post-graduate students 124 (83.84) [19.23] 67.03 61 (101.16) [15.94] 32.97 185 Under-graduate students 142 (215.73) [25.20] 29.83 334 (260.27) [20.88] 70.17 476 Column Totals 339 45.32 409 54.68 748 (Grand Total) The chi-square statistic is 133.5295. The P-Value is < 0.00001. The result is significant at p < 0.05. *Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell]. Table 5: Users' level Vs Awareness Table 5 shows the significant relationship between the Users' education level and the awareness. It is found that in the above three categories of users' education level, Teaching staff and Research Scholar category is well aware of DRS that is 83.91%, when comparing with other categories post-graduate students and under-graduate students the awareness percent is 67.03%, 29.83% respectively. 232 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Male *Yes - Frequency 158 (159.08) [0.01] Gender Vs Awareness Yes - % No - Frequency 45.01 193 (191.92) [0.01] No - % 54.99 Row Totals 351 Female 181 (179.92) [0.01] 45.59 216 (217.08) [0.01] 54.41 397 Column 339 45.32 409 54.68 748 (Grand Total) Totals The chi-square statistic is 0.0251. The P-Value is 0.874147. The result is not significant at p < 0.05. *Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell]. Table 6: Users' Gender Vs Awareness of DRS Table 6 shows that there is no significant relationship between users' gender and awareness of DRS. The Chisquare test result shows p-value 0.874 which is greater than 0.05. Less than 21 years 21 to 24 years More than 24 years Column Totals Users' Age Vs Awareness *Yes - Frequency Yes - % *No – Frequency 125 (201.22) [28.87] 28.15 319 (242.78) [23.93] No - % 71.85 Row Totals 444 117 (86.11) [11.08] 61.58 73 (103.89) [9.18] 38.42 190 97 (51.67) [39.78] 85.09 17 (62.33) [32.97] 14.91 114 339 45.32 409 54.68 748 (Grand Total) The chi-square statistic is 145.8219. The P-Value is < 0.00001. The result is significant at p < 0.05. *Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell]. Table 7: Users' Age Vs Awareness of DRS Table 7 shows the relationship between users' age and awareness of DRS. The chi-square statistic value is 145.82 and the p-value is less than 0.00001. Thus there is significant relationship between users' age and awareness of DRS at p < 0.05. It is found that in table 7, users with more than 24 years old are well aware of DRS that is 85.09%, where as in the other two categories that is less than 21 years and 21 to 24 years the percentage of awareness is 28.15% and 61.58% respectively. The reason is most of the teaching staff and research scholars are older than 24 years. *Yes - Frequency 192 (130.52) [28.95] 147 (208.48) [18.13] Stay Vs Awareness Yes - % *No - Frequency 66.67 96 (157.48) [24.00] 31.96 313 (251.52) [15.03] No - % 33.33 68.04 Row Totals 288 460 In-campus Off-campus Column 339 45.32 409 54.68 748 (Grand Total) Totals The chi-square statistic is 86.1077. The P-Value is < 0.00001. The result is significant at p < 0.05. *Observed cell totals, (the expected cell totals) and [the chi-square statistic for each cell]. Table 8: Users' Stay Vs Awareness of DRS Table 8 shows cross tabulation of users' stay and awareness of DRS. Users staying in campus are well aware of DRS when comparing with the off-campus days-scholars. There is a need for providing and educating users to access and avail the digital reference services in the academic libraries of the institutions under study. CONCLUSION AND SUGGESTIONS The results indicated that there is significant relationship between awareness of DRS and institutions type, users' education level, users' age, stay. The results also show that there is no significant relationship between awareness of DRS and gender. Only Institutions type, Users' education level, Users' age and Users' stay were found to be significant in determining the awareness of DRS. The finding of this study are (i) The awareness of DRS among users of non-autonomous affiliated institutions is very low, (ii) Users under 21 years old are not well aware of DRS, (iii) users staying off-campus are also not well aware of DRS in numbers. It is found that ISBN 1-63102-455-8 233 A Study On Determining The User Awareness To Evaluate The Effectiveness of Digital Reference Services Provided By Academic Library Of Engineering And Technology Institutions In Tamil Nadu most of the engineering and technology colleges are not providing dedicated website for libraries, remote login to users. The suggestion for improvement is, it would be efficient DRS if the academic libraries of all engineering and technology colleges provide dedicated website and remote login to every members. There is a good expectation from the users to avail the digital reference services from their academic libraries beyond the office hours through the use of remote login facility to access the digital library to avail the digital services. Anna University is proving affiliation to all the engineering and technology colleges in Tamilnadu. Anna University can insist all its affiliated institutions to provide digital reference services through dedicated website for their libraries and remote login facilities. REFERENCE [1] Archana Saxena and Dr. T. N. Dubey, 2014, "Impact of Digital Technology on Academic Libraries of India: Problems and Prospects", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 3, Iss 3, pp 308-325. [2] Dollah, W. A. K. W. (2006). Digital reference services in selected public academic libraries in Malaysia: A case study. In C. Khoo, D. Singh & A.S. Chaudhry (Eds.), Proceedings of the Asia-Pacific Conference on Library & Information Education & Practice 2006 (A-LIEP 2006), Singapore, 3-6 April 2006 (pp.122-135). [3] M.Magamma, (2013), ''Digital reference service in enginerring college Libraries: a case study of visakhapatnam'', e-Library Science Research Journal, Vol.1,Issue.10/Aug. 2013 ISSN : 2319-8435 [4] Neeraj Kumar Singh, (2012), ''Digital Reference Service in University Libraries: A Case Study of The Northern India'', International Journal of Library and Information Studies ISSN: 2231-4911, Vol.2(4), Oct-Dec, 2012 [5] Salma Khan, J. Dominic, (2012), ''A Study Of Use Of Information Communication Technology Tools At Dental, Engineering And Management College Libraries Of Moradabad , International Journal of Information Dissemination Technology, Vol 1, No 1. [6] Wan Ab. Kadir Wan Dollah and Diljit Singh, (2010), "Determining the Effectiveness of Digital Reference Services in Malaysian Academic Libraries", The Reference Librarian, Taylor & Francis Group, LLC, 51:329–354 234 ISBN 1-63102-455-8 THE IMPACT OF INFORMATION COMMUNICATION TECHNOLOGY ACT IN COMMUNICATION STUDIES Richa Chandi | Research Scholar | MCRPSV | Bhopal | chandi_richa@yahoo.com Rana khan | Research Scholar | MCRPSV | Bhopal Abstract: With the invention of Information and Communication Technology, libraries now use various types of technologies to aid the services they render. Everyday new technological advances affect the way information is handled in libraries and information centres. The impacts of new technologies are felt by libraries in every aspect. Computing technology, communication technology and mass storage technology are some of the areas of continuous development that reshape the way that libraries access, retrieve, store, manipulate and disseminate information to users. Keywords: Information and Communication Technology, Information Centres, Mass Storage Technology, retrieve INTRODUCTION Over the past twenty seven years, academic libraries have been affected by changes in information and communication technology. The rate of changes is still accelerating in this area. The introduction of various information technology (ICT) trends has lead to reorganization, change in work patterns, and demand for new skills, job retraining and reclassification positions. ICT holds the key to the success of modernizing information services. Applications of ICT are numerous but mainly it is used in converting the existing paper-print records in the entire process of storage, retrieval and dissemination. ICT presents an opportunity to provide value-added information services and access to a wide variety of digital based information resources to their clients. Furthermore mass communication field is using modern ICTs to automate their core functions, implement efficient and effective library cooperation and resource sharing networks, implement management information systems, develop institutional repositories of digital local contents, and digital libraries: and initiate ICT based capacity building programmes for library users. Information and Communication Technology (ICT) has brought unprecedented changes and transformation to communication and information services, reference services, bibliographic services, current awareness services, Document delivery, Audio visual services and customer relations can be provided more efficiently and effectively using ICT, as they offer convenient time, place, cost effectiveness, faster and most-up-to-date dissemination and end users. The impact of ICT characterized on information services by changes in format, contents and method of production and contents and method of production and delivery of information products. Emergence of internet as the largest repository of information and knowledge, changed role of information professionals from intermediary to facilitator, new tools for dissemination of information and shift from physical to virtual services environment and extinction of some conventional information services and emergence of new and innovation web based. STATEMENT OF THE PROBLEM Considering the enormous benefits that are experienced in the impact of ICT in the field of communication the academicians still experience some obstacles or hindrances in the effective and efficient use of the ICT resources in the communication field(mass media). Today, ICT acquisition and implementation is facing a lot of problems. This research work is focus to expose some of the inhibiting factors that are hindering the impact of ICT. OBJECTIVES OF THE STUDY 1. 2. To ascertain the level of computerization/automation of communication Libraries. To determine the usefulness of ICT resources in libraries related to communication studies. ISBN 1-63102-455-8 235 The Impact Of Information Communication Technology Act in Communication Studies 3. 4. To determine the changes that has occurred with the coming of ICT in the education sector. To determine the challenges associated with the application of ICT. 1. To what extent has information and communication technology been employed in the communication field? What are the changes in the field of education after the adoption of ICT? Do the people of the Libraries have the required knowledge and skills in using ICT resources? What are the factors militating against the application of ICT ? RESEARCH QUESTIONS 2. 3. 4. PURPOSE OF THE STUDY The purpose of the study is to ascertain the impact of ICT on media studies related academic libraries. The research work highlights the advantages or merit associated with ICT. SCOPE OF THE STUDY This research work is on the impact of ICT on media studies related libraries as a descriptive study. SIGNIFICANCE OF THE STUDY 1. 2. 3. This study is expected to provide a basis for comprehensive information on information and communication technology procurement and application. The study will established the existing gaps in the adoption of information and communication technology in the operations. The output of this study will serve as a blueprint for information managers/information scientists, researchers, lecturers, students, and teachers to chart the right course of action for the use of information and communication technology in furthering education through implementation. METHODOLOGY Research Design The choice of the descriptive analysis as the research design for the project was necessitated by the nature of the study. This research is a descriptive research that gathered data from different sources in order to determine the current status of the issue under study from the respective institutions. FINDINGS AND DISCUSSIONS Communication facilities are the basic requirements of every organization. In the age of ICT email, fax, etc are the common tools for fast a and smooth dissemination of the information. Automated communication facilities All the libraries related to communication field have all the facilities which are mentioned above. they all are using the technologies but with a varied degree of usage. Reason for the use of ICT resource 1. To acquire information 2. To process information 3. To store information 4. To retrieve information 5. To disseminate information Communication tools Email address World wide web(university website) Fax facility Telephone Percent 100 100 100 100 Factors militating against the application of ICT 1. Inadequate funding 2. Automation at infancy level 3. No power supply 4. Technical know-how 5. Lack of search skills 236 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Trends in the media studies due to adoption of ICT Digitization of Books (E-Text Books) There is an increased trend towards creation of a digital repository of books to create a digital learning environment for students. The digital version of the books embedded with text, pictures along with video, simulations and visualizations help students learn the concepts in an interactive way. The National mission on Education through ICT plans to generate new online course content for UG, PG and Doctoral education. Content Delivery using IT is purely a content driven play where educational content is delivered through innovative use of ICT. There is an increased trend in higher education institutes to render content through Radio, TV and Satellite. Open Education Resources Many Indian universities are contemplating Technology enabled free access of education resources. AICTE – Indian National Digital Library in Engineering & Technology (AICTE – INDEST) is a consortium set up by the Ministry of Human Resource to enhance greater access and generate annual savings in access of bibliographic databases. UGC has also launched its Digital Library Consortium to provide access to peer reviewed journals and bibliographic databases covering subjects such as arts, humanities, technology and sciences. Mobility With the proliferation of mobile phones on campus, colleges everywhere are compelled to capitalize on feature-rich phones that are capable of much more than just voice calls. Adoption of the BlackBerry, iPhone and other smart devices that have Internet access allows students and faculty to perform a wide range of assignments. Tasks like administration, sharing class notes, downloading lectures, instant messaging, etc., are possible anywhere cell phone service is available. The adoption of IT/ICT in higher education facilitates the following: 1. 2. 3. Improving the access to the system through online education. Improving the quality of teaching especially across remote locations. Increasing transparency and strengthening systems, processes and compliance norms. RECOMMENDATIONS 1. 2. 3. More generous financial support should be made available to provide the basic ICT infrastructural facilities. Since Information and Communication Technology (ICT) has come to stay, people that are not computer literate should take positive steps to remedy their deficiencies so as to flow along with the reforms. Effective and efficient power supply supplemented with standby generators should be provided to check the menace of frequent electricity power failure. CONCLUSION The inevitable conclusion that the researchers have arrived at in this study is that ICT has fulfilled its promise in the sector, there is remarkable rise in the use of ICT, and many of the activities are now ICT driven. This has led to the speed on acquisition, processing, storage, retrieval and dissemination operations. ICT has also help to curb the problem of information explosion in this information era. REFERENCES [1] Making the Indian Higher Education System Future Ready – FICCI Higher Education summit 2009 ; An Ernst and Young Report. [2] Wikipedia – Role of ICT in India. [3] A report to the people on Education , Ministry of HRD , Government of India. [4] ICT IN INDIAN UNIVERSITIES AND COLLEGES ; A report by Neeru Snehi. [5] National Policy on ICT in Education; Ministry of HRD , Government of India. [6] Educational Technology, http://en.wikipedia.org/wiki/Education_Technology. [7] http://www.webpages.uidaho.edu/~mbolin/shariful.htm. ISBN 1-63102-455-8 237 USE OF SNS BY LIBRARY PROFESSIONALS AND USERS: AN OVERVIEW Atika Khursheed | Assistant Librarian | Integral University | Lucknow | khursheedatika@gmail.com Aslam Ansari | Assistant Librarian | Integral University | Lucknow Abstract: Libraries, as information and social institutions have always been up-to-date with modern technological developments. In today’s scenario Social Networking sites are used as effective media of communication. These SNS terms are new tools to connect people together for common goal. The SNS allow library professionals to deliver desire information to the users within a minimum time. Through SNS library users can get personalize service from the library easily within a short span of time. SNS are one of the new approaches offering libraries the opportunity to reach out to its members. The use of SNS has affected the operations and service delivery of libraries and information centers. This study focused on use of SNS by library professionals, users, their purpose and how SNS are useful to them for improving library services. Keywords-Libraries, Social Networking Sites, Library services INTRODUCTION The use of social networking sites has become a popular and integral part of everyday communication in India. Young generations are very enthusiastic users and majorities are engaging on a daily basis with social networking services via a computer or smart phone. Nowadays, the importance of social networking services has become a major issue in society, as well as a important topic for many researchers. The most important characteristic of social networking service is that they enable users to make their social networks visible and build connections among individuals (Huan, & Eric, 2010). DEFINITION A social networking site or SNS is a platform to build social networks or social relations among people who share similar interests, activities, backgrounds and same real connection. Social network sites are web-based that allow individuals to create a public profile, create a group of users with whom to share connections. Mostly all social network Sites are web-based and provide means for users to interact over the Internet. Social network sites are wide-ranging and they include new information and communication tools such as blogging, photo/video sharing. Online communities are sometimes considered as social network sites. All SNSs authorize members of the group to share thoughts, ideas, videos, posts, pictures, activities, events, and interests with populace in their group. TYPES The mainly noteworthy Social networking websites frequently used by the public especially by the youngster are: MySpace: MySpace are extremely popular social networking sites which primarily have a social function allowing people to make friends, talk online and share resources. Facebook: This social networking site was introduced with the purpose of linking friends in Harvard University in 2004. Thereafter, the company extended to other universities then colleges. Eventually, they invited corporate communities. Facebook is librarian friendly; Group communication among patrons can be possible in web 2.0. Ning: Ning is an online platform for people and organizations to create custom social networks, launched in October 2005. Ning allows users to create their own communities and social networks around specific interests with their own visual design, choice of features and member data. The central feature of Ning is that anyone can create their own social network for a particular topic and catering to a specific membership base. Librarian can use this tool to get connected with students, library associations, and more. Members can also use it to share information with many people at a time. 238 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education LinkedIn: LinkedIn was founded in 2003 and was one of the first mainstream social networks devoted to business. Originally, LinkedIn allowed users to post a profile and to interact through private messaging. This social networking site for professionals is a great way to get library patrons connected with the people that can help them find information. Whether that's you, faculty, authors, historians, or other sources, they can find them in your LinkedIn network. Flickr: Flickr has become a social network in its own right in recent years. They claim to host more than 3.6 billion images as of June 2009. Flickr also has groups, photo pools, and allows users to create profiles, add friends, and organize images and video. YouTube: YouTube was the first major video hosting and sharing site, launched in 2005. YouTube now allows users to upload HD videos and recently launched a service to provide TV shows and movies under license from their copyright holders Reddit: Reddit is another social news site founded in 2005. Reddit operates in a similar fashion to other. Twitter: Twitter was founded in 2006 and gained a lot of popularity during the 2007. Status updates have become the new norm in social networking. Twitter is a micro blogging application, to keep staff and patrons updated on daily activities, like frequently updated collections, new arrival, current content services of library. FriendFeed: Friend Feed launched in 2007 and was recently purchased by Facebook, allow you to integrate most of your online activities in one place. It’s also a social network in its own right, with the ability to create friends lists, post and updates. BharatStudent: Bharatstudent is a social utility that brings together all the young Indians living across the globe. It is for every Young Indian who is a student or a non-student, fresh graduate, a working professional or an Entrepreneur, and is focused on providing comprehensive solutions for any personal and professional issues. Fropper: Fropper is ALL about meeting people, making new friends & having fun with photos, videos, games & blogs! Come, become a part of the 4 Million strong Fropper communities. CHARACTERISTICS SNS is acronym of Social Networking Site which is used to determine any web based navigated pages for their user to create public profiles within the network can make contacts with other users of the same web based navigated pages who may able to access their profile. And SNS can be used for community based websites, online discussion forums, chartrooms and other spaces online. The primary function of any library is to acquire, store and disseminate the information, in the same way SNS also explores the information variously. SNS helps students or research scholar to develop practical research skills that they need in a world where knowledge construction and dissemination make increasing use of online information network. SNS works as a tool to mobilize library services among younger generation of LIS Professionals. Similarly as to get aware of the users about new arrivals library have make notices, in the same way SNS also shows new information in the form of notification. The faculty of Library and Information Science may get share information with their students on SNS that will help to embark their wide knowledge to the student’s community outside the classroom. SNS can work as a tool for interaction among the students and teachers. The popularity of social networking sites is increasing among the educated people especially adult youth in college and universities and by LIS Professionals Positivity of SNS Social networking sites have its own advantages to Librarians and users. Some of the advantages are as follows: • • • Social networking sites will facilitate collaborations and promote effective communication between Librarians and their patrons. It will generate a flow of information excluded from search engines and Library Catalogues. The critical aim of librarians is to make library resources available to patrons so if social networking sites will help achieve this goal then it should be pursued vigorously. ISBN 1-63102-455-8 239 Use Of SNS By Library Professionals And Users: An Overview • • Social networking sites wall linked to a library’s web page has the potential of reaping great results by attracting and serving Distance Education Students. Watts et al (2002) stress that it is through social networking sites that any person is capable of communicating and delivering a message to a distant target person. It will help Librarians and Libraries to keep pace with technologies and compete effectively with the developed World (Ayiah and Kumah, 2011) RISK FACTORS OF USING SNS Drawbacks to Social Networking Sites s demonstrated above, online social networking by academic libraries has many possibilities within the realm of student outreach. Some libraries may choose to use several social networking methods simultaneously while others may only use one preferred option. Yet, using the various social networking Web sites available does not guarantee success or effectiveness as an outreach method. Several concerns about the use of social networking have been raised and must be considered by any academic library currently using social networking Web sites or considering the implementation of social networking outreach programs. Several of the concerns about social networking by academic libraries center on the lack of quantitative data to support their effectiveness in student outreach. Most discussions about social networking by academic libraries are primarily anecdotal (Boxen, 2008). There are very few quantitative studies available about the broad effectiveness of the approach. This makes it extremely difficult to determine if the social networking efforts are worth librarian time in competition with other established outreach methods. One of the primary concerns about social networking is low usage. One article reported that from the messages sent to 1,500 undergraduate and graduate students on Facebook by an academic librarian, only 48 responded (Mathews, 2006). Another study focusing on Wiki use in academic libraries found that six of twenty-one libraries reported difficulties with low participation rates (Chu, 2009). It is also difficult to determine if patrons using the library’s social networking tools are new library users or existing patrons (Sekyere, 2009). Thus, each library must decide upon its definition of success for social networking tools. Is the goal chiefly to draw new users into the library, or does it also include keeping current users informed and engaged? Though each library can determine its own measures for success, usage rates should be monitored in social networking programs to determine whether or not they meet the library’s goals. Another major concern regarding social networking by academic libraries is whether students are even receptive to the idea. Librarians are seen as authority figures within the university community, and students may be resistant to friending the library if their personal information is visible to university officials (Sekyere, 2009). Some librarians advocate actively friending their students, which may only serve to distance the very students librarians are trying to attract. For example, Brian Mathews advocates actively following student blogs to look for academic-related keywords, such as library or assignment, and then encourages librarians to “initiate contact, conduct a reference interview, and provide the necessary support” (2007a, p. 12). However, some students may see this extremely proactive approach as stalking. A better option is to mention “one’s Facebook account in library instruction sessions and reference interviews and then [let] the students find that account” (Connell, 2009, p. 28). Librarians at Pennsylvania State University found that promoting their Facebook page during library instruction sessions and reference interviews resulted in “increased research traffic in not only their Facebook message boxes, but also in their institutional email and even in person” (Mack, Behler, Roberts, & Rimland, 2007). In fact, over a fall semester, 126 of the 441 reference questions fielded by a Penn State librarian were through Facebook. This was the highest percentage of reference transactions among the various options--email, phone, IM, and in-person interactions (Mack et al, 2007). Thus, allowing students to control their level of participation yielded positive results and increased the number of students using librarians in their research. Ultimately, librarians using social networking Web sites must avoid being perceived as invading student space. In addition to student perceptions, another concern regarding social networking by academic libraries is in regards to how students actually use these technologies. Students generally use social networking sites to distract themselves from their academic activities (Sekyere, 2009). Even when they use social networking for school-related activities, it is usually in conjunction with a student organization or a specific class. Essentially, students use social networking to interact with fellow students. They are not using these services to connect with libraries. Ruth Sara Connell conducted a survey of Valparaiso University students that discovered that 17.2 percent of students were open to the idea of having the library as a friend, 57.7 percent would accept a friend request from the library but would not be proactive about it, and 25.1 percent would not add the library on their Facebook or MySpace page (2009). Thus, while most 240 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education students were receptive to a library presence on the major social networking Web sites, a sizable percentage were not. Additionally, even those students receptive to social networking by libraries indicated that they did not want their time wasted with frequent, irrelevant messages (Connell, 2009). Academic librarians must be aware of student attitudes as constant updates from the library may detract from the libraries outreach attempts and be considered as intrusive as email spam. Ultimately, social networking by academic libraries can only be effective if library efforts are not seen as encroaching on student privacy and if they are not perceived as wasting valuable student time. Academic librarians must also be in favor of social networking for it to be an effective tool. Librarians at an academic institution must be proactive in their social networking attempts and must be willing to participate in the ongoing process. There is little point to creating an account on a social networking platform if it is not going to be used or updated. For example, a survey of 126 academic librarians by librarians Laurie Charnigo and Paula Barnett-Ellis (2007) found that 54 percent of the librarians surveyed did not believe that there was an academic purpose for Facebook. Additionally, most of the librarians felt that Facebook was a student space and that librarians and other university administrators should not invade this space. Though this attitude many change as older individuals flock to social networking sites, it cannot be expected that all librarians will be in favor of the idea. Lack of librarian time is also a concern, particularly with social media games that are frequently laborintensive, expensive, and only allow librarians to provide open-source information (Boxen, 2008). If the overwhelming majority of librarians are not in favor of social networking, this will not be an effective outreach strategy. A lack of librarian support for social networking also risks uneven service levels for students enrolled in different disciplines. If only selective liaisons are proactive in social networking to provide subject support, subject-based support may become unequal among disciplines. Thus, libraries that only have certain librarians engaging in social networking with students will need to address this concern to ensure that all departments receive an equal level of subject support. Ultimately, social networking requires continuous updating, knowledge of changes to the social tools, and monitoring user comments. Thus, academic librarians must be willing to dedicate their time to social network-based student outreach for these methods to be successful. In addition to general support for social networking by librarians, academic librarians engaged in social networking must also address the consistency and timeliness of the service. Students will expect timely responses to any inquiries sent through social networking tools. They are unlikely to return to social networking tools for library assistance if librarians do not respond quickly to inquiries. This also potentially risks the possibility that the student will not use other library services. Thus, libraries must create guidelines on response time to answer student questions on social networking platforms as they most often have done with email and virtual reference services. These guidelines must also address staff absences and vacations so that the social networking services remain consistent while still allowing librarians to take vacations or attend conferences. Ultimately, academic libraries engaging in social networking with students must address issues regarding consistent and timely responses for these new service tools. Lastly, many academic librarians fear losing control over their resources if they use some of the available social networking tools. Tools that allow students, and even faculty, to edit content about the library remove a certain amount of control from the librarians themselves. Tools, in particular folksonomy, that allow users to assign tags to resources that then replace the traditional subject headings established by librarians can result in a lack of synonym control, lack of precision in subject terms, a lack of hierarchy among categories, and a lower recall ability (Kroski, 2007a). Ultimately, there is legitimate concern that permitting increased user participation through social tools will remove librarian control over resources and inhibit a librarian’s ability to use the very resources they are trying to make more accessible among academic library users USE OF SNS IN LIBRARY Dickson A (2010) define the term Social networking as '”communication with people who share your interests using a website or other service on the internet”. But Aiyah & Kumah (2012) find in her study entitled “Social Networking: a tool to use for service delivery to clients by African Libraries” the Social networking can be referred to as a web platform where people from different cultural settings can connect and interact with each other. Suraveera, Namali & et.al.,(2011) defined at the level of terminological base 'social networking refers as a process of build up a relationship among a group of people, who have a common interest and also grouping of individuals in specific groups. According to Boyd & Ellison (2007), the social network can be defined as a web ISBN 1-63102-455-8 241 Use Of SNS By Library Professionals And Users: An Overview based network, which use for construction of a profile within a bounded system to articulate a list of members, group to share their views, connection, and list of connection, and those made by other in the system. Social Networking has some technological terminology, these helps to content activity for user, Redmond, Fiena (2010) examine as the concept behind the networking technology is an online location for user to create profile and build up a group (personal network) for connecting to other group or users and a study by Chu and Meulemans (2008) states that Social networking sites are very popular among the students. They highlight that MySpace, Facebook; these two widely adopted social networking sites can be used in the university libraries for imparting library instruction, references and outreach. Naushia Parveen (2011) believes that it is most LIS professionals who are connected to each other on social network them to share their experiences, views and anticipatory awareness. Charnigo and Barnett-Ellis (2007) find in her study that, the use of Social Network is a feasible way to deliver library and information services and is a good medium to communicate to their user. A survey of Connell (2009), students have negative feelings about the librarians using Social Networking tools to outreach since it may infringe on their sense of personal privacy. So Connell survey suggests that, “a library would want to use social network sites effectively, librarians should be cautious in establishing communications and relationships with their student friends and avoid “mass friending”. SUGGESTIONS Suggestions based on personnel and staffs of the library, the following recommendations are suggested for adoption in an effort to improve library services by the libraries patrons. • • • • Librarians should formulate policies on the use of social networking sites. Such a policy should be designed in a way to include: a designated member of staff at a senior management level, with appropriate professional qualifications, to be responsible for the planning, implementation, operation and monitoring of services of the social network site of the library. It is recommended education and publicize of this tool to librarians and their clientele. Expertise should be sought from International Universities for assistance in the design for the University Libraries. Periodic evaluation of the social networking sites should be carried out to determine areas requiring attention. Evaluation is important because it helps to match objectives of the social networking sites with performance. CONCLUSIONS Conclusion From the above discussions and analyses it has been established that access to Internet connectivity and computers are on the increase. University of Education, Winneba has moved on with the introduction of wireless facility on their campuses given students and the university community access to Internet in the comfort of their hall of residence and homes. It is understandable that Twenty-First century student is not interested in printed work; for librarians to make libraries interesting innovations such as social networking site should be introduced to attract them to the library environment. Social networking sites would help establish a cordial relationship between librarians and patrons; market the library’s services; announce library programmes on the wall and so on. This technology provides the enabling platform that goes beyond the traditional service delivery by allowing patrons to interact in real time with librarians in the comfort of their hall of residence or homes. Librarians must acquire the necessary skills in information technology to meet the challenging demands of social networking sites. This technology provides the enabling platform that goes beyond the traditional service delivery by allowing patrons to interact in real time with librarians in the comfort of their hall of residence or homes. Librarians must acquire the necessary skills in information technology to meet the challenging demands of social networking sites. REFERENCES [1] [2] [3] 242 Dickson, A. & Holley , R . P . (2010). Social networking in academic libraries: The possibilities and the concerns. New Library World, 111(11/12), 468-479. doi: 10.1108/03074801011094840. Boyd & Ellison, N. B. (2008). Social Network Sites: Definition, History & Scholarship. Journal of ComputerMediated Communication 13, 210-230. Dakers, H. (2003). The BL reaches out library and information. Update, 2(10),46-47. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] Huan, C., & Eric, H. (2010). The lived meanings of Chinese social network sites (SNSs) among urban white-collar professionals: A story of the happy network. Journal of Interactive Advertising, 11(1), 11-26. List of social networking websites (2015). Accessed from: http://en.wikipedia.org/wiki/ List_of_social_networking_websites. Ramsey, T. P. (2008). Social Networking Services: Library Collaboration 2.0? Accessed from: https://cdr.lib.unc.edu/record?id=uuid%3a01d677d2-e9bb-49ea-858d-0e9dee3be2ad Roberts, S. and Rowley, J. (2004). Managing Information Services. London, Facet Bell, S.J. (2007). Building better academic libraries with Web 2.0 technology tools. Library Issues, 28(2), p. 1 - 4 Byers, Peggy Y. Wilcox, James R. (1991) Focus Groups: A Qualitative Opportunity for Researchers, The Journal of Business Communication 28:l: Winter 1991. Dadzie, Perpetua S. (2007) Information Literacy: assessing the readiness of Ghanaian Universities, Information Development; vol 23( 4). p 265-277. Denscombe, M. (1998) The good research guide for small – scale social research project; Buckingham, Open University Press. p 87-106. Maness, J. (2006). Library 2.0 Theory: Web 2.0 and its implications for libraries. Webology. 3 (2). http://en.wikipedia.org/wiki/Social_networking_and_British_libraries. O’Brien, J. (1996) Management information systems: managing information technology in the networked enterprise. Powell, Juliette (2009) 33 million People in the Room: how to create, influence, and run a successful Business with Social networking. Pearson Education, Inc https://idv.sagapub.com/cgi/content/abstract/23/4/266. Raskin, R (2006) Facebook faces its future, Young consumers, Vol. 7 No. 2, p. 56-58. Scale, Mark-Shane (2008) Facebook as a social search engine and the implications for libraries in the twenty-first century. 26(4).p. 540-556. Seufert, Andreas, Von Krogh Georg and Bach Andrea (1999) Towards knowledge networking. Journal of Knowledge Management .3(3).p 180-190. Social Network. (n.d.). The Free On-line Dictionary of Computing. fromDictionary.com website:http://dictionary.reference.com/browse/social network. Watts, D. J., Dodds, P.S. and Newman, M.E.J. (2002), identity and search in social networks’ Science, 296(5571), p. 1302. Parveen. Noushia, Use of social networking site (facebook) in making awareness among the library and information science professionals of university libraries of u.p: a case study,International Journal of Digital Library Services, 1(1).p. 9-17. Sahu. Mahendra, Information disseminating through using social networking sites among library professional in the engineering colleges of odisha: a survey, International Journal of Digital Library Services.3(1).p. 45-54. Boyd. D, and Ellison. N, Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication. 13(1). Ayiah. Efua Mansa, and Kumah. Cynthia Henewaa, Social Networking: a tool to use for effective service delivery to clients by African Libraries. (http://conference.ifla.org/ifla77).p. 1-15. Chu. Samuel Kai-Wah, and Du. Helen, Social Networking Tools for Academic Libraries. Journal of Librarianship & Information Science.45(1).p. 64-75. Ahmad Ateeq (2011). A Short Description of Social Networking Websites And Its Uses. International Journal of Advanced Computer Science and Applications. 2(2).p 124-128. ISBN 1-63102-455-8 243 ROLE OF MOBILE COMMUNICATION IN RURAL DEVELOPMENT: A STUDY OF KARALA VILLAGE Nidhi Chaudhry | Assistant Professor | BJMC | MAIMS | Rohini Sec – 22 | Delhi | nidhichaudhry@ymail.com Dr. Nisha Singh | Assistant Professor | BJMC | MAIMS | Rohini Sec – 22 | Delhi | ratrinisha@gmail.com Abstract: The paper examines the role of mobile communication in rural development. Communication plays an important role in the process of rural development. The communication bridges the gap between public institutions, rural organizations and people generate the opportunities to ensure share of knowledge and experience needed for rural development. The mobile industry have realised the significance of mobile communication and its effects in rural areas hence they are coming up with low cost smart phones and low tariff internet packages and schemes like EMI, etc. The innovations in mobile industry are oriented towards rural community like mobile applications in regional or local languages. The policymakers in developing countries has taken this into consideration very seriously and hence they channeling their efforts and resources towards rural development. The study made use of frequency counts and simple percentages to analyse the data collected. The study revealed that communication is essential in fostering rural development; that with good communication strategies, rural people would take ownership of development initiatives in their hands and that good and effective communication would foster rural development. The study concluded that communication is important in rural development and that it must be fostered for people to participate actively in the process of development. Keywords: Development, Rural Development, Mobile Communication, INTRODUCTION Development refers to the sustained, concerted actions of communities and policymakers that improve the standard of living and economic health of a specific locality, thereby leading to the general progress and welfare of its people. ‘Development’ is a broad term which calls for overall and comprehensive development of the entire society or nation, if any section of the society is left out or does not develop than that society or nation cannot be categorized as developed. Hence ‘development’ is always comprehensive thus the rural areas cannot be left out. Especially in a country like India which is an agricultural economic and 70 percent of its population resides in rural areas. Rural development is a process of action with economic, political, cultural and social dimensions. To put it differently, agricultural development is a process whereby the farmers possess modern knowledge and information. It is essential for the farmers to have and accept the necessary technologies, innovations and knowledge for the rural development. Therefore, communication plays an important role in the process of rural development. The communication bridges the gap between public institutions, rural organizations and people generate the opportunities to ensure share of knowledge and experience needed for rural development. The policymakers in developing countries has taken this into consideration very seriously and hence they channeling their efforts and resources towards rural development. To bring about social change among the marginalized and vulnerable population groups, participation must be fostered through communication; as such will lead to the transformation of the community. This is to say that communication is a central or the mediating factor facilitating and contributing to collective change process (Sarvaes and Liu 2007). “Collective action is built on personal interactions and trust, but today’s communications technologies and social networks also hold potential for extending the scope of social and political communities across borders. 244 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Mobile phone use is almost universal, with 6.8 billion subscriptions, and Internet use is on the rise, with average annual growth in Africa leading the way at 27 percent. Communications technology can also increase the voices of the vulnerable—encouraging the political and social participation of groups that have historically been excluded from, or minimally represented in, public discourse, including the poor, women, minorities and other vulnerable groups.” The United Nations Development Program (UNDP)’s Human Development Report 2014 (www.undp.org). The United Nations Development Program (UNDP)’s Human Development Report 2014 stresses that the strategic communication works and information communication technologies play vital role in the elimination of poverty and ensuring public access to information in rural development, creation of employment and other similar fields (www.undp.org). In communication for development, rural people are at the centre of any given development initiative and so communication is used in this sense for people’s participation and community mobilization, decision making and action, confidence building for raising awareness, sharing knowledge and changing attitudes, behaviour and lifestyles (FAO 2006). Mobile phone is another means of communication. Its use is increasing day by day. It is an example of convergence. It converts various media in to a single media. Today you can talk face to face. You can connect with whole world. The development of telecommunication technology converts world in to Global Village. Mobile communication can affect rural people in the spheres of – trade & commerce, education, information, healthcare and governance and it is important for the mobile industry to work at these levels to achieve significant development. India is the second largest Country of the world in which 96, 051, 9472 mobile phone users are using mobile phone. Six million new mobile subscriptions are added each month. Many of these new "mobile citizens" are belong to rural areas. The mobile industry have realised the significance of mobile communication and its effects in rural areas hence they are coming up with low cost smart phones and low tariff internet packages and schemes like EMI, etc. The innovations in mobile industry are oriented towards rural community like mobile applications in regional or local languages. Cooperation (DAC), Ministry of Agriculture, Govt. of India launched Kissan Call Centers on January 21st, 2004 across the country to deliver extension services to the farming community. Government and private players are increasingly tapping into this widely available medium. Kissan Call Centre Services and number of mobile values added services such as free daily voice messages on marketing prices for their produce, farming technology, weather forecasts, dairy farming, fertilizers availability, plant protection etc. The purpose of these call centers is to respond to issues raised by farmers, instantly, in the local language. Kiosks are meant for access to basic browsing and various types of commercial values added services including entertainment, Information, tele-education and telemedicine. The Indian government has launched Sanchar Shakti Mobile VAS scheme for providing information and training to rural women, providing them with information on health, social issues, government schemes, as well as livelihood related inputs training, for women self help groups in rural India. REVIEW OF LITERATURE Ajay Kumar Pandey, G.P. Pandey, K.M. Pandey (2001) concludes that the rural poor community, friends and market place are the major source of communication. There is a need to give electricity to all villages in Garhwa district. The rural people largely contribute to promote agriculture, forest through this promotion or contribution they will develop the nation. Rural District of Garhwa district is not developed and healthy areas so developmental policies must apply to control poverty illiteracy and aware about development. The developmental work is not properly run due to illiteracy, crime, bandh, etc. ISBN 1-63102-455-8 245 Role Of Mobile Communication in Rural Development: A Study of Karala Village Prof. T.P. Rama Rao (2004) observes that the information and Communication Technologies have facilitated the design of solutions to deliver government services for social development at the door step of rural people. Successful ICT projects involved, in the design process, all stakeholders such as government officials, legislators, regulatory agencies, citizens, voluntary organizations, technology consultants and vendors, academics, researchers, funding agencies, and media. Some projects could not retain private entrepreneurs due to poor revenue realization and inadequate quality of responses by the government departments offering the services. Dr. J.S. Giri Rao, Dr. S.N. Pattnaik (2006) conclude that as telephone gets cheaper and widely accessible across the country, the real life of rural people of the country would definitely undergo a tremendous transformation, providing the needed momentum for development. There is much to do with regard to improvement in the field of telecommunication’s participation in rural development in India. Increasing access of telephone in rural areas is especially critical given that most of poor people cannot afford their own telephone service. Access to the means of telecommunications, transformation and dissemination of information is crucial for human development especially with reference to knowledge based society and globalised competitive economic environment. Jonathan Donner (2007) concludes that as far as the technology is concerned, there are innumerable interesting topics for exploration in the developing world, where the distinct forces of cultural variability and economic constraint will enrich our understanding of mobile use for years to come. It can be difficult to be mindful of all the variability, but cultural, economic, and regulatory factors all play a role in structuring the use of a billion (or more) handsets in the developing world. Jayanta Banerjee (2011) observes that telecommunication has become a vital part of our life; maintain social contact, emergency relief, health and education. There are many noteworthy challenges to rural telecommunication. Rural network infrastructure is difficult to maintain as access to power, transport and road communication is poor. Government of India needs to ensure that all obstacles are removed in licensing, spectrum allocation, technology acquisition, so that small 'niche' operators who are unable to make a mark in the highly competitive urban market. Christine Zhenwei Qiang, Siou Chew Kuek, et al., (2011) concludes that Mobile applications for agricultural and rural development (m-ARD apps) offer innovative, dynamic, interdisciplinary services. These new services could raise incomes and create more opportunities for people in rural and underserved communities in developing countries as well as stakeholders throughout the ecosystem for m-ARD apps. Abdul Razaque Chhachhar, Har Bakhsh Makhijani, et al., (2011) concludes that information and communication technologies are growing rapidly in developing countries and most of the countries are getting benefit from these technologies in different sectors of development. Still there is lack of infrastructure and facilities in rural areas have no given appropriate development in agriculture and education sectors. By using computer labs farmers directly can contact buyers and sellers for sell their goods and services lack of awareness and illiteracy also a problem among farmers most of them cannot use technologies. There is need for education of farmers regarding information and communication technologies and its uses that farmers can get information about market, weather pesticides and seed. Richard Duncombe (2014) provides a systematic review of the potential and limitations of mobile phones in the delivery of rural services for agricultural and rural development in developing countries. Giving greater mobility and portability, such devices and applications will offer greater processing power through cloud connections, open source development, and possibly greater affordability, speed to market, new opportunities for micro-revenue generation and financial sustainability. Saravanan, R., Suchiradipta Bhattacharjee (2015) conclude that along with incredible opportunities, implementation of mobile applications also poses a lot of challenges in India due to lack of mobile friendly and locally relevant digital content, rural mobile infrastructure limitations illiteracy, large number of local languages 246 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education and tribal dialects. All that is needed is to learn from the success and failures alike and make mobiles an integral part of agricultural extension as it has become an integral part of the life of the people.     OBJECTIVE OF THE STUDY To know that Uttar Pradesh rural public believes that mobile communication is really beneficial. To study that Mobile communication has changed lifestyle of Uttar Pradesh rural public. To evaluate that people are aware about govt. policies regarding mobile communication. To verify that people are get benefit from using Kisan Call Centre Services and SMS portal Rural Broadband and NeGP Rural telephony Telecom Service. RESEARCH DESIGN Research Method: To meet above objective survey method is adopted. In this survey village people are target respondents. Sample Size: 150 respondents were selected for survey. Sample Selection: To meet above objective village Abdullah pure is selected by convince sampling. Research Analysis: Out of 150 respondents, 142 questionnaires were found to be good for analysis. Male= 96 and Female= 46 respondents. Out of 142 respondents, 58 respondents were 0 to 10 th class educated, 28 were done 12th , 12 respondents were graduate, 8 were post graduate and 2 were M.Phil. RESULTS AND FINDINGS: Table 1: Respondent’s those have mobile phone During the survey it was found that almost ever respondent have one mobile phone at their home. A good number a 93 male respondents have their personal phone. But 31female respondents did not have their personal mobile phone they were using family phone. 84 respondents said that it is not at all difficult to use a mobile phone. On the other hand 25 respondents replied that it was not at all easy to use a mobile phone. 92 respondents said that they were spend 1 to 2 hrs on mobile phone. Only 16 internet users were found. Especially youth like to use internet on mobile phone. 103 Table 2: Respondent’s perception about how easy to use Table 3: Respondents those have internet connection on their mobile phone mobile phone respondents were never used internet on mobile phone.130 respondents said that they were not aware about video calling from phone. 28 respondents said that they tried video calling and they faced difficulty to use video calling. 12 respondents replied that it was not so difficult to use video calling. They liked to use video calling. They also said that it is a good feature of mobile phone that anybody can talk and watch somebody in same time. Almost every 140 respondents replied that they were listen radio on mobile phone. 56 respondents said that they used ISBN 1-63102-455-8 Table 4: Internet used by respondents on mobile phone 247 Role Of Mobile Communication in Rural Development: A Study of Karala Village mobile phone for all purpose. They said that mobile phone is a good infotainment medium. Mobile communication had made communication very easy said by almost ever respondent. 45 respondents said that they used mobile phone only for communication. They said that cost of mobile phone is not so much affecting their purchasing behaviour. Every respondent said that mobile communication has made communication process easy. They also said that with mobile phone they can talk to anybody in very less time and less money. With the help of mobile communication 28 respondents said that they got profit with using mobile phone. Table 6: Mobile phone has changed respondent’s life style Table 5: Respondents purpose to used mobile phone Respondents replied that they can order material which want to use. There is no need to visit shop to shop. Just call them and they send material to their home. Their business is increasing because of mobile phone. They also said that mobile has made their life so easy and comfortable. It is very difficult to live without mobile phone. Their education level also has improved said by 7 respondents. 48 Farmer said that they got information about weather, seeds and govt. policy with use of mobile phone. Yes village people lifestyle has changed but normally said by 29 respondents. 85 respondents said that there is no change has found in their lifestyle. 52 respondents said that yes they got Table 7: Awareness of respondents towards government policies regarding mobile technology profit through mobile phone and 67 respondents said that through mobile communication they got less profit. Government policy regarding mobile communication, has known by 56 respondents. They were aware about govt. policy like Kisan Call Centre and they were called in Kisan call centre. 38 respondents replied that they were satisfied with kisan call centre mobile services. 70 respondents were not replied anything they were neutral on this question. 40 respondents said that they were not satisfied with Kisan Call Centre services. 82 respondents didn’t want to see any change in it. On the other hand 48 respondents said that they want Table 8: Satisfaction level of respondent’s toward kissan call centre mobile service that govt. create awareness among village people so that they should know that how to use of kisan call centre services. Everyone should have kisan call centre mobile phone no. 12 respondents said that they want to change language of the mobile phone. They said that it should be local language so that they can understand and easily operate it. With the help of mobile communication rural development is possible replied by 102 respondents. 20 respondents were quite on this question they were not replied anything. Only 12 respondents said that rural 248 Table 9: Respondent’s perception towards rural development through mobile phone ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education development through mobile phone is difficult. 56 respondents said that mobile technology is quite difficult for them and they wanted that mobile technology should be easy for them. 105 respondents said that mobile phone should be cheap so that they can purchase more. Only one helpline can’t do any help in rural development govt. should increase more development program. They didn’t know how to use internet on mobile phone. Govt. should organized seminar and workshop to create awareness among village people. CONCLUSION The research was carried out to find out the extent to which mobile communication would help in the rural development. The study made use of frequency counts and simple percentages to analyse the data collected. The study revealed that communication is essential in fostering rural development; that with good communication strategies, rural people would take ownership of development initiatives in their hands and that good and effective communication would foster rural development. The study concluded that communication is important in rural development and that it must be fostered for people to participate actively in the process of development. RECOMMENDATIONS To this end, the following recommendations are made: Members of each community should be made to realize the importance of communication in the process of community development. In realization of this, community members should be made to see the importance of choosing the right words for use in the right context so that ideas and opinions on community development, as expressed by each community member would be understood and eventually lead to collaborative efforts. Community leaders should endeavour to engage in clear communication so as to enlist the participation of everybody in the process of community development. Community leaders or community development agents should ensure effective circulation of information among different participants by using communication tools and channels appropriate to the groups involved. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] Adedokun M.O. 2008. A Handbook of Community Development. Ado-Ekiti: Balfak Publisher. Adepoju Tunji 2000. Introduction to Mass Communication. Ibadan: The Gift Communications. Akinpelu J.A. 2002. Philosophy and Adult Education. Ibadan: Stirling-Horden Publishers. Anyanwu C.N. 1999. Introduction to Community Development. Ibadan: Gabesther Educational Publishers. Braimoh Dele 1988. The process and effects of distortion. In Human Communication and its Implication for Educators. Nigerian Journal of Curriculum, 5(1): 83- 95. Communication and Community Development From http://www.communicationforsocialchange.org/ maziarticles.php?id = 272. Communication for Development J. Sarvaes, Liu S. (Eds.) 2007. New Approaches in Communication and Community Development. Moving Targets: Mapping the Paths Between Communication, Technology and Social Change in Communities. Penang, Malaysia: Southbound. Alamgir M. 1989. Participatory Development: The IFAD Experience. In: WP Lineberry (Ed.): Assessing Participatory Development: Rhetoric versus Reality. Boulder: West View Press, pp. 115-125. Manyozo Y. 2006. Manifesto for development communication: Nora C. Quebral and the Los Banos School of Development Communication. Asian Journal of Communication, 16(1): 77-79. Quebral N. C. 1973. What do we mean by development Communication. International Development Review, 15(2): 25-28. Thussu D. K. 2000. International Communication: Continuity and Change. London: Arnold. Udoakah N. 1998. Development Communication. Ibadan: Sterling-Horden Publishers. United Nations Development Program (UNDP)’s Human Development Report 2014 (www.undp.org). (Accessed on 26th July, 2015) ISBN 1-63102-455-8 249 A COMPARATIVE STUDY ON TOTAL QUALITY MANAGEMENT OF LIBRARY SERVICES IN TAMIL NADU UNIVERSITY LIBRARIES Dr. I. Ravi Kumar Kennedy | St. John’s College | Palayamkottai | Tirunelveli | i.r.k.kennedy1996@gmail.com Abstract: The Total Quality Management mainly rely on recognizing library user’s and discovery of their needs, setting standards that an consistent with library users requirements, empowerment of people at all levels in the organization to act for quality improvement. Quality services means resources and services, which satisfy user’s expectations and perceptions. It is very clear that librarians must use management tools to run the library Services. The tools such as TQM, SERQUAL, SERVPERF, LibQUAL help them to assess services, to make decisions, to improve services and to achieve a better quality. The main idea of the present study describes the commitment to quality and meeting the library user’s requirements, communication of the quality message and recognition of the need to create total quality. Keywords: Information Services, Library Services, Total Quality Management, University Libraries, Users satisfaction. INTRODUCTION The very existence of libraries are dependent on user’s satisfaction in the present digital information era, the librarians are more than a custodians to provide the right documents, information and the services to its users. The main objective of this paper is to describe and identify the issues of meritorious attention by the library professionals to gear up the library product and services, so that the user communities to get satisfied for coming to library. Total Quality Management (TQM) is an integrative philosophy of management for continuously improving the quality of products and processes. The quality of products and processes is the responsibility of everyone involved with the creation or consumption of the products or services offered by an organization. In other words, TQM capitalizes on the involvement of management, workforce, suppliers, and even customers, in order to meet or exceed customer expectations. Cua, McKone, and Schroeder (2001) identified the nine common TQM practices as cross-functional product design, process management, supplier quality management, customer involvement, information and feedback, committed leadership, strategic planning, cross-functional training, and employee involvement. Quality Management in University Libraries The emergence of knowledge society has necessitated exploring more innovative and insightful measures of modernization. The Present study makes an effort to study, assess and evaluate the quality management in the university libraries in Tamil Nadu. Three main components of Quality Management are: a) Quality Control, b) Quality Assurance, and c) Quality Improvement and Enhancement SIGNIFICANCE OF THE STUDY 1. 2. 3. 4. 5. 250 To analyze the demographic characteristics of library users gender wise and status. To analyze the time spent by students and academic users in university libraries. To analyze the different methods adopted for providing quality library services by the university library. To analyze the availability of study materials for teaching and research. To evaluate the modernization inputs and to work out the growth rate trend in key variables in libraries of higher education. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education 6. 7. 8. To examine the views and opinions of users and staff and to apply a simple SWOT model to assess the quality management in university library services and facilities available. To assess the problems faced by all those concerned with library quality and standards. To offer suggestions for better performance of university libraries. A Structured Questionnaire was designed after completing the pilot survey. Different university library records were referred for secondary data and were collected using suitable schedules. Appropriate statistical tools were employed considering their utility and plausibility in this research study. A simple SWOT model was used. This survey covered all the profiles of 15 university Libraries in Tamil Nadu with a randomly selected a samples of 500. Materials, facilities, services offered and the staff and users were considered for the study. FINDINGS OF THE STUDY The following are the major findings of the present study: Gender Particulars Male Female Total No.of Respondents 256 244 500 Percentage 51.2 48.8 100 Table 1: Demographic characteristics of Library users – Gender Table 1 showed the Demographic characteristics of Library users that 51.2% of the respondents belong to the male category whereas 48.8% of the respondents belong to the female category. Status Faculty Member M.Phil Scholar Ph.D Scholar First year Students Second year Students Total 28 93 70 147 162 500 Table 2: Demographic characteristics of Library users – Status 5.6 18.6 14.0 29.4 32.4 100 Source: Primary data Table 2 showed that among the overall 500 library users, twenty-eight respondents (5.6%) are faculty members, 18.6% are M.Phil research scholars, 14% of the respondents are Ph.D research scholars, 29.4% are first-year PG students and 32.4% are second year PG students respectively. Hence more than three-fifths of the respondents belong to the category of PG Students who use the university library services. Table 3: Status of users and frequency of visits to the library S. No. 1. 2. 3. 4. 5 Status of the users Faculty Members M. Phil Research Scholars Ph. D Research Scholars P.G. First year Students P.G. Second year Students Total Total Frequency of visit the library Every day 13 (46.43%) 57 (61.9%) 25 (35.71%) 78 (53.06%) 80 (49.38%) 253 Once in two days 9 (9.68%) Once in three days 6 (21.43%) 2 (2.15%) 14 (20%) 5 (3.40%) 13 (8.02%) 41 4 (5.71%) 12 (8.18%) 19 (11.73%) 43 Weekly Monthly Occasionally - 3 (10.71%) 4 (4.30%) 28 14 (15.05%) 6 (21.43%) 7 (7.53%) 21 (30%) 40 (27.22%) 32 (19.75%) 107 4 (5.71%) 6 (4.08%) 8 (4.94%) 31 2 (2.86%) 6 (4.08%) 10 (6.17%) 25 70 93 147 162 500 Table 3 showed the status of the library users and their frequency of visiting the library. Among the faculty members, 46.43% visit the library every day, 21.43% visit once in three days and 21.43% visit monthly. Hence ISBN 1-63102-455-8 251 A Comparative Study On Total Quality Management of Library Services in Tamil Nadu University Libraries nearly half of the faculty members visit the university library daily. Among the M.Phil research scholars, 61.29% visit every day, 9.68% visit once in two days, 2.15% visit once in three days, 15.05% visit weekly, 7.53% visit monthly and 4.30% visit occasionally. Therefore three-fourths of the M.Phil research scholars visit the university library daily. Among the Ph.D research scholars, 35.71% visit every day, 20% visit once in two days, 5.71% visit once in three days, 30% visit weekly, 5.71% monthly and 2.86% visit occasionally. Hence more than one-third of the Ph.D research scholars visit the university library daily. Among the Post-graduate first-year students, 53.06% visit every day, 3.40% visit once in two days, 8.18% visit once in three days, 27.22% visit weekly, 4.08% visit monthly and 4.08% visit occasionally. Hence more than half of the Post-Graduate firstyear students visit the university library daily. Among the Post-graduate second-year students, 49.38% visit every day, 8.08% visit once in two days, 11.73% visit once in three days, 19.75% visit weekly, 4.94% visit monthly and 6.17% visit occasionally. Hence nearly half of the post-graduate second year students’ visit the university library daily. S.No. Purpose No. of Respondents Percentage 1. 2. 3. 4. 5. To know the latest arrivals in the library in your subject Academic improvement Reading newspaper Prepare competitive Examination To gain current and general information 146 188 162 154 156 29.2 37.6 32.4 30.8 31.2 6. 7. 8. Reading Journals and magazines For leisure reading Preparation of class notes/ assignments/seminar papers 148 100 114 29.6 20.0 22.8 9. Employment news Total N=500 8 1.6 Table 4: Purpose of Visit to the Library by the users Source: Primary data Table 4 elicited the purpose of visit to the University Libraries by the respondents in the study, 188 respondents visit the library for their academic improvement, 162 visit for reading newspapers. This is followed by 156 respondents to get current and general information, 154 respondents visit the library to prepare competitive examinations, 148 respondents visit the library for Reading journals and magazines, 148 respondents use the university library to know the latest arrivals in the library in their subject, 114 for Preparation of class notes/ assignments/ seminar papers, 100 respondents visit the library for leisure reading, 8 respondents visit the library for employment news respectively. Hence most of the respondents visit the library for the academic improvement and It is suggested that the library authority should consider the needs of the users who prepare for competitive examinations and encourage the use of library for preparing class notes/assignments/seminar papers. S.No. 1. 2. 3. 4. 5. 6. 7. Type of materials Reference Books Newspapers Employment newspaper Journals/ Magazines Text Books Theses and Dissertations E-Resources Total N=500 No.of Respondents 236 208 75 135 179 104 55 Table 5: Library users’ preference of seeking information sources Percentage 47.2 41.6 15.0 27.0 35.8 20.8 11.0 Source: Primary Data Table 5 discussed that 47.2% of the respondents preferred to seek reference books, whereas 41.6% of the respondents newspapers. This is followed by, 35.8% seek text books, 27% of the respondents seek Journals/ Magazines, 20.8% seek theses and dissertations, 15% of the respondents preferred to seek the employment 252 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education news, and 11% of the respondents seek e-resources. Hence most of the library users preferred to seek the information from reference books and newspapers. Sl. No Opinions on Very % Good Good 1 Seeking Infmn. thro’ Books Seeking Infmn. thro’ Jls / magazines furnishing of Reading Room Cleanliness and working space of Library Ventilation and lighting of reading and stack rooms 116 23.2 330 109 21.8 176 2. 3. 4. 5. % 66.0 Less satisfied/ Satisfactor y 40 341 68.2 34 6.8 35.2 180 36.0 124 158 31.6 214 42.8 111 22.2 215 43.0 8.0 Not satisfied/ Dissatisfied 14 % Total % 2.8 500 100 16 3.2 500 100 24.8 20 4.0 500 100 103 20.6 25 5.0 500 100 157 31.6 16 3.2 500 100 Table 6: Opinions on the level of satisfaction on book collection, journals and magazines and about furnishing of reading room, cleanliness and ventilation and lighting of the Library Source: Primary data 6.1 users seeking information through books: Table 6 showed that 23.2% of the respondents report that satisfactory level was Very Good for seeking Information through books , 66% report as Good, 8% report as satisfactory and 2.8% report that Not satisfactory respectively. Hence 89.2% of the respondents are satisfied as Good in seeking information through books. 6.2 users seeking information through Journal/Magazine/Periodicals: Table 6 showed that 21.8% of the respondents reported the Level of satisfaction of seeking Information through Journal/Magazine/Periodicals are Very Good, 68.2% as Good, 6.8% as satisfactory and 3.2% are Not satisfactory respectively. Hence 90% of the respondents are satisfied with the level of satisfaction of seeking information through Journal/Magazine/Periodicals as Good. 6.3 users’ opinion on the Furnishing of Reading Room: Table 6 showed that 35.2% of the respondents report that furnishing of Reading Room is very good, 36% of the respondents report that good, 24.8% of the respondents report that satisfactory and 4% of the respondents report that not satisfactory respectively. Hence most of the respondents are satisfied Good with the Furnishing of Reading Room at the university library. 6.4 users’ opinion on the cleanliness and working space of the Library: Table 6 showed that. 31.6% of the respondents report that Cleanliness and working space of the Library is very good, 42.8% of the respondents report that good, 20.6% of the respondents report that satisfactory and 5% of the respondents report that not satisfactory respectively. Hence most of the respondents are satisfied with the cleanliness and working space of the Library. In this study, five per cent of the library users are not satisfied with cleanliness and working space of the library and the university library should engage some menial worker to keep the library Clean and also provide sufficient working space of the Library in order to encourage users for spending more hours and utilizing the library. 6.5 users’ opinion on Ventilation and lighting of Reading and Stack Rooms: Table 6 showed that 43% of the respondents report that Good, 31.6% of the respondents report that satisfactory,22.2% of the respondents report that Ventilation and lighting in the Reading and Stack Rooms is very good, and 3.2% of the respondents report that not satisfactory respectively. Hence most of the users are satisfied with the ventilation and lighting in the Reading and Stack Rooms. ISBN 1-63102-455-8 253 A Comparative Study On Total Quality Management of Library Services in Tamil Nadu University Libraries S.No. 1. 2. 3. 4. 5. Options Very Good Good Satisfactory Not Satisfactory No Comments Total No.of Respondents 81 186 128 23 82 500 4 16.2 37.2 25.6 4.6 16.4 100 Table 7: User Friendliness of OPAC Source: Primary data Table 7 showed that 16.2% of the respondents report that User Friendliness of OPAC was very good, 37.2% reported it as good, 25.6% reported it as satisfactory and 4.6% reported it as not satisfactory, respectively. In this study, 16.4% of the respondents did not express any comments. Hence 79% of the users were satisfied with the User Friendliness of OPAC. CONCLUSION TQM is managing the concept of quality with the objective to meet and exceed the customer‘s expectation by developing leadership-driven forces for providing a product or service with built-in quality. The total quality should aim at the needs of the library users of present and future. The main requirements may include availability, delivery, reliability, maintainability and cost effectiveness, among many other features. Now-a-days the concept of quality has changed from the provider-oriented into customer oriented. Quality is the driving force of the entire activity cycle from the beginning to the end. TQM in any organization are the organizational vision, customer -focused, management by fact, total involvement and system support. REFERENCES [1] American Society for Quality. “Total Quality Management (TQM)”. Available at: <http://en.wikipedia/wiki/total_quality_management/overview//overview.html> [2] Hashmi, Khurram (2010). “Introduction and Implementation of Total Quality management (TQM)”. Retrieved 28.04.2012, from http://www.isixsigma.com/ methodology/total-quality-management-tqm/introduction-andimplementation-total-quality-management-tqm/ [3] Jaafar, S. B. (1998). “Total Quality for Libraries”. Retrieved May 05, 2004, from<http://www.voctech.org.bn/Virtual_lib/Programme/Regular/Library98/TQM%20for%20Libraries.pdf> [4] John, Paul and Yohannan, Sherin (2012). Total Quality Management in M.G. University Library, Kottayam: A Case Study. In: National Seminar on digital Library Era: Expectations of Librarians and Library Users. Ed by A. Thirumagal, P. Balasubramanian and K. Kannan. Tirunelveli: Manonmaniam Sundaranar University,2012: 136 – 140. [5] Jurow, S. & Barnard, S. B. (1993). Introduction: TQM fundamentals and overview of contents. "Journal of Library Administration," 18(1/2), 1-13. (EJ 469 099) [6] Jurow, S. & Barnard, S. B. (Eds.) (1993). "Integrating total quality management in a library setting." Binghamton, NY: Haworth Press. [7] Kumbar, Rajashekhar D. “The Importance of Marketing and Total Quality Management in Libraries”. Electronic Journal of Academic and Special Librarianship. v.5 no.2-3 (Fall 2004). Retrieved May 01, 2004, from http://southernlibrarianship.icaap.org/content/v05n02/kumbar_r01.htm 254 ISBN 1-63102-455-8 A PARADIGM OF KNOWLEDGE MANAGEMENT IN ACADEMIC LIBRARY: SOME INNOVATIVE EXPERIMENTS R. R. Kuralkar | Librarian | Adarsha Science, J. B. Arts & Birla Commerce Mahavidyalay | Amravati (MS) | rkuralkar@rediffmail.com Abstract: The process of managing the knowledge is being done since the period early human beings. However, with the inception of new and modern technologies the very concept of managing the knowledge in an organization and out of organization has been changed. The human brains are starving to identify the new techniques to manage the knowledge for the rapid progress in the concerned field of enterprises. The research has mentioned some innovative experiences here with the library which is situated in the rural area of Maharashtra state in India. In the era of automation of libraries some of the libraries have a facility of searching the library databases. Perhaps, comparing the rural student community with the urban student community, the rural students are lacking behind in respect of use of information and communication technologies. When the OPAC is made available to all the students of higher secondary and undergraduate students along with the proper user education, most of the students are found reluctant to use that mechanism to find out their required information. On the other hand they were approaching to the circulation desk to have their information particularly about the textbooks of their syllabi. The researcher made an experiment that he prepared an Offline Public Access Catalog. The details of the same are described in the article. Another innovative endeavor is made to provide online anticipated immensely needed information to the students. In this case it was found that most of the students were approaching to the help desk in the reading room to have their syllabi, old examination question papers and college magazine. Eventually, the library was having the lack of manpower. Therefore the researcher has decided to start online and 24x7 anticipated service with the cloud environment. The author got a drastic success in both the experiments which is narrated in the article. Keywords: Knowledge management, Knowledge sharing, anticipated intensive care library services, cloud computing and libraries, online library services. INTRODUCTION In the present age of information technology (IT) both information and knowledge have become essential components due to multi-dimensional use and application in the society. They have also been playing a crucial role to change and improve the current society for future vision. Knowledge Management is an emerging field, much hooted or advertised since late 1990s. Knowledge Management is a complex process, which deals with creations, acquisitions, packaging and utilization of knowledge. It is the methodical, unequivocal and premeditated building renewal and utilization of knowledge related to effectiveness and returns from its knowledge assets. Library & Information Science professionals and Knowledge Managers have realized the importance of knowledge management. The attention being paid to knowledge management (KM) has been growing very fast. Business magazines, books, and journals are publishing countless theories and business cases on knowledge management and related topics, and the number of conferences organized all over the world is growing exponentially. But why is this concept generating so much hype? And what are its major drivers? The importance of intellectual capital and the management of knowledge are strongly emerging themes in today’s organisational world (Chase, 1997). Many authors and practitioners (Quinn, et al., 1996, Matinez, 1998, Numri, 1998, Albert and Bradly, 1997) note that the emerging patterns are that intellectual capital will replace natural resources, commodities, finance, technology and production processes as the key factor influencing competitive advantage. This is because, with the exception of intellectual capital, everything else (IT, materials, end technical information) is available to ISBN 1-63102-455-8 255 A Paradigm Of Knowledge Management In Academic Library: Some Innovative Experiments everyone on more or less the same terms. “Knowledge is now a crucial factor underpinning economic growth. Producing goods and services with high value-added is at the core of improving economic performance and international competitiveness, increasing intangible investment, which is difficult to measure, and has become a major issue for enterprises and governments” Former Secretary General, OECD (quoted in Skyrme, 1998). IMPORTANCE OF KM IN LIBRARIES There are many firm reasons why organizations should pay attentions in knowledge management. The three types of benefits:    Efficiencies in information and knowledge processes, for example by reducing duplication Internal organizational benefits, such as sharing of best practices External benefits, such as faster problem solving. Many KM programs are start exclusively with a focus on the first group of benefits. Although important - and it is where an audit of knowledge and information can help very much, more important is that a KM initiative should be well beached in the core strategies and plans of the organization. Therefore, I consider some typical strategic priorities which act as drivers for KM and also some factors that trigger the initiation of a KM initiative. DRIVERS THAT STIMULATES KM An essential starting point in developing a KM program is to consider the needs of the library. In our consulting work this typically involves reviewing the corporate strategy, departmental plans and current challenges and applying to them a KM perspective. Some people call this process "developing the KM narrative". Below we give a sample of some aspirations commonly seen in corporate strategies followed by a comment on how KM can contribute.         256 Improving the levels of clientele service: through knowledge aggregation, KM can provide better knowledge of users problems and how they are solved Improving service quality: by linking disparate sources of information and using KM techniques, such as sharing best practices in design and framing, knowledge from performance in practice can be fed back into improved service designs and service rendering processes Moving away from simply services into value-added services: much of the value-added comes from knowledge - of product applications, of know-how delivered as training or as consultancy; KM can provide knowledge structures and repositories, either that customers can access directly or via consultants Achieving faster times from service development to delivery: KM's networking and communities of practice bring together knowledge from people working at all phases of the design-to-delivery cycle across all sections of libraries, thus anticipating potential problems, bringing historic knowledge to bear and condensing time frames; in addition, well structure work-in-progress repositories, such as project wikis, can ensure that documentation is up to date, continually reviewed and accurate Retaining and motivating our best clientele: evidence from several sources suggests that professionals are more likely to be loyal to firms that give them the best tools of the trade; in knowledge intensive organizations this includes intranet portals, collaborative technologies and networked specialist communities; in addition a good KM programme will put in place mechanisms to capture key knowledge so that when experienced staff retire or leave, all theit knowledge does not leave with them Reducing unneeded: in a knowledge intensive organization, wasted time comes from duplicating work done elsewhere and taking time to find information; good KM systems can ensure that knowledge repositories are well structured and that information can be searched and accessed efficiently Increasing flexibility and adaptability in an uncertain environment: KM can provide mechansisms for better external environment sensing and organizing market intelligence Ensuring compliance with external regulations: better records and information management are the key to providing authorities with reliable information and confidence ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education  Minimizing risk in our libraries: KM can been used to capture expert knowledge of risk assessor, and also draw on 'lessons learned' from similar situations that have been encountered previously Every situation is different, but a skilled KM analyst should be able to dissect strategic statements and identify potentially useful KM techniques and how much they could contribute to making an improvement. TRIGGERS FOR ACCOMPLISHMENT Our research shows that it usually takes one or more of the following events to stimulate an organization into initiating a KM programme        Poor performance - investigation often reveals inadequate information flow or lack of knowledge of demand forces the dawn of realization by senior management that knowledge is indeed a source of competitive advantage A change of senior management - where incoming managers have come from a more KM-mature business or can see that poor information or knowledge flows are hampering the organization The need to be more responsive to external trends and events, thus requiring better knowledge sensing and analysis capabilities Recognition of the need for a coherent KM effort to overcome the plethora of various projects (not all having a KM label) The need for significant investment in new IT systems, where it is important to balance investment in technology with that of content A recommendation from a consultant's study that started with another focus, such as customer relationship management New external regulatory or compliance requirements - Freedom of Information in the public sector is one example. ORIGIN OF THE IDEAS These experiments are made in the college library which is belonging to higher secondary and undergraduate students and situated in the rural part of Maharashtra state in India. In fact an OPAC was made available to the students and faculty for searching library databases and the college library was lacking sufficient numbers of computers in proportionate to the students and faculty. This resulted into the growing reluctance in the users to search the database. One another fact is that the students from rural areas were not have the sufficient knowledge to handle the computers. In the regular observation it is found that the students were placing their demand on the help desk and books circulation counter. This behavior hunted the mind of the researcher who is the librarian of this college. The researcher deeply thought over the issues and decided to provide Offline Public Access to the clientele. The detailed story is narrated in the next point. It was found that most of the students were visiting the help desk for some particular needs like syllabus, old examination question papers etc. Due to the shortfall of employees it was difficult to serve the students and hence some students were lying unfulfilled. The librarian seriously thought over the issue to solve it in the given environment and available facilities. The concerned syllabus and question papers were made available to the students for 24x7 using no cost mechanism. The real story of this is explained below. PRACTICING AND IMPLEMENTATION OF THE IDEAS To accomplish this task the researcher conducted meeting with the faculty to know which books are needed as per the syllabi of their subjects. Some those books are traced out which were already issued by the students. A subject wise, faculty wise and class wise inventory of books with the tile, author and registration number was prepared. This inventory is printed in a bold format and display near to the circulation desk. The precaution is been taken that the display of this inventory is most accessible and noticeable to all the clientele. The fact was brought into the notice of all the clientele that they can access their books regarding their needs through this inventory. One new endeavor is made to solve the problem of the students regarding the frequent needs of syllabus and old exam question papers. The required material is scanned and stored it on the cloud in drive the link of the drive is ISBN 1-63102-455-8 257 A Paradigm Of Knowledge Management In Academic Library: Some Innovative Experiments provided in the email of the library by setting a return email setup. It resulted into a drastically fantastic output. The notice is announced for the students that if they are in need of syllabus and old exam question papers they have to send a email on the given email that is the email of our library and then open their inbox they will get the syllabus and other material instantly. As a result of it the clientele rush on the help desk is reduce and user got served. It became possible to us to provide the library service in available least manpower. On the other hand ours students who are from rural areas becoming aware about the information and communication technology and ultimately they became happy. CONCLUSION In a nutshell these experiments resulted into fruitful. The knowledge management of available resources in the library as per requirement of the clientele could be done. Considering the existing situation of the library in respect of staff, IT infrastructure what was possible to prove the users is successfully done. The use of available resources for the sake of user within the required time span is made. REFERENCES Chase, R. (1997) The knowledge-based organisation: An international survey. Journal of Knowledge Management, 1, 1, pp. 38-49 [2] Quinn, J.; Andersen, P.; and Finkelstein, S. (1996) Managing Professional Intellect: Making the most of the best. Harvard Business Review. March-April. [3] Skyrme, D. (1998) Measuring the value of knowledge. Business Intelligence report. Business Intelligence Limited: London. [1] 258 ISBN 1-63102-455-8 ACADEMIC LIBRARIES WITH RFID Anil K. Mishra | Senior Lib. Information Asstt. | P.K.Kelkar Library (Central Library) | Indian Institute of Technology | Kanpur | mishraak@iitk.ac.in | dearanielkumar@gmail.com Jyoti Verma | Senior Lib. Information Asstt. | P.K.Kelkar Library (Central Library) | Indian Institute of Technology | Kanpur | jyotiv@iitk.ac.in, Abstract: In this paper described about the importance of RFID technology in academic libraries. Libraries using fast growing application RFID; this technology promises to relieve repetitive strain injury and make possible comprehensive inventory and by implementing this technology in academic libraries, the manpower, energy, time, duplication of efforts can be saved and reciprocate these saved resources can be used for betterment of the libraries in other wing. This article focused on the role of RFID in different type of functions of the library as security checking, shelf management, check-in and check-out etc. Keywords : RFID, Radio Frequency Identification INTRODUCTION RFID is a set of technologies that enables tracking and monitoring activities to be carried out using invisible radio waves over distances that range from less than a centimeter to many hundreds of meters. RFID applications in library require item-level tagging, because RFIDs are used to manage each books in a library collection. Thus, RFID in library applications may be the first major deployment of item-level tagging. This provides an interesting opportunity to study the privacy implications of item-level RFID tagging in a concrete, real-world setting. Generally, Radio Frequency Identification (RFID) is a means of identifying a person or object using a radio frequency transmission; these may be 125kHz (Low Frequency), 13.56 MHz (High Frequency) or 800-900MHz (Ultra High Frequency). RFID has been in existence for more than 20 years, and it is also used in other areas such as toll collection, access control, ticketing, and security concerns. RFID IN LIBRARIES RFID (Radio Frequency Identification) in library provides solutions on cost-effective basis. As name implies all functions are based on radio waves, short and long waves (125kHz-Low Frequency, 13.56 MHz-High Frequency or 800-900MHz-Ultra High Frequency) used in RFID as required according to distance of objects(books), RFID systems have been in existence within libraries for more than a decade. Through this technology stock verification at any level becomes very easy and can be performed in short span of time without disturbing any kind of library service. As the increasing of the amount of collections in library it becomes more difficulty to gather and search books, which would cause a series of problems, such RFID tags used in libraries: square book tag, as, putting books on the wrong or disordered frame, readers round CD/DVD tag and rectangular VHS tag keeping books of their own privately, and difficult to count and classify etc. Bar coding technique cannot meet the requirements any more. It was new challenge to improve the level of book management and service by applying the advanced information technology. It is a new challenge to improve the level of book management and service by applying the advanced technology. This system makes the readers seek what they want easily, and decreases the possibility of putting the books at the wrong place and bringing them out of library. Radio Frequency Identification can track and position all of the bibliographies that labeled RFID tags. RFID is an automatic identification technology thus automatic identification of objects using RF signal and special coupling (inductor or electromagnetic coupling) or the transmission properties by radar reflection. The beneficial side are quick scanning of books (RFID reader device can identify multiple RFID labels simultaneously); reading without barriers; shape of diversification; being of ISBN 1-63102-455-8 259 Academic Libraries With RFID strong durability and reusability of books; due to being of large data memory; the safety of library collection is also become strong. Use of RFID through smart cards for circulation of materials becomes very convenient for the library readers for check-in and check-out of documents(these smart cards has RFID chips), user can also perform self check-in and checkout, user identification can be done easily by these smart cards. A centralized database of the library readers can be prepared to speedup information between user and librarians. Library Inventory Reading can be performed by handheld RFID reader which consists of a long light weight handle with a flexible end part i.e. RFID antenna that rotates to identify the items on all shelves where hard to reach. The reader offers highest reading performance enabling instant data capture when passed near the items in a continuous movement. RFID reader can do fast and accurate inventory checks and also search specific documents i.e. re-shelving, weeding of books, on-hold management by connecting to the pocket PC which can stores and displays the documents data. This data can be transferred to the Library database via pocket PC through a wireless connection. Further no modification to the Library database is required. The inventory reader is unique and a convenient tool for the library staff as it is helpful in no. of ways as documents are identified on upper and lower shelves more comfortably without removing books from the shelves, inventory checks can be performed with minimal staff and within short time period. By using such type of Inventory Reader, stock verification no longer remains a tedious operation. Using RFID when required any kind of information regarding library collection can download from the pocket PC memory or central server. RFID Security at main exit (Gate) this security system allows to perform simultaneous reading/writing into the chip and activation and de-activation of the antitheft function. Library main gate are ultimately collection keeper of library and they run the most modern detection algorithm that constantly detects non de-activated items. There is installed an audio or visual devices which suddenly prompts when security is violated. The library main Gate does not require additional equipment to operate. This is a low cost security system as it only requires a single RFID tag and a single piece of hardware equipment. RFID ARCHITECTURES FOR LIBRARY (Radio Frequency) communication occurs by the transference of data over electromagnetic waves. RFID is mainly consist of labels, reader, antenna and a set of system transmitting and processing data. . Practically in RFID technology, an electronic label is attached to the book, when the book with electronic label is goes through the readable area of reader, a wireless communication link established between the label and the reader, when label send information to the reader then reader receives and decode it; than these information is transmitted to the computer running back to complete the whole information process. Thus, RFID System can be summarized as the sum of the following three components: Small RFID chips, here it is compared to a grain of rice. 1. RFID tag or transponder It is composed of an antenna, a wireless transducer and an encapsulating material. These tags can be either active or passive. Where active tags have on-chip power, passive tags use the power induced by the magnetic field of the RFID reader. Thus passive tags are cheaper but with lower range. 2. RFID reader or transceiver It consists of an antenna (transceiver) and decoder, which sends cyclic signals to inquire about any tag in area. On receiving any signal from a tag it passes on that information to the data processor. 3. Data processing subsystem The data processing subsystem provides the means of processing and storing the data. 260 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education RFID systems can also be differentiated based on the frequency range it uses. The common ranges are LowFrequency (LF: 125 - 134.2 kHz and 140 - 148.5 kHz), High-Frequency (HF: 13.56 MHz) and Ultra-HighFrequency (UHF: 868 MHz - 928 MHz)    RFID ISSUES FOR LIBRARY It is sometime also possible to compromise an RFID system by placing two items against one another so that one tag overlays another, that may cancel out the signals. It can be eradicated by careful alignment and knowledge of the technology. Higher cost is the major disadvantage of RFID technology. The hardware required for RFID setup is costly which is difficult for the small library to implement. The tags pasted on the books can be easily removed which causes the problem for the library staff because then Radio Frequency device will not trace the document and then there may be threat of stealing. CONCLUSION A books tracking based on RFID is proposed in this paper in order to solve a series of problems, such as readers keeping library books of their owns, putting the books on the wrong frames, checking large amount of books, etc. The system is innovatively blended with RFID technology which replaced library bar coding. In addition, the virtual routing algorithm is used in the system to realize ID positioning with wireless network technology to spread the real-time tracking data to PC. Simulating experiments is carried to confirm its viability. This system not only can detect the position of bibliographies in real-time, but also realizes the wireless short-distance communication of less power-consuming and lower cost. Further it is certain that the system with a good developing space is a scheme worthy of studying. REFERENCES http://www.loc.gov/ Allied Business Intelligence. (2002). RFID white paper. Oyster Bay, New York. American Library Association. (2004). Code of Ethics of American Library Association. http://www.ala.org/ala/oif/statementspols/codeofethics/codeethics.htm [4] www.tagsys.net [5] www.Wikipedia.com [6] https://www.rfidjournal.com [1] [2] [3] ISBN 1-63102-455-8 261 EMOTIONAL INTELLIGENCE OF TEACHERS IN WORK PERFORMANCE S. Jerslin | Research Scholar | Department of Education | GRI-DU | jerslinmartina@gmail.com Dr. N. Devaki | Assistant Professor | Department of Education | GRI-DU | devakiaries@gmail.com Abstract: Teachers are the shapers. They shape the future generations of India. An Emotionally Intelligent teacher can shape an Emotionally Intelligent student community. Thus Emotional Intelligence plays a main role in teacher’s work performance. Here in this paper, the author clearly states various measures to enhance the Emotional Intelligence of the teachers. The author talked about the self motivation (i.e) self efficacy, empathy and spiritual intelligence in this paper. Self efficacy or self motivation contain two characters namely optimism and flow. The following article talks about these factors in detail. Keywords: Emotional Intelligence, Self Motivation, Spiritual Intelligence INTRODUCTION Teachers are the friend philosopher and guide to the students community. The present student community is expecting more from the teachers. Apart from the subject the subject the teacher can play a vital role to promote her student. Making high mark in the examination alone is not the purpose of a teacher. The teacher should promote an all round development of the students. That is why the teacher in need of emotional intelligence. The role of a teacher is crucial in the 21st century. She has to satisfy the authorities the students the parents and her colleges inside the campus. Outside the campus also she has some work she has to manage her family members. Unless she posses Emotional intelligence she cannot tackle easily those things. In our present study we are going to see some of the ways to enhance her emotional intelligence. EMOTIONAL INTELLIGENCE Emotional intelligence means the ability to manage one’s own emotions as well as other persons emotions. In 1937, Thorndike used the term “social intelligence” to describe EQ (Thorndike & Stein, 1937) while Wechsler used the term “non-intellective” to refer to affective, personal and social domains (Wechsler, 1940).However, the work of these pioneers was largely forgotten or overlooked until 1983when Gardner began to put forward the theory of “multiple intelligence” (Cherniss,2000). Gardner (1983) conceptualized “emotional intelligence” as constituting intrapersonal and interpersonal intelligence. Salovey and Mayer (1990) were the first to use the expression “emotional intelligence”. Goleman (1995; 1998) took one step forward to link the theory to job performance. Emotional intelligence is commonly defined as the ability to sense, understand and effectively use the power of emotions to guide, motivate and even influence others (Salovey & Meyer, 1990). Emotional intelligence in the form of emotional adaptability and agility is essential to enhance personal and leadership qualities. According to Goleman (1995) “the rules for work are changing” (p. 1) and performance is rarely judged by one’s ability to complete a task but by the ability to empower one and others. OBJECTIVES OF THE STUDY In this article we are going to see some steps or some ideas to improve the emotional intelligence of the teachers. a) Self efficacy b) Empathy c) Spiritual intelligence a) 262 Self Efficacy : Self efficacy is the belief that one has mastery over the events of one’s life and can meet challenges as they come up. Daniel Goleman points out five ways to improve Emotional Intelligence. They are self-actualization, self –management, self-motivation, empathy and social ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education interaction. They are known as both interpersonal and intra personal skills. Of the above said five components I can say the teacher should posses almost all these components to manage the students, superiors, colleges and parents. Under self efficacy I want to talk about two things that is optimism and flow. They are come under the category of self-motivation. Of this self-efficacy I want to include two things. One is optimism and the other is flow. A) OPTIMISM Daniel Goleman says that optimism is the power of positive thinking. Before doing anything better we should have some positive attitude. I can do, I will, I have are some of the self motivating words that a teacher has to have in her mind while preparing for teaching modules or aids like that. Results showed that the students and teachers who has positive attitudes are getting passed or doing works twice as that of others (Seligman). Optimism is the overall view that the world is a great place and that things will turn out ok. The optimist believes (for example) that events will turn out for the best, or that people are trustworthy. Most people are generally optimistic about things that have turned out well for them in the past, or about things that have good associations for them. Martin Seligman in his studies he concluded that optimism half of it is genetically acquire and half of it is environmentally adapted. And also from his experiments he suggests that optimism like other skills can be taught in schools and colleges. The one who undergo training and practice optimism shows higher or better results. So as teachers or teacher educators if they practice or posses this optimism they easily overcome the huddles, barriers and situations that come across them. Having optimism means that one will not give in to over whelming anxiety, a defeatist attitude or depression in the face of difficult challenges or setbacks. Indeed, people who are hopeful evidence less depression than others as they maneuver through life in pursuit of their goals, are less anxious in general, and have fewer emotional distresses. Researchers told that optimism has some effects on health also. Optimism significantly predicted rate of recovery, such that optimists were faster to achieving behavioral milestones, such as sitting up in bed and walking, than were pessimists, and were rated by staff members as showing a better physical recovery. At six-month follow-up, optimists continued to have a recovery advantage, reporting that they were more likely to have resumed vigorous physical exercise, to have returned to work, and to have resumed normal activities (see also Fitzgerald, Tennen, Affleck, & Pransky, 1993). In a five-year follow-up, optimists were more likely to be working and, among those experiencing angina, reported less severe chest pain. A manuscript by Scheier and associates currently under review reports that optimists are less likely to be rehospitalized for complications arising from the surgery. B) FLOW Flow means mastery over the subject. If a teacher has mastery over her/his subjects, then nobody will question her. A less practiced teacher a less learned scholar will struggle a lot in their work. They have to afraid for the questions of the students, teachers, fellow workers, parents and superiors. On the other hand if the teachers educate themselves with all potentials will come out bright in colours. They have to motivate themselves to mastery over the skills and their subjects. The reluctant teacher cannot acquire anything. They should show their multi personality to the student community. The present student community is well known for its technologies. They are using the ICT tools as they like. The teacher who studied in 90s may not familiar with these new technologies. It is advisable for teachers to familiar with these technologies by themselves and teach the students. Otherwise the students won’t respect the teacher. The teacher should equip herself with the following subject areas as for as my concern. The teacher should through with1) the subject they teach2) the skills needed for the students and for herself and 3) the new technologies. ISBN 1-63102-455-8 263 Emotional Intelligence of Teachers In Work Performance If they are through with these things then there will be continuous flow from their mouth or from their body will enhance their self-confidence and bring great respect from the students and others. For this the teacher needs self motivation which is the third components of emotional intelligence told by Daniel Goleman. Everybody lack something in their field. What I want to say is practice gives perfection. Yes through practice repeated practice with optimistic aim make one mastery over their subjects and make the flow easily. Channeling emotions towards a productive end is a master aptitude. Whether it be in controlling impulse and putting off gratification, regulating our moods so they facilitate rather than impede thinking, motivating ourselves to persists and try, try again in the face of setbacks, or finding ways to enter flow and so perform more effectively-all be speak the power of emotion to guide effective effort. b) Empathy: Empathy plays a main role in the field of education. Both the teachers and the superiors should have empathy. A caring classroom provides more ways and means to the students to study effectively. Uncared classrooms and uncared teachers create lot of emotional problems. Although empathy is an interpersonal skill it has a lot of effect in the intra personal skill also. Unless a teacher has empathy she cannot hear the complaints of her students, know the interests of her students and provide ways and means of their problems. They will be in the excited state of emotion. From the childhood the child needs caring hands during the time of distress and anxiety. Empathy will be very much need for the primary school teachers. While emotional neglects seem to dull empathy, there is a paradoxical result from intense, sustained emotional abuse, including cruel, sadistic threats, humiliations, and plain meanness (Goleman). In case of the synchrony between teachers and students indicates how much report they feel; studies in classrooms show that the closer the movement coordination between teacher and student, the more they felt friendly, happy, enthused, interested, and easy going while interacting. c) Spiritual Intelligence: Spiritual Intelligence is the upcoming term that has some effect on the Emotional Intelligence. Spiritual Intelligence means have faith in one’s religion or faith and also respect all religion. In the time of distress, depression, anxiety, fear, emotional hijacking, accidents, natural calamities usually people go to the supreme being. They find relaxation from their mental depression easily without any cost. It is a easy solution for their problems. Today a large number of our teaching faculties have faith in the supreme being to get ventilation for their emotional problems. It consumes less money, time, energy and the like. Recent researchers have begun to argue for the importance of exploring their relationship to workplace performance. Recent research, for example, has shown a positive relationship between emotional intelligence and workplace success. Similarly, it appears that spirituality is related to workplace performance or effectiveness. CONCLUSION With this I want to conclude that an emotionally intelligent teacher will bring up an emotionally intelligent student. The teachers have to equip themselves with self confidence, self motivation, empathy and spiritual intelligence to produce a nice and pleasant working environment. The above said emotional intelligent components help the teacher to face the challenging world boldly and will produce a very good work performance. REFERENCES Cary Cherniss, Daniel Goleman,(2001), The Emotionally Intelligent Work place, Published by Jossey-Bass, San Francisco. [2] Daniel Goleman (1995), Emotional Intelligence Why it can matter more than IQ, Published by New York Bantam Books, New York. [3] Geetu Bharwancy, Reuven Bar-On and Adele Mac Kinlay(2011), EQ an the bottom Line:Emotional Intelligence Incerases Individual Occupational Performance, Leadership and Organisational Productivity , Published by Ei World Limited. [1] 264 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Les Tischler, Jerry Bibert, Robert Mckeage (2002) Linking Emotional Intelligence, Spiritual and work place performance-Definitions, models and ideas for research, vol.17 Iss; 3, pp 203-218. [5] Roya Razavi(2014),EFL Teachers’ Emotional Intelligence and their Personality Types: Exploring Possible Relations, Advances in Language and Literary Studies,Vol.5 No.2. [4] Web References [1] [2] Journal of psychology today, Harward University. Research Network on SES&Health, University of California, San Francisco. ISBN 1-63102-455-8 265 LIBRARY AUTOMATION: WHAT, WHY AND HOW? Pankaj K. Bhardwaj | Librarian | R.D.S.P.G. College | Rewari | Haryana | pankajkbhardwaj9@gmail.com Abstract: Library automation implies a higher degree of mechanization where conventional and regular works or operations are to be performed by machines with little or no intervention by human beings. The various advantages of library automation may be like that of easy searching of information which saves our time and decides it speedily communication, stock verification and resource sharing are done more effectively. It motivate the library staff a lot. It also helps in development of human resources. Librarian gain the experience threw training and workshops. University and other higher institutions in India conducted academic and professional training, courses may come to great help by producing new batch of library professionals. Keywords: Automation, Hardware, Software, Computerized. INTRODUCTION Library Automation in simple words is the application of computers and utilization of computer based products and services for carrying out different library operations and functions. Library Automation implies a higher degree of mechanization where conventional and regular works or operations are to be performed by machines with little or no intervention by human beings. OBJECTIVES OF THE LIBRARY AUTOMATION - The main objective of the Library Automation System is to provide better services at minimum cost, effort and time. It aims at eliminating extralabor in repetitive and routine activities. 1. 2. 3. 4. 5. Creation of a well storage and retrieval system. Improvement of human services. Time and human power saving with qualitative services. Improvement of new library services. Preparation of reports and correspondence. DEFINITIONS OF LIBRARY AUTOMATION: The use of automatic machines and processing devices in libraries is called Library Automation. The automation may be applied to library administrative activities, office procedures and delivery of library services to users. Library Automationmay be defined as the application of computer to perform conventional library housekeeping activities such as acquisition, circulation, cataloguing, reference services and serial control. Automation is used to reduce the amount of staff time devoted to repetitive activities. According of encyclopedia of library and information sciences “Library Automation is the use of automatic and semiautomatic data processing machines to perform such traditional library activities as acquisitions, cataloguing and circulation. These activities are not necessarily performed in traditional ways, the activities themselves are those traditionally associated with libraries; library automation may thus be distinguished from related fields such as information retrieval fields, automatic indexing and abstracting and automatic textual analysis” (Kent 1977). NEED OF LIBRARY AUTOMATION:- 1. 2. 3. 4. 5. 6. 7. 266 Information Explosion. Availability of information in various formats. Limitations of library. Needs of users. Avoid duplication in housekeeping operation. To well management and retrieval of information. Search national and international database. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education 8. Increasing numbers of users. 9. Impact to communication technology. 10. To improve the quality, speed and effectiveness of services. Automated Library Services:Mahapatra (1985) has given the following automated services are:1. 2. 3. 4. 5. 6. 7. Online search service. Printed Indexes. Current awareness services (CAS). Selective Dissemination of information (SDI). Inter Library Loan. Stock Verification. Reference service. A BRIEF HISTORY OF LIBRARY AUTOMATION:An automated library is one where a computer system is used to manage one or several of the library’s key functions such as acquisitions, serial control, cataloging and the public access catalog. Now a days due the impact of information technology and application of computers a process of great change is taking place in library work. We hear a lot about Library Automation in libraries and Library Automation is nothing but application of machines viz. computers to the routine library house-keeping operations such as acquisition, serial control, cataloguing and circulation. Before proceeding into the depth of Library Automation, it is necessary to know the historical background of automation. Automation of library has passed through several of developments, which can be divided into 3 phases:1. Experimental Phase (1930-1960):- The first application of automatic data processing equipment’s in libraries can be traced back to 1936 when the University of Taxes adapted a mechanical system for its circulation function. Library Automation began especially in the U.S.A. after the World War II. During their period many libraries in North America and in U.K. began to experiment by using computer. Many techniques were introduced in the Universities and national libraries. Several of these systems were like tabulators, punch cards were used for circulation, serial control acquisitions and cataloging etc. (Laxminarayan 1986) 2. Local System Phase (1960-1970):- This period applied general purpose digital computer for retrieval of Information. In this period computers were applied offline. During this period many libraries made use of the computer as a tool in the institution of many library procedures. During the phase OPAC i.e. online public access catalogue was in an experimental stage in U.S.A. MARC came into in the year 1963 at the library of Congress. U.S.A. for providing standardization in 1967, the Library of Congress started distribution of records in the new MARC II format. (Tedd 1977) 3. Co-operative system Phase (1970-):- In the 1970’s there has been an increase in library cooperation and Resource sharing by libraries. Designing of online system and conversion of batch. System into on line mode was done. The growth of library network and databases was seen in this phase. During this period magnetic tapes and floppy disks were used for storage of information. In 1980’s there was an intensive use of online systems networks, optical disks and CD-ROMs etc. in this period microcomputer’s come to be used in libraries. Later on through internet and library networks,all processes of libraries were integrated. (Rajagopalan 1986) LIBRARY AUTOMATION IN INDIA:- Indian Statistical Institute Calcutta was first in India to install a computer system in 1955 and to develop an indigenous computer in 1964. In India computers were used in library work for the first time possible by INSDOC where they computerized the author and subject indexes of “Indian Science Abstract in 1965. In 1967 INSDOC brought out the “Roster of Indian Scientific and Technical Translators with the help of computers. In ISBN 1-63102-455-8 267 Library Automation: What, Why And How? 1978 INSDOC initiated SDIservice as a NISSAT Project with Chemical Abstracts and INSPEC data-bases, with the use of CAN/SDI software of IIT Madras. In 1970’s many libraries ventured in preparing computerized databases. Many library networks were initiated and are operative through the initiative and financial support of NISSAT. These networks are CALIBNET, DELNET, and INFLIBNET etc. Among other networks are NICNET, INDONET, SIRNET etc. are notable. Now a days many institutions such as DRTC, INSDOC, DESIDOC, NISSAT etc. are engaged in imparting training for computer application in library work through regular, sponsored and adhoc courses. The price of computer hardware and software has been considerable reduced. On these factors computers have become popular with Indian Libraries. (Pandey 1995) The real improvement in Library Automationbegins from the establishment of INFLIBNET. Before INFLIBNET separate efforts were done in academic library especially in institution of special characters like IITS, IIMS etc. INFLIBNET proved a real motivation by providing finance and laying standards. (Singh 2003) INFLIBNET is an autonomous inter University centre of the “University Grant Commission” in India. It is major National Programmeinitiated by the UGC in 1991 with its Head Quarters Gujrat University Campus Ahmedabad. INFLIBNET is involved in modernizing University libraries in India and connecting them. It is set out to be a major player in promoting scholarly communication among academicians and researchers in India. The National centre of INFIBNET is located in Gujrat University at Ahmedabad. INFLIBNET aims at computerizing and networking of University and college libraries. The selected organizations are provided funds for acquiring computer systems and networking. Application software data entry and additional library uses, library standards and formats etc. are provided by INFLIBNET to the participating libraries. Resources development is a vital part of this programme. Training courses for library staff engaged in computerized library operations have been conducted since 1992-93. Every year, INFLIBNET programme is identifying a number of University libraries for automation depending on the budget allocation. ADVANTAGES OF LIBRARY AUTOMATION:- 1. 2. 3. 4. 5. 6. 7. 8. It is easy searching of information with the help of Library Automation. Library Automation is time saving. Speedily Communication. Quickly transfer of library work. Library Automation is helpful for stock-verification. Easily working with the help of Library Automation. Library Automation is helpful in resource sharing and networking. It motivates the library staff. Development of human resources. [1] It is long term and time consuming process. Financial Expenses. In this process continuously staff training are required. Security problems. It is totally dependent on electricity. Untrained users. Costly Maintenance. DISADVANTAGES OF LIBRARY AUTOMATION:[2] [3] [4] [5] [6] [7] 1. 268 HOW DID LIBRARY AUTOMATION BEGIN:Team Work:-A qualified planner for the system maybe engaged to guide the library in designing the machine operated system. Thus consultant must have a thorough knowledge and experience of how the library system work. His work like the planner, would be to turn the general programme into a detailed system design with the full aid and participation of the library’s own system group. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education 2. 3. 4. Essentials for Library Automation:- Time and money are essential for Library Automation. It consists to stall, equipment’s and organization with a regular budget and a certain amount by doing a series of projects. Success depends to a large extend on how wellthese resources are utilized. Staff:-Without manpower nothing get done. Hence training and holding a qualified staff is the most important single element in the Library Automation. The number of librarians with training in computer technology is extremely small. To attract people from the computer field, the authority will have to pay more than they pay member of library staff. On the other hand, it should not be too difficult to recruit on qualified librarian with good ability who may be trained in computer. There are various levels of library system, analysts and programmers and the number and type needed will depend on the approach and the stage of a particular library’s automation effort. The critical factor is not numbers but quality. It would be a mistake to under estimate the importance of the role of key punchers, typists and other machine operators. It is essential that these staff members must feel responsible. They are responsible for the quality and quantity of the input, output and they can do much to make or break the system. Equipment’s:- From my discussions, with a few librarians using computer onshared time basis I am convinced that a library cannot risk basic vital computer based systems on toequipment over which it has no control. This view is also being reflected in current literature. This does not necessarily mean that it needs its own computer however if it plans to depend on equipment under the control of others it must get thick and binding responsibility for time and must have a voice in supervise the equipment. Steps of Library Automation:1. Feasibility study of the system:-The aim of feasibility study is to determine if this is achievable, if the benefits out with the disadvantages and to examine alternative solutions. It is designed to answer these questions:a. b. c. d. Is the proposed system realistic? Is it necessary? What other options are available? Is it affordable? The final output of the feasibility study is a report to be presented to the management. (Large 2006) 2. Hardware:When automating the library, the hardware to be purchased should also be given an idea. Today different types of hardware is available in the market and due to new kinds of hardware available in the market, the earlier ones are getting outdated soon. Also while acquiring the hardware, it should be seen whether the software which will be implemented will be suitable with the hardware procured. 3. Software:-The term software refers to a set of computer programmes procedures and associated documents that describe the programme and how they are to be used. To be accurate a software is collection of programmes to upgrade the working capacity of the hardware. Software is a set of programme written or developed to enable the computer to do desired operations. (Pandey 1995) It is one of the most important fundamental which should be taken notice of while automation. Today a number of application software are available in market manufactured by different companies of India and abroad with distinct feature and hence while selecting software. Manjunath (2006) has given the following criteria:1. 2. Who has developed the software? Whether institution or company or an individual? In such case, first preference should be given for an institution and second preference should be given for software developed by a company. Software developed by an individual should be as for as possible avoided because there will be no continuity in the software. How many times the software has been raised since its first launch? ISBN 1-63102-455-8 269 Library Automation: What, Why And How? 3. 4. How many parameters are available for each module? Whether the software has the facility to import bibliographic data available in ISO 2709 format and at the same time export data in this format. 5. Whether the software is user friendly and menu driven to facilitate access? 6. Whether training and guidance will be provided after installation? 7. If it will be available to operate on major operating systems and in multi-user environment. 8. Whether it is web interface able and supports data security through password? 9. Whether it can be interfaced with email system of the campus work? 10. How many installations it has got in the country, since when and its major clients? 11. Whether it can offer OPAC and different rights to different logins? 12. Cost of the software has also to be taken into account and compared with different software available in the market. This is important because if particular software provides good facilities, but if the cost is very high and other software provides the similar facilities with slightly less cost then the later will be preferred. Therefore, comparative study of the cost factor of different software should be done before installation. SUGGESTIONS 1. 2. 3. 4. 5. Economically help should be provided by the central, state, local govt. and library authority according to library and information policy. Libraries should be conducted training program time to time for the development of library staff. Librarian should be selected best hardware and software for automation. All the data or information should be secure with the help of different security tool such as use of antivirus, firewall and taking a backup of data time to time. Inverter should be used for power. CONCLUSION There is no readymade formula for Library Automation in any academic library. Each library is to decide for itself which approach seems best suited to its own particular needs and situation. Librarians gain the experience through training and workshops. Universities and other higher institutions in India conducting academic and professional training, courses may come to great help by producing new batch of library professionals, who could take initiative in our new library systems to meet the in-avoidable demand of this automation generation. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] 270 Laxminarayan Ishwar, (1986, June) Computer Applications in Libraries. Paper Presented at the seminar of Madras Library association on Library Automation, Madras 19. Tedd, LA (1977) “An Introduction to Computer based library systems, “London; Hey International. Pandey, SK Sharma (1995) Fundamental of Library Automation, New Delhi. ESSESS Publication 131. Singh Yogendra (2003) Library Automation in Academic Libraries in India; Problems and Prospects. www.caliberdspace.inflibnet.ac.in/access on 30.06.2010. PPT of Library Automationby Ratha Bhupendra School of Library and information Science: Devi Ahilya University, Indore. Annals of Library and information studies (ALIS) ALIS vol. 16 (1969) September-December 1969 Approaches to Automated in Large Academic Systems Libraries By Biswas, Subas C. Large, John Andrew (2006) ICT for Library and information Professionals; A Training Package for developing countries.http://www.unesdoc.unesco.org/accessed on 02.07.2010. Manjunath, GK (2006) Library Automation: Why and How? Rajagopalan, TS (1962, June) Computer Application in Library Works. Paper presented at the seminar of Madras Library Association of Library Automation. Madras 2. Kent, Allen., (1977) Encyclopedia of Library and Information Science. New York: Marcel Dekkar. 19. Mahapatra Piyushkanti (1985) Computer in library services. Calcutta: World Press. ISBN 1-63102-455-8 A LITERATURE SURVEY OF SIGNATURE RECOGNITION AND VERIFICATION SYSTEM Vaibhav Bansal | Associate Professor | BM Group of Institutions | vaibhav.mtech@gmail.com Abstract: Biometric system is a recognition and verification system which makes use of different physiological or behavioural characteristics of an individual to label the identity of an individual. Physiological characteristics include shape of the body. These are also known as vision based characteristics which include voice face, fingerprint, and palm recognition. Non-vision based is voice recognition or signature verification which possesses behavioural characteristics of a person. Signatures are the most natural and unique way to authenticate an individual as well as a document. According to the definitions of signature, there are two approaches of signature verification: Off-line or static signature verification and On-line or dynamic signature verification. This paper gives a brief review of off-line signature verification techniques. Keywords: Signature verification, Feature extraction, FAR, FRR INTRODUCTION Signature is one of the unique and widely known behavioural biometric. Behavioural biometric is related to the particular pattern of behaviour of a person. In this era where security has been a big issue, signature is an important attribute to identify whether an individual is authentic or not. Any human physiological or behavioral characteristic can be used as a biometric characteristic (indicator) to make personal identification as long as it satisfies the requirements of the biometrics like Universality, Distinctiveness, Permanence, Collectability, Performance, Acceptability and Circumvention. This technique is largely used in day to day applications such as e-banking, passport verification system and authenticating any person to label him/her as genuine. With the evolution of information technology, our society is becoming more and more electronically connected. Daily transactions between individuals and various organizations are conducted increasingly through highly interconnected electronic devices. The capability of automatically establishing the identity of individuals, called as person authentication or person identification is thus essential to the reliability of these transactions. Traditional personal identification approaches which use something that you know such as Personal Identification Number (PIN), or something that you have, such as an ID card are not sufficiently reliable to satisfy the security requirements of electronic transactions because they lack the capability to differentiate between a genuine individual and impostor who fraudulently acquires the access privilege. Signature verification not only authenticates a person but also is a way to authorize transactions. A number of other methods are also available to identify the originality of an individual such as voice, face, gait, palm recognition but hand written signatures are one unique method because it is easy to scan a signature done with pen as well as done using any electronic gadget. This method of identification is highly preferred over traditional methods such as PIN, key cards or passwords because biometric characteristics of an individual are highly unique and cannot be stolen. The choice of one of the biometric solutions depends on several factors which include [7]:     User acceptance Level of security required Accuracy Cost and implementation time Usage of signature as an authentication method is respected since long time. Today also most of our daily works run across this verification method. A signature of the person is considered to be the “seal of the deal” and is the most accepted form. ISBN: 978-16-31024-51-1 271 A Literature Survey of Signature Recognition And Verification System Thus, Signature recognition and verification system (SRVS) is a system capable of efficiently addressing two individual but strongly related tasks: [10]  Identification of the signature owner and,  Decision whether the signature is genuine or forger. [10] Types of Signature Verification Based on the definitions of signature, it can lead to two approaches [12]:  Off-line or Static Signature Verification Technique: This technique is based on static characteristics which do not change or are invariant. In this type of method, a scanner or a camera is used to trace the signature.  On-line or Dynamic Signature Verification Technique: This approach makes use of dynamic characteristics of a signature. Dynamic features includes the number of order of the strokes, the overall speed of the signature and the pen pressure at each point that make the signature more unique and more difficult to forge.[7] SIGNATURE VERIFICATION PROCESS The method of signature recognition and verification involves a number of concepts which are as follows:     Forgeries Feature selection Performance evaluation parameters or error Rates a) Types of Forgeries Forgery is the process of making, adapting, or imitating objects with the intent to deceive people. Three basic types of forgery are: Random Forgery: As the name suggests, is random in nature i.e. the forger has no idea about the signature style and name of the person. Simple Forgery: In this the forger knows the shape of the original signature. Skilled Forgery: This type of forgery is done by those who have had access to a genuine signature for practice [7]. b) Feature Selection Feature selection is categorized in two categories: Global Features: Global features are those features which are taken from the whole signature image. Global features include- signature area, signature height to width ratio, centre of gravity etc. [6] Local Features: Local features are taken from the small portion of an image. These include- local pixel density, slant features, critical points etc. [6] c) Error Rate  False Acceptance Rate(FAR)  False Rejection Rate(FRR) Type I error or FRR, which means an authentic signature is rejected, and Type II error or FAR, which means a forgery is accepted. [2] Proposed Methodology for Signature Verification: In order to identify an individual’s originality, a particular method has to be adopted. This method follows the following steps which are: 272 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Fig. 1: Static or off-line signature verification system     Image Acquisition: The image to be processed is acquired first either by an optical pad or a scanner. Pre-Processing: This stage is necessary because the processed image, after this, would be subjected to feature extraction process. Various algorithms are used at this stage such as Background elimination, noise reduction, width normalization, skeletonization, thinning, Binarization, Denoising etc. [10] Feature Extraction: The efficiency of a signature verification system mainly depends on Feature extraction stage. [6] Selected features are extracted at this stage on the basis of three categories global, local and geometric features. Verification: This stage is the final stage which verifies whether the signature is original or forged. LITERATURE SURVEY A Bharadi and H B Kekre [1], discusses system designed using cluster based global features. A multi algorithmic signature recognition system is designed by the author. Hadamard transform to the horizontal pixel distribution and vertical distribution points is used because it is easy to calculate. A codeword histogram for signature is generated. Grid and texture information features is used to consider size. As a result, an accuracy of 95.08% is achieved. A total of 353 tests are performed for verification method and 257 tests are performed for recognition method. The system is having decision threshold of 60% for both methods. In verification mode, FAR of the system is 2.5% and EER is 3.29% which gives an accuracy of 95.08%. In recognition mode accuracy of 93.08% is achieved and EER is 6%. Juan Hu and Youbin Chen [2], discussed a method for writer-independent off-line handwritten signature verification based on grey level feature extraction. Real Adaboost algorithm is also proposed. In this paper two experimental databases are used and both the databases contained samples from 300 individuals. This research shows that the performance of Adaboost classifier is better than LS-SVM classifier. The proposed method achieved the FRR of 5.64% and FAR of 5.37%. Suhail M. Odeh and Manal Khalil [3], introduced an approach to decide whether a signature is original or forged using neural networks. “GPDS300 signature database” is used for the research purpose. Proposed methodology consists of various stages: image pre-processing, feature extraction, pattern recognition through neural network & recognition of signature. For security purpose, 4 features are used in the feature extraction stage termed as: Eccentricity, Skewness, Kurtosis and Orientation and are applied to all the tested samples. As a result, accuracy rate is 64% and error rate is 36% during training stage. During testing period, accuracy rate achieved is 78.85 and error rate is 21.2%. Srikanta Pal, Umapada Pal and Michael Blumenstein [4], proposed a method for identification of scripts from bi-lingual off line signatures. In this English and Chinese test samples are considered. This paper identifies whether a signature belongs from English signature group or Chinese. Foreground and background features are extracted using gradient-based method.SVM is used as a classifier for signature identification. 1120 samples are used for training purpose out of which 640 are English and 480 are Chinese and 560 samples are used for testing the system out of which 320 are English and 240 are Chinese. An accuracy of 97.70% is achieved in this proposed system. ISBN 1-63102-455-8 273 A Literature Survey of Signature Recognition And Verification System Ravi J, Sundernag Hosamani andK B Raja [5], proposed a model for off-line signature identification using Discrete Wavelet Transform (DWT) and Spatial Domain Features (OSIDS) method. “GPDS database” is used which consists of 160 signers with 300 dpi resolution. The main aim of proposed algorithm is to increase success rate and decrease False Acceptance Rate (FAR). In this method an increase in the value of FRR from 0% to 36.67% is seen and a decrease in TSR from 100% to 63.34% is observed but the value of FAR decreases to 6.67%. Vitthal K. Bhosale and Dr. Anil R. Karwankar [6], proposed a review on the approaches that are used in static signature verification process. Performance evaluation parameters are discussed for different methods. According to the author of this paper more research is required in the field of signature recognition and verification process. Pradeep Kumar, Shekhar Singh, Ashwani Garg and Nishant Prabhat [7], proposed off-line signature recognition & verification technique using neural network. The methodology followed included image pre-processing, feature extraction, neural network training. The results in this paper are obtained using the” Grupo de Procesado Digital de Senales” (GPDS) signature database. 2000 signatures are tested and verified in this process giving the 82.66%, the correct classification rate of the system in generalization. A two layer feed forward neural network using Error Back Propagation Algorithm (EPBTA) is used to preserve the efficiency of the network. Ankit Arora and Aakanksha S. Choubey [9], discussed various features of off-line signature recognition and verification process. A comparison of existing techniques and various methods of feature extraction are proposed. Various performance metrics are compared and signature verification system based on Hough transform is giving the accurate results. CONCLUSION As we grow towards electronic era, there is a great need of security and reliability. Thus, signature recognition and verification is a method which is highly secure and trust worthy. Various approaches can be used to implement this method such as neural network, support vector machine etc. which makes the result more accurate. A lot is still to be done in this area in order to avoid any kind of forgery. ACKNOWLEDGMENT Thanks to my family, my guide Er. Navdeep Kaur (AP, CSE Department), Er. Harpreet Kaur (AP & HOD, CSE Department), Bahra Group of Institute, Bhedpura, Patiala for having faith in me and allowing me to work with all terms and conditions and advising me time to time about this survey paper. REFERENCES [1] V. A. Bharadi, H. B. Kekre, “Off-line Signature Recognition Systems”, International Journal of Computer Applications, Volume 1-No. 27, 2010 [2] Juan Hu, Youbin Chen, “Fusion of Features and Classifiers for Off-line Handwritten Signature Verification”, 978-14577-0121-4/11/2011 IEEE [3] Suhail M. Odeh, Manal Khalil, “Off-line signature verification and recognition: Neural Network Approach”,978-161284-922-5/11/2011 IEEE [4] Srikanta Pal, Umapada Pal, Michael Blumenstein, “Off-line English and Chinese Signature Identification Using Foreground and Background Features”, WCCI June 2012 IEEE [5] Ravi J, Sundernag Hosamani, K B Raja “Off-line Signature Identification Based on DWT and Spatial Domain Features”, IEEE ICCCNT, July 2012 [6] Vitthal K. Bhosale, Dr. Anil R. Karwankar, “Automatic Static Signature Verification Systems”, International Journal of Computer Engineering Research, Vol. 3, Issue 2, February 2013 [7] Pradeep Kumar, Shekhar Singh, Ashwani Garg, Nishant Prabhat, “ Hand Written Recognition &Verification using Neural Network”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013 [8] Imran Hussain, Vikash Shrivastava, Vivek Kr. Shrivastava, “Review on offline signature verification methods based on artificial intelligence technique”, International Journal of Advancements in Research & Technology, Volume 2, Issue 5, May 2013, 274 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education [9] Ankit Arora, Aakanksha S. Choubey “Comparative Analysis of Off-line Signature Recognition”, International Journal of Science and Research (IJSR), Volume 2, Issue 7, July 2013 [10] Kanawade M. V., Katariya S. S, “Review of offline signature verification and recognition system”, International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 7, July 2013 [11] Prathiba M.K., Dr. L. Basavaraj, “Online handwritten signature verification system: A Review” International Journal of Emerging Trends & Technology in Computer Science, Volume 3, Issue 2, March-April 2014 [12] Sameera Khan, Avinash Dhole, “A Review on Offline Signature Recognition and Verification Techniques”, International Journal of Advanced Research In Computer and Communication Engineering, Vol. 3, Issue 6, June 2014 [13] Rapanjot Kaur, Gagangeet Singh Aujla, “Review on: Enhanced offline signature recognition using neural network and SVM”, International Journal of Computer Science and Information Technologies”, Volume5 (3), 2014 ISBN 1-63102-455-8 275 DEVELOPING OF DIGITAL LIBRARY THROUGH GSDL: AN EXPERIENCE AT GITAM Pushp Lata | Library Assistant | Ganga Institute of Technology and Management | Jhajjar, Haryana- India | pushplata.lib@gmail.com Abstract: The methods of accessing and retrieving knowledge are changing in the present scenario for all the users. This paper presents a study regarding creation the digital library assimilate and disseminate the information using the famous OSS GSDL. The methodology followed the study of the software related documents and practical approach during creation of digital library at GITAM. Keywords: Open Source Software, Information Dissemination, GSDL INTRODUCTION With the impact of IT the world is converting in a global village. In the present scenario the role of libraries and librarian are also changed. In India the concept of digital library is in developing stage. There are a lot of libraries which are not automated. The demand and behavior of users are changing rapidly with compare to the libraries. Users want the information at their smart phones or PCs. The digital library is the demand of time and in the context of digital library, the role of library professionals is also changed. Definition-A digital library is a large database for the people who are working on hypertext environment which supports the life cycle of creation, storage, preservation, dissemination and use of data, information and knowledge. A digital library is an organized collection of digitized material which can be accessible by the users on a computer or smart phone through the network by using TCP/IP or other protocol. NEED OF DIGITALIZATION For the modern users the time is major factor. Digitization of libraries is the solution of this factor. Digital libraries are needed to provide quality-based service at the user doorstep. In general digital libraries are needed for the following reason.        Easy to understand Shifting of the environment Information explosion Multiple function of same information Specific Information retrieval Distance learning To procure online publication RESOURCES All the material either print or electronic/digital material which can be stored, organized, transmitted and displayed by the computer without any intervening conversion process, are the resources of a digital library. For a digital library there are two types of resources: On line resources:      276 E-book, v-book, electronic tax, map, image, sound, video, and multimedia etc. E-journal Local database of traditional books in machine-readable form. LAN, MAN, WAN for web browsing, e- mail etc. Well trained manpower for online help ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Off line resources:   CD-ROM etc. Audio visual aid etc. The digital material may be of multimedia types or any other i.e. only digital audio, video, full text information, photograph, drawing, digitized sound, e-book, v-book, electronic tax, map, image, 3D representation etc. including structured /unstructured text, scanned images, graphic audios, video recording etc. BASIC NEEDS FOR DIGITAL LIBRARIES For the development and operation of a digital library, the technological environment is provided by the Internet and World Wide Web. The web provides tools and technique for publishing the information over Internet while the Internet provides the TCP/IP and or its associated protocol for accessing the information. To store the information output of the region as well as information from outside the country in the digital environment, there is a strong need to create a central back up or archive at the national level. Some of the basic requirements for a digital library are:        Computer Software Storage devices Scanner Network Audio visual Printer GSDL Greenstone is a suite of software tools for building and distributing digital library collections on the Internet or CD-ROM. It is open-source, multilingual software, issued under the terms of the GNU General Public License. Greenstone is produced by the New Zealand Digital Library Project at the University of Waikato, and has been developed and distributed in cooperation with UNESCO and the Human Info NGO in Belgium. In order to construction and presentation of information collection in form of digital library in GITAM, we thought of opting for Greenstone digital library software, which is an open-source system. It builds collections with effective full-text searching and metadata-based browsing facilities that are attractive and easy to use. Moreover, they are easy to maintain. Collections of information comprise large numbers of documents (typically several thousand to several million), and a uniform interface is provided to them. It is used internationally. Greenstone supports collections in many different languages. Greenstone CD-ROMs have been published by the United Nations and other humanitarian agencies for distribution in developing countries. Digital libraries are radically reforming how information is disseminated and acquired in UNESCO's partner communities and institutions in the fields of education, science and culture around the world, and particularly in developing countries. We hope that this software will encourage the effective deployment of digital libraries to share information and place it in the public domain. HISTORICAL DEVELOPMENT In 1995, the journey of development was started from the establishment of New Zealand digital Library Project. In the beginning 50,000 computer science technical reports are included in the collection downloaded from the internet. The history of Greenstone releases are as: ISBN 1-63102-455-8 277 Developing Of Digital Library Through Gsdl: An Experience At GITAM Year Month Version Year Month Version 2014 Nov 3.06 2002 Jan 2.38 2006 Dec 2.72 2001 Oct 2.37 Oct 2.71 Jun 2.36 Mar 2.70 May 2.35 Jan 2.63 Apr 2.33 Jun 2.62 Feb 2.31 Apr 2.60 Feb 2.30 Mar 2.53 2000 Dec 2.30 Oct 2.52 Sep 2.27 Jun 2.51 Jul 2.25 Feb 2.50 Jun 2.23 Dec 2.41 Jun 2.22 Jun 2.40 Apr 2.21 Mar 2.39 Feb 2.12 2005 2004 2003 1995 The new Zealand Digital Library Project was established FEATURES OF GSDL We close with a brief summary of Greenstone facilities:  Accessible via Web browsers  Runs on Windows and Unix.  Full-text and fielded search.  Flexible browsing facilities.  Creates access structures automatically.  Makes use of available metadata.  Plugins and classifiers extend the system’s capabilities  Multiple-language documents.  Multiple-language user interface  Multimedia collections.  Classifiers allow hierarchical browsing.  Designed for multi-gigabyte collections.  New collections appear dynamically.  Collections can be published on CD-ROM.  Distributed collections are supported  What you see—you can get! LIBRARIAN INTERFACE Tool for collecting and marking up documents, then building digital library collections, Librarian Interface tool is used in GSDL which provides access to the software's functionality from a graphical point. The following steps are taken in creation of digital collection:  Creation of New Collection: To create a new collection open the 'file' menu and choose 'New', then the following screen will appear. 278 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education (Figure 1)   Selection of Metadata: Software provided different type of metadata. Gathering: Gather area to select what files to include in the collection you are building. Files can be copied into the collection by dragging and dropping. (Figure 2)  Enrich: Having gathered several files into the collection, now enrich them with additional information called 'metadata'. This section explains how metadata is created, edited, assigned and retrieved, and how to use external metadata sources. (Figure 3)  Design: Once the files are marked up with metadata, you next decide how it should appear to users as a Greenstone collection. What kind of information is searchable? What ways are provided to browse through the documents? What languages are supported? Where do the buttons appear on the page? These things can be customized. ISBN 1-63102-455-8 279 Developing Of Digital Library Through Gsdl: An Experience At GITAM     Document Plugins: Through user selected plugins, Greenstone can import digital documents in formats including text, html, jpg, tiff, MP3, PDF, video, and Word, among others. The text, PDF, HTML and similar documents are converted into Greenstone Archive Format (GAF) which is an XML equivalent format. Plugin help the users to see the file without having software at the destination or using device. Search Type: Here you can add search type. If you want to add advance search please enable advance search option. Search Index: Here you can add search the names of the fields on which you want to build the indexes. Browsing Classifier: Indexes specify what parts of the collection are searchable this section help to add and remove indexes, and set a default index. (Figure 4)   Create The first two entries in the list on the left are 'Import' and 'Build', which give settings that apply to the import and build scripts respectively. (Figure 5) Format: This option is used to customized the GSDL i.e general information, search, formatting and translation text features on the web interface. (Figure 6) 280 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education  Web Interface: End users may access the digital library web page at any device having browser e.g. PC, laptop, mobile phone etc. The screen shoot of Digital Library of GITAM is shown in figure 7. (Figure 7) DIGITAL LIBRARY AT GITAM The Digital Library is an essential infrastructure of information dissemination and empowerment of user. It is a very powerful tool that can serve as an engine of information transfer. The Digital Library contains old question papers, syllabus, journal articles, lecture notes, News clippings, etc. It can be accessed at LAN in the campus on any web browser by using the address- http://gitamlibrary:8383/greenstone3/library CONCLUSION Due to the fund limitation the libraries have to stop the different projects. To avoid this problem the Open source softwares are the best solution. The GSDL is the most suitable software for digital library management due to its content management, full text searching, CD-ROM publishing. This is the only software that can be published on CD-ROM. It is very helpful for those areas in which internet connectivity is not available and users can get information without internet connectivity. REFERENCES [1] [2] [3] [4] [5] [6] Biswas, Gautam, Institutional repository: Special reference to D space and greenstone digital library( International Journal of Library and Information Science Vol. 2(1) pp. 001-010, February, 2010 Available online http://www.academicjournals.org/ijlis ©2010 Academic Journals)Department of Computer Science Ian H. Witten, David Bainbridge, and Stefan J. Boddie,Greenstone: OpenSource Digital Library Softwarewith End-User Collection Building http://eprints.rclis.org/13172/1/Open_Source_Software_and_Libraries.pdf http://Greenstone.org , access on 26.05.2015 http://wiki.greenstone.org/doku.php?id=en:beginner:overview_of_greenstone ISBN 1-63102-455-8 281 REVIEW ON WSN APPLICATIONS WITH SOME ISSUES Prachi Arora | M.Tech Computer Sc.(Mobile Computing) | Central University Jharlkhand | Ranchi, India | prachiarora.128@ gmail.com Abstract—The area of wireless sensor network is one of the emerging and fast growing field in the world but there are some key issues in WSN such as maximizing the network lifetime. Network lifetime is important in sensor node when the sensor node, distributed typically in remote area is powered by finite energy batteries. Likewise many more issues and problems in WSN are going to be discussed in this paper. Keywords: WSN, network lifetime sensor node. INTRODUCTION WSN consists of distributed self-governing sensors to monitor physical or environmental conditions. WSN consist of an collection of sensor. Each sensor network node has typically following parts: a radio, transceiver, antenna and microcontroller A Base station links the sensor network to another network to broadcast the data sensed for future processing.[1] . Sensing, processing and communication are three basic elements whose combination in one tiny device gives rise to a large number of applications. Sensor networks provide endless opportunities, but at the same time pose alarming challenges, such as the fact that energy is a scarce and usually non-renewable resource.[2] In most applications, sensor nodes are constrained in energy supply and communication bandwidth. Thus, innovative techniques to eliminate energy inefficiencies that shorten the lifetime of the network and efficient use of the limited bandwidth are required. Such constraints combined with a typical deployment of large number of sensor nodes pose many challenges to the design and management of WSNs and impose energy-awareness at all Layers of the networking protocol stack [3]. This paper was organised as introduction of WSN in current section, next section discusses application of WSN. After that, different issues of WSN and finally conclusion of the article has been summarized Fig 1: WSN(Wireless Sensor Network) CHARACTERISTICS OF WSN Compact Size: Since many sensor nodes (Hundreds or thousands) are deployed in area for sensing data size become impact. Physical Security: Physical security for sensor nodes of the network become an important characteristics of WSN Power: Power is an important characteristic of WSN. As sensor nodes uses battery and need low power consumption for their processing. Memory space: Sensor Nodes are tiny elements and may not have enough memory to collect and store data. A centralized data base is needed to store the sensed data by sensor nodes. Bandwidth: As Sensor nodes need to transmit sensed data to base station frequently in regular interval and 282 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education therefore high bandwidth is needed. Unreliable communications: Communication between nodes and base station should be reliable. Due to life time and energy constraints communication become unreliable .To solve this problem many routing techniques are going to developed.[1] APPLICATIONS OF WSN Sensor nodes can be put for continuous sensing, location sensing, motion-sensing and event detection. The idea of micro-sensing and wireless connection of these sensor nodes assures many new application areas. Environmental applications: Environmental applications take account of the monitoring of atmospheric parameters, tracking of the movements of birds and animals, forest fire detection, habitat surveillance etc.   Greenhouse Monitoring: To ensure that the automation system in a greenhouse works properly, it is necessary to measure the local climate parameters at various points of observation in different parts of the big greenhouse. A WSN based application for this purpose using many small size sensor nodes can be equipped with radio for a cost effective solution. Habitat Surveillance: WSNs find extensive application in habitat surveillance compared to other monitoring methods due to high deployment density and self-organisation of the sensor nodes. The advantage with WSN is that the invisible placement of sensor nodes in the habitat does affect the behaviour pattern of the inhabitants. Health applications: WSNs are efficient enough in supporting various day-to-day applications. WSN based technologies have revolutionized home and elderly healthcare applications. Physiological parameters of patients can be monitored remotely by physicians and caretakers without affecting the patient’’ activities. These technologies have significantly minimised human errors, allowed better understanding into origin of diseases and has helped in devising methods for rehabilitation, recovery and the impacts of drug therapy. The recent developments in the application of WSN in healthcare are being presented. Industrial applications: The industrial applications based on WSN are built on distributed architectures and they are required to be inexpensive, flexible and dependable. The system’s performance can be improved by interfacing sensors and actuators directly to the industrial communication network, as data and diagnostics can be made accessible to many systems and also shared on the web. Many such applications for different industries with different technologies were proposed. Military applications: WSNs play a vital role in military Command, Control, Communications, Computing, Intelligence, Surveillance, Reconnaissance and Targeting (C4ISRT) systems. WSNs have found application in very critical applications such as object detection and tracking. These applications require high detection probability, low false alarm rate and bounded detection delay. In the battlefield, the WSNs are prone to the attacks, where either the data or corrupting control devices are attacked, leading to large amount of energy consumption and finally to the exit of nodes from work. Biological applications: The WSN based applications have made tremendous impact for biological problems. Some of these include biological task mapping and scheduling, biomedical signal monitoring etc.   Biological Task Mapping: WSNs find general applications in the area of biological sensing. Specifically, there is recent research going on in the concept of “labs on a chip”, supported by latest technologies like nano-techniques. The use of WSNs for biological applications have been accelerated due to the advancements in Micro Electro-Mechanical Systems (MEMS), embedded systems, microcontrollers and various wireless communication technologies. Biomedical Signal Monitoring: WSNs have revolutionized the field of medicine in many ways. Telemedicine is the field which involves the treatment and care of patients from a distance and also aids in biomedical diagnosis. The application of WSNs has significantly improved this field. To develop ISBN 1-63102-455-8 283 Review On WSN Applications With Some Issues modern equipments for monitoring patients in remote places using wireless technologies, the network topology, sensors specific signal reception and analysis has been considered. Commercial applications: Some of the commercial applications of WSN include vehicular monitoring, cultural property protection, event detection and structural health monitoring. These applications have a profound impact on ordinary day-to-day life.   Smart Parking: WSNs are widely used in the applications like intelligent for the purposes such as effective usage of existing parking lots instead of making expensive investments in new installations and to make provisions for coupling with cheap sensor nodes which can track the vehicles effectively. Existing solution for parking application uses magnetometers and video cameras. Event Detection: Tracking is a typical characteristic of wireless sensor networks, especially for instant tracking of events. Much work has been done in WSN, with sensor nodes having identical sensing units.[4] Other applications: Sensor networks now find huge application in our day-to-day appliances like vacuum cleaners, micro-wave ovens, VCRs and refrigerators. Other commercial applications includes constructing smart oce spaces, monitoring product quality, managing inventory, factory instrumentation and many more.[1]. Fig 2: Applications of WSN       284 ISSUES IN APPLICATIONS Data analysis, DSP based control solutions and more complex network setups are the areas yet to be explored in green house monitoring. A WSN based application that will never affect the biological behaviour of the inhabitant species is very important, and hence challenges are open for research. The main research issue to be addressed is to increase the degree of awareness of home assistants, caregivers, primary healthcare centres, to understand the patients’ health and activity status to quickly discern and decide on the required action in health monitoring applications. Design of complex underwater acoustic sensor networks that can be used in deep waters is an area yet to be addressed as an issue in industrial applications like water quality measuring and monitoring system. The energy efficiency of sensor nodes and the correct modelling of energy consumption are the research issues yet to be explored. The issue with biological application, the simulation model that was built was applicable only if the nodes in the WSN were separated with a distance up to 150m, for medium distance only. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education   Issue with smart parking , the detections of magnetometers used for this are not very accurate as they are influenced by environmental factors and in a parking lot, apart from entry and exit of vehicles there may be other moving objects, which is a great challenge. The issues with event detection application, solutions to sensor node deployment, data dissemination routing in Wireless Heterogeneous Sensor Networks (WHSNs) are the yet to be addressed. [4] SECURITY ISSUES The requisite of security not only affects the operation of the network, but also is highly important in maintaining the availability of the whole network .It is necessary to know and understand these security needs first before implementing security scheme for WSN.WSN should take the following major security needs which are basic needs for any network into consideration of secure mechanism: DATA INTEGRITY A. Data Integrity: Data integrity in sensor networks is needed to ensure the reliability of the data . It ensures that data packets received by destination is exactly the same with transferred by the sender and any one in the middle cannot alter that packet. The techniques like message digest and MAC are applied to maintain integrity of the data. By providing data integrity we are able to solve the Data integrity attacks. Data integrity is achieved by means of authentication the data content. B. Data Confidentiality: Confidentiality is to protect data during communication in a network to be understood other then intended recipient. Cryptography techniques are used to provide confidentiality. Data confidentiality is the most important issue in all network security. Every network with any security focus will typically address this problem first Data confidentiality of the network means that data transfer between sender and receiver will be totally secure and no third person can access it(neither read nor write) .Confidentiality can be achieved by using cryptography: symmetric or asymmetric key can be used to protect the data. C. Data Availability: Availability ensures that the services are always available in the network even under the attack such as Denial of Service attack (Dos). The researchers proposed different mechanisms to achieve this goal. Availability is of primary importance for maintaining an operational network. Data Availability determines whether a node has the ability to use the resources and whether the network is available for the messages to communicate. Availability ensures that sensor nodes are active in the network to fulfil the functionality of the network. D. Data Authentication: Data Authentication of a sensor node ensures the receiver that the data has not been modified during the transmission. Data authentication is achieved through symmetric or asymmetric mechanisms where sending and receiving nodes share secret keys. In asymmetric cryptographic communication digital signatures are used to check the authentication of any message or user while in symmetric key, MAC (Message Authentication Code) are used for authentication purpose . E. Data Freshness: Data freshness is very important in wireless sensor networks. Because an attacker can send an expire packet to waste the network resources and decrease in network lifetime. Freshness ensures that the data received by the receiver is he recent and fresh data and no adversary can replay the old data. The freshness is achieved by using mechanisms like nonce or timestamp should add to each data packet.[1] CONCLUSION In this paper a brief introduction of WSN, characteristics of WSN were described. WSN applications with application issues were also described. It also explains the security issues of WSN. ISBN 1-63102-455-8 285 Review On WSN Applications With Some Issues REFERENCES [1] [2] [3] [4] [5] [6] 286 Himani Chawla “Some issues and challenges of Wireless Sensor Networks” IJARCSSE ISSN: 2277 128X Volume 4, Issue 7, July 2014 Daniele Puccinelli and Martin Haenggi “Wireless Sensor Networks: Applications and Challenges of Ubiquitous Sensing” IEEE Circuits and System Magazine .third quarter 2005 Jamal N. Al-Karaki, Ahmed E. Kamal” Routing Techniques In Wireless Sensor Networks: A Survey” IEEE Wireless Communications Dec. 2014 Edwin Prem Kumar Gilbert, Baskaran Kaliaperumal, and Elijah Blessing Rajsingh “Research Issues in Wireless Sensor Network Applications: A Survey”, IJIEE, Vol. 2, No. 5, September 2012 ISBN 1-63102-455-8 POTENTIALITY OF CLOUD COMPUTING IN LIBRARY STORAGE, ACCESS AND RETRIEVAL: A CRITICAL ANALYSIS Medha Ray | Student of Five Year Integrated MLIS Course | Department of Library & Information Science | University of Calcutta | medharay1994@gmail.com Souvik Koner | Student of MLIS | Department of Library & Information Science | University of Calcutta | souvikkoner89@gmail.com Abstract: Technology is changing rapidly and is forming a layer that is touching every sphere of human life like power grids, traffic control, medical and health care, water supply, food and energy and all the financial transaction of the world. So, latest technological developments have brought a dynamic change in every field and library science is not an exception to it, for collection, Storage, organization, processing, and analysis of information. Although the use of the cloud in the business environment has already transformed the concept of data storage and resource management, its use in the field of libraries and information centers is somewhat less widespread .At present libraries are moving in advanced level called cloud computing. Through this technology, the users can access the information from any part of the world. Now, libraries are required to focus and avail the advantages of cloud computing to offer user centered multi-level services to enable them to become self supportive in seeking their information with greater level of confidence as well as satisfaction. This paper emphasizes the basic concept of newly develop area known as cloud computing. The use of cloud computing in libraries and especially how cloud computing actually works is explained in the area of storage and retrieval of the documents. Keywords: Academic Libraries, Cloud computing, , Cloud Deployment Model, Information Technology, Storage & Retrieval. INTRODUCTION Information is the key power of the society. Library is a cornerstone to meet the information requirements of a nation. In the field of Library & Information Science, information Technology has a great impact on different application within the library housekeeping operation. The rapid progression of IT helps to discover new advanced dimension of technology throughout the world. After mainframe, distributed computing and utility computing we have to familiar to the extension ofgrid computing, i.e. cloud computing. The cloud computing consist of two words, one is cloud that means a virtual platform of complete application and the second one is computing means a process of utilizing computer technology to complete a task. It is a computing paradigm based on client server architecture.This cloud platform allows organization to split their operations into few components which can perform separately or across a distributed network widely. There are various definition are available of cloud computing. Some of them are as follows.Buyya defined it as 'Cloud computing is a parallel and distributedcomputing system consisting of a collection of inter-connectedand virtualized computers that are dynamically provisioned andpresented as one or more unified computing resources based onService Level Agreements (SLA) established through negotiationbetween the service provider and consumers.' “Cloud Computing is the paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients that include desktops, entertainment centers, table computers, notebooks, wall computers, handhelds, etc.” (IEEE Computer Society). ‘Cloud computing is a model for enabling ubiquitous, convenient onISBN 1-63102-455-8 287 Potentiality Of Cloud Computing In Library Storage, Access And Retrieval: A Critical Analysis demand network access to ashared pool of configurable computing resources (e.g., networks, servers, storage, applications, andservices) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing is a model for delivery of resources as a service’ (NISAT, 2009). Figure 1: Cloud computing at a glance In short it can be said that cloud computing service is a highly scalable web enabled platform and pay per use model capable to provide hardware, software and dynamic infrastructure on demand to manage, evaluate and access the information by expert or non-expert users. HISTORY & DEVELOPMENT The term “cloud” has been coined as a symbol for the internet. It was used for the purpose of common representation in network diagrams as an outline of a cloud, used to represent the transfer of data from one point to the other side of the cloud. This concept came in 1961 when professor John McCarthyrecommended that computer time sharing technology will be pioneering leader of the future where computing power and even specific applications might be sold through a utility-type business model. This idea becomes very popular in the late 1960s, but by the mid-1970s the idea became clear that the IT related technologies of the day were unable to sustain such a futuristic computing model. CHARACTERISTICS OF CLOUD COMPUTING        288 Major characteristics of cloud computing are On demand self- service – It means a user can access the resources when he wishes, from any place, any time without human interaction with each service’s provider. Rapid Elasticity - Cloud Computing ensure quick operation of necessary resources in a dynamic method. Broad network access - It means a huge capacities which is accessed through the wide range of network with the help of desktop computers, mobile phone, Smart phone, PDAs, tablet etc. Measured service - Depending on the users demand, measured service is a cloud based system which is automatically control and optimizes necessary resources on the basic of financial influence. Resource pooling –Resource pooling is one of the characteristics of cloud computing. Resources are pooled or controlled here, the computer providing resources are controlled or pool to supply multiple consumers with different physical and virtual resources dynamically assigned and reassigned according to users request. Dynamic computing infrastructure – Generally, Dynamic computing infrastructure is the basic feature of cloud computing where dynamic computing standardized, scalability, and secure physical infrastructure required. StandardizedInterface - It shows how two applications or data source can communicate with each other for processing with the help of easily link cloud service having some standardized APIs. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education  Usage Priced – It deals with cloud-based infrastructure services, the pricing model is according to use basic for bandwidth, storage and CPU. There is also the scope for monthly basic and subscription basic. DEPLOYMENT MODEL OF CLOUD SERVICE Figure 2: Model of cloud computing     TYPES OF CLOUD Public cloud - In this computing, services are provided to the public by third party on payment basic with the help of hardware and software. Free e- mail service is the best example for public cloud. Private cloud - In private cloud, cloud services will not be available to the general public and it is meant for the private, i.e. internal data center. Hybrid cloud - it is more useful and flexible because of maximum use of the resources with the conglomeration of more than one cloud. Community cloud - As the same signifies. Community cloud is meant for specific group of people or organizations. In this method, several community or organization can interact with each other and establish cloud service. Figure 3: Relational Diagram of the cloud types Cloud computing usage in libraries: Library possesses a major area where clod services can be applied to increase the benefit of the library to its users and as well as society. Cloud is being used to host library website, increasing storage capacity, resource sharing, and content searching as well as in the area of library automation and so on. We have discussed on the area of storage and retrieval of the digital documents of the library using cloud computing in this paper. Deployment model of cloud Services within the library: ISBN 1-63102-455-8 289 Potentiality Of Cloud Computing In Library Storage, Access And Retrieval: A Critical Analysis    Infrastructure as a service (IaaS): Infrastructure as a service is one of the popular cloud computing service model called as utility computing and sometimes it is also known as hardware as a service. This is a crucial area of storage of the library, part of a cloud service, and materials in digital format. IaaS providers provide computers, infrastructure, storage, communication technologies, as well as hardware and related components to the library on the basis of virtual reality and operating software for utilizing it smoothly. This deployment model helps information storage/hosting and archiving also. Storage capacity of server, communication technologies, platform, hardware cost /implementation etc. is not a matter of worseness of a librarian. The only job of a librarian is uploading the library’s digital documents over the web and for that he should be pay a pre-determined cost to the company providing this service. A pioneer example of this is Amazon which provides virtual infrastructure, maintenance, storage, communication technology and computation as an innovative procedure/service. Amazon’s Elastic computer cloud one of the popular examples of IaaS. Platform as a service (PaaS): This deployment model provides the software and the programming languages to the users of the library. In PaaS model, service providers provide also operating system, hardware, database, framework, web server etc. to facilitate the easy storage and retrieval of the information of the library through the internet. It is a platform of computing for the software developer to run a new application or working with existing ones on the cloud platform without a huge cost of implementing hardware & software. The broad application of PaaS in the field of library are maintaining integrated management system of collection development and resource sharing, developing archiving management software for valuable and rare digital resources of library, hosting initial website application etc. Amazon, Microsoft, Google etc. are the common and popular PaaS Vendors. Software as a service (SaaS): This is another important service model of cloud computing. In SaaS, a complete and compact application is provided to the user by the service provider. Often librarians or library staffs face the problem of installation and run the new software and upgrading the existing one without a strong technical background. In this service model, cloud vendors are totally responsible to maintain and make available an application to the cloud user extended on their demand. Librarian and staff can work with the software offered for them from anytime and anywhere where there is an internet connection. It may be on pay per use or rental basis. It offers email application, free services etc. in the era of library. But which is very important is that it allows a limitless storage of the documents of the library and beside this their provision of access or retrieves them through the help of internet. Google, Microsoft, SQL Azures etc. are the common Saas provider companies throughout the world. Figure 4: Service model 290 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Need of cloud computing in the era of digital resources of the library:   Document storage and retrieval: se cloud computing technologies in the area of document storage and retrieval is one of major application part of the cloud computing technology in the libraries. At present a library whether it is traditional or hybrid possesses more or less digital documents. In case of digital library, the library has a huge collection of digital resources which are stored on the library server. Basically librarians are responsible to store their data or information on the server and it is their duty to maintain the server to work out which cause a headache sometimes to the librarian and beside this many technical problem arises to host the server properly. This makes obstructto provide the service and job of the librarians. Using cloud computing technology librarian stores all data/information which are digitally available into the library wall without any hindrance of manage the server. Thus this technology helps to build a digital library and institutional repositories effectively. In the context of retrieval, access of the stored data is easy and convenient way to the users at anytime from anywhere where there is a internet connection without physically present in the library. Figure 5: Data storage application To build an institutional repository cloud computing technology usesDura spacecloud and it have two software Dspace and fedora. Dspace is most common software using in digital library. To access the stored information cloud computing facilitates Google Doc, Sky Drive, Drop Box, Flicker,and Jungle Disk and so on. By providing LOCKSS (Lots of copies keeps stuff safe), CLOCKSS (Controlled LOCKSS), and Portico Tool it helps to digitally preserve and conserve the library materials over the cloud platform. For the librarian he/she is able to update or put information on the cloud throughout the world via internet. Collection development and resource sharing: Collection development through collaboration of number of libraries using cloud computing techniques and sharing of resources within these libraries is important application of cloudcomputing. OCLC is one of best example of cloud computing service throughout the world. Worldcat sevice of resource sharing is popular service of OCLC. This aspect is devided into two broad categories.  E-Resources- collection: In the era of tchnological advancement the demand of e-resources like e-book , e-journal and so on are increasing in a high rate. Beside this it is not possible to acquire all the eresources for their users because of financial construction. Though to take a facility of cloud comuting servicelibrarian is to bound up to pay for the complete application but it is cheaper to compare than installation of hardware and software in the library and duplication and efforts cost of the e-resource development.  Content searching: It allows the web OPAC, Federated searching for content seraching via internet with the help of any device. In case of Scholarary content searching Kimbus which is a popular research ISBN 1-63102-455-8 291 Potentiality Of Cloud Computing In Library Storage, Access And Retrieval: A Critical Analysis platform based on cloud environment to retrieve scholary content available on the cloud. Kimbus,meant for knowledge discovery, was lunchde in 2010,initaitive taken by Rahul Ararwalla and Tarun Arora to meet the scholary interest of the researchers from multiple sources. Through this platform researchers are able to searching content, make a collaboration,discuss with peers group and enrich the platform by dedicating their intellectual and innovative ideas,thoughts and so on. At present Kimbus is consist of 600 academic institution, research labs,50000 scholars throughout the world. Kimbus offers the library to make a search available through dyanamic and single point search interface. Presently Information and Library Network makes a collaboration with Kimbus in order to provide a more effective and efficient search & retrieval to the users and professionals under the UGCINFONET digital Library Consortium project. Cloud Computing Initiatives for Libraries: The services are designed through different ways like forums, discussion room, web repository, bibliographical services etc. These are as follows         Drupal for content management: It is free and open source content management software, initially released on January, 2011. Drupal is written on PHP and 0n 17th June, 2015 it was available on stable format. Dura space’sDura Cloud – Repository solutions like Dspace , Fedora: Dura Space provides cloud based services, developed by the Dura Cloud, to support to preserve and access the documents by academic libraries, research institutions, and other cultural and heritage organizations. It is a non -profit organization from 2011, offering cloud storage by “Dura Storage” across multiple commercial & non -commercial organization and as well as libraries. Ex-Libris Cloud: This provides the cloud based service and a cloud environment based on future technologies and open for business and communication. Moodle for Library Management Software: This is developed by an Australian Company with the help of 30 developers, supported by 60 companies. It provides a platform for educators, administrators, and learners with a secure and integrated system and learning environment. OCLC Web scale: Libraries at Web Scale – it is an OCLC report which explores the impact of the web on our rapidly changing information era and presents an overview of opportunities in changing environment. Open source software like Koha, Dspace, Green stone: It is a “source code” modified by anyone and also it is the part of software that most computer users do not oversee. Reed Elsevier: Reed Elsevier is an Anglo- Dutch multinational publishing and information company from 1992-2015 and renames as RELX Group in February, 2015. It provides information in the field of Science, Medical, Marketing, Financial, Risk, Legal and Business Sectors. Library Thing: The creator of Library Thing, launched 29 August, 2005, is Tim Spalding. It is a social cataloguing web application. Chronopolis Project: It is a project of university of California in associated with San Diego Super computer Centre. It is based on data grid framework. Advantages:  Service oriented architecture- Cloud computing services are based on service oriented architecture. The cloud provides the servicesto the library which is controlled by remotely located data centers.  Pay per use model service– Being a demand based service it allows pay per use model based on license agreement to the third party with the library. Library should only pay for the service, platform, and application it uses.  Cost effective -This is more cost effective and cheaper method rather than traditional method. Sharing of infrastructure, platform, software, hardware among the different libraries is an advantage to reduce the implementation cost of them.  Portability –From any part of the world, anyone can browse the web anytime to get his/her service via internet using any device. 292 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education     Eco-friendly – It is very helpful for green computing because of low consumption of electricity. Adjustable storage-Cloud computing provides the adjustable storage capacity depending on the requirement of the library. Flexible and innovative – In cloud computing we use modern technology, so it is more flexible and also very innovative. WEB OPAC – If the catalogue of the institute make available through cloud, it will be more benefitted to the users to find out the availability of material all over the world. Challenges of cloud computing: The major challenges that a library may face are as follows.  Security: Library and Information centers have deal with huge amount of information. So data security or data protection is a great challenge to the cloud provider. In case of cloud computing vendors are totally responsible to provide the data security and fire wall is used to protect sensitive data of library.  Reliability: The arena of cloud computing required huge responsibility as user satisfaction in involved here.  Data back up: IPR (Intellectual Property Rights) are different type of problem in which cloud providers have to be much careful.  Data recovery and availability: Data recovery and availability is also a concerned fact of cloud computing.  Regulatory and compliance restrictions: As anyone can access this service, and then there must be restricted with some rules and regulations.  Management capabilities: The management of cloud computing prove insufficiency then in create dissatisfaction. Currents trends and present situation of the libraries in India: Cloud computing is the advanced level of information technology and it is an upgraded version of grid computing and distributed computing. As a developing country India is trying to switch over in this technology gradually. Library has performing a great job of procuring, disseminating and retrieving a huge number of documents. At the same time as a service oriented institution Library can adopt cloud computing services to fulfill its objectives .But the present scenario of the Indian libraries shows that there is a lack of cloud service providers, deficiency of technical skill and knowledge among the library professionals, unwillingness of technological improvementetc. for which libraries cannot grow up efficiently in compare than technological advancement day to day. Though some services like digital library using Dura space, web documentation, library website, web OPAC, web 2.0 etc. are adapted to the academic libraries of India. In a nut shell still now cloud computing techniques are not fully accepted in the libraries of India. Cloud service providing libraries: Though many libraries of foreign countries are providing cloud based services but in respect of our country result is very poor. Only pioneer libraries are providing this. In international scenario (a) OCLC (b) Columbia Public Library (c) Exlibris (d) Library of Congress ( LC) (e) Polaris (f) Scribd (g) Encore. In national scenario INFERENCE In the epoch of technological advancement cloud computing has become a buzzword over the last few years. It is a shift towards a new paradigm of technological development.In spite of being some negative aspects it plays an important and effective role in utilization of data which can be stored and shared among the different academic libraries. But still now Indian libraries are situated in a developing phases to adopt and adapt cloud computing techniques within the library. To build a cloud environment motivation of library professional for using this technology is necessary done by the different commercial cloud providers in India like INFOSYS, Bangalore, TCS, and Wipro etc. ISBN 1-63102-455-8 293 Potentiality Of Cloud Computing In Library Storage, Access And Retrieval: A Critical Analysis REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] 294 A.Suthar, A. (2013, June 1). An overview of Using Cloud Computing in Libraries.Retrieved July 12, 2015, from http://www.theglobaljournals.com/ijar/file.php?val=June_2013_1370077205_6654a_101.pdf, accessed on 12.07.2015,15.48 Anna, K., & Kumar, A. (2013, December 23). Application of Cloud Computing in Libraries. Retrieved July 29, 2015. Baniwal, R. (2013, September 1). Application of Cloud Computing in Different Areas. Retrieved July 29, 2015, from http://www.csjournals.com/IJCSC/PDF4-2/5c.pdf,accessed on 15.07.2015,11.43 Bhattacharya, N., & Das Purkayastha, S. (n.d.). Cloud computing and its applications in libraries. Retrieved July 29, 2015. Chand Goyal, L., & Kumar Jatav, P. (2012, September 1). Cloud Computing :an overview and its Impact on libraries. Retrieved July 29, 2015,from http://ijngca.com/Papers/IJNGCA08092012.pdf,accessed on 11.07.2013,22.10 Managai, G., Ganesan, P., & Kumar.D, K. (n.d.). A PERSPECTIVE STUDY OF CLOUD COMPUTING IN LIBRARY SERVICES. Retrieved July 29, 2015, from http://www.liscom.org/postContent/fullPaper/pdf/paper presented/O 13 A PERSPECTIVE STUDY OF CLOUD COMPUTING IN LIBRARY SERVICES (1).pdf,accessed on 12.07.2015 Sanchati, R., & Kulkarni, G. (2011). Cloud Computing in Digital and University Libraries. Retrieved July 29, 2015, from https://globaljournals.org/GJCST_Volume11/6-Cloud-Computing-in-Digital-and-University.pdf Teregowda, P., Urgonkar, B., & Lee. Giles, C. (n.d.). Cloud Computing: A Digital Libraries Perspective. Retrieved July 29, 2015,from http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5558004&abstractAccess=no&userType=inst,accessed on 13.07.2015,22.45 Yuvaraj, M. (n.d.). Cloud Computing Application In Indian Central University Libraries: A Study of Librarians' Use. Retrieved July 29, 2015. ISBN 1-63102-455-8 USE OF LIBRARY MANAGEMENT SOFTWARE BY SELECTED UNIVERSITY LIBRARIES OF DELHI: A STUDY Jitendra Kumar | Assistant Librarian (I/C Library) | National Institute of Tuberculosis and Respiratory Diseases | Ministry of Health & Family Welfare | Govt. of India | jitendra3682@gmail.com Tanuja Kumari | Research Scholar | Deptt. of Library & Information Science | University of Delhi, Delhi Abstract: This study presents a assessment of the library management software packages used in University Libraries of Delhi. It focuses on the evaluation of software on the basis of certain important checkpoints. It also highlights the importance of library management, library activities and services in libraries. Today, the single most important issue for university libraries is managing change without losing their identity. Change is nothing but a transformation of today’s requirements to tomorrow’s performance. It is the only thing that has made possible the journey of libraries from storehouses to the stage of information centres. Keywords: Automation, Libsys, CDS/ISIS, Sanjay, Libman, SOUL. INTRODUCTION Software is a term used in contrast to hardware to refer to all programs (set of instructions for solving a given problem by computer) which can be used to perform specified tasks. That is, the term software is used to describe program set, needed to operate an information processing system. These programs give life to the circuitry of computer hardware. It consists of a sequence of instructions and decision rules that directs the computer in executing the given task. Software is a set of programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory, “The market for software is expected to expand.” Software is an application package, which enables you to perform certain tasks, which manipulates any number of variables, hardware or data. LIBRARY SOFTWARE Library software is a set of programs which helps in housekeeping functions (operations) of Library. These software also called Library Automation Software, it contain all the functions related with library like, Acquisition, Cataloguing, Circulation, Serial Control, OPAC, Administration etc. Library Software is an Integrated Library System (ILS), also known as a Library Management System (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bill paid, and patrons who have borrowed. LIBRARY MANAGEMENT SOFTWARE The World is going digital. Libraries are no expectations. In fact, librarians are one of the most enthusiastic user groups of information technology in general and computer softwares in particular. A software may be viewed as a digital version of human knowledge. Library Management Softwares (LMSs) are now established as an essential tool in the support of effective customer service, stock management and management of services offered by libraries. These are based on knowledge and experience of library professionals over the centuries. Library Management Software is a set of programs which helps in housekeeping functions (operations) of Library. These software also called Library Automation Software, it contain all the functions related with library like, Acquisition, Cataloguing, Circulation, Serial Control, OPAC, Administration etc. 296 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Fig. 1 Library Management Software in Library Library Software is an Integrated Library System (ILS), also known as a Library Management System (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bill paid, and patrons who have borrowed. The rapid growth in utility of hardware, software & connectivity and reduced costs gives the development of LMS a vital breakthrough to achieve a remarkable height. Current LMSs are integrated systems, based on relational database architecture. In such systems files are interlinked so that deletion, additions and other changes in one file automatically activate appropriate changes in related files. The market place for LMSs is now a mature one in India. Almost all special libraries and larger academic libraries in India have adopted a computer-based system. NEED AND IMPORTANCE OF LIBRARY MANAGEMENT SOFTWARE Today, the single most important issue for university libraries is managing change without losing their identity. Change is nothing but a transformation of today’s requirements to tomorrow’s performance. It is the only thing that has made possible the journey of libraries from storehouses to the stage of information centres. Today technology, marketing, quality, and costs are the major change elements. These change agents disturb and upset all balances and equilibrium in the market. Out of the four elements, quality, which is easy to recognize, but difficult to define is very dynamic. IT plays key role in achieving total quality (i.e., satisfaction of users, staff, librarian, and institution) in the libraries. In TQM framework the user (king) is at the top of the organizational pyramid, staff is next to serve the user and management is there to support the staff. To please the king (user) libraries are expected to arrange all their activities and processes around the needs and expectations of him and also desired to remain ahead of the users in all aspects. The ability of a computer to put items rapidly in order and to do so in a variety of sequences or by a number of different access points all derived from a single record, is undoubtedly one of its alluring attributes to a librarian. Besides time saving benefits, it helps in library automation in many ways. It increases productivity, reduces unit cost, and ensures consistency and reliability. Library software helps in managing diverse library resources and provides better and wider access to resources.     OBJECTIVE OF THE STUDY To know the Library Management softwares available in India. To study the Library Management softwares being used by selected university libraries. To study the modules, usefulness & backup facility the Library Management Softwares used by selected universities. To know the hardware & infrastructure requirements necessary for these softwares. ISBN 1-63102-455-8 297 Use Of Library Management Software By Selected University Libraries Of Delhi: A Study   To formulate a criteria for evaluation of Library Management Software Packages. To know the librarians satisfaction and problem faced by them regarding software used in respective libraries. NEED OF THE STUDY In todays environment no library can functions manually to provide better and effective services to users community. Every library has to purchase & use a Library Management Software to enhance effectiveness & services. There are so many Library Management Softwares available in the market and some softwares are also designed & developed by government organizations. These Library Management Softwares available at different cost or at zero cost. It is very difficult to select good software with all necessary modules. This study will emphasize on all the aspects related to library software like price, modules, budget, designing agencies and success rates etc. I want to check out the different Library Management Softwares being used by different universities in Delhi and whether they are successful or not. LIMITATIONS The aim of this research is to study the various kinds of library management softwares which are used by libraries of different universities in Delhi but i have selected only three university libraries named as Delhi University, Jawahar Lal Nehru University and Indra Gandhi National Open University. LITERATURE REVIEW A comprehensive survey of the works published in a particular field of the study or the line of research, usually over a specific period of time, the form of in depth, critical bibliographic essay or annotated list in which attention is drown to the most significant works. An annual review is a type of serial denoted to the publication of literature review. Literature review is an evaluative report of information found in the literature related to the subject area of the study. The review describes summaries, evaluate and clarify the literature available on the related topic. It gives the theoretical base for the research and to determine the nature of the research. In scholarly journals, particularly those publishing original research in the physical and social, the first section of each article, devoted to a review of the previously published on the subject, with reference in text to footnotes or to list of work cited at the end. Literature review can be just a smile summary of the source, but it usually has an organization pattern and combines both summary and synthesis. A summary is a group of the important information of the source, but a synthesis is a re-organized or a reshuffling, of the information. It must give a new interpretation of the old material. According to cooper “A literature review uses as its database reports of primary or original scholarship a does not report new primary scholarship itself .The primary report used in the literature may be verbal but in the vast majority of cause reports are written in document. The types of scholarship may be empirical, theoretical critical analytic, or methodological in nature. Second as literature review seeks to describe, summaries, evaluate, clarify and /integrate the content of primary report.” METHODOLOGY There are three research techniques and tool available for data collection. 1. 2. 298 Interview Method  Structured Interview  Unstructured Interview Observation Method  Structured Observation Method  Unstructured Observation Method  Participant Observations  Non Participant Observations  Direct Observations  Indirect Observation ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education 3.  Simple Observation  Systematic Observation Questionnaire  Closed ended question  Open- ended questions AREAS OF LIBRARY MANAGEMENT Ranganathan’s five law of library science stipulates that documents of the library should have the maximum number of users. With the application of ICT in the area of libraries there has been tremendous improvement in the library services offered to the users by the libraries. Following are the main areas of library management:    Library management. Library house keeping operation, and Information Retrieval System. Generations Of LMSs Over The Years: Sl.No. Features 1st Generation 2nd Generation 3rd Generation 4th Generation 1 Low level Language In house COBOL, PASCAL, C Vendor Specific 4 GL OOPS 2 Programming Language Operating System UNIX, MSDOS UNIX, Windows 3 DBMS Non-standard 4 Import/Export None Hierarchical and Network model Limited Entity Relation model Standard 5 Communication Limited Some interface Standard 6 Portability Machine dependent and hardware specific Machine independent but Platform dependent Multi-vendor Object oriented model Fully integrated and seamless Full connectivity across the Internet Multi-vendor and Platform independent 7 Reports Fixed format and limited fields Fixed format and unlimited fields Customized report generation 8 Colour None None Available 9 Limited Improved Unlimited 10 11 Capacity of record holding Module Integration Architecture Customized report generation with e mail interface Fully available with Multimedia Unlimited None Stand-alone Bridges Shared Seamless Distributed Seamless Client-server 12 Interface Command driven (CUI) Menu driven (CUI) Icon driven (GUI) 13 User Support Single user 14 Multi-lingual support/ UNICODE None Limited number of users Limited (through Hardware support) Unlimited number of users Standard Icon driven with Web and Multimedia (GUI) Unlimited number of users UNICODE base Table: 1 Generation of Library Management Softwares Library Management Softwares in India: There are so many Library Management Softwares available in the market and some softwares are also designed & developed by government organizations. These Library Management Softwares available at different cost or at zero cost. ISBN 1-63102-455-8 299 Use Of Library Management Software By Selected University Libraries Of Delhi: A Study CDS/ISIS: CDS/ISIS stands for Computerized Documentation Services/lntegrated Set of lnformation Systems. CDS/ISIS is an advanced non-numerical information storage and retrieval software developed by UNESCO since 1985 to satisfy the need expressed by many institutions, especially in developing countries, to be able to streamline their information processing activities by using modern (and relatively inexpensive) technologies. The software was originally based on the Mainframe version of CDS/ISIS started in the late '60s, thus taking advantage of several years of experience acquired in database management software development. SOUL (Software for University Libraries): INFLIBNET Center of the UGC has developed a Windows-based library management software, SOUL, which provides a total solution for the automation of university libraries in India. SOUL is designed using client-server architecture, which imparts extra strength to storage capacity, multiple access to a single database, various levels of security, back up and storage facilities, etc. It has MSSQL (Structured Query Language) Server 6.5 RDBMS (relational database management system) as the back end. Now new version of SOUL 2.0 has come. This user-friendly software is quite easy to work with. The software comprises various modules like acquisition, catalogue, circulation, OPAC, serials control and administration. E-Granthalaya: E-Granthalaya is library automation software from National Informatics Centre, Department of Information Technology, Ministry of Communications and Information Technology, Government of India. The software has been designed by a team of experts from software as well as Library and Information Science discipline. Using this software the libraries can automate in-house activities as well as user services. The software can be implemented either in stand-alone or in client-server mode where database and Web OPAC are installed on the server PC while the data entry program is installed on client PCs. Alice for Windows: Alice for Windows (AfW) is very popular, integrated library automation software designed and developed by a leading Australian company, Softlink. The package is available in three versions, for school libraries, academic libraries, special libraries and public libraries. Standard Modules are required for a library to function from day to day. These are: Management, Reports and Utilities, Circulation and Inquiry (OPAC). Advance Modules extend the usability of the automated library. LIBSYS: Libsys is fully integrated library management software designed to run on a number of platforms. LibSys has been developed by LibSys Corporation, New Delhi. It supports UNIX, Windows NT, and Novell Netware in client-server architecture. It can run on many servers such as Windows NT, SCO Unix, Linux, Unixware, Novell, Sun Solaris, Alpha OSF/1, etc. On the client side, a library may have any version of windows. Besides, the software is also compatible with Java-enabled thin client. Significantly, Libsys does not need any relational database management system (RDBMS) as it uses proprietary database. However, ORACLE as backend or SQL server is the available options of Libsys. Libsys has the largest installations base in India with more than one thousand libraries using the software. DELMARC and DELPLUS: DELPLUS (formerly DELSIS), an integrated modular package, was developed on Basis plus by DELNET to support complex cataloguing and union catalogue functions under network environment. The software provides interface to CDSIISIS and supports creation of bibliographic records in 13 Indian languages (using GIST card). It facilitates duplicate checking, online help and interlibrary loan. Currently it supports all the DELNET databases catering to all the network users. SANJAY: SANJAY is a library automation software package which has been designed and developed by DESIDOC (Defence Scientific Information and Documentation Centre), Delhi, with the support of NISSAT, by augmenting CDS/ISIS (ver 2.3) to cater to the need of library management. CDS/ISIS lacks programs for housekeeping activities such as circulation, serials control, etc. DELSIS: Delsis, the networking software, is an integrated modular package developed on Basisplus by DELNET to undertake complex cataloguing and union cataloguing functions in the libraries, library networks and information centres. Some of its special features include: Enquiries through OPAC by author/title/ subject/call no./series/keyword, etc., Boolean enquiries, Full text search retrieval, Display records in AACR II 300 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education format, Data import – export, Automatic index generation, Input format: Common Communication Format (CCF) developed by UNESCO, Duplicate checking of records, Creation of bibliographic records in Indian languages for 13 languages ( using GlSTcard), Interface to CDS/ISIS, All DELNl3 databases and online interlibrary loan facility, etc., are functioning on this software presently. Virtua ILS: Virtua Integrated Library System is a comprehensive, integrated library software package from VTLS Inc, Virginia, USA. It has the modules of Acquisition and Fund Management, Circulation, Cataloging, Serials Control etc. There are several features that are unique to VTLS Virtua ILS (Vyasamurthy, 2001). TROODON: Troodon is an integrated package linking all the relevant functions in the library. It has been designed to suit the library procedures and financial rules of the government of India and so is ideally suitable for government libraries. Troodon 5.0 is user-friendly, multi-user, multi-lingual and multitasking. The package is developed to work on Windows 95/Windows NT. It can be operated by library staff without much prior knowledge of computer operations. It is web enabled to work perfectly on both Intranets and the Internet, is GUI-based and is compatible with barcode technology and multimedia. It is a multi-user library software package in Windows NT/Novell Netware Server. It is CCF (Common Communication Format) based for import/export of data. The Standard package has installed the following modules: Acquisition, Circulation, OPAC, Serials Control, Maintenance, Backup and Setup. The software also provides customization as per local needs. Troodon provides powerful, yet affordable library automation solution for the libraries of all types and sizes. Troodon is designed as an integrated package linking all the relevant functions in the library. STATEMENT OF THE PROBLEM There are so many library management softwares available in India like open source softwares & commercial softwares but I want to check out which software is best in terms of modules, services, backup facility, price, future addition options, data storage capacity, software & hardware requirements of the software etc. I want to select only three university libraries named as Delhi University, Jawahar Lal Nehru University and Indra Gandhi National Open University. CONCLUSION On the basis of different criteria for library management software and software package used by Central Reference Library (DU), Central Library (JNU) & Library & Documentation Division (IGNOU) Library find that these university libraries are using different software and they satisfied with their performance. After analysis of the functionality of these software draws some findings that there is no end of satisfaction in human nature, every user wants more & more facilities in minimum charges, so that selection of software is done very carefully. Qualities of good software is to offer the complete satisfaction of users and perform the above mentioned library activities and functions, we must select a competent and suitable software which can meet out users requirements. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] "LIBSYS 7." LIBSYS. Libsys Ltd., 2010. Web. 6 Mar. 2015. <http://www.libsys.co.in/offerings-libsys7.html>. "NewGenlib." NewGenLib / Best Open Source Integrated Library System. Verus Solutions Pvt Ltd, 2010. Web. 6 Mar. 2015. <http://www.verussolutions.biz/>. "SoftLink Asia-Alice." Softlinkasia.com: Softlink Asia, Library Automation Software, Alice, Liberty, Library Software in India. Softlinkasia, 2007. Web. 04 Mar. 2015. <http://www.softlinkasia.com/Alice.htm>. "SOUL, Software for University Libraries, INFLIBNET Centre Ahmedabad." Information and Library Network Centre. INFLIBNET Centre, 18 Mar. 2009. Web. 04 Mar. 2015. <http://www.inflibnet.ac.in/soul/about.htm>. "Troodon 5.0." Comtek Services Pvt. Ltd. Web. 6 Mar. 2015. <http://www.comtek-services.in/Documents /Troodon5Broacher.pdf>. Gupta, Atul. "Software." Information Technology. Delhi: Rathore Institute, 2008. 45-58. Print. Information Development 19.1 (2003): 50-55. Print. Malwad, NM. "Selection Criteria for Library Automation Software." DESIDOC Bulletin of Information Technology 15.2 (March,1995): 17-26. Print. Mukhopadhyay, Partha Sarathi. "Progress of Library Management Softwares: an Indian Scenario." Documentation Research and Training Centre. Web. 20 Feb. 2015. ISBN 1-63102-455-8 301 Use Of Library Management Software By Selected University Libraries Of Delhi: A Study [10] [11] 302 Mukhopadhyay, Partha Sarathi. "Progress of Library Management Softwares: an Indian Scenario." Documentation Research and Training Centre. Web. 20 Feb. 2015. <https://drtc.isibang.ac.in/bitstream/handle/1849/189/lmss2a.PDF?sequence=2>. Ratnakar, K.V., ed. "Library Management Software." Indian Council of Medical Research:ICMR Libary Bulletin 4.4 (2007): 4-9. Print. ISBN 1-63102-455-8 CLOUD COMPUTING IN COLLEGE LIBRARIES Ram Nath (Maurya) | Librarian | Axis Colleges Hathipur | Rooma | Kanpur | ramnathmaurya10@gmail.com Jai Prakash | Librarian | Jan Nayak Choudhary Devi Lal Memorial College | Sirsa | Haryana | jpsonepura@gmail.com Abstract: In digital era library must soon be building and managing own data centers. In this study libraries maintain more control over the applications that contain sensitive, private information about sponsor. Libraries have been using some cloud computing services for one decade. For example- It we can access databases online, they called cloud applications. In this paper, discuss overview of this technology, Infrastructures, digitization and cloud computing are only choice, new features, usage, purpose of cloud computing in college libraries, present status of user services in college libraries. In this paper details discuss of the cloud computing security issues and challenges. Keywords: Cloud computing, Digital Libraries, College Libraries, Web world. INTRODUCTION Cloud computing is a new technology model for IT services which many businesses and organizations are adopting. It allows them to avoid locally hosting multiple servers and equipment and constantly dealing with hardware failure, software installs, upgrades and compatibility issues. For many organizations, cloud computing can simplify processes and save time and money. Cloud computing is changing the way that organizations manage their data, due to its flexible, user-demand, economical Characteristics. Cloud is a many group of mutual interconnected computer that extends exceeding an organization. Cloud computing, where all files are hosted on a “Cloud” consisting of thousands of computers and servers, all linked tighter and accessible via the internet. With cloud computing everything you do is now web based instead of being desktop based. You can access all your programs and documents from any computer that’s connected to the internet. Present scenario and now too many colleges’ libraries computers to work alone inside a library by investing on hardware, software and maintenance. Introducing of information technology, the scenario has totally changed as today they can provide information, around the world in twenty four hours/ round o’clock. This is possible only the use of computers and networking. In this regard multi-level services their different modules i.e. World Wide Web (WWW) file transfer protocol (FTP), bulletin board services BBS), an e-mail. So many libraries are using or entering in a new era technology for example cloud computing. Cloud computing known as so many names i.e. ‘on-demand computing, information utilities, software as a services and the internet as a platform. Cloud computing is making tasks distributed in large numbers of distributed computers but not in LAN. Cloud computing is capable of integrating them and putting on the public cloud are networks. Example -like internet. What is Cloud Computing? Cloud computing is not a new technology that suddenly appeared on the web but it is a new form of computing. Cloud computing is a kind of computing technology which facilitates in sharing the resources and services over the internet rather than having these services and resources on local servers/ nodes or personal devices. The combination of servers, networks, connection, Fig. 1: Cloud Computing applications and resources is defined as 'cloud'. Cloud computing is acting as a resources pooling technology for accessing infinite computing services and ISBN 1-63102-455-8 303 Cloud Computing In College Libraries resources as per demand of users and can be compare with models of pay as you use or utility model same as used for mobile services usages and electricity consumption. Wikipedia claimed that the concept of cloud computing was emerged back to the 1960s, when John McCarthy opined that computation may someday be organized as a public utility. Chellappa gave the first academic definition of the term Cloud Computing in 1997 and later on, in the year 2007 the term cloud computing came into popularity and firstly was used in this context when Kevin Kelly opined that eventually we will have the inter-cloud, the cloud of clouds. Diffusion of Cloud Computing in College Libraries: A model of cloud implementation in college libraries. We proposed model identified the stakeholders in a college education who internet with the digital division of the college. We have named the digital division as the digital libraries. Book requisition Inter library loan Library Portal Remote Access and maintains of e-resource Circular Fig.2: Library Portal What are the implications for College: Colleges are expected to provide a wide array of technology services, some of which are highly specialized to individual’s campuses, whereas others simply need to be available. Operating in a cloud environment requires information technology experts and staff to develop different skills. Such as libraries services in library and off campus services. Features of Cloud Computing: Following important effects of cloud computing will probably impact of college libraries. Fig. 3: Features of Cloud Computing a) b) c) d) e) f) g) h) i) 304 Cost saving User friendly Sustainability Versatility Scalability Resource Optimization Better mobility Highly automated Easy maintenance ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Model of Cloud: Cloud expand model helpful efficient in developing of economic, extensible and representative symmetry. These are following types of development model of cloud. A) Private cloud B) Public cloud C) Hybrid cloud Fig. 4: Model of Cloud A) Private Cloud: The public cloud substructure is available for public use substitute for a huge industry class and is retain by an organization marketing cloud services. B) Public Cloud: Public cloud computing climate are open for use to anyone who wants to sign up and use them. These are run by peddler and applications from distant users are likely to be compound conjointly on the cloud’s services, storage systems and networks. Example- Google’s App Engine and Amazon web services. C) Hybrid Cloud: Hybrid cloud provides digital solutions through a combine both private and public cloud models. Hybrid cloud is a private linked to one or many extraneous cloud services. Centrally supervise, provisioned as a single unit, and restrict by a fixed network. Cloud Computing and Library Services: following library services are given below1. 2. 3. 4. 5. 6. 7. 8. Online search services (OSS) Bulletin board service (BBS) and e-mail Electronic Document Delivery Services (EDDS) Full text Information (FTI) File Transfer (FT) E-learning Really simple syndication (RSS) www services Fig. 5: Cloud Computing in library Services Applications of Cloud Computing In Libraries Libraries are shifting their services with the attachment of cloud and networking with the facilities to access these services anywhere and anytime. In the libraries, the following possible areas were identified where cloud computing services and applications may be applied. Building Digital Library/Repositories ISBN 1-63102-455-8 305 Cloud Computing In College Libraries In the present situation, every library needs a digital library to make their resources, information and services at an efficient level to ensure access via the network. Therefore, every library is having a digital library that developed by using any digital library software. In connection to cloud based digital library software, Duraspace is having two softwares namely Dspace and Fedora Commons but Dspace is widely used for building digital libraries/ repositories relative to Fedora Commons. Dura cloud provides complete solutions for developing digital libraries/ repositories with standard interfaces and open source codes for the both software. CONCLUSION Libraries have the opportunity to improve their services and relevance in today’s information society. Cloud computing is one avenue for this move into the future. It can bring several benefits for libraries and give them a different future. Cloud computing is the most important action in modern library. Digital era, libraries must soon be building and managing own data centers. Information Communication Technology (ICT), Infrastructures, digitization and cloud computing are only choice, new features, usage, purpose of cloud computing in college libraries, present status of user services in college libraries. REFERENCE [1] Miller, Michael, “Cloud Computing, Pearson, Noida,(2011) pp.01 [2] http://www.slideshare.net/Vasanthrz/can-cloud-computing-help-for-government-colleges-to-automate-theirlibraries-a-point-of-view [3] http://www.csjournals.com/IJITKM/PDF%205-2/30_Rajni_Bala.pdf [4] http://berkeleycollege.libguides.com/content.php?pid=478746&sid=3977499 [5] http://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=1006&context=aiken_gregg_graniteville_library_facpu b [6] http://www.ijodls.in/uploads/3/6/0/3/3603729/vol._2_july_-_sept._2012_part-2.pdf [7] http://www.alatechsource.org/techset-issue-11-cloud-computing-for-libraries-by-marshall-breeding [8] http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-winds-of-change-paper.pdf [9] http://www.ijidt.com/index.php/ijidt/article/viewFile/3.4.9/pdf [10] http://www.facetpublishing.co.uk/title.php?id=048477&category_code=#.VcxEncVmKf4 306 ISBN 1-63102-455-8 WEB BASED CUSTOMIZED INFORMATION SYSTEM: A MODEL CONCEPT Shyamanta Boro | Assistant Librarian | University of Science & Technology, Meghalaya | shyamantalis@gmail.com Abstract: The evolution of lead generation and the increasing demand of information by the information user create a growing need of specialized information. It is because of sustainable development of information or resource by the information builder as well as publisher, author. It being is motivated to the user to adopt high cost of information until and unless advent of new era of customized information disseminations through like online shopping. For the tremendous growth of information and over explosion of information its price has been increasing since for the for disseminating of information in different way either it may be Documents (Electronic + Print), Journal (Electronic + Print), and Consortia and due to the increasing price resources or packaging of information under different group (Consortia) it is very difficult to handling of particular information by single handled. Thus information users are motivating towards the customized information where each and every user can handle required information by minimum cost. In this article it explore the importance of overcoming the global information explosion with high cost (particularly among lower socioeconomic groups) to take up the targets to provide customized information service. We also look at some intervention options that may assist in improving the affordability of web based services among lower socioeconomic groups or individual Keywords: Online, Information, Shopping, Internet, Web Based INTRODUCTION Since the invention of Internet and WWW more people felt comfortable with the services of modern ICT for information shopping. It’s a global phenomenon to satisfy the each and every information seeker to getting things done in an appropriate manner of information rate. The globalization of Information Communication Technology creates visualization of information product in global World Wide Web. Special values and free shipping of customized information incentivized them to fulfill their need for basics and their reading habit apparel online. What will happen in the future as even more if information are found to be your desktop shift to online as a customized manner with paying less money for the required item or information. As because we are living in the 21st century, where it is depend on wheel. It is the age of technology and technology converge the society in to a global village of information and knowledge. Book sellers are still selling but not satisfactory to the user as well as reader community because you have to pay high for a volume. But due to the high race or professional competitions for achieving the academic goal creates information explosion and information repeating again and again. For that reason user or readers are suffering to find out right information and to solving that kind of problem there is a provision to introduce “Web Based Customized Information Service” where each and every user will get customized, content based electronic information retrieval to user door step or Desktop, Tablet, Smartphone via connecting internet by subscribing of particular information or content by paying minimum cost. If the online content information shopping trend will lead to many book stores as well as high rate public private companies of consortia, databases will have to minimize their business. Yes of course there is may be big problem for providing of customized information due to copyright and memorandum of understanding with the Author, Publishers. I could see that in the next five years some private companies will introduce “Web Based Customized Information Service” with understanding of Memorandum information builders and as well as publisher to put forwarded monetizing their business of information delivering to their clients. ISBN 1-63102-455-8 307 Web Based Customized Information System: A Model Concept OBJECTIVES OF THE STUDY Information technology has brought the key change in all field of life and the roles of technologies play in our lives are rapidly expanding. To look at light and shadows of this new dawn of social and moral implications deeply connected, analyzed and informed with global ICT. The activities of obtaining information resources relevant to information need from a collection of information resources. Searches of information can be based on metadata or on full texts which are used to reduce low income groups in affordable with a target group towards which interventions can be targeted. As we are getting paid for our productivities and relative to others with the socially expected level of information productivity in each and every user’s personal lives. It has significant consequences that the more efficient process of Internet marketing is one of the most effective ways to bring a business to exciting new levels of success i.e. Web Based Customized Information Service. To provide best quality service and to succeed in the online web based information service, there are some basic objectives of study are put forwarded    Reduce the high cost of information to minimum level To satisfy the user by providing customized item or information Global information retrieval & green revolution Importance of Web Based Customized Information Service: Cloud is emerging as a cost effective solution to provide customized information services in the computing world and the capacity of data storage on cloud gone up to a zettabyte from gigabyte. The need to store and retrieve written information became increasingly important over centuries especially with inventions like paper and the printing press. Soon after computers were invented, people realized that they could be used for storing and mechanically retrieving large amounts of information and the practice of archiving written information into a digitally readable can be traced back to around. For thousands of years people have realized the importance of archiving and finding information globally by one touch computer mouse. As it is known fact that the competition of money making business by the information builders as well as publisher makes information explosion and quality of publication is decreasing. Yes of course there are number of good quality journal publications having high impact factor. So for that quality based information each & every user or customer must spend maximum price. So here the concept of “Web Based Customized Information System” is introduced for each and every user or common people as like “Online Shopping” where each and every user can check and can read content information, summery of particular book, abstract of Journal etc. Here any one can browse and check whether that information is available or not? If not then he or she can ask & send request, so that administrator of that WBCIS will arranged that the required information to your desktop as well as tablets, smart phone. It is being targeted to global perspective that means “Reaching to not reachable”. Finding useful information from such collections became a necessity in the field of Information Retrieval. There are some importances of Web Based Customized Information Service       Repackaged information Green revolution and paper less society Saving money & Time It reaches to not reachable Pay Online & get information online via mail Information on pocket Customized Information Services: Cloud Computing are the virtual pool of computing resources that provides an online pool of resources for computing, where the computing is performed by efficient sharing of resources or disseminating of information to a particular Desktop, Laptop, Tablets, Smartphone via internet connectivity. Cloud relies on its resources for handling the application in the local and personal devices by developing Smartphone Google Apps of “Web Based Customized Information System” (WBCIS). There are some proposed customized information services which are as 308 Content based: Content-based information is part of information retrieval where content wise information and data are arranged automatically via content management software used. So to full fill the ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education customer needs in global information era the web based customized information system targets to provide content with chapter in a customized mode        Abstracting Information: An abstracting service is a service of summary of a particular topic or article that provides abstracts of publications, often on a subject or group of related subjects, usually on a subscription basis. It gives full view of the topic or details of the topic. Bibliographic information:User can read bibliographic details and contents as well as abstract those who are closed access otherwise open access are given links SMS Alert (Short Message Service): Short Message Service (SMS) is a text messaging service component of phone, Web, or mobile communication systems. It uses standardized communications to the user as well customer for getting update information of relevant topic or subject. Email Alert: The concept of information at home and for general help from the web administrator customer support service will communicate via email. More over each and every registered member will get email notification regarding updating of product & services RSS feed (Rich Site Summary): RSS feeds also benefit users who want to receive timely updates from web based customized information system or to aggregate data from many sites. It gives frequently updated information on Web Based Customized Information system (WBCIS). RSS feeds enable publishers to syndicate data automatically OPAC: As it is the Online Public Access Catalog gives databases that are available in a WBCIS Knowledge Bank and Bibliography details, Users can search in a web based a information catalog principally to locate information and data (Books, Journals, Audio, Video Etc) and other material available at a knowledge bank. Miscellaneous Services:By giving the name of miscellaneous services it includes different links of information resources through hyperlinks of various sources for making information more productive and accessible to each and every user or customer. Proposed Model of Web Based CIS: Advantages & Disadvantages of WBCIS: Advantages:  Multi user can subscribe beyond the boundary  Individual user’s are benefitted from that information system ISBN 1-63102-455-8 309 Web Based Customized Information System: A Model Concept      Information on your desktop and it saves time No need of physical space only need computer memory Instant messaging service / Remainder / Newsletter Ne need of shipping agent It creates green revolution Disadvantages of WBCIS  Online payment may occur problem  Mostly depend on technology  Information overload Special Nature of Web Based Customized Information System (WBCIS)      Communication: For making customized information service more popular over the World Wide Web it is necessary to communicate with users as well as customer of different information seeker. Communication must be done via Email. Short Message Service, feedback notification of current arrival. For making communication and interaction with users or customer there must always available on particular address so that each and every one can ask related information Organization: Proper administration for large team can create the successful nature of web based customized information service. Distribution of job among the human resources is the main tools to set up from many search engine optimization and online information marketing. Consultant of resources allows us to deliver exemplary services to a number of clients, without ever sacrificing individual quality. Accountability: It is a one of the major part of successful business on proposed model. Accountability is must in age of ICT where internet marketing and social media plays various roles to provide right information to the respective clients or user. It will be absolute transparency in web based customized marketing services. The complete understanding of every step of regularly and updated reports will be able to see and measure. Consistency: Every user or client regardless of web based customized information, will receive the same level online information marketing services. Integrity: Above all else, at online information marketing company need integrity. In the web based customized information marketing services strongly believe to work. It takes only clients or user so that we can help be successful and If we cannot help you meet your goals, if our online information marketing services are not right for you. CONCLUSION The tremendous technological convergences of ICT and WWW have forced the mankind to adopt the revolutionary changes of globalized information. Though libraries are growing with print or electronic as well as digital form and that are also important element but we can’t denied making online circulation services of content based, summery based, bibliographies to the end user as because of time bound for searching of that particular information and physical presence in the library. We people need readymade information of particular topic so that time of users will save (According to the fourth law of Library Science) the information that included under closed consortia or packaged information of different information builders as well as publisher. As is targeting to serve the individual user, common people, socially and economically low, private institutions, or distant people those who are beyond the institutional campus will be benefitted from that customized information services. Though it has various negative impacts on certain copyright declaration but there have lots more opportunities for providing better support or a completely outsourced solution. Knowledge Marketing provides an entire circulation solution that supports your needs and the appropriate solution will make societies more needful “Web Based Customized Information Services”. 310 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education I do hope that very soon memorandum of understanding with certain publisher or authors will make agree for providing that kind information circulation services. RECOMMENDATIONS For making successful “Web Based Customized Information Services” there are some Recommendations of marketers, publishers and media companies, being in control of your web content creation is essential.      Responsibility: We approach responsibility to our clients with the same passion as if it was our own business or as we do not believe in cutting corners, shortcuts, or unethical marketing practices. We believe in responsibility as an organization, within our local and global communities Integrity: We make recommendations, yet we also respect our clients’ knowledge and the fact they are the final decision makers. We approach our client relationships as partnerships and we do everything to make our partnerships successful. We believe in discretion and in protecting our clients’ information and data. Freedom to Innovate: Our teams have the creative freedom they need to design the most successful campaigns possible. We believe that a free culture helps encourage and facilitate personal and professional growth. We believe in open doors, providing help when you need it from any of our knowledgeable ninjas. Any task can be accomplished with the right minds. Fun: We believe that a fun work environment stimulates the mind and creates a positive attitude and good morale, and that these qualities are reflected in our work and in the relationships we build with clients Plagiarism: It is a major issue for disseminating of information through proposed “Web Based Customized Information System” because of copyright violation where it is very difficult to make understanding of authors or information builders as well publisher. The way technology are changing and ever increasing of information and the high cost information product and services I hope difficulties will arise for arranging such kind of services. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] S. Ajay, Pratap. And Y. Mayank , (2013). Information Communication and Society. New Delhi, Ess Ess Publications. B. Badan (2012). Library and Information Science: UGC Net Guide. Guwahati, DVS Publisher. A. Jagdish, C. A. S., S. Mukesh.,C . Prem., H. H.G., and C. Rajesh. (2010). Re-Engineering of Library and Information Services in Digital Era. 7th Convention PLANNER 2010, Tezpur. K. P.S.G. (2008). Fundamentals of Information Science. New Delhi, Indraprastha Books & Periodicals. S. Mukesh and E. Monawwer (2013). E- Resource Management in Libraries: Issues and Challenges. Guwahati, K K publications. Wikipedia https://en.wikipedia.org/wiki/Indexing_and_abstracting_service (20/07/2015). Wikipedia https://en.wikipedia.org/wiki/Content-based_image_retrieval (20/07/2015). F. Joaquim, S. Boris, H. Markus, and M, Leszek. (2008). Software and Data Technologies: Second International Conference. New Delhi, Springer Science & Business Media. K. Tom, S. Christine and U. Peter (2014). Library3.0: Intelligent Libraries and Apomediation. New York, Elsevier. (https://books.google.co.in/books?id=QvOiAgAAQBAJ&dq=Content+based+library+service&source=gbs_navlin ks_s ) 20/07/2015. S, Amit. (2001)Modern Information Retrieval: A Brief Overview. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. Anvil Media http://www.anvilmediainc.com/marketing-resources (22/07/2015). ISBN 1-63102-455-8 311 PKP AND ITS OPEN JOURNAL SYSTEM: AN INITIATIVE IN OPEN ACCESS SCHOLARLY ENVIRONMENT Satish Kumar | Information Scientist | ARIES | Nainital | sklisc@gmail.com Anil Kumar Mishra | Senior Technical Assistant ‘B’ | CVRDE | DRDO | Chennai | anilmlis@gmail.com Abstract: Commercial publishers are increasing the subscription prices of journals, the libraries attached to universities, colleges and R&D institutions are finding it very difficult to subscribe the core journals to cater to the knowledge requirements of their stakeholders. The Open Journal System helps us to publish and manage the entire publishing process of a journal; the Academic institutions can do this without any additional funding. This paper describes about an initiative; started by the Public Knowledge Project. Keywords: Commercial, Open Journal System Public Knowledge Project. INTRODUCTION When scholarly publishing was in trouble due to so many reasons such as high printing cost, limited circulations, scanty funding resources, time consuming peer review process, etc. the advent of electronic publishing technology came as a panacea and changed the face of scholarly publishing. Evolution of Open Source Softwares for Journal publishing and management has opened new doors to the academic and research community for production, storage and access to research literature in the networked digital environment. The introduction of open journal management systems like 'Open Journal System' (OJS) of the Public Knowledge Project (PKP), 'DPubs' of Cornell University, 'ePubTK' of Edgewall Software, GAPworks of German Research Foundation, 'Ambra' of PLOS, 'SOAPS' of SciX, 'Scholarly Exchange', etc. paved the way for scholarly publishing by academic and research community with zero budget 1. Now, we are fortunate by this environment which has given freedom to the scholarly community to more focus on their research rather than worrying about the fund problem for publishing their research. In these initiatives, a major system has been started by Public Knowledge Project (PKP) through its Open Journal System. WHAT IS PKP The Public Knowledge Project (PKP) is a non-profit research initiative that is centered on the importance of getting the results of publicly funded research freely available through open access policies, and on producing strategies for making it possible including software solutions. It is a partnership between the Faculty of Education at the University of British Columbia, the Canadian Centre for Studies in Publishing at Simon Fraser University, the University of Pittsburgh, Ontario Council of University Libraries, the California Digital Library and the School of Education at Stanford University. It tries to improve the scholarly and public character of academic research through the growth of innovative online environments 3. “PKP is a multi-university initiative developing (free) open source software and Conducting research to improve the quality and reach of scholarly publishing” HISTORY The PKP founded in 1998 by Dr. John Willinsky in the Department of Language and Literacy Education at the Faculty of Education at the University of British Columbia, in Vancouver, British Columbia, Canada, based on his research in teaching and publishing. Dr. Willinsky is a leading promoter of open access publishing, and has written extensively on the value of public inquiry. The PKP’s initial focus was on increasing access to scholarly research and output beyond the traditional academic environments. This soon led to a related interest in scholarly communication and publishing, and especially on ways to establish it more cost effective and less reliant on commercial enterprises and their generally restricted access models. PKP has developed free, open source software for the management, publishing, and indexing of journals, conferences, and monographs 4. 312 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education The PKP has collaborated with a broad scope of collaborators concerned in doing research publicly available, including the Scholarly Publishing and Academic Resources Coalition (SPARC), the Brazilian Institute for Information Science and Technology (IBICT), and the International Network for the Availability of Scientific Publications (INASP). Together with INASP, the PKP is working with publishers, librarians, and faculty members in the evolution of scholarly research portals in the developing world, including African Journals OnLine (AJOL) and Asia Journals Online. As of 2008, the PKP has joined the Synergies Canada initiative, contributing their technical expertise in integrating work being performed within a five-party consortium to make a decentralized national platform for social sciences and humanities research communication in Canada. Growth of PKP (2005 to 2009) The Public Knowledge Project grew between 2005 and 2009. In 2006, there were approximately 400 journals using Open Journal Systems (OJS), 50 conferences using Open Conference Systems (OCS), 4 organizations using the Harvester, and 350 members registered on the online support forum. In 2009, over 5000 journals were used OJS, more than 500 conferences were using OCS, at least 10 organizations are using the Harvester, and there were over 2400 members on the support forum. Since 2005, there were major releases (version 2) of three software modules (OJS, OCS, Harvester), as considerably as the addition of Lemon8-XML, with a rising number of downloads being recorded every month for all of the software. From June 12, 2009 to December 21, 2009, there were 28,451 downloads of OJS, 6,329 of OCS, 1,255 of the Harvester, and 1,096 of Lemon8-XML. A new module, Open Monograph Press (a publication management system for monographs) has also been started. The PKP also witnessed increased community programming contributions, including new plug-in and features, such as the subscription module, allowing OJS to support full open access, delayed open access, or full subscription-only approach. A growing number of translations have been contributed by community members, with Croatian, English, French, German, Italian, Japanese, Portuguese, Russian, Spanish, Turkish, and Vietnamese versions of OJS completed, and several others in production4. PKP Conferences:PKP holds a biannual conference. The First PKP Scholarly Publishing Conference was held in Vancouver, British Columbia, Canada on July 11–13, 2007 and the Second PKP Scholarly Publishing Conference was also arrested in Vancouver on July 8–10, 2009. The Third PKP Scholarly Publishing Conference was held in Berlin, Germany during 26-28 September 2011. The fourth PKP Scholarly Publishing Conference was held in Mexico City, Mexico in August 19-21, 2013. Notes on the presentations were recorded on a scholarly publishing blog for both the 2007 and 2009 conferences, and selected papers from the 2007 conference were published in a special issue of the online journal First Monday. Papers from the 2009 conference are available in the inaugural issue of the journal Scholarly and Research Communication5. PKP SOFTWARE The PKP's suite of software includes four separate, but interrelated applications to demonstrate the feasibility of open access: the Open Journal Systems, the Open Conference Systems, the PKP Open Archives Harvester, and Open Monograph Press. PKP briefly experimented with a fifth application, Lemon8-XML, but has since opted to integrate the XML functionality into the existing applications. All of the products are open source and freely available to anyone concerned in employing them. They share similar technical requirements (PHP, MySQL, Apache or Microsoft IIS 6, and a Linux, BSD, Solaris, Mac OS X, or Windows operating system) and necessitate only a minimum degree of technical expertise to fetch up and moving. In summation, the software is well supported with a free, online support forum and a producing body of publications and documentation is available on the project web site. Increasingly, institutions are combining the PKP software, using the OJS to publish their research results, OCS to organize their conferences and publish the transactions, and the OAI Harvester to organize and get the metadata from these publications searchable. Together with other open source software applications such ISBN 1-63102-455-8 313 PKP And Its Open Journal System: An Initiative In Open Access Scholarly Environment as DSpace (for creating institutional research repositories), institutions are creating their own infrastructure for sharing their research output6. OPEN JOURNAL SYSTEMS (OJS) Open Journal Systems (OJS) is open-source software for the management of peer-reviewed academic journals, produced by the Public Knowledge Project, published under the GNU General Public License. OJS are a journal management and publishing scheme that have been produced by the Public Knowledge Project (PKP) through its federally funded efforts to extend and improve access to research. The origins of OJS- The arrangement was first published in 2002 as a research and development initiative of the Public Knowledge Project at the University of British Columbia, with the support of the Social Sciences and Humanities Research Council of Canada, Max Bell Foundation, the Pacific Press Endowment, and the MacArthur Foundation. Its continuing development is presently managed by a partnership between UBC's Public Knowledge Project, the Canadian Center for Studies in Publishing and the Simon Fraser University Library9. OJS Features: OJS is installed locally and locally controlled.  Editors configure requirements, sections, review process, etc.  Online submission and management of all content.  Subscription module with delayed open access choices.  Comprehensive indexing of content region of planetary organization.  Understanding Tools for content, based on field and editors’ choice.  E-mail notification and commenting ability for readers.  Complete context-sensitive online Help documentation. OJS assists with every phase of the refereed publishing process, from submissions through to online publishing and indexing. Through its management systems, it has finely grained indexing of research, and the context it supplies for research, OJS seeks to better both the scholarly and public quality of refereed research. OJS is open source software made freely available to journals worldwide for the use of making open access publishing a viable selection for more journals, as open access can increase a journal’s readership as well as its contribution to the public good on a global scale. Design of OJS:OJS was designed to ease the growth of open admission, peer-reviewed publication, providing the technical infrastructure not only for the online presentation of journal articles, but also an entire editorial management workflow, including article submission, multiple cycles of peer-review, and indexing. OJS relies upon individuals fulfilling different roles, such as the Journal manager, editor, reviewer, author, reader, etc. It has a module that supports subscription journals. The software holds’plug-in' architecture, similar to other community-established projects, such as WordPress, allowing new features to be easily integrated without the demand to convert the entire core code base. Some of the plugins contributed to OJS include tools to facilitate indexing in Google Scholar and PubMed Central, a feed plugin providing RSS/Atom web syndication feeds, a COUNTER plugin, allowing COUNTER statistics and reporting, and more. Open Journal Systems is also LOCKSS-compliant, helping to ensure permanent archiving for ongoing access to the content of the diary. To improve reader's engagement, PKP has developed a series of Reading Tools, which provide admission to related works, media accounts, government policies, etc. in open access databases. This journal utilizes the Open Journals Systems software for management and publication documentation. OJS is an open source solution to managing and publishing scholarly journals online. OJS is a highly flexible editoperated journal management and publishing system that can be downloaded for free and installed on a local 314 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Web server. It has been designed to reduce the time and energy devoted to the clerical and managerial tasks associated with editing a journal, while improving the recordkeeping and efficiency of editorial processes. It tries to improve the scholarly and public quality of journal publishing through a number of inventions, from making journal policies more transparent to improving indexing 6. OJS SYSTEM BACKGROUND OJS is a journal and website management and publishing system. OJS covers all facets of online journal publishing, from setting up a journal website to operational tasks such as the author's submission process, peer critique, editing, publication, archiving, and indexing of the diary. OJS also help to manage the people aspects of organizing a journal, including keeping track of the work of editors, reviewers, and authors, notifying readers, and assisting with the correspondence. OJS is flexible and scalable. A single installation of OJS can support the performance of many diaries. Each diary has its own unique URL as well as its own expression and feel. OJS can enable a single editor to oversee all facets of a journal and the journal's website, or OJS will support an international squad of editors with diverse responsibilities for a journal's multiple sections. OJS supports the principle of widening access. This system is not intended only to assist with journal publishing, but to demonstrate how the costs of journal publishing can be reduced to the point where providing readers with "open access" to the contents of the journal may be a viable option. The case for open access is spelled out over a wide series of articles stemming from this project, which are freely available under Publications at the University of British Columbia Public Knowledge Project website. OJS MANAGEMENT STRUCTURE Editorial Process OJS moves submissions to the journal through five steps in the editorial process, which can be handled by one or more of the editors.     Unassigned Queue: Items begin here and are delegated to one or more editors. Submit Review: Items undergo peer review and editorial decision. Submission Editing: Items undergo copy editing, layout, and proofing. The submission is assigned to an issue for publication. Table of Contents: Items are ordered for publication and are published. 7.2 Editorial Roles (Assigned in Academic Journal Management)       Journal Manager: Sets up the journal and staffs editorial roles (can also serve as an Editor and other roles). Editor: Oversees editorial process; can assign submissions to Section. Editors to see through the Submission Review and Submission Editing; Undertakes scheduling of content and publishing of journal. Section Editor: Oversees Submission Review and possibly Submission, Editing for assigned submissions. Copyeditor: Works with submissions to improve grammar and clarity, poses questions to author on possible errors, and ensures strict adherence to journal's bibliographic and textual style. Layout Editor: Transforms copyedited submissions into galleys in HTML, PDF, and/or PS files in the proper format for electronic publishing. Proofreader: Reads galleys for typographic and formatting errors. ISBN 1-63102-455-8 315 PKP And Its Open Journal System: An Initiative In Open Access Scholarly Environment Figure.1 Support:A support forum and bug reporting system for technical issues can be accessed via the PKP web site. Users who have questions about interacting with a particular journal site using OJS or that journal's policies are encouraged to contact the journal's principal or support, listed on the PKP web site10. CONCLUSION When the commercial publishers are increasing the subscription prices of journals, the libraries attached to universities, colleges and R&D institutions are finding it very difficult to subscribe the core journals to cater to the knowledge requirements of their stakeholders. Though some e-journal consortia are in operation in India, still access to scholarly knowledge has so many issues. In this context, it is suggested that at least one electronic journal may be published by each university in India without duplication in subjects so that a least about 400 electronic journals can be published at this country. Since the Open Journal System helps us to publish and manage the entire publishing process of a journal, the Academic institutions can do this without any additional funding. The UGC, ICAR, MCI, AICTE and other higher education, regulatory bodies in India should come forward to take up this task and insist all academic and research institutes to bring open access journals so that the knowledge generated by the publicly funded organizations can be made available in the public web which 316 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education will bring visibility to the research findings . Further, open access journals may also bring good citations to the research papers since it is available in the public web. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] Rathinasabapathy, G., Rajendran, L., & Arumugam, J. (2012). Electronic Journal Publishing and Open Journal Systems: An Overview. International Conference on Eletronic Publications, 1-2 March 2012, pp.198-203. Willinsky, J. (2006). The Access Principle: The Case for Open Access to Research and Scholarship. Public Knowledge Project available at http://pkp.sfu.ca. (Accessed on 25/05/2015). Wikipedia. http://en.wikipedia.org/wiki/Public_Knowledge_Project (Accessed on 25/05/2015). Muthayan, S. (2003). Open Access Research and the public domain in South African Universities: The Public Knowledge Project's Open Journal Systems. Paper presented at the International Symposium on Open Access and the Public Domain in Digital Data and information for Science, UNESCO, Paris. Willinsky, J. (2005). Open Journal Systems: An Example Of Open Source Software for Journal Management and Publishing. Library Hi-Tech, 23(4), 504-519p. Rathinasabapathy, G. (2011). Public Knowledge Project (PKP) and its role in Open Access Initiatives. Asian Journal of Library and Information Science, 3(1-2), 43-50p. German Academic Publishing (Accessed on 25/05/2015). Fonseca, RMS. (2004). Open Journal Systems. Paper presented at ICCC 8th International Conference on Electronic Publishing, Brasilia. Current Science. http://www.currentscience.ac.in/csojs/index.php/index/help/view/intro/topic/000000 (Accessed on 25/05/2015). ISBN 1-63102-455-8 317 SURFACING A NEW PLATFORM IN MLIS: A PATHWAY OF GEN-NEXT LIBRARY SYSTEM Dr. Dharmendra Harit | Librarian | NIEC | Delhi | dkharit10@gmail.com Mr. Nasim Ali | Lecture | GIMT | Noida Mrs. Lalita Rani | Asst. Librarian | IPS | Meerut | lalita.rani@gmail.com Abstract: Marketing management has been expansively implemented in manufacturing & service industry for over a decade. Now a day’s marketing as an apparatus is becoming prolific for every library & service to accomplish required goals and objectives. As we all know marketing isused to create users, to gratify the users and to retain the user. It is the“science of strategy” and its main objective is to make user satisfied, so it is obligatory forthe librarians to act passionately on marketing applications. This can be done in LIS (Library & Information Services) by using service marketing. Marketing of services in LIS can be done through online as well as offline platform in different institutions & organizations. Telecommunications, Information Technologies and Database Technologies have been acting as key elements in service marketing. Marketing of LIS plays an essential role in today’s era because of users need & demand which can be fulfilled either by online services or reprographic services. To enhance the marketing services in LIS at different Institutions and organizations, it is important to have services onsubscription basis & priced publication basis. In this paper we are trying to find out the practical solutions provided on how to employ themarketing strategy in LIS to provide a quality based services in different libraries across thenation. It helps to establish a positive image for the library in the community, and determine the best way to provide a quality services to users. It also shows the relationship between promotinglibrary services and raising the silhouette of the library. Keywords: Service marketing, MLIS, Library Environment. INTRODUCTION Marketing is an incorporated progression through which organizations create values for customers and build strong customer relationship in order to capture value from customer in return. Thus the quintessence of marketing involves finding out what the users want, then setting out to meet those needs & wants. The role of the librarians is to help in assessing the user’s needs and then trying to accomplish them. In order to do this effectively librarians need to squeeze the total marketing function involving service planning and promotion. MLIS (marketing of library and information services) is the way of planning, organizing, promoting and distributing library products & services to create smooth connections that satisfy the library and the users. MLIS is the process which determines the decisions and actions involved in meeting the needs of the customers. MLIS requires watchful planning and begins with understanding the mission of the library.    OBJECTIVE OF THE STUDY To take an outline of Marketing of Library and Information Services(MLIS) To study the stumbling block of MLIS Suggesting practical solution to implement marketing strategy in LIS RESEARCH METHODOLOGY This is an empirical paper in which the data is collected from secondary sources such as Journals, Magazines, Newspapers, Case studies, Hypertext etc. 318 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Marketing as a driver In the last few years, the products and services provided by librarians have changed considerably. The challenges to library services from changes in educational approaches, the impact of technology, new methods for information provision and declining budgets have meant that marketing is now so basic that it cannot be considered a separate function. It is the whole business seen from its final results that is from the customers’ perspective. In determining new approaches, many librarians have come to appreciate the Contribution of an application of marketing concepts, tools & techniques. Any library using marketing plan, the 4 P’s have become central to libraries. Any library using marketing techniques to develop its operations focuses on its products or services, the price paid which may be in terms of money, time or energy. Service marketing in particular reflecting the mutual interests of libraries and the customers they serve is being seen as a concept of libraries to embrace. In developing and maintaining a healthy relationship, it is essential that all the users are identified and their needs understood. Product marketing versus service marketing Many Organizations/Institutions know how to market products, but it is trickier to market services. Here are some points which are necessary to understand about the differences between products and service marketing. a) When any organization or institution is marketing a service, they are really marketing relationship and value. This relationship and value needs to be marketed differently than if they are marketing actual products. b) When a buyer purchases a service, the buyer is purchasing something that is intangible. c) Consumer’s concept of a service if often times based on just the reputation of only one single person. Instead of building a reputation based on the quality of a number of different products, a service is built on how well a particular person delivers on a service, such as how well a stock advisor does with your stock portfolio. d) It is pretty easy to compare the quality of different products. However, it is much more difficult to compare the quality of similar services that are provided. How to market services Generally speaking marketing a product requires what are known as the 4 P’s – product, price, place and promotion. Marketing a service adds three more P’s to the traditional 4 P’s – people, physical evidence and process. Service marketing also includes marketing what is known as the service escape, which is the aesthetics of your work place: the Outside of your work building, the inside of you work building, and the way that the users look. Call for MLIS In a good library major share of the stock/facilities are kept unutilized within an organization/institution. Side by side the views facility and the modern technology for an effective library services needs capital investments and year to year recurring expenditure as well as capital expenditure in library. This in turns demands an effective utilization of resources within and marketing its surplus facilities to the prospective users/buyers to compensate the expenditure/earning. As such marketing of library services is an elite type of marketing and needs to be handled sophisticated. Why there is a need for MLIS? Users eminence based requirements Dearth of necessary resources such as Infrastructure, Volumes of Text Books, Foreign publications, Journals, Case Studies, Research Papers etc. Maintaining relevant study materials Visibility Rising anticipation of the users in terms of quality at reasonable prices Advantageous to library picture Is publicity of information diverse? There are different types of library services such as public libraries, academic libraries, workplace information centre, advisory services, business consultancy services etc. MLIS based products and services refers to sources of Information and knowledge contents that are available in reprographic forms or in electronic forms such as ISBN 1-63102-455-8 319 Surfacing A New Platform In Mlis: A Pathway Of Gen-Next Library System CD’s, e-journals, audio digital products, online publishing which is available through Internet and other private network providers. Stumbling Block to MLIS Librarians from various Management & Technical Institutions do not know how to market the products of their library in a smooth way, since they don’t know how to do it well through the use of MLIS. The following are the points which create hurdle in promoting library and information service products. a) Paucity of training and education: Many librarians do not promote library services well due to the lack of training and knowledge of marketing tools and techniques. The librarians should know how to deal with the marketing tools and techniques only then they can handle the situation. b) Complexity: Marketing of services is a thorny problem for librarians because of their extensive range of products and services from text books to Internet access. It becomes also very complicated because of an enormous diverse audience that ranges from children to seniors, public officials to business tycoons, students to faculty and many more. c) Scarcity of funds: Scarcity of funds is often used as a rationale not to market the library services. However, marketing library services is not merely a matter of spending finances, promoting and advertising. It is a subject of improving the customer’s experience of library services. MILS & Marketing Mix Figure1: Marketing Chakra for library and information service The marketing mix is a muddle of 7 P’s – product, place, price, promotion, process, people & physical evidence. The enlargement of an effective marketing strategy requires the specification of marketing mix. MLIS requires a decisive analysis of the marketing mix to identify the nature, features, benefits and value of the products to the users. Good library marketing will also yield by probing products offered and assessing the value of the products to the users. The above figure depicts a marketing chakra for Library and Information Service wherein the information should be made available to the library and then a concrete & quality based service is provided by the library personnel. The above information can be utilized by various Engineering & Management Institutions, Government Officials, Research and Development officials etc. 320 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education 7 P’s in Marketing Mix 7 P’s Product Price Place Promotion People Process Physical Evidence Description The product or services in library is of course the information, reference and ancillary services that add value such as referral services, online data base searches, document delivery and inter library loan or subscription. The pricing in library services involves such as journals, foreign publications, and research papers etc. which are very costly in terms of price and not affordable for many users. Pricing should in accordance with the quality of the material. Patent search should be also of high cost. Infrastructure or the place of service is essential in order to identify users and their discrete information needs and wants. This location has an effect upon how the library can best access their product offerings. For expansion of the service space, library must have branches, reprographic services, online services or electronic access, fax etc. Promotion includes: publicity, personal representative, public relations, advertising and sales promotion. On the basis of this promotion includes utilizing information about general information services, and communicating this information to the potential users. All the users such as children to seniors, public officials to business people, students to faculty and so on who plays a vital role in reference and information service delivery, namely the library’s personnel The mechanisms, procedures and flow of activities by which the reference and information services are acquired. The environment in which the reference and information services are delivered that facilitates the performance and communication of the service. SWOT Analysis STRENGTH Facility are available and we can think only it is surplus for the physical stock. Reprographic/ejournal/searching/case studies/foreign publication and expert guidance OPPORTUNITY There is a huge opportunity of MLIS inside the geographical boundaries as well as outside the geographical boundaries through the use of Internet facility. WEAKNESS The market of MLIS is unexploded. There is risk in marketing of Library and Information service. Cost of implementation and availability of experts in library service and managing information technology is also very high such as patent search. THREAT There is a little bit threat in MLIS because IIM’s, IIT’s, XLRI & Nirma are already marketing their library services. SOLUTION TO STUMBLING BLOCK Problems in marketing of services are more critical than marketing of products because of its characteristics such as intangibility, heterogeneity, perishability and inseparability. The problem of service in MLIS can be sort out by creating awareness about LIS in various institutions: MLIS will benefit the Institutes or organizations that do not have an adequate or moderate library resource for their Institutions. By providing quality based training to the external librarians and make them aware about the library operations and about the handling of sophisticated information system. CONCLUSION As librarians we should be actively marketing and promoting our library services in Institutions. The basic aim ISBN 1-63102-455-8 321 Surfacing A New Platform In Mlis: A Pathway Of Gen-Next Library System of marketing is to know and understand the user’s needs and demands in order that the library is able to gratify in an effective way. Libraries will be utilizing the web to provide services to an increasingly classy and demanding computer user by providing admittance to the world’s wide information that users and institutions need in a timely, expedient and evenhanded manner. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] 322 “Library Services for the Disadvantaged” by H.Guruswamy Naidu, an ess ess Publication, New Delhi, India. “Management of libraries in 21 st century” by M.Bavakutty, M. Parmeswaran, an ess ess Publication, New Delhi, India. “Marketing and Promotion of Library Services” by Julie Nicholas, Institute of Astronomy, University of Cambridge, Cambridge, UK. “Marketing Management” by Philip Kotler, Kevinlane, Keller & Mithileshwar Jha, 12 th Edition, Pearsons Prentice Hall. “Marketing Management” by Czinkota, Michael R, Thomson South and western, 2007 edition. “Services Marketing-Integrating customer focus acro ss the firm” by Valarie A Zeithaml, Mary Jo Bitner, Ajay Pandit, 4th Edition 2008, The McGraw-Hill Companies. “Service Sector Management-an Indian Perspective” by C.Bhattacharjee. (2nd Edition). “Service Marketing” by Srinivasan .R, Prentice Hall of India, New Delhi, 2007 edition. “Unlocking the library: Marketing library services” a case study approach by Janine Schmidt, University Librarian, Australia. ISBN 1-63102-455-8 MODELS OF INFORMATION SEEKING BEHAVIOR Sarita Mohan | Research Scholar | Mewar University | Rajasthan | narendramohan2210@gmail.com Dr. C. K. Sharma | Research Supervisor | Mewar University | Rajasthan | drcksharma05@yahoo.com Abstract: The aim of this paper is to review the status of models of information behavior to discover how they may relate one to another and, perhaps, propose an integration of the models into a more general framework. To this end, this paper offers a view of the existing research as a set of 'nested' models bound together by a dependency upon one another and by an increasing concern, as we move to deeper levels, with finer and finer details of human information seeking and searching behavior. By information behavior is meant those activities a person may engage in when identifying their own needs for information, searching for such information in any way, and using or transferring that information. Keywords: Model of Information Seeking Behaviors, Wilson Model, Ervin Model, Ellis Model INTRODUCTION Research in information behavior has occupied information scientists, since before the term information science was coined. We can take its origins back to the Royal Society Scientific Information Conference of 1948, when a number of papers on the information behavior of scientists and technologists were presented. Of course, the term information behavior was not used in the papers, which were generally about document and library use, but the origins are clearly there. This was seven years before Hanson (of Aslib) coined the term information science and nine years before the establishment of the Institute of Information Scientists in the U.K. the first professional society devoted to the field. Over the intervening period since the Royal Society conference literally thousands of papers and research reports have been produced on user needs, information needs, and information-seeking behavior (see, for example:. Throughout the period the one constant complaint of commentators has been that researchers have not built upon prior research in such a way as to cumulate a body of theory and empirical findings that may serve as a starting point for further research. MOEL OF INFORMATION SEEKING A number of reasons can be advanced for this situation: first, in the positivist tradition, quantitative research methods were adopted that were inappropriate to the study of human behavior. Many things were counted, from the number of visits to libraries, to the number of personal subscriptions to journals and the number of items cited in papers. Very little of this counting revealed insights of value for the development of theory or, indeed, of practice. Secondly, researchers in the field of information science seem generally to have ignored allied work in related areas that might offer more robust theoretical models of human behavior (see Wilson for a review of such research). Thirdly, general models of information behavior have only begun to emerge, and attract much attention, in the past ten to fifteen years. “Information-seeking is a special case of problem solving. It includes recognizing and interpreting the information problem, establishing a plan of search, conducting the search, evaluating the results, and if necessary, iterating through the process again.” Wilson Model, 1981: Wilson's second model of 1981 is based upon two main propositions: first, that information need is not a primary need, but a secondary need that arises out of needs of a more basic kind; and second, that in the effort to discover information to satisfy a need, the enquirer is likely to meet with barriers of different kinds. Drawing upon definitions in psychology Wilson proposes that the basic needs can be defined as physiological, cognitive or affective. He goes on to note that the context of any one of these needs may be the person him- or herself, or the role demands of the person's work or life, or the environments (political, economic, technological, etc.) within which that life or work takes place. He then suggests that the barriers that impede the search for information will arise out of the same set of contexts. ISBN 1-63102-455-8 323 Models of Information Seeking Behavior This model is shown in a simplified version (which also shows the search behaviors defined by Ellisin Figure 1 , below. Wilson's model is clearly what may be described as a macro-model or a model of the gross informationseeking behavior and it suggests how information needs arise and what may prevent (and, by implication, aid) the actual search for information. It also embodies, implicitly, a set of hypotheses about information behavior that are testable: for example, the proposition that information needs in different work roles will be different, or that personal traits may inhibit or assist information seeking. Thus, the model can be regarded as a source of hypotheses, which is a general function of models of this kind. Figure 1: Wilson's information-seeking behavior model Dervin Model 1983, 1996: Dervin's sense-making theory has developed over a number of years, and cannot be seen simply as a model of information-seeking behavior: it is, rather, as she say '…a set of assumptions, a theoretic perspective, a methodological approach, a set of research methods, and a practice.' designed to cope with information perceived as, '…a human tool designed for making sense of a reality assumed to be both chaotic and orderly.' However, it may be preferable to use the bridge metaphor more directly and present the model as figure 2 below: Figure 2 : Dervin's 'sense-making' model re-drawn 324 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education The strength of Dervin's model lies partly in its methodological consequences, since, in relation to information behavior, it can lead to a way of questioning that can reveal the nature of a problematic situation, the extent to which information serves to bridge the gap of uncertainty, confusion, or whatever, and the nature of the outcomes from the use of information. Applied consistently in 'micro-moment, time-line interviews' such questioning leads to genuine insights that can influence information service design and delivery. Ellis, 1989 Cox & Hall, 1993 Model: Ellis notes that, '...the detailed interrelation or interaction of the features in any individual information seeking pattern will depend on the unique circumstances of the information seeking activities of the person concerned at that particular point in time' .However, it is clear that Starting must initiate a process and that Ending must end it. It also seems reasonable to suggest that Verifying is a penultimate stage in a process and that Extracting must follow on from specific search behavior such as Browsing. Indeed, drawing attention to this fact, leads to the conclusion that Extracting is not information behavior of the same kind as Browsing, or Chaining or Monitoring. It further suggests that Differentiating is also a different kind of behavior: browsing, chaining and monitoring are search procedures, whereas differentiating is a filtering process and extracting may be seen as an action performed on the information sources. If these points are accepted, it is then possible to suggest a diagrammatic presentation of the model, as in Figure 3: Figure 3: A process model based on Ellis's 'characteristics' Thus, the models of Wilson and of Ellis are intended to function at different levels of the overall process of information seeking and this fact is demonstrated by the ability to nest one within the other. CONCLUSION Ellis's work suggests that an IR system ought to provide more navigational routes for the user, providing not only Boolean or best-match search strategies, but also the capacity to chain through citations in texts both backwards and forwards in time, and with intelligent agents to monitor additions to the database according to, say, the user's last search or an established profile. Similarly, given that virtually all studies of information-seeking behavior show the importance of personal networks, IR systems could well embody routines that would enable users to indicate their willingness to be put in contact with others interested in the same research areas. By doing so, IR systems could become genuine tools for collaborative work, not only within but across disciplines: the potential for this has been made real by the development of the Internet and by modern software tools that allow the 'desk-top' to act as the interface to the Internet and World Wide Web. It also defined the notion of information need and summarized research on inferring the user's information need from records of their queries, and presented the major query intent taxonomies that are in common use today. These taxonomies are not comprehensive; they do not, for example, distinguish between ad hoc queries (spur of the moment, or one-time) and standing queries (an information need that a user is continually interested in), but they are referred to heavily in the literature and have helped shape thinking about query intent. REFERENCES [1] [2] [3] 325 Aguilar, Francis J. 1967. Scanning the Business Environment. New York, NY: Macmillan Co. Aguilar, Francis J. 1988. General Managers in Action. New York, NY: Oxford University Press. Chang, Shan-Ju and Ronald E. Rice. 1993. Browsing: A Multidimensional Framework. In Annual Review of Information Science and Technology, ed. Martha E. Williams. Medford, NJ: Learned Information. ISBN 1-63102-455-8 Models of Information Seeking Behavior [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] 326 Choo, Chun Wei. 1998. Information Management for the Intelligent Organization: The Art of Scanning the Environment. Second ed. Medford, NJ: Information Today, Inc. Daft, Richard L. and Karl E. Weick. 1984. toward a Model of Organizations as Interpretation Systems. Academy of Management Review 9, no. 2: 284-295. Ellis, David and Merete Haugan. 1997. Modeling the Information Seeking Patterns of Engineers and Research Scientists in an Industrial Environment. Journal of Documentation 53, no. 4: 384-403. Ellis, David, D. Cox, and K. Hall. 1993. A Comparison of the Information Seeking Patterns of Researchers in the Physical and Social Sciences. Journal of Documentation 49, no. 4: 356-369. Ellis, David. 1989. A Behavioural Model for Information Retrieval System Design. Journal of Information Science 15, no. 4/5: 237-247. Etzioni, Amitai. 1967. Mixed-Scanning: A "Third" Approach to Decision-Making. Public Administration Review 27, no. 5:385-392. Kuhlthau, C.C., inside the search process: information seeking from the user's perspective. Journal of the American Society for Information Science, 1991. 42: 361-371. Kwasnik, B.H., The importance of factors that are not document attributes in the organisation of personal documents. Journal of Documentation, 1991. 47: p. 389-398. Pirolli, Peter and Stuart Card. 1995. Information Foraging in Information Access Environments. In Proceedings of Conference on Human Factors in Computer Systems, CHI-95 held in Denver, Colorado, USA, p. 51-58. ACM Press. Paisley, W.J.I., Information needs and uses. Annual Review of Information Science and Technology, 1968. 3: 130. Report and proceedings. In Royal Society Conference on Scientific Information. 1948. London: Royal Society, 1948 Sandstrom, Pamela Effrein. 1994. An Optimal Foraging Approach to Information Seeking and Use. Library Quarterly 64, no. 4: 414-449. Weick, Karl E. and Richard L. Daft. 1983. The Effectiveness of Interpretation Systems. In Organizational Effectiveness: A Comparison of Multiple Models, ed. Kim S. Cameron and David A. Whetten, 71-93. New York, NY: Academic Press. ISBN 1-63102-455-8 ELEMENTS OF COLLECTION DEVELOPMENT: A PERSPECTIVE Madhuri Gangal | PhD, Research Scholar | Mewar University | Rajasthan | madhurigarg.09@gmail.com Dr. S. P. Singh | Research Supervisor | Mewar University | Rajasthan | dr.satyaprakash31@yahoo.com Abstract: The term "collection development" refers to the process of systematically building library collections to serve study, teaching, research, recreational, and other needs of library users. The process includes selection and de selection of current and retrospective materials, the planning of strategies for continuing acquisition, and evaluation of collections to determine how well they serve user needs. Overall, collection development encompasses many library operations ranging from the selection of individual titles for purchase to the withdrawal of expendable materials. Keywords: Collection development, Elements of collection development, Budget. INTRODUCTION Collection development includes everything that goes into acquiring materials, including selection, ordering, and payment. It is a chain of events that includes planning, administration, and control. Collection development serves as a foundation upon which other library services are built. A collection development policy establishes ground rules for planning, budgeting, selecting, and acquiring library materials. These documents provide a framework for coordinated collection development program me throughout the university libraries. In addition, these policies help the library serve the academic community. They assist bibliographers in making not only routine selections, but also approval plan profiles and gift acceptance decisions. With common terminology and collecting standards, bibliographers can work with greater consistency towards defined goals. ELEMENTS OF COLLECTION DEVELOPMENT In order to develop, maintain and improve upon a school library media collection, the LIBRARY MANAGEMENT COMMITTEE must be aware of the importance of the six elements of collection development and how to implement each portion. These elements of collection development are:       Community analysis, Policies, Selection, Acquisition, Weeding, And Evaluation. The Library management committee is responsible for providing the community with an unbiased, objective collection that is stimulating, learning oriented, and age appropriate. The LIBRARY MANAGEMENT COMMITTEE must support the needs of the community as well as the direct needs of the students and staff. COMMUNITY ANALYSIS Library management committee should always be aware of the state of the community. Staying abreast of current political and social issues within the community will assist the LIBRARY MANAGEMENT COMMITTEE when addressing the changing dynamics of the population as well as adapting the collection accordingly. Understanding the location, income level and diversity will allow the LIBRARY MANAGEMENT COMMITTEE to focus on collection areas that may be weak or need to be weeded. Community analysis also allows the LIBRARY MANAGEMENT COMMITTEE to connect with the students on a more personal level as ISBN 1-63102-455-8 327 Elements of Collection Development: A Perspective well as show the parents in the community the dedication and commitment on the part of the Specialist. Community analysis is an on-going process. POLICY IMPLEMENTATION, EVALUATION, AND REVISION These policies will support and justify the development of the collection and must be approved legally through the Board. In addition to establishing a connection with the community, establishing a policy for selection, acquisition and evaluation is also necessary. The committee must develop policies that include what sources are appropriate for selection, when and how much to weed, the “official stance” on intellectual freedom, censorship, copyright issues, and Internet use. These policies should be reevaluated yearly to maintain the accuracy and dependability of the collection. At the same time, these policies must remain accessible to the community and administration for perusal and if necessary, adjustment.  State specifically who will review and update the policy and when it is to be done.  The last item on the policy should be the official record of implementation. SELECTION The selection process in collection development will be supported by the Library Management Committee policies, but the procedures must also be created and adhered to. The Library Management Committee is responsible for developing, maintaining, and improving upon the collection for the benefit of the learning community. It is necessary to be objective and provide materials that reinforce Intellectual Freedom. Selection is not always a “one woman” job. By developing positive relationships with the staff, students and community, the Library Management Committee will be able to benefit from the expertise of teachers, the needs of the curriculum and the wants of the students. The selection process includes from where the items will be selected, what is the criteria for selection, how the items will conform to intellectual freedom, the objectives of the school and school library, and the reevaluation of materials. ACQUISITION After selecting age appropriate, positively reviewed items for a collection, must acquire these items into the collection. This step in the process is limited by budget restraints and possibly state or county level policies. In some cases, bulk book orders may be placed through a specific book jobber who processes the materials, saving time and money. In some counties, these orders are requested to be compiled by a certain point in the school year, ideally in time for the students of the current year to use the materials. Again, based upon budget, funds from fundraising and small accounts, materials can be purchased throughout the year directly from acquisition sources such as individual catalogs, Amazon, and Barnes & Noble. If possible, when teachers make requests, sometimes it is possible to purchase these items immediately to reinforce the efficiency and commitment of the library. It is also important, if not available through the county, to purchase supplies for processing books within the media center. In many cases, however, the county will have a consistent, standardized manner in which to process books and link to the circulation system. Collection Development In Relation To Selection And Acquistion: Ifidon (1996) opines that a focused, positive, and consistent collection development strategy is a necessity for any meaningful library development. Librarians engaged in selection must answer the following questions:  Who are the library's patrons?  Is the library to serve only those who actually come to it today or should the librarian attempt to provide for all those who may come some day?  The librarian must also ensure that no race, nationality, profession, trade, religion, school of thought, or local customer is overlooked during selection. The collection is built according to the policy, and patrons’ demands must also be considered. Materials should meet high standards of quality in content, expression, and format. On the other hand, the selector should not hesitate to acquire a mediocre book that will be read in preference to a superior book that will not be read. The quality of materials must be related to the other two basic standards of selection , which are purpose and need. The library performs a variety of roles, which in turn demands a variety of materials. 328 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education WEEDING Collection development also includes the “deconstruction” of the media. That is, it is necessary to remove items from the collection that are no longer needed, up to date, worn out, smelly or just not used. Due to limited time, space and budget, weeding could be a process to follow throughout the year but better yet, after inventory. Keeping track of circulation and curriculum needs, it is possible to remove items that are no longer used or needed. At the same time, items will not circulate if they are not appealing in look and smell. In general, a collection can be weeded of 5% of the total collection. This may not seem like much when faced with an outdated collection, but the shelves cannot be bare. An individual who is aware of the use and circulation of the items as well as the needs of the students/staff should complete weeding. The public and staff do not need to be made aware of the weeding process, necessarily. The committee should, however, maintain a weeding policy including criteria and procedures. This policy may state that the circulates collection areas and focuses on one section at a time. In some scenarios, however, spot-checking areas will keep the collection looking new and appealing. EVALUATION Evaluating the items in the media center is important to maintaining a collection that will be inviting and useful. The learning community must have confidence in the collection and depend upon it. If the selection process is not developed with the assistance of the staff and students, there is a risk that the items may not be as appropriate or valuable as the LIBRARY MANAGEMENT COMMITTEE intends. Establishing an evaluation process once the items are introduced into the collection is an important step in maintaining an effective collection. The process may include requesting the staff and students to fill out evaluation forms. In all likely hoods, monitoring the circulation and being aware of the interest in the items will provide the most feedback.       Mission statement: This may include the mission of the parent organization as well as that of the library. A vision statement may also be included along with long- and short-term goals and any relevant objectives related to information resources. Audiences and purposes of the policy: The purpose should discuss library management, planning, accountability, and consistency. To who is the policy addressed? Staff? Board? Users? Community officials and politicians? Administration? All of these? Be specific about the primary audience as well as identifying other possible readers of the policy. Community and user groups defined: What are the characteristics of the library's user community? What are the educational levels? Use demographic and other factual and statistical information to define the library's community or institution. Which groups do or do not use the library? For what purposes do they use the library? What are their occupations or disciplines of interest? Description of the types of programs or patron's needs: What educational, recreational, social, or research needs must be met by the library? Are there programs or distinct requirements for special needs populations? Brief general description of the collections and information resources: In general, provide a description of the collections: their size, primary formats, languages, and reading or information level. At what rate are they growing or are they being maintained at a stable size? Cooperative or collaborative collection development issues: Make a statement with regard to other libraries and access to remotely held information resources in electronic, print, or other formats. Do interlibrary loans, Internet access, or patron direct accesses to other collections have an effect upon the collection management of the library? If the library participates in specific collaborative activities, interlibrary loan services or other consortia arrangements, these should be addressed here. If the library committee is aware of and implements the six elements of collection development, the learning community will be assured of the dependability and quality of the media center materials. By providing the community with accessible and effective materials, will also be able to promote reading and information literacy due to the established positive relationships within the community and administration. Collection development, although only one role of the committee, is quite possibly the anchor to developing a worthwhile media program. ISBN 1-63102-455-8 329 Elements of Collection Development: A Perspective BUDGETING AND COLLECTION DEVELOPMENT For a budget to be successful, it must be directive. It must be based on a plan so that there is value for the money spent. Money available for collection development is always very limited. The collection development policy considers the focus of the library, the clientele, and the organization it serves. The reverse is the case where acquisitions are at the mercy of the institutional director, or the founder, in the case of a private institution. In order for the collection development librarian to defend expenditures for library materials, there must be a guide to assist his decision making process. Human and material resources must not be wasted; hence, the collection development policy also serves as a training manual for new library staff. Determining why scarce resources should be spent on item"A" instead of "B" is not an easy task. A collection development policy can help bring order out of chaos. CONCLUSION Collection development is a planned, continuous, and cost effective acquisition of quality, relevant materials to meet the needs of users and the objectives of the library. Collection development is not only growth in volumes and titles but in the quality of acquired materials in enhancing effective information delivery. It is only from this perspective that the word "development" could be meaningful in relation to collection development. REFERENCE [1] [2] [3] [4] [5] [6] [7] [8] [9] 330 Buckland, John E. (1963). Planning the University Library Building: a summary of discussions by Librarians. New York: Columbia University. Carter, M. Duncan (1974).Building Library Collections. 4th Ed. Princeton, New Jersey: Princeton University Press. Cutter, Charles A. (1978) Rules for a Dictionary Catalogue. 4th Ed. Washington: Government Printing Office. p. 43. Gardner, Richard K. Library Collections: Their Origin, Selection and Development. New York: McGraw-Hill Book Company, 1981. Quoted in Gorman, G.E. and B.R. Howes. Collection Development for Libraries. Topics in Library and Information Studies. London; New York: Bowker-Saur, 1989. Mount, Ellis. Special Libraries and Information Centers: An Introductory Text, 3rd ed. Washington, DC: Special Libraries Association, 1995. Organization of Collection Development. Systems and Procedures Exchange Center, Kit 207. Washington, DC: Association of Research Libraries, April 1995. Ochai, A. (2001). Collection Development in Nigeria Libraries: Problems and Prospectsin Olanlokun, S. O. and Salisu, T. M. Libraries and Librarianship in Nigeria : A Festschrift for Ezekiel Bejide Bankole, Lagos, Ikofa Press, 2001, p. 62 Stephanie Greene/SLM 506/ July 2004 ISBN 1-63102-455-8 EXCHANGE OF META DATA: A CONCEPT TOWARDS FUTURE Bikramaditya Barman | University of science and technology | Meghalaya | barmanbikramaditya215@gmail.com Abstract: In the technological age information explosion, formation of subjects makes the world more complex. Change is the law of nature. Meta data is the way of understanding information .Generally speaking; Meta data is data about data. The main purpose of metadata are Asset portrayal, Data recovery ,Administration of data ,Rights administration, proprietorship and genuineness Interoperability and e-trade .This paper will explained about purpose of metadata, Responsibility of metadata, Three Principles of Meta data, Structuring Metadata, Creation Tools of Meta data, Metadata Quality Control, Interoperability and Exchange of Metadata, Future Directions of Meta data. Keywords: Meta data, Dublin Core, WWW. INTRODUCTION As per the first very broad definition, the metadata is such information, which portrays other information or gives data about this information. Thus, for instance, letters or characters in content are information. The quantity of letters in content is the metadata, which can be likewise portrayed as the extra data about the "source" information. In the event that a narrower sense is inferred and the term is utilized as a part of association with document sorts, the metadata implies, for instance, such data as the name and the title of a record, its creator, decisive words to the substance of a document or the date of the sparing. At that point metadata or meta-data can be described in such a route, to the point that it is spared in a record, however when in doubt is not obvious at the first sight when somebody opens the document in application programming. Likewise at the printing of record substance (for instance, of an archive) on paper most metadata gets to be lost. As this ordinarily does not happen at the exchange of the records, they can go on more data than their creator really needs to uncover. Then again, an undeniable beneficial outcome of metadata in records is: they permit indexing and perusing of information clusters as per certain general criteria in a less difficult and more exact way. PURPOSE OF META DATA Planning of address notes for the postgraduate understudies at City University a day or two ago got me to pondering the reasons of metadata. When I composed Metadata for Information Management and Retrieval a couple of years prior, I thought of five reasons of metadata. However as far back as 1998 Gilliland-Swetland discussed "metadata identifying with the organization, accessioning, safeguarding, and utilization of accumulations". She had concentrated on the reasons of metadata. The option is to order metadata components as indicated by what they are about as opposed to what they are utilized for. The reasons methodology considers numerous reasons of metadata and can apply to measures (e.g. Dublin Core and PREMIS) or to individual information components (e.g. dc.identifier and dc.rights). The five reasons of Metadata are:  Asset portrayal  Data recovery  Administration of data  Rights administration, proprietorship and genuineness  Interoperability and e-trade These reasons for existing were in light of a comprehension of the fundamental courses in which metadata was being a couple of years back and suspecting the ascent in e-business and e-government. Around then the greater part of the examination about Web 2.0 was centered around the semantic web. From that point forward the dialog has proceeded onward to interpersonal interaction, with the ascent of ISBN 1-63102-455-8 331 Exchange Of Meta Data: A Concept Towards Future administrations, for example, FaceBook, Twitter and LinkedIn. This requires a reevaluate of the reasons of metadata and the accompanying altered rundown speaks to my present considering:      Resource Depiction and Distinguishing Proof: the structure and presence of data assets. Incorporates identifiers and utilized as a part of utilizations, for example, lists, RFID codes, book and article numbering (DOIs and ISBNs). Legitimacy of things may likewise be built up with this sort of metadata Retrieval and Dissemination: the most natural reason for metadata to make an asset discoverable. Ordinarily incorporates indexing and categorisation (characterization) information. Principles, for example, Dublin Core concentrate principally on this reason as does a ton of the metadata utilized by institutional stores. Can likewise be utilized proactively to disperse or spread data to target groups of onlookers. Preservation and Retention: any material or data asset in an accumulation whether it be physical or electronic needs to be saved and held in a controlled manner on the off chance that it is to be accessible and usable by its target group. Some metadata principles, for example, PREMIS are about safeguarding of electronic assets, while in different guidelines, particular information components are utilized to manage protection issues. Users and Specialists: this is metadata about clients (e.g. gathering of people), and dealing with the use of an asset –e.g. credit of materials by a library (flow control). This can likewise be utilized for figuring out who has admittance to an asset – where security or classifiedness are contemplations Ownership and Rights: responsibility for property rights is vital for business frameworks, for example, iTunes where electronic assets are made accessible for an expense. This gives a method for guaranteeing that all components in the production network get paid. It is additionally utilized for catching rights articulations, for example, protected inn RESPONSIBILITY OF METADATA A vital explanation behind making elucidating metadata is to encourage revelation of applicable data. Notwithstanding asset disclosure, metadata can help arrange electronic assets, encourage interoperability and legacy asset mix, and give advanced recognizable proof, and bolster documenting and conservation. Asset Discovery: Metadata serves the same capacities in asset revelation as great recording does by      permitting assets to be found by pertinent criteria; distinguishing assets; uniting comparative assets; recognizing divergent assets; and giving location information. Organizing Electronic Resources: As the quantity of Web-based assets develops exponentially, total locales or entryways are progressively valuable in sorting out connections to assets taking into account crowd or point. 332 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Such records can be assembled as static website pages, with the names and areas of the assets "hardcoded" in the HTML. Notwithstanding, it is more proficient and progressively more normal to manufacture these pages powerfully from metadata put away in databases. Different programming apparatuses can be utilized to naturally separate and reformat the data for Web applications. Interoperability: Depicting an asset with metadata permits it to be seen by both people and machines in ways that advance interoperability. Interoperability is the capacity of numerous frameworks with distinctive equipment and programming stages, information structures, and interfaces to trade information with negligible loss of substance and usefulness. Utilizing characterized metadata plans, imparted exchange conventions, and crosswalks between plans, assets over the system can be sought all the more consistently. Two ways to deal with interoperability are cross-framework pursuit and metadata gathering. TheZ39.50 convention is generally utilized for cross-framework look. Z39.50 implementers don't impart metadata yet outline own pursuit abilities to a typical arrangement of hunt traits. A differentiating methodology taken by the Open Archives Initiative is for all information suppliers to make an interpretation of their local metadata to a typical centre arrangement of components and uncover this for gathering. A pursuit administration supplier then assembles the metadata into a predictable focal record to permit cross-store looking paying little mind to the metadata configurations utilized by taking part archives. Digital Identification: Most metadata plans incorporate components, for example, standard numbers to interestingly recognize the work or article to which the metadata alludes. The area of an advanced item might likewise be given utilizing a record name, URL (Uniform Resource Locator), or some more persevering identifier, for example, a PURL (Persistent URL) or DOI (Digital Object Identifier). Relentless identifiers are favoured because object areas regularly change, making the standard URL (and hence the metadata record) invalid. Notwithstanding the real components that indicate the article, the metadata can be joined to act as an arrangement of recognizing information, separating one item from another for approval purposes. Archiving and Preservation: Most present metadata endeavours base on the revelation of as of late made assets. Then again, there is a developing worry that advanced assets won't make due in usable structure into what's to come. Computerized data is delicate; it can be debased or adjusted, deliberately or accidentally. It may get to be unusable as capacity media and equipment and programming advancements change. Group movement and maybe imitating of current equipment and programming conduct in future equipment and programming stages are systems for defeating these difficulties. Metadata is vital to guaranteeing that assets will survive and keep on being open into what's to come. Chronicling and safeguarding oblige exceptional components to track the ancestry of an advanced article (where it originated from and how it has changed over the long run), to detail its physical attributes, and to report its conduct keeping in mind the end goal to imitate it on future innovations. Numerous associations globally have dealt with characterizing metadata plans for advanced protection, including the National Library of Australia, the British Cedars Project (CURL Exemplars in Digital Archives), and a joint Working Group of OCLC and the Research Libraries Group (RLG) . The recent gathering built up a structure laying out sorts of presentation metadata. A subsequent gathering, PREMIS (Preservation Metadata: Implementation Strategies)— additionally supported by OCLC and RLG—is building up a situated of centre components and techniques for the encoding, stockpiling, and administration of safeguarding metadata inside a computerized conservation framework. Large portions of these activities are taking into account or perfect with the ISO Reference Model for an Open Archival Information System (OAIS). Several Types: Notwithstanding the content archives, metadata can be additionally contained, for instance, in music records, feature documents, photographs or html pages. In music documents, among the rest, it is the data about a craftsman and a title or unique labels. In features it incorporates, for instance, record time, size and picture rate. In photographs metadata is frequently spared as picture data in Ex if or IPTC position. Metadata in ISBN 1-63102-455-8 333 Exchange Of Meta Data: A Concept Towards Future HTML pages (page title, watchwords to the page contents etc.) is utilized to demonstrate pages in the outcome arrangements of web crawlers. The accompanying diagram concerns just the utilization of metadata in Microsoft Office records and in PDF archives. At that the three Office applications – Word, Excel and PowerPoint will be considered. Three Principles of Meta data There are three principle sorts of metadata:    Descriptive metadata portrays an asset for purposes, for example, disclosure and distinguishing proof. It can incorporate components, for example, title, dynamic, creator, and keywords. Structural metadata demonstrates how compound items are assembled, for instance, how pages are requested to shape parts. Administrative metadata gives data to help deal with an asset, for example, when and how it was made, record sort and other specialized data, and who can get to it. STRUCTURING METADATA Metadata plans (additionally called pattern) are sets of metadata components intended for a particular reason, for example, depicting a specific kind of data asset. The definition or importance of the components themselves is known as the semantics of the scheme. The qualities given to metadata components are the substance. Metadata plots by and large determine names of components and their semantics. Alternatively, they may indicate substance rules for how content must be planned (for instance, how to distinguish the fundamental title), representation rules for substance (for instance, capitalization rules), and passable substance values (for instance, terms must be utilized from a predetermined controlled vocabulary). There may likewise be language structure rules for how the components and their substance ought to be encoded. A metadata plan with no recommended punctuation standards is called linguistic structure free. Metadata can be encoded in any perceptible punctuation. Numerous present metadata plans use SGML (Standard Generalized Mark-up Language) or XML (Extensible Mark-up Language). XML, grew by the World Wide Web Consortium (W3C), is an expanded type of HTML that takes into account provincially characterized label sets and the simple trade of organized. data. SGML is a superset of both HTML and XML and considers the wealthiest imprint up of an archive. Helpful XML instruments are getting to be broadly accessible as XML assumes an inexorably vital part in the trading of a mixed bag of information on the Web. Metadata Schemes and Element Sets: A wide range of metadata plans are being produced in a mixed bag of client situations and orders. The absolute most basic ones are examined in this area Dublin Core: The Dublin Core Metadata Element Set emerged from examinations at a 1995 workshop supported by OCLC and the National Centre for Supercomputing Applications (NCSA). As the workshop was held in Dublin, Ohio, the component set was named the Dublin Core. The proceeding with advancement of the Dublin Core and related determinations is overseen by the Dublin Core Metadata Initiative (DCMI). The first goal of the Dublin Core was to characterize a situated of components that could be utilized by creators to portray their own particular Web assets. Confronted with an expansion of electronic assets and the failure of the library calling to inventory every one of these assets, the objective was to characterize a couple of components and some basic decides that could be connected by non cataloguers. The first 13 centre components were later expanded to 15: Title, Creator, Subject, Description, Publisher, Contributor, Date, Type, Format, Identifier, Source, Language, Relation, Coverage, and Rights. The Dublin Core was created to be straightforward and brief, and to portray Web-based records. Then again, Dublin Core has been utilized with different sorts of materials and in applications requesting some unpredictability. 334 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education CREATING METADATA The response to this differs by order, the asset being depicted, the apparatuses accessible, and the normal result, yet it is quite often a helpful exertion. Much essential auxiliary and managerial metadata is supplied by the specialized staff who at first digitize or generally make the advanced question, or is created through a computerized methodology. For graphic metadata, it is best in a few circumstances if the originator of the asset gives the data. This is especially valid in the documentation of investigative datasets where the originator has critical comprehension of the reason for the dataset and the uses to which it could be put, and for which there is little if any text based data from which an indexer could work. In any case, numerous tasks have discovered that it is more effective to have indexers or other data experts make the elucidating metadata, in light of the fact that the creators or inventors of the information don't have sufficient energy or the abilities. In different cases, a blend of analyst and data expert is utilized. The specialist may make a skeleton, finishing the components that can be supplied most promptly. At that point results may be supplemented or assessed by the data master for consistency and agreeability with the mapping punctuation and nearby rules. Creation Tools of Meta data: Numerous metadata venture activities have created apparatuses and made them accessible to others, sometimes free of charge. A developing number of business programming instruments are additionally getting to be available. Creation apparatuses fall into a few classes:     Templates permit a client to enter the metadata values into preset fields that match the component set being utilized. The layout will then produce a designed arrangement of the component properties and their relating qualities Mark-up instruments will structure the metadata qualities and qualities into the predetermined outline dialect. The vast majority of these instruments produce XML or SGML Document Type Definitions (DTD). A few formats incorporate such an imprint up as a major aspect of their last interpretation of the metadata. Extraction apparatuses will naturally make metadata from an investigation of the advanced asset. These apparatuses are for the most part restricted to printed assets. The nature of the metadata separated can differ essentially taking into account the apparatus' calculations and in addition the substance and structure of the source content. These apparatuses ought to be considered as a guide to making metadata. The subsequent metadata ought to dependably be physically checked on and altered. Conversion apparatuses will make an interpretation of one metadata organization to another. The similitude of components in the source and target arrangements will influence how much extra altering and manual information of metadata may be needed. Metadata apparatuses are by and large created to bolster particular metadata compositions or component sets. The sites for the specific construction will regularly have connections to imp METADATA QUALITY CONTROL The production of metadata consequently or by data originators who are not acquainted with classifying, indexing, or vocabulary control can make quality issues. Compulsory components may be missing or utilized inaccurately. Outline punctuation may have slips that keep the metadata from being prepared accurately. Metadata content phrasing may be conflicting, making it hard to find important data. The Framework of Guidance for Building Good Digital Collections, accessible on the NISO site, verbalizes six standards applying to great metadata:    Good metadata ought to be suitable to the materials in the accumulation, clients of the gathering, and planned, present and likely utilization of the advanced article. Good metadata underpins interoperability. Good metadata utilizes standard controlled vocabularies to mirror the what, where, when and who of the substance. ISBN 1-63102-455-8 335 Exchange Of Meta Data: A Concept Towards Future         Good metadata incorporates a reasonable articulation on the conditions and terms of utilization for the advanced item. Good metadata records are items themselves and in this way ought to have the characteristics of achievability, diligence, special ID, and so forth. Great metadata ought to be legitimate and obvious. Good metadata bolsters the long haul administration of items in accumulations. There are various continuous endeavours for managing the metadata quality test: Metadata creation instruments are being enhanced with so many highlights as formats, pick records that utmost the determination in a specific field, and enhanced acceptance rules. Software interoperability programs that can robotize the "crosswalk" between distinctive outlines are consistently being produced and refined. Content originators are by and large formally prepared in comprehension metadata and controlled vocabulary ideas and in the utilization of metadata-related programming instruments. Existing controlled vocabularies that may have at first been intended for a particular utilization or a restricted group of onlookers are getting more extensive utilization and mindfulness. For instance, the Content Types and Subtypes initially characterized for MIME email trade are ordinarily utilized as the controlled rundown for the Dublin Core Format component. Communities of clients are creating and refining gathering of people particular metadata patterns, application profiles, controlled vocabularies, and client rules. INTEROPERABILITY AND EXCHANGE OF METADATA A few individuals ask: Do we require such a large number of metadata measures? With all the metadata standards, initiatives, augmentations, and profiles, in what manner can interoperability be guaranteed? It is essential to recall that diverse plans serve particular needs and crowds. Reciprocal plans can be utilized to portray the same asset for numerous reasons and to serve various client bunches. For instance, a specialized report could have a MARC metadata set in a library's online list, a FGDC portrayal as a feature of the National Spatial Data Infrastructure. C l e a r i n g h o u s e Mechanism, and an implanted arrangement of Dublin Core components. The Resource D e s c r i p t i o n Framework (RDF), grew by the World Wide Web Consortium (W3C), is an information model for the depiction of assets on the Web that gives an instrument to incorporating different metadata plans. In RDF a namespace is characterized by a URL indicating a Web asset that portrays the metadata conspire that is utilized as a part of the portrayal. Various namespaces can be characterized, permitting components from distinctive plans to be joined in a solitary asset depiction. Various depictions, made at distinctive times for diverse purposes, can likewise be connected to one another. RDF is by and large communicated in XML. FUTURE DIRECTIONS OF META DATA AND CONCLUSION Most early metadata principles have concentrated on the clear components required for revelation, ID, and recovery. As metadata activities created, managerial metadata, particularly in the rights and safeguarding regions was further stressed. Specialized metadata is one territory that still does not get much consideration in metadata patterns. The successful trade also, utilization of the advanced items depicted by the metadata regularly obliges information of particular specialized parts of the items past its filename and sort. More up to date benchmarks are starting to address this need. The NISO/AIIM standard, Z39.87, Data Dictionary— Technical Metadata for Digital Still Images, concentrates exclusively on the specialized information expected to encourage advanced picture documents. The metadata components characterized in the standard spread essential picture parameters, for example, pressure and shading profile, data about the hardware and settings utilization to make the picture, and execution appraisal information, for example, examining recurrence and shading maps. Metadata work is continuous over various models advancement associations. In the Worldwide Organization for Standardization (ISO), a subcommittee of Technical Committee (TC) 46 (Information and documentation), is tending to metadata advancement for bibliographic applications. ISO TC 211 (Geographic data/ Geomatics) is creating metadata principles for applications in geographic data frameworks. The Data administration and trade subcommittee of ISO-IEC JTC1 (Information innovation) is creating principles for the determination and 336 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education administration of metadata and has as of late issued a specialized provide details regarding Procedures for accomplishing metadata registry content consistency (ISO/IEC 20943). Numerous associations that created metadata details outside the formal models group are trying to have their particulars transformed into worldwide measures. The Dublin Center is an illustration of this methodology. It was initially grown in 1995 at a workshop supported by OCLC and the National Center for Supercomputing Applications. In 2001, it turned into an authority ANSI/NISO standard (Z39.85) and in 2003 Dublin Core was issued as a global standard (ISO 15836). The World Wide Web Consortium's (W3C) metadata movement has been consolidated into the Semantic Web, their drive to "give a typical system that permits information to be imparted and reused crosswise over application, venture, and group limits." The RDF system is one of the key empowering measures. The Semantic Web endeavours are coordinated to guidelines that expand the interoperability of metadata, instead of particular metadata constructions. The World Wide Web has made an upset in the availability of data. The advancement and use of metadata speaks to a significant change in the way data can be found and utilized. New advances, measures, and best practices are consistently progressing the applications for metadata. The assets in the accompanying area will issue you a head begin in following improvements and contain connections to more data on the undertaking talked about all through this record. REFERENCE [1] [2] [3] [4] [5] Bedard, Y.Merret, T., Han, J, (2001) .Fundamentals Of Spatial Data Warehousing for Geographic Knowledge Discover.Geographic.Taylor & Franeis, pp 53-73. Damiani, M., Spaccapietra, S, (2006) .Spatial Data Warehouse Modeling. Processing and Managing Complex data for decision support. Idea group, pp 21-27. Bazhrer R, A.N.M &Anwar H(2012) .Challenging issues of Spatiotemporal data mining. Journal of Computer Engineering and Intelligent Systems, pp 1-10. Haritha Genel Komutanligi, Kartrgvafya Dairesi, (2002).Design of Spatial Data Warehouse based on an Integrated Non-Spatial Database and Geo Spatial Information. International Symposium on Nipen G &Surabhi M,(2011).Spatial Data warehouses-A survey wwwusers.cs.umn.edu. ISBN 1-63102-455-8 337 TOTAL QUALITY MANAGEMENT IN ACADEMIC LIBRARY Kanupriya | Assistant Librarian | Lingaya’s LDIMS | Delhi | kanupriya275@gmail.com Khurshid Anwar | Librarian | Lingaya’s LDIMS | Delhi | anvarkhurshid@gmail.com Dalip Singh | Sr. Technical Writer | Birlasoft India Ltd | dalip.singh@birlasoft.com Abstract: Total quality management is an approach that an organization takes for improving its performance on systematic and continuous basis. This is achieved by involving all employees throughout the organization in satisfying all requirements of every customer, whoever the customer may be either external or internal. Quality Management is the basis for library management in general. Such principles of TQM as meeting the Customer needs, exact assessment, continuous improvement, team work and enthusiasm of the leaders are typically for library services. This paper focused on TQM in academic library and information centre. Keywords: TQM, Academic library, ISO, Management, Quality. INTRODUCTION The academic library has been described as the “heart” of the learning community, providing a place for students and faculty to do their research and advance their knowledge. The librarians and library staff provide numerous services to these users, addressing their diverse needs, characteristics and interests. However, with the advent of online catalogs, CD-ROMs, online databases, other electronic resources, new methods of document delivery, and access to information, the role of the academic library has begun to change. Students do not have to be physically present in the library in order to access the library’s resources. With the internet and the availability of new technologies and numerous indexes, abstracts and database, the range of services that academic libraries can provide has increased dramatically. Users can access the libraries resources, without stepping into the library building. They can also very easily access other libraries resources, such as online catalogs and unrestricted databases. The internet has opened the resources of libraries to students and faculty worldwide. QUALITY Quality is often used synonymously with excellence. However, for proper quality Management, defining quality and its measurement are essential. Quality has been defined variedly in different contexts. There is wide range of definitions or Approaches to quality, describing the relative nature of the concept in the context of higher education. Some of the definitions are discussed here Green and Harvey (1993) identified five different approaches to quality in higher education. These are, quality:      In terms of exceptional (high standards); In terms of consistency; As fitness for purpose (meeting stated purposes); As value for money; and As transformative (transformation of the participant). Libraries have always been committed to provide a high quality of services to its users. In the past, consuming more resources, buying more books, and moving to large premises are considered as improving quality. But that approach is not valid today. One of the good solutions to improve quality is to provide right information to a right user at right time. This requires a through change in the approach – an approach based on user requirements and user satisfaction. It is believed that this can be achieved by implementing TQM. Thus, TQM approach is slowly getting popular in today's libraries 338 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education What is quality: Meaning of quality is the satisfaction of the customer through product or by providing services. The customers in the academic library are the user like scholars, researcher and regular students. Here the customer is the part of the academic community. India’s University Grants Commission (UGC) has setup NAAC (National Accreditation and Assessment Council). NAAC conducts audits and inspections on the quality of service provided by educational institutions, and the library service including part of it. Sanctions of grants are dependent an outcomes of these assessments. In light of this, academic libraries must develop its work culture, philosophies and strategies for enhancing quality. The primary function of an academic library is to support the teaching, research and other academic programs of its parent organization. An academic library is the part to serve an organization which delivers products in person to its clients. Managing Quality in an Academic Library: - In a service organization like and academic library, customer satisfaction means fulfilling expectations. Librarians must find out what readers want and they should concentrate upon providing it. Designing an appropriate service means asking    Who are the customers? What do they want? What can the organization provide? In a library there are basically two types of customers those who are in hurry and those who want to kill time. An academic library has to identify these and search them accordingly. ISO 9000 series steps towards TQM academic library: ISO 9000 has an internationally accepted certificate that accredits an organization for its quality management systems and procedures. ISO 9004-2:1992 has guidelines for services and was issued ISO to establish and implement a quality system within a service organization such as an educational institution. TQM In Libraries: Among the service industries such as Airlines, Banking institutions, Insurance companies and Health care providers, Libraries are the last to adopt TQM practices. For a long time, Librarians saw themselves as keepers of knowledge rather than active agents in information transfer. Though the main aim/objective of libraries is to satisfy the users, the library professionals often forget that. But today's libraries are pushed to a position where they have to provide quality services to its users, to justify their existence. So, now libraries are also started adopting TQM practices following other kinds of service industries. Quality Concept in Library Services: The library is an organization to offer reference and information services to its users. Library service is the combination of the services- process and its delivery? In a library, the service offered from Acquisition section, technical section, maintenance section etc. are the processes carried out There and thereafter delivered to the users. The quality should start from the acquisition section, which should be carried uniformly to circulation section? Auser who had an unpleasant experience from the library will tell it to many people, but a good experience will be told to very few. Therefore it is very necessary for librarian to understand the users, what they want, how they want, and when they want the documents and information. The quality of a library may be determined on the basis of resources, capability and utilization, whereas value is determined on the basis of utilization and beneficial effect. In Orr’s 1973 opinion ‘effectiveness’ and ‘benefits’ were closer in meaning to the ‘quality’ and ‘value’ respectively but in literature effectiveness and benefits were having wide connotations. De Prospo 1973 described library effectiveness as a measure of library collections, facilities and staff. He defined four measures: 1) Benefit, 2) Effectiveness, 3) Cost Effectiveness & 4) Cost benefits. TQM involves the management of at least five major quality check point: ISBN 1-63102-455-8 339 Total Quality Management In Academic Library      Selection of suppliers, Vendors, Customers (Internal & External) development & maintenance of standards, specification & communication channels with the parent organization, Input & quality assurance, Efficiency & effectiveness of value adding process, Quality, cost & delivery of products & services, the proactive assurance that your organization is meeting or exceeding customer’s needs, requirements & wants. If any library able to manage quality of inputs, process, outputs & customers then will manage quality into. The system components provide the framework for formulation the definition of quality and TQM. In other words, quality is the ability or capability of library services, products & consultation to meet the requirement of users. Quality management is defining the library user (customer), understanding his requirements, finding out library’s capability and in case of mismatch changing either the customer definition or capability of library &specifying library’s requirements to university, authorities, external vendors & suppliers & internal staff. For this measurement of quality or performance is essential. Characteristics of TQM in Libraries: The following characteristics can be inferred.              TQM is management philosophy to guide the libraries in meeting the challenges of the time. TQM starts at the top management of library. TQM calls for strategic planning based on vision, mission, goals and objectives of academic libraries. TQM calls for everyone to be skilled and knowledgeable (HR). TQM requires quality as a strategic priority. TQM promote team work. TQM focus on the users. TQM recognize internal and external users of the library. TQM aims to instill a “prevention not an inspection” ethic. TQM is a process and activities based approach. TQM emphasizes the importance of measurement through the measuring rod of user satisfaction. TQM reduces total cost of meeting user requirements. TQM is a disciplined, continuous and system approach. Benefits of TQM for Academic Libraries:         340 TQM reduces bureaucracy, empower staff and create a team base culture, which is keenly desired and suited for mechanistic, hierarchical organization structures like university libraries. Librarian’s role becomes one of support and coaching. TQM helps in gauging users’ needs and expectations in a proactive way and equip the librarians to provide more and better services with the same resources efficiently ineffectively, resulting increased user satisfaction and loyalty. TQM is an evolutionary process and can easily be incorporated into the already existing management system of libraries. Brainstorming exercise helps know what functions are necessary to the efficient operation of a library and who should perform these, resulting increased employee involvement and dedication. Reductions in user complaint gain a competitive advantage over other information providers. TQM help in breaking down intersectional barriers/ status in a library and promotes cooperation and teamwork instead of competition. In TQM, quality is a high profile management tools. Its implementation in libraries improves the image of the library staff and helps in public relation and marketing. TQM ensures consistent qualitative library and information services to the users and defines user satisfaction issues. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education   TQM ensures a non threatening environment for open debate for problem solving, for change, for H.R.D., and clearly indicates power, responsibility and accountability of each employee. Empowered staff members develop a sense of self determination; a sense of meaning; a sense of competence; a sense of impact and become more effective innovative, transformational and charismatic. Principles of TQM in Academic Libraries: TQM principles have been explained in details for conceptualization in the context of academic libraries.                Continuous improvement Customer force Process improvement Employee involvement Leadership Empowerment Defined system Trust Commitment Team building Education and training Organizational Learning Innovation Communication Suggestion Library Service Quality Dimensions: Zeithamal, Parasuraman and Berry (1990) identify ten dimensions of service quality. These are adapted with changes to illustrate the dimensions or aspects of quality within library services.  Reliability  Responsiveness  Assurance  Access  Access  Communication TQM Principles: According to Galyani Moghaddam TQM is the application of a number of activities with perfect synergy. The following are the most important elements of any total quality management programme:        Customer-driven quality Top management leadership and commitment Continuous Improvement Fast response Actions based on Facts Employee Participation A TQM culture Continuous Improvement: American society for Quality outlined continuous improvement as ‘Continuous improvement’ is an ongoing effort to improve products, services and processes. Among the most widely used tools for continuous improvement is a four-step quality model-the plan-do-check-act (PDCA) cycle, also known as Deming Cycle or Shewhart Cycle:   Plan: Identify an opportunity and plan for change. Do: Implement the change on a small scale. ISBN 1-63102-455-8 341 Total Quality Management In Academic Library   Check: Use data to analyze the results of the change and determine whether it made a difference. Act: If the change was successful, implement it on a wider scale and continuously assess your results. If the change did not work, begin the cycle again. Other widely used methods of continuous improvement- such as six sigma, lean and total quality management emphasize employee involvement and teamwork; measuring and systematizing process; and reducing variation, defects and cycle times. How to improve the quality in Library Services: In this information age it is very easy to make a quality based library if the parent body or concerned Authority assists financially as well as collectively. It is very necessary for the librarian and its parent body to look forward for the present and future generation to cope up with international phenomena. A user must be educated with proper technology to use the library effectively. He or she should have knowledge of what facilities and services are available in the library and information centre and how to access those efficiently and effectively. To improve the service quality the user satisfaction survey is a tool that provides both quantitative and qualitative data. It is an important part of libraries for process and performance measurement. Main steps to measure users' satisfaction are [2]: I) Conducting sample survey. II) Data collection. III) Process and analysis of data. IV) Interpret and present the data. V) Finding out result. With the help of the result the librarian can take new steps for development of library. The regular survey will enable the library to understand the changes in user's satisfaction and to plan the services accordingly CONCLUSION The paper concludes with an idea after perusing various literatures stating that Total Quality Management is a way wherein it could any management for improving its effectiveness, efficiency, flexibility and competitiveness among the libraries as a whole by making each and every employee to get involved with an intention to improve the performance of the organization in all spheres. This eventually keeps the customers feel happy and highly satisfied with the services offered by the organization. Libraries can also excel in its performance by maintaining the Quality standards and conformities as prescribed in TQM Principles employing necessary tools and techniques. In the recent years it was noted that TQM has increasingly being practiced in libraries of developed countries for last two decades. In effect to the implementation and regular adoption of TQM, libraries were able to establish a culture of continuous improvement and started to offer quality product and services. Indian libraries started to practice TQM which is in the nascent stage and still expected to grow in the years to come. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] 342 BARNARD, SUSAN B. (1998) Total Quality Management. In: Encyclopedia of Library and Information Science. V 61, p.311- 325. CARLEY, R. & WALDRON, M.W. (1984) Quality assurance and continuing education. Canadian Journal of University Continuing Education, 10(1), p.53-67. COMMONWELATH OF LEARNING (1994) Symposium on Quality Assurance in Higher Education. Vancouver: Commonwealth Of Learning. FRAZER, M. (1992) Quality Assurance and Higher Education. In. A.Craft (Ed.), Quality assurance in Higher Education: Proceedings of an International Conference, Hong Kong, 1991, p.9-25. GARVIN, D.A. (1988) Managing Quality: The Strategic and Competitive edge. New York:Freepress. HARVEY L & GREEN D. (1993) Defining `Quality’ In: Assessment & Evaluation in Higher Education,18(1), p.9-34. JOHANNSEN GUSTAN CARL (1995) Quality Management Principles and Methods in Library and Information Science theory and Practice. In: Encyclopedia of Library and Information Science, V 56, p.318-352. NUNAN,T. & CALVERT,J.(1995) Report of the project to Investigate Quality & Standards in Distance Education. PETER BROPHY(1993) Quality Management :University approach. Aslib Information21(6), p.246248. TANNOCK, J.D.T. (1992) A new approach to quality assurance for Higher Education. Higher Education Quarterly 46(1), p.108-123. Total quality management in library and information sectors Golnessa Galyani Moghaddam Department of Library and Information Science, Shahed University, Tehran, Miller, R.G. and Stearns, B. (1994). Quality Management for Today's academic library, College & Research Library News, 1994, Vol. 55 ANDALEEB, SYED SAAD, (2001). Usages of Academic Libraries: The Role of Service Quality, Resources, and User Characteristics. Library Trends FRAZER, M. (1992) Quality Assurance and Higher Education. In. A.Craft (Ed.), Quality assurance in Higher Education: Proceedings of An International Conference, Hong Kong, 1991, p.9-25. ISBN 1-63102-455-8 RADIO FREQUENCY IDENTIFICATION (RFID) Shyam Bihari Gupta | LIA & PRO (Additional) | Intellectual Property Office | Patent Office | Ministry of Commerce & Industry | Government of India | New Delhi | sbiharigupta@gmail.com Gunjan Gupta | Assistant Librarian | Rameesh Institute of Education | Greater Noida, UP Abstract: This presentation gives an overview of the current state of the art in the radio frequency identification (RFID) technology. Then it explores the brief introduction to the principles of the Radio Frequency Identification technology, current and envisaged fields of application, as well as advantages, concerns and limitations of use, comparison with the Barcodes Reader. This presentation concludes that RFID is a viable technology with many possible applications. However, only some of the impacts on organizations and society can be anticipated at present. Keywords: RFID, Tag, Security System, Barcode Reader. INTRODUCTION RFID is only one of numerous technologies grouped under the term Automatic Identification (Auto ID), such as bar code, optical character recognition, voice recognition, biometrics etc. Auto ID technologies are a new way of controlling information and material flow, especially suitable for large production networks. The RFID technology is a means of gathering data about a certain item without the need of touching or seeing the data carrier, through the use of inductive coupling or electromagnetic waves. The data carrier is a microchip attached to an antenna (together called transponder or tag), the latter enabling the chip to transmit information to a reader (or transceiver) within a given range, which can forward the information to a host computer. The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information. WORKING METHODOLOGY OF RFID RFID (Radio Frequency Identification) is a wireless system used to identify tags. The RFID ‘tag’ is essentially a memory device with a means of revealing and communicating its memory contents, when prompted (scanned) to do so. The memory consists of a plurality of binary (two state) digits, also known as bits, and the communication comprises RF reception and transmission means. The binary data (bits) are formed into binary words comprising typically 8, or 16 or 32 bits that can make up letters and numbers in the same manner as in computing, the Internet and ‘texting’ on a mobile phone. The ‘tag’ may comprise an electronic circuit (printed circuit board) with its own power supply–an active device; or be a very low power integrated circuit that is able to gain enough energy from the scanner/reader RF signal to actually power itself for long enough to transmit the contents of its memory–a so called passive device. In its passive embodiment RFID tag transmission power is very low and measured in millionths of a watt i.e. microwatts, μ W. Figure 1, shows diagrammatically one of the latter style devices, which may be found on products, particularly consumer durables. Figure 1 ISBN 1-63102-455-8 343 Radio Frequency Identification (RFID) The typical RFID tag portrayed in Figure 1, comprises a host substrate which is typically, but not exclusively, a flexible plastic (polymer), with an attached flexible etched aluminum alloy, or conductive ink antenna, plus a small (few millimeters square) attached integrated circuit connected to the antenna. The whole assembly is typically 30 millimeters square. The data in the RFID tag memory may be pre-loaded (determined at time of manufacture) as a Read Only Memory (ROM), or may be dynamically variable (Static Random Access Memory) and take up the status of the last write/read cycle. The data is always read out serially so that it can be correctly parsed. The information contained in the RFID tag memory is deliberately kept to a minimum, and typically, dependent upon the data format (its syntax, numerical format – decimal, hexadecimal etc) requires translating into a human readable form via a host system. Dependent upon the technology used, and in particular its radio frequencies, RFID tags can be small enough to be humanely inserted under loose skin of animals as with cat and dog passports. Figure 2 COMPARISION WITH BARCODES Compared to barcode inventory control systems RFID technology has both advantages and disadvantages, many of which are outside of product manufacture and distribution chain applications.       344 ADVANTAGES VERSUS BARCODES Not requiring line of sight access to be read. The tag can trigger security alarm systems if removed from its correct location. Automatic scanning and data logging is possible without Operator intervention. With the right technology a plurality of tags can be concurrently read It can be read only or read-write. Provides a high degree of security and product authentication – a tag is more difficult to counterfeit than a barcode. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education         Since each tag can be unique they can act as a security feature if lost or stolen e.g. a stolen smart travel card can be cancelled. The technology could be inserted within a suit so that when it is sent to the cleaners it automatically gets the right cleaning procedure applied to it. DISADVANTAGES VERSUS BARCODES Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Tag collision occurs when many tags are present in a small area. Are limited to the data printed on them and cannot be updated, other than by replacement or sticking a label over them. External influences such as metalwork, material dielectric properties and radio interference can constrain RFID remote reading. There is a high cost (long pay-back) for integrating RFID technology into existing inventory control systems. Poor performance with RF-opaque and RF-absorbent objects. This is a frequency dependent behavior. The current technology does not work well with these materials and in some cases, fail completely. EXAMPLES Blood Banks: The RFID tag is attached with the blood label itself. The paramedic who transfuses the blood can scan the bag before transferring. He/She typically enters the patient ID, number, or in a better system the patient also has a wrist band RFID tag which identifies him/her uniquely. In case the wrong blood bag is scanned, the reader can throw up a warning like this. Warning: Blood Mismatch Your immediate attention is required The blood bag is for patient The blood bag is for patient John Smith John Smet Patient ID-JS1002453 Patient ID-JS1003453 Animal Identification: Injectable RFID tags are available for animal identification. They are injected to remain under the skin of the animal. Delivery is through a special syringe. The advantages is that they are less painful, also there is no outside identification mark for a malicious person to know where the tag is embedded in order to remove it as modify it. The RFID chip inside the tag is generally ‘Read-Only’ so that data once recorded can’t be modified. The reader is connected to a remote database which correlates the unique RFID tag number on the animal with other data fields. Airport Baggage Handling: Bags are tagged with an RFID tag rather than a bar-coded tag so that they can be tracked by readers throughout their journey. Safety is improved because security information can be associated with particular tags enabling them to be routed automatically through an explosive detection machine. It will use secure data encryption and tags with read/write capabilities. E-tags will be applied at curbside check-ins and allow information to be added during a bag’s journey, giving security personnel a snapshot of the route each bag traveled. Tagging will also eliminate the need for manual sorting and lifting through the use of conveyor belts equipped with tag readers. Electronic Payment: Both Exxon and Phillips 66 have implemented RFID systems that enable customers to instantly charge their fuel and convenience store purchases without using cash or a credit card. Customers enrolled in these programs wave a miniature transponder attached to their key chain in front of an electronic reader at the pump or checkout counter. ISBN 1-63102-455-8 345 Radio Frequency Identification (RFID) Postal Services: The Italian postal service now uses e-tags to ensure mail is moved to the correct destination and to monitor delivery times [Langnau, 2001]. Mail bags are tagged with read/write tags as they arrive at Italy’s airports. As the bags are loaded on conveyor belts, readers can verify each bag’s destination automatically and route it appropriately. The service also puts e-tags in envelopes and mail throughout the country. As these letters arrive at a routing area, their travel time data are recorded. The tags help identify delivery problems. CONCLUSION This presentation provides an overview of RFID technology and tries to give readers some understanding of its potential applications and implications for business strategy. As with any new technology, it is extremely difficult to anticipate the full scope of these applications and an implication until it is more widely used. Furthermore, whole sets of broader possible impacts, e.g., on privacy and security are even less clear at present. It is hoped that by clarifying some of the early uses of RFID and documenting the road ahead for organizations as far as we can see, others will find it easier to think through how best to manage and exploit this technology’s potential, while avoiding some of its negative repercussions. REFERENCES [1] [2] [3] [4] [5] 346 Michael Faraday House (2005) “Radio Frequency Identification Device Technology (RFID)”, Institution of Electrical Engineers. Sam Polniak (2007) “The RFID Case Study Book-RFID application stories from around the globe”, Abhisam software. Heather Smith (2003) “Developments in Practice X: Radio Frequency Identification (RFID) -An Internet for Physical Objects”. www.technovelgy.com. Radio-frequency identification - Wikipedia, the free encyclopedia. ISBN 1-63102-455-8 INFORMATION TECHNOLOGY FOR EDUCATION ROLE IN MODERN EDUCATIONAL PRACTICES Suman Singh | Librarian | Ghanshyam Urvashi Mahavidhiaya | Baudi, Phoolpur | Allahabad | suman_singh36@yahoo.com Abstract: Education Technology is one way or the other has been used in education since times immemorial. It is said that good teachers have always used visual aids to assist their teaching. Even the Czech Comenius Suggested teachers to use illustrations and models to increase the interests of their students. Today education technology is stressing modern audiovisual equipment. Keywors: Education Technology, Hardware Technology, Software Educational Technology. INTRODUCTION Educational technology emerged as a distinct discipline only in the last quarter of the twentieth Century. Therefore, its concept has not received a uniform educational technology; the educational literature reveals that there are more than fifty definitions of educational technology. Information is vital to the success of Academic and Research activity and its flow is a two-way process. On the one hand, specialized, up dated information is constantly needed by users to keep them informed of the latest developments and updates in their fields of interest. Leith (1967) : Education Technology is application of scientific knowledge about learning and the conditions of learning to improve the effectiveness and efficiency of teaching and learning National council of Educational Technology, U.K. (1967): Educational technology is the development, Application and Evolution of systems, techniques and aids to improve the process of human learning. OPERATION OF EDUCATIONAL TECHNOLOGY The Educational technology is a scientific and systematic approach to design and evaluate learning and teaching methods and to the application and explanation of media and the current knowledge of communication Techniques is education took formal and information. NATURE OF EDUCATIONAL TECHNOLOGY A review of the above mentioned definitions of educational definitions of educational Technology paints out the following characteristics of educational Technology.         Educational technology is not confined to the use of the electronic media in education . Educational technology involves input, output and process aspect of education. Educational technology is the application of scientific principles to education. Educational technology is an important medium of communication. Educational technology lays stress on the development of methods and techniques for effective teaching learning. Educational technology stresses the organization of learning situations for the effective realization of the goals of education. Educational technology facilitates learning by controlling internment media and methods. Educational technology emphastses the designing and measuring instruments for testing learning outcomes. HARDWARE TECHNOLOGY IN EDUCATION Hardware technology of education means the use of mechanical equipment and material to the teaching learning process. Hardware Technology of the following types is used in educational an  Audio: Audio tape, Audio cassettes, Records. ISBN 1-63102-455-8 347 Information Technology For Education Role In Modern Educational Practices       Video: Television broadcast, cable, Television, Video, tape Video-cassettes, video-disc telecast, VideoText. Computer: Computer Assisted instruction (CAI), simulation and gaming. Graphics: Charts, graphs, maps, overhead transparencies. Photographic: Motion pictures, filmstrips, slides print. Print: Hard copy (Paper), Micro film, Micro fiche. Davis (1971) is of the view that the hardware approach is based on the application of physical Science to the education and training system which Mechanises the process of teaching gradually so that teachers would beable to deal with more students, resulting in less costs and economy in finances. Nickson- Educational technology deals with the application of many fields of science to the educational needs of the individual as well as of the equipment. SOFTWARE EDUCATIONAL TECHNOLOGY The hardware approach originated from the physical Sciences and applied engineering and the software approach owes its origin to the behavioral sciences and their applied aspects concerned psychology of learning It originated from the pioneering efforts of skinner & other behaviorists. Leith has also observed, educational technology is the application of scientific knowledge about learning and the conditions of learning to improve the effectiveness and efficiency of teaching and learning. “This software view of educational Technology is closely associated with modern principles of Programmed learning and is characterized by task analysis, writing precise objectives, selection of appropriate learning strategies, reinforcement to correct responses and constant evaluation” Software technology includes the following:  Analysis of instructional problems.  Selection of strategies to btain the desired results from the teaching learning process.  Teacher behavior  Programmed learning  System Analyses.  Selection of instruments of evaluation. The software technology is sometimes referred to as instructional Technology teaching technology and behavioral technology. Hardware technology Vs. software Technology: In hardware approach, we concerned with the use of audiovisual aids material and sophisticated instrument, gadgets and mass media to assist the teacher and the learner to achieve belter results. In software we try to make use of psychology of learning for the production and utilisation of software techniques and materials in terms of learning materials, teaching learning strategies tools of evaluation and other devices of soften and smoothen the task of teaching learning. Complement and supplementary Nature of the use of Hardware Technology and software Technology in Education. The hardware and software approaches are interlinked to plan the seed of educational technology which is developing with other essentials ingredients of other varieties like system engineering, educational planning and management. Hardware technology and software technology in Education:       348 Both types of technology carter to individual differences of students. Both contributes to the economy of energy, resources and time of teachers as well of students. They assist in bringing about clarity and vividness in the teaching learning material. They help in developing motivation among students. They make the subject-matter easy to comprehend. They make the subject-matter interesting. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education  They bring the replicas of various object and scenes the class room. MISSION The mission is to integrate ICT-enabled with pedagogical and management processes is self sustaining manner to develop a world-class globally competitive flexible and value based open and distance education system that has the scope to provide quality life to all citizens, and meet the developmental needs of the country. Role of teacher/counselor- Teachers play an important role in development of qualities among students. Teachers themselves be committed words their students Teachers themselves should be committed towards their profession. Only then can we expected quality among students as well as school. A teacher can bring about qualitative result when he or she is able to pay attention to individual students. Empirical researches and innovative development in this area's. The National Policy on Education 1986 and as modified in 1992 envisaged the role of media and educational technology as : Modern communication technologies have the potential to bypass several stages and sequences in the process of development encountered in early decades. Both the constraints of time and distance at once become manageable. In order to avoid structural dualism, modern educational technology must reach out to the most distant areas and the most deprived sections of beneficiaries simultaneously with the areas of comparative affluence and ready availability. Educational technology needs to be employed in the spread of useful information, the training and retraining of teachers, to improve quality, sharpen awareness of art and culture, to include abiding values etc., both in the formal and non-formal and non-formal sectors. In the villages without electricity, batteries or solar packs need to be used to run the programme. Educational technology has great potential for improving the teaching-learning processes. It is needed to education for the following purposes :      Individualised Instruction: Educational technology is very helpful in individualising instruction by enabling us to make use of self-instructional programmes. Improvement in the quality of Teaching: Educational technology assists in the improvement of the teaching-learning process by enabling us to use more varied, rich and motivational programmes through TV and other media. Meeting the Problem of Mass Education: Educational technology helps in using programmes developed by experts for a population of students with the use of computers and TV etc. Equalising Educational Opportunity: Educational technology assists us in making efforts for equalising educational opportunities irrespective of economic, social and geographical status of the learners. Providing Continuing Education: TV lessons and self-instructional programmed material sent to the learners or to in-service personnel and vocational workers help them to keep themselves abreast of the latest material. Three Views of Scope of Educational Technology: Educational Technology First (ET 1). It refers to the application of physical science and engineering technology to provide mechanical or electromechanical tools, instrumentation or 'hardware' which can be used 'for instructional purposes. This is the view of James O. Finn and others (1960). In this sense, the reference is generally to the use of equipment for presenting instructional material such as still and motion picture projectors (silent and sound), tape-recorders (including language laboratory), television, teaching machines and computer-based teaching. Educational Technology Second (ET 2). It referts to the application of scientific principles to instruction. This is the view of Skinner, Gangne and others. Here psychological principles of learning are stressed. Educational Technology Third (ET 3). Described by Davis and Hartley (1972), it incorporates both ET 1 and ET 2, through application of a 'system approach' to education and training. According to this view, education should be considered a system in which machines, materials, media, men and methods are interrelated parts and are organised in such a way as they work together for the fulfillment of specific educational objectives. Educational ISBN 1-63102-455-8 349 Information Technology For Education Role In Modern Educational Practices technology, in education according to scientific principles so as to best achieve the educational objectives. It is the modern view of educational technology. In fact scope of educational technology is as wide as education itself. Its scope ranges from the concrete educational process to the most abstract and subtle ones. It includes the use of hardware and software and systems analysis in various educational operations. The possibility of using educational technology in almost all areas of education has been and is being explored. There are three major areas in education has been and is being explored. these are : (1) Technology related to general educational administration and management, (2) Technology related to general educational testing, (3) Technology related to the instructional process. A very remarkable trend in the field of education towards the end of the 20th century in the advanced countries had been the tremendous use of educational technology in making education more productive, relating it to the individual, providing instruction on more scientific bases, making learning more powerful and lasting making up the cultural handicaps of certain categories of pupils and for extending educational services in the remote areas. Technology of Education: Technology of education's inherent in the planning and implementation of the teaching learning process in general technology of education includes the following internists.       Selection of Instruments for evaluation. Analysis of instructional problems. Selection of strategies to obtain desired result from the teaching learning process. Teacher Behaviour. System Analysis. Programmed learning. Technology in Education : Bradley speaking, technology in education in plies the use of implements, tools and machines in-education in the some manners as we use these for the development of agriculture and gardening and industry and in fact our everyday life to reap the fruit of scientific and technological development. We include electronic media as        Projector, Tape Recorder Film Radio TV teaching machine, OHP. Computers and Interned etc. Movie or motion picture projector Record player disc. Video Disc. Uses of Record Disc Player in the Teaching learning Process :         350 Records are good for training in speaking, singing and recitation. Certain portions can be played back at will to highlight specific points. Records can be useful for teaching phonetics. Records can arouse positive emotion by specific sound effects and dramatisation. Records provide learning with enjoyment. The record player suplements a lesson. Records are good for teaching music and dance. Record player can be used for an appreciation lesson in music. Record player can be used for physical exercises accompanied with music. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education  Record player has a repeat value and can be played over and again for practice and drill. Uses of Video Disc:    It increases learner's productivity It makes pros sidle extensive collection of learning material. Effective Television Education. Role of the teacher in school/TV teacher should be associated with each stage in one way or the other     Planning Production Presentation Utilisation Evaluation Importance of Internet in Education: There is no doubt that the internet offers the unique opportunity of providing education of a fast pace. Internet has varied educational uses. Even a well-established traditional library can hardly match the resources available on the Net. This is not to say that the Internet can take the place of the library. But the simple fact is that no library on earth has the financial resources to buy the latest international books on everything under the sun. This is where the Net comes handy for students, teachers, researchers as well as for those preparing for several examinations including Civil Service Examination. Collecting reports from different sources for projects and research reports is such a hassle-wasting valuable hours traveling to varous libraries all over the country to find out whether they are available. Now it is available at the click of a mouse. Name any branch of study- the Net provides the requisite information- whether it is to keep abreast of the latest scientific discoveries or to further skills. The Net helps in enriching classroom discussions. Following are the important uses of internet in education:          Internet can be used to provide information and education to the wider population located in every nook and corner of the globe. Internet is an important tool to disseminate large qualities of information, to propel the masses forward on path of prosperity in the shortest possible time with minimum resources. Internet technology can be very useful in removing adversities of nature or the adversities faced by human because of their caste or creeds. Internet makes learning process interesting and interactive. The students have a great opportunity to be creative. The use of the Internet provides wider access to good quality education at low cost. Internet has information on most of the advanced research topics in highly technical or scientific areas besides information on very petty topics. As a matter of fact all use of Internet is educative as it involves access to information and contains huge quantities of data on numerous topics. The internet use would remove the limitation of (i) classroom size (ii) fixed timing of imparting education (iii) restrictions on learner's pace of learning. ISBN 1-63102-455-8 351 Information Technology For Education Role In Modern Educational Practices Meaning of E-mail- Email or electronic mail is the means of sending messages from one place to another through the use of one computer to another. We can send messages through computers on a local area network or through computers on the internet. E-mail is a very important component of the internet. Operation of E-mail : For using E-mail the user types his message among with the E-mail address of the person whom E-mail is being sent. The computer converts the message into an electronic format. Thereafter, the electronic format of the message is sent to its destination. For long distances, E-mail message are transferred along communication links such as telephone lines through internet. Merits of Using E-mail:  E-mail reaches its destination in a few seconds.  Where internet is available, messages can be sent and received anywhere in the world.  We can send E-mail message to a group of people just as easily as we can send to just one person.  For confirmation from the sender registered E-mail can be sent.  E-mail is cheaper than any other type of mail through post.  We can send files, photographs, computer files and video-clips with an E-mail. Limitations of Using E-mail  People can send junk mail.  Computer viruses often sent by E-mail can damage our computer.  When mail box is full, we cannot receive any message. learner's ability to afford quality education at the best school, college or university anywhere in the world. Internet gives the following benefits also :                Exploring libraries Browsing the Web Visiting educational institutions, museums, publishers and universities, etc. Reading the news. Reading the articles Getting software On-line shopping playing games Getting degrees Discussing Watching video Reading programmes on other computers Chatting Exchanging messages On line banking Teleconferencing at university or college level. University based private audio- teleconferencing costs are moderate when the local telephone system has the following facilities.     352 Telephone line is relatively quiet. There is ready accessibility Local and long distance rates are acceptable. Computer teleconferencing. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education In the teaching learning process, a variety of modern technologies are called into pay which determine the interrelationships of the teacher and the learner. The communication technologies available intoday's world are radio, TV audio and video cassettes, computer based managements (CBM) (CAI) talking computer and educational telephone Networks etc. A number of products based on digital technology, such as, the compact disc (CP) digital audiotape (DAT) Digital TGV are coming up. They one create favourable conditions for teaching process, and they provide the teacher with an efficient tool with which to manage the creaming process they serve as a vehicle to implement the curriculum content.          Verpal Communication Written Communication Oral Communication Non-Verbal Communication Non Verbal Sound. Body Language Symbols & Sign. Colours, Printed Media, Non Printed Media. Audio Media, Visual Media Audio Visual Media CONCLUSION Managing teaching is a broad concept which includes teaching. earning process all the steps a teacher who related as the manager in the knowledge based economy large sections of the society would certainly need access to information to address issues and problems related to knowledge creation, knowledge application or knowledge utilization. Evaluation may be defined as a process by means of which changes in behaviour of learners are studied and guided towards predetermined objects, It is a process for improving the product, the process and even the goals also. REFERENCES [1] [2] [3] [4] Aggarwal R.K. (2002) Essentials of Education technology management, Mark book. Anshah Pb. House, Delhi. Shukla,s Satish Prakas, Information and Agrawal Pb. Agra communication technology in teacher education. Jena, S. Sitansu, agaral Kuldeep,: Quality in School Education, Issues and concerns, National Institute of open Schooling, SHIPRA, Delhi. IGNOU online B.Ed. course book (2008) teacher training New Delhi, IGNOU. ISBN 1-63102-455-8 353 E-RESOURCE MANAGEMENT IN DIGITAL LIBRARY Shalini | Librarian | Chhotu Ram Institute of Law | Rohtak | crillibrarian83@gmail.com ABSTRACT: With the advent of information and communication technology and explosion of knowledge, the demands of digital information by the users are increasing on their desktop day by day. In the modern era of 21st centaury libraries has turned into the repository of e-resources. This paper presents an overview of e-resources (internet based electronic resources), management & their impact on library and information science. E-resources provide feasible solution to the library problems such as easy access, preservation, high storage and minimum space with multimedia documents and remote access to information collection. E-resources are resources in which information is stored electronically and it can be accessible through electronic systems and network environment. This paper present deals the need and role of Electronic Resource Management. KEYWORDS: E-Resources, Electronic Resource Management (ERM), ICT, Digital Library. INTRODUCTION Libraries are the integral part of the human society. Library is a knowledge centre which has rich information resources stored in different ways both in print and electronic form. In the modern era of information explosion electronic resources play a prominent role in facilitating access to accurate, timely and relevant information to the users. The main reason of accepting e-resources because of their many advantages such as easy accessibility, search facilities, simultaneous access to many users. Electronic Resource Management has become essential for the librarians for proper and best utilization of e-resources. What are E-Resources? Normally we can define e-resources as the resources or information gathered in electronic format. According to Library of Congress “An electronic resource” is defined as any work encoded and made available for access through the use of a computer. It includes electronic data available by (1) remote access and (2) direct access (fixed media). “ A collection of on-line publications giving author, title, date, place of publication, publisher, details of edition, pagination, series and some idea of contents etc.” In other words: Remote access refers to the use of electronic resources via computer network”. What is Electronic Resource Management? Electronic resource management (ERM) is the practices and software systems used by libraries to keep track of important information about electronic information resources, especially internet-based resources such as electronic journals, databases- papers-magazine and electronic books. The development of ERM became necessary in the early 2000s as it became clear that traditional library catalogs and integrated library systems were not designed to handle metadata for resources as mutable as many online products are. So that ERM should offer an integrated environment that supports both management and access, without maintaining duplicating system. The idea of developing electronic resource management emerged in 2001-2002, growing out of research by Tim Jewell at the University of Washington. The ERM place a key role in the coordination and management of content supplied by over 500 producers as well as freely available content. Even after two decades of digital presence in libraries and proliferation of electronic resources in term of production, acquisition and usage the management of e-resources remains a cumbersome process. In order to cope with the present development in IT, modern libraries are now adapting various electronic resources for its collection development to fulfill the requirements of the different users in a better way. For better management of global information, there is a need to develop and restructure the state of art of traditional library services to e-based services. CHARACTERISTIC OF ERM The ERM have following characteristic and function for development of digital libraries : 354 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education                Notify appropriate staff before licenses expire. Supporting acquisition and management of licensed e-resources Maintain current vendor contact information. Integrated into other library system modules or may be standalone system for eliminate data entry duplication. May have a public interface, either separate or integrated into the OPAC. Providing descriptions of resources at the package (database) level and relate package contents (e.g. ejournals) to the package record. Encoding and perhaps publicly displaying licensed rights such as e-reserves, course packs, and interlibrary loan. Tracking electronic resources from point of order through licensing and final access. Providing information about the data providers, consortia arrangements, access platform Providing contact information for all content providers. Logging problems with resources and providers. Providing customizable e-mail alerting systems (e.g. notices to managers when actions are expected or required). Linking license documents to resource records. Easily availability of funds to purchase resources. Update in real time. Why to adopt E-Resource Management for Digital Library? In a digital library, the location, identification and detaching information would be easier than manual system. Librarians are finding themselves a discouraging challenge of managing the ever growing collection of eresources of their libraries in addition to all other responsibility. The main problem arises in its exhaustive collection of information and user wants to search very specific information among the entire collection. So we need or require ERM. It is the library without walls. It allows to locate and search any library collection on network system irrespective of time, space or and social barriers. As the importance of e-resources to library collections grows, the skills needed to create, develop, grow and manage them have become increasingly valuable to modern information services and professionals. This practical step-by-step toolkit gives you a thorough grounding in all aspects of e-resource management including selection of content, developing workflows and knowledge bases, technologies, resource discovery, analysis and trouble shooting. The libraries are still trying to grapple with the issues of copyright, licensing, system compatibility, access speed and time, downloading, book marking etc. numerical. graphical or time based, as a Each of these issues are complex and at the same commercially available title that has been time interdependent. To avoid ambiguities, it would be necessary to have proper planning and management mechanisms. So we need ERM for digital library. The ERM Librarian has primary responsibility for the management of all aspects of our acquired electronic information resources are electronic resources, providing support for collecting activities including the identification of potential new products and coordinating the Library's trial program. Provides license support including initial negotiation and technical review to ensure that the licenses conform to University and Library requirements. Manages the ordering of new products and with other units, coordinates the cataloging activities related to e-resources. The ERM Librarian also supervises the ERM Manager and ERM Assistants. ERM systems for collection-development decision making: One of the great advantages of an e-resource management system-and indeed one of the goals of Verde-is to provide tools to assist librarians in the decision making surrounding collection development. Such tools include a global knowledge base, from which libraries can select resources; overlap-analysis reports; cost-usage analysis reports; and more. In a consortia environment, the system can also provide valuable information about the collections of member institutions, which should ideally be able to see what their fellow institutions have acquired or are considering acquiring and to share resources when relevant. The global knowledge base: Librarian who want to acquire a resource must learn which of many diverse 355 ISBN 1-63102-455-8 E-Resource Management In Digital Library sources will enable them to acquire it-and, clearly, a librarian cannot always be aware of all the available options. An ERM system can facilitate this process by providing a global picture of the e-resource world, a comprehensive knowledge base that describes what is available, including information about the packages, interfaces, and providers. Statistics: Increasingly, information vendors are making statistical data available to their customers in accordance with the Project COUNTER Code of Practice. Today, an ERM system can store user names, passwords, URLs and other information about access to the statistics hosted at the vendor's site. In the future, when such statistics are available in a standard XML schema, librarians will be able to download the statistics to an ERM system to use in cost-usage analysis reports. With the global e-resource offerings described in the universal e-resource knowledge base, the library's e-resource collection described in the local Verde database, and the library's expenditures expressed in the cost and usage entities, librarians can find new e-resources of interest; take advantage of information already available in the system when adding local information; and, when deciding whether to acquire, renew, or cancel an e-resource, use existing information related to that eresource and others. or, as Raschke and Weiner put it, "Imagine a resource management system with a sophisticated reports module where librarians could consult everything from cost per full-text article download to faculty retention requests over the last three years to average annual inflation rate. Our professional judgment about materials would be more informed and efficient while easily accessible usable data would enhance negotiation with users" (Raschke and Weiner, 2004). i ISSUES AND CHALLENGE There are many issues are still remaining unsorted for the point of view of management of Technology, sociological, legal issues. The issue covered wide range of aspects like acquisition, access restriction, authentication, copyright, preservation, software and other user interface. Management is not only about managing the process of selection, collection, processing, controlling and dissemination of information but also effective use of information and knowledge store in print and electronic format . Some of management issue like User interface and accessibility, Change in IP address, network connectivity and accessibility, lack of standardized format or web presentation, renewal policy, number of issues, funding, duration of agreement, etc. The challenge of e-resources management has provided us an opportunity to improve the value of holdings of our libraries and enable librarians to increase the visibility of parent institution. It has made possible to come out of traditional roles, made to work on developing local solution to manage e-resources. CONCLUSION Libraries in India are facing great challenges due to budget cut, reduced staff, and devaluation of rupee and increase in cost of publication. Due to these factors academic libraries are finding it difficult to buy required number of books and periodicals, and other resources which has resulted into the adverse impact on the research and development programmes. Users use digital library and e-resources as it reduces their physical strain and save their time. It minimizes expenses, keep accuracy and with minimum storage capacity etc .We know in the digital environment managing electronic resource is not an easy task. So to overcome this problem library professionals need to equip themselves with skills and techniques required for managing the changing needs of library users. For increasing the effectiveness and efficiency of the library services, it is necessary for library professionals to accept ERM and implement all new technologies in the libraries. REFERENCES [1] [2] [3] [4] [5] [6] [7] 356 Sharat Kaushik, Shesh Narayan, “E-Resources and its effects on Library and Information Science”. “Library Automation Issues and Remedies In Present Scenario” .P-89. https://en.wikipedia.org/wiki/Electronic_resource_management. Natasha Kaushik,” E-Resources management for digital library”. “Library Automation Issues and Remedies in Present Scenario” .P-106-107. www.exlibrisgroup.com http://Wikipedia Jewell Tim (2004) E-Resources management ://www.diglib.org Shilpi Goyal,,”E-Resources management for digital library”. “Library Automation Issues and Remedies in Present Scenario” .P-252. ISBN 1-63102-455-8 BIBLIOGRAPHIC INFORMATION SERVICE USING ZOTERO Dr. Jyoti Bhabal | Assistant Professor | SHPT School of Library Science | SNDT Women’s University | Mumbai | jyotibhabal@gmail.com Abstract: Zotero has been much explored by the researcher to manage their reference and cite the same in the standard citation styles. However, libraries may explore this software and use its features intelligently to start bibliographic information service in most effective manner. This paper brings library’s attention to the procedure for the same. INTRODUCTION The world of Information is blooming minute by minute; thousands of databases, journals are giving access to millions of articles. Researchers are continuously adding in the quantity of information as well as they are craving for information. In academic set up, research is carried out at Master Degree Programmes, at PhD level, and at post doctoral level. The students as well as faculty members are getting more and more involved in research and publication. Nowadays research and publication is very essential in the academic fraternity. Academic libraries are always part of library users’ research work. The most essential library service for researcher is ‘Literature Search’. Libraries may provide this service at mass level in the form of Current Awareness services (CAS) or at individual level in the form of Selective Dissemination of Information (SDI). In both the cases bibliographic information about new books, articles, audio or video are shared with the users. Though library users are provided with the access to different types of information sources, many users lack the precision in their retrieval. Traditionally, libraries were preparing ‘List of Additions’, ‘Subject Bibliographies’ to provide ready references on a given topic. Many times such list of references incites curiosity among the readers about the new subject and made them to access those references. In 1990s this was quite popular service offered by the libraries. Today, the advent of Web 2.0 and Web 3.0 allows libraries and its user to collaborate and share information on digital platform. Many open source software are available that can be explored by the libraries to provide effective and efficient services to the library users. This paper will discuss use of Zotero, open source software for providing literature search services. Zotero’s features discussed below are also useful for teachers for sharing references with the students. ZOTERO: CITATION MANAGEMENT TOOL “The name ‘Zotero’ is loosely based on the Albanian (yes, Albanian) word zotëroj, meaning ‘to acquire, to master,’ as in learning”.Zotero is a bibliographic management tool.It is developed by the Center for History and New Media of George Mason University (GMU). Zotero is a free, easy-to-use tool to collect, organizes, cite, and share research sources. It works on Windows, Linux, and Machintosh(“Zotero | Home,” n.d.).Zotero's core functionality enables libraries (users) to easily record the relevant citation information from online items and store them in a flexible personal database that can then be used to generate internal citations and/or bibliographies. Zotero is particularly well suited to record information from online sources (Fernandez, 2011) This tool is generally used by the researchers, students, faculty to manage their citations which they use for academic purpose. However, library too can use this tool to provide an innovative service to its patron. Teachers as well as students are getting more engaged in their research work. According to new curriculum pattern, students need to do lots of assignments, project work, dissertations, presentations, etc. In this scholarly environment, libraries may play its role by providing current awareness services to academic patrons. On one hand libraries may conduct literacy programmes on Zotero to teach how to use this application for citation management for their study, but on the other hand libraries can make use of this application for creating ready bibliographies for the researchers by forming specific groups on Zotero site. This would save tremendous time of researcher that they invest in literature search. ISBN 1-63102-455-8 357 Bibliographic Information Service Using Zotero ZOTERO GROUP TYPES Private Groups:  Private groups provide a means of collaboration among group members without creating any public face for the group online.  Only group members and users invited to join the group are able to see the group’s page.  Private groups are completely hidden from group searches. They are not shown on members’ public profile pages and will not appear in search engine results.  If administrators enable file sharing, group members can access and share files in addition to references. Public, Closed Membership:  Closed-membership groups are useful for creating a controlled group environment with a public presence. This allows a group to publicly present its work and sources, or develop new membership in a controlled fashion.  Anyone can view the group page, but the only way to join the group is by invitation or by requesting an invitation.  If the group has a library, administrators can choose to show or hide the library from non-members.  If administrators enable file sharing, group members can access and share files in addition to references. Public, Open Membership:  Open public groups are useful for the broadest discussion and collaboration.  The group page is public, and anyone who wants to can join instantly.  If the group has a library, administrators can choose to show or hide the library from non-members.  Open public groups do not allow file sharing.(“Groups [Zotero Documentation],” n.d.) Amongst the above groups, Private group or public group with closed membership would be ideal for a library to create a library of references. Library would need administrative control to share scholarly references amongst the library users. Procedure to start Current Content service using Zotero:  Download Zotero from http://www.mozilla.org/firefox . It works with few web browser namely Firefox, Google Crome and Safari. Figure 1: Zotero Home Page  The Zotero icon will appear in the address bar only on sites supported by a Zotero translator. To save citation from other sites, right-click and select "Save Page to Zotero." There are number of videos and documentation available on how to use zotero for referencing and citation management. Library staff must read those first to get familiar with this tool. 358 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education  To explore advance features of Zotero, library needs to create its account in Zotero by registering itself on Zotero site. Once the account is created library can synchronize all its searched references to save it all on cloud. (See Figure 2) Furtherby signing in Zoterowith library username and password, library may create groups according to its need i.e. Subject wise or user wise (See Figure 3). It will allow library to send invitation to concerned library users to join the group. Users would in turn accept invitation and will get register themselves to Zotero. As an administrator library may set up a group where only library staff can add reference or each member of the group may have rights to add new reference to the collection. Figure 2: Zotero Window showing list of articles saved in the zotero library The above figure 2 shows various options and parts of Zotero available for users. They are:        Button to create subfolders to organize collection of references. Relevant references from the main library are dragged into concerned folders. Button to create new group. Subfolders are created under the group and then relevant references from the main library are dragged into concerned folders. Display of subfolders Display of different groups created List of references saved in Zotero library Bibliographic details of individual reference Button to synchronize library virtually ISBN 1-63102-455-8 359 Bibliographic Information Service Using Zotero Figure 3 : Web page showing groups created by the Zotero user Figure 4: Display of Group Library Once groups are created, library staff can periodically add latest reference on the topic. Zotero is compatible to several databases, few of them are EBSCO, American Chemical Society (ACS) Publications, Cambridge Scientific Abstracts, EBSCOhost , Emerald, InfoTrac, JSTOR, LexisNexis, Medline, PubMed, ScienceDirect, Amazon.com, Chronicle of Higher Education, The Economist, Google Books, Google Scholar. A library staff may decide a day in a week to search across all the available online resources and may add more and more in reference library. Group members can view newly added references in the group library according to the date of addition. The collection of the references will remain for future use till the group exists. Member of the group may select required reference and read full text or generate bibliography. Library needs to conduct information literacy on use of Zotero, this would help user to manage citation and cite reference in their work. This “Groups” feature would be useful to teachers’ community also. Similar to the library, teacher may create groups for students and share latest references with students or colleagues. 360 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education CONCLUSION In conclusion, libraries must utilize open source software wisely to reshape library services. “Group” feature of Zotero can be explored more by the library which was initially introduced to provide opportunity for a researcher to create/ join group, follow other researchers’ group and build research network. As an administrator, library would manage its ‘Group Libraries’ on Zoteroas well as would archive references for future use. Additionally library would assist its user to form their research network. REFERENCES [1] [2] [3] Fernandez, P. (2011). Zotero: information management software 2.0. Library Hi Tech News, 28(4), 5–7. http://doi.org/10.1108/07419051111154758 Groups [Zotero Documentation]. (n.d.). Retrieved July 30, 2015, from https://www.zotero.org/support/groups Zotero | Home. (n.d.). Retrieved June 30, 2015, from https://www.zotero.org/ ISBN 1-63102-455-8 361 INFLUENCE OF INTERNET AND DIGITAL MEDIA ON LIBRARY SERVICE Jyoti Verma | Senior Library & Information Assistant | PK Kelkar Library | Indian Institute of Technology | Kanpur (IITK) | jyotiv@iitk.ac.in Abstract: The paper aims to understand the influence of the internet and digital media as an information source as well as tools by libraries and services. The internet has been described as the opportunity to a world of apparently endless information resources and a valuable information tool to the library and information centres. . The internet and digital media like PDA, Laptop, Tablet etc. provides strategic leadership in technology services in library. It maintains an evolving, robust and flexible technological infrastructure and provides responsive user support. Keywords: Internet, Digital media, Library INTRODUCTION 21st century set example of emerging technologies in libraries which are rich in both variety and quantity. The role of the library within and the services is rapidly changing. With the rise of online resources and latest technologies, libraries are enhancing user services and providing unmediated and independent access to library services. With new technology it’s started creating online community. Internet access has become a sign of a country’s socio-economic status in the Information Society. Consequently, the Web, the most popular part of the Internet, has become everywhere in reference services. Internet has become an integral part of library and information centres that helps in meeting the information requirements of the users in a timely manner 1. It’s allowed libraries to provide a better service to users by offering simple access to what, when and how they want it. To provide access to and market the optimal 24/7 content and service delivery, libraries are creating virtual communities through social software such as blogs, RSS feeds, Instant Messaging (IM), wikis and web conferencing. Library services are converting towards digital which encouraged the emergence of new LIS disciplines that have various titles such as digital librarianship or emerging technologies librarianship2. It required technological skills and experience, an understanding of metadata, and an ability to create and manage digital content. Digital Services and the Emerging Technologies are closed to each other. The Digital Services focuses on the technical and usability aspects of building digital platforms for users. The effect of internet: use on library: There are little technological advancement that has had as much impact on the dissemination of information as the internet, and especially the World Wide Web. It is not surprising then that this tool is also changing the way of readingor studied, taught and practiced today. This impressive infrastructure enables us to teach and study in an entirely different way. The web provides users with access to continuing education, and unparalleled communication between colleagues via e-mail regarding enhancing better library services. The educational web site may be used as a dynamic newspaper or bulletin board to disseminate information internally among the faculty as well as to the outside world. In addition, the web allows user access to related literature, applications and other resources depots. The internet is being used extensively in schools across the world. The use of the World Wide Web ranges from the simple to the spectacular. The Internet provides a means of communication at a distance for those people who have not facility of library. Influence of internet on libraries and its services: Internet is a great information source towards the academic and research area and also a great information tool to the library and information centres to addition their information support to the users. No other recent advance has impacted the library profession to such a great extent as Internet. It has changed the roles, paradigms, and organizational culture of libraries and librarians as well, which created impact on Library services by offering new modes of information delivery and a vast information source. Internet has been treated as an integral part of library activities and services and can be used successfully in house-keeping operations, extending Internet/Email facilities and, providing information services such as Computer aided reference services, electronic document delivery, Message alert service etc. 362 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education There is a continuation of the roles and functions of libraries and librarians, which appears to parallel the growth of acceptance and use of the Internet by library professionals. The innovative use of Internet technologies make possible us to reach both local and far-away users much more easily and effectively. Vast collection of information are available on the Internet. It has become difficult to say, what is not available on the Internet. Since the libraries are involved in acquiring, organizing and delivering the information to their end users, they have to fall in line with the changing mode of publishing and needs of users. Technologies such as email and Web provides tremendous opportunities for library professional to deliver the information to the desktops of our users. Web offers significant advantage by integrate different library & information services with a common user interface offered by Web browsers. Realising the potentials, many libraries are rushing to getting the connectivity. The effect of digital media: use on library: Now, we are finding the use of technologies and libraries are not exception for that. The single force that has brought innovative changes in functioning of libraries is Information Communication Technology (ICT). The introduction and application of these modern means have changed the value of library such as introduction of computer hardware, tablet, PC has developed interest in electronic texts or e-books, as they are most commonly called. This new hybrid of laptop computer and PDA (personal digital assistant), which a kind of writing tablet and offers convincing advantages for reading and writing texts. Following are some digital media which effect library services on large scale.    Laptop: Physical portability allows that a laptop can be used in many places— not only at home and at the office, but also during commuting and flights, in coffee shops, in lecture halls and libraries, at clients' location or at a meeting room, etc. The portability feature offers many distinct advantages. Palmtop/Personal Digital Assistant (PDA): A small computer that literally fits in your palm. Compared to full-size computers, palmtops are severely limited, but they are practical for certain functions such as phone books and calendars. Palmtops that use a pen rather than a keyboard for input are often called hand-held computers. Mobile: Mobile provides wireless coverage and seamless transactions which works as catalyst for eusers. Today mobile is very common and popular device in amongst peoples due to easily access. As we know Mobile is portable device, user can retrieve the information through their mobile at any time. Most of people prefer to mobile for accessing the information.4 ISBN 1-63102-455-8 363 Influence Of Internet And Digital Media On Library Service CONCLUSION Libraries accept the significance of Internet in library activities and services. The librarians have to boost themselves, think creatively and adopt the new technology to generate services and resources where skills of structuring and organizing resources are put to its best use. Libraries tended to offer both end-user and intermediary searching to online databases. The libraries are making use of Internet services mainly WWW and e-mail and efforts have to be made to understand and utilize the significance of newsgroups, discussion forum, and chatting service etc. for the benefit of library activities and services. Libraries develop electronic reference as a core service, and that librarians increase their Internet and online instruction efforts by using e-mail, Web tutorials and virtual classrooms to reach users. Further, skills and techniques for internet use should be learnt by undergoing training and constant use of internet so that, the library activities can be used better in the interest of the institutional goals. Internet is not going to replace traditional libraries but supplements the library activities and services. REFERENCES [1] [2] [3] [4] [5] 364 Jange, S., & Sami, L. K. (2006). Influence of Internet on library and information centres of National Institutes of Technology in India. Annals of library and information studies, 53(4), 184. Available at: http://nopr.niscair.res.in/bitstream/123456789/7483/1/ALIS%2053(4)%20184-197.pdf Kajewski, M. (2007). Emerging technologies changing our service delivery models. The Electronic Library, 25(4), 420-429. Available on http://www.emeraldinsight.com/doi/full/10.1108/02640470710779835 Naqvi, S. H. (2007). Impact of internet on library and information services. Library Herald, 45(1), 5160. Available on : http://ir.inflibnet.ac.in/bitstream/1944/279/1/Inf_5.pdf Verma, J., & Sonkar, S. K. (2013). Impact of E-Resources and Web Technology on Reading Habits. Challenges of Academic Library Management in Developing Countries, 68. Libraries and Internet. ERIC Digest Available on : http://www.ericdigests.org/1995-2/libraries.htm ISBN 1-63102-455-8 MOBILE PHONE BASED LIBRARY SERVICES Dr. Anil Kumar Dhiman | Information Scientist | Gurukul Kangri University | Haridwar | akvishvakarma@rediffmail.com Abstract: The first one and half decade of 21st century has witnessed great changes in acquiring, storing and dissenting of information. Internet and World Wide Web has completely changed the whole scenario. Nowadays, we have mobile phones through which people communicate and organize information effectively. Various opportunities exist for library and information centers to provide effective services to their users through mobile technology. This paper discusses about the mobile phones and their possible usage in providing library services. Key Words: ICT, Mobile phones, SMS and WAP. INTRODUCTION Information & communication technology or ICT that is the combination of information and communication technologies (Dhiman, 2003; Dhiman and Rani, 2012) has brought major changes in every body’s life. It has also changed the way of storing, retrieving and disseminating the information. The libraries in ancient times were “collected and organized clay tablets but today’s libraries seek to support the rapidly growing computer tablet ownership within our community and must respond to new circumstances with new services” (Schmidt, 2013). Therefore, ICT has collapsed barriers and promoted fast communication and interactions across the boundaries. Internet and the proliferation of mobile phones have lead to a change in the way individuals communicate – and how reference queries are communicated in libraries. For a number of years, libraries have received queries in person, via telephone conversations, and (over the last decade) through the use of email and online Web-based forms (Giles and Grey-Smith, 2005). But now information is becoming intertwined with our lives more profoundly through mobile connectivity than is the case when we sit down at a desktop or even with a laptop computer. Further, the use of mobile phones is increasing day by day. According to Taylor and Starling (2004), around a third of a million new subscribers join the world’s mobile phone services every day. So, mobile technology is altering and extending the ways we communicate, teach, learn, entertain ourselves and make decisions. Khare (2009) mentions– our librarians are in move to determine how these mobile devices are affecting information access and ensure that they are communicating with patrons and providing web content in the most appropriate and effective ways. MOBILE PHONES A mobile phone or mobile that is also called cellphone and handphone can be defined as “an electronic device used for mobile telecommunications (mobile telephone, text messaging or data transmission) over a cellular network of specialized base stations known as cell sites” (http://en.wikipedia.org/wiki/Mobile_phone). Although “mobile devices have been in popular use for some time, but today’s mobile devices boast large color displays, high resolution, multi-touch capabilities, significant computational horsepower, and high-speed connectivity. In combination, these features dramatically alter the possibilities and experience of mobile information access today in comparison to even just a few years ago. The rich developer tools available for today’s mobile devices also make it easier than ever to build and deploy mobile applications” (Broussard et al., 2010). Today’s smartphones, are similar to mobile phones but they offer advanced capabilities like computers functioning. They run complete operating system software providing a standardized interface and platform for application developers. In other words, they may be called as miniature computers which have phone capabilities. Now, bluetooth, accelerometers, and multitouch screens, as well as text messaging, smartphone software applications, mobile websites, global positioning systems (GPS), wi-fi, and media creation and capture tools, are all part of the mobile environment. Most of the browsers of today’s mobile phones allows browsing ISBN 1-63102-455-8 365 Mobile Phone Based Library Services sites online and helps the user to search information from all the access points. Though, they can differ greatly in terms of their operating systems supported but they can display most websites and offer page zoom and keyboard shortcuts. 3G and 4G mobile phones display very rich contents of websites fastly. Due to popularity and easy availability of mobile phones, many libraries have started to optimize their web sites for mobile devices. There are various advantages of using mobile phones for library services. One of the major advantages is that the users of the library can access 24x7 services from anywhere. Like the desktops and the laptops, there is no problem of charging mobile phones, they can last over for many hours. Besides, portable power banks are also coming which recharge mobile phones comparatively for long duration. Mobile – Phone Based Services for Libraries: Mobile phone is one of the tools that may hold some answers to some of the challenges faced by librarians in terms of meeting the information needs of their users (Kakana, 2009). Thus, seeing the future and popularity of mobile phones, libraries are switching over to provide mobile phone based services to their users. Many types of library services can be provided using mobile phones. They can better serve their users by “embracing the growing capabilities of mobile technology. They can promote and expand their existing services by offering mobile access to their websites and online public access catalogues; by supplying on-the-go mobile reference services; and by providing mobile access to e-books, journals, video, audio books, and multimedia content” (Kroski, 2008). “Mobile devices and services therefore provide tremendous flexibility for those who wish to take advantage of library services. With a simple 3G connection, a user lying on a beach can access e-books and multimedia content via his or her local library” (Vollmer, 2010). However, broadly saying, SMS and WAP services are two basic services which can easily be delivered through mobile phones. Based on Khare (2009) and Ye (2010), these two are detailed out below. SMS (Short Message Service): Short Message Service or SMS is the most basic and much used facility of mobile phones. It is a technology that enables the sending and receiving of messages between mobile phones. As this service is a mature technology with full functions and strong two-way quality, libraries can apply the SMS for following operations:    SMS Notification: Library system does daily check circulation database of readers in regular, if any book is about to expire or has extended, then the system will send reminder messages to users’ preestablished phone number. Libraries may send the recent book titles as per the different needs of readers for increasing reader's attention in collection via SMS. Announcement of public information to readers can also be sent so that readers can understand the library services. SMS Query: Readers can make queries and reservations via SMS. Readers may edit messages with personal information, sending to the library server and the server will judge whether the input library information is correct or not, while send query results of the appropriate bibliographic information to readers. Readers may also be informed by SMS query to renew books or make an appointment of books, and to realize reservation operation, by sending SMS commands to renew or make an appointment, then the system returns replies via SMS. SMS Consultation: Readers can send consultation request via SMS, the library SMS management system will automatically send format answers back to users. It may also be sent to readers in the form of SMS by reference librarians. There are also many free SMS messaging services available in World Wide Web. Google SMS enables you to send queries as text massage over your mobile phone or device and easily get precise answers to our questions, No Links, No web pages, just text and information in seconds. Merriam Webster (online) is mobile subscription facility, and just by putting the mobile number we get the word information just by messaging. Besides, many 366 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education social network sites, for example, the Twitter and Peekamo and instant messenger services, like Yahoo and Rediff allow sending and receiving of free SMS between web and mobile phone. Library OPAC system is now mobilized by facility of text message to check the availability and other details of books. An example of mobile OPAC is shown in figure 1. The publishers may also send the extracts from books out via SMS. Besides, the websites are now giving the option of sending contents via SMS. That is why some libraries have begun to offer customized mobile applications for their online public access catalogues (OPACs). But little research has investigated the relative costs and benefits associated with developing such applications. Figure 1: An Example of OPAC on Mobile Phone (Source: http://lib.de.us/mobile-app/) WAP (Wireless Application Protocol) Services: Wireless Application Protocol or WAP technology allows users to use wireless devices like mobile phones online, through the small screen to access various websites. WAP-based mobile phone library offers more services than SMS. Using the structure of WAP mobile phone platform, libraries generally use its following applications:    User Management: It includes user registration, cancellation, and library cards report of loss. WAP Information: It refers to a number of static information published by library. Here, the readers can browse according to their need, such as the general situation of library, library rankings, opinions and suggestions, information and appointments etc. Knowledge Service of Users: It means that readers need to develop a personalized interactive service, such as due notice, book reminder, library announcements and consulting services. Figure 2: An Integrated Approach for Social Media on Mobile Phones (Source: www.smartcities.info) ISBN 1-63102-455-8 367 Mobile Phone Based Library Services Some libraries are offering “text-a-librarian” services ideal for simple questions that can be answered with a brief response. Various “apps” which are the computer program or the set of software that the end user perceives as a single entity as a tool for a well-defined purpose, are available on mobile sites. They can be used for library services. Besides, social networking sites can also be accessed using mobile phones and instruction for various library services that can be routed through them. An example for integrated approach for social media on mobile phones is shown in figure 2. Some other services are also on the move to be provided over the mobile phones. Important of them based on Jharotia (2015) are listed below:     Academic affairs administration that is meant for latest news and notices from any university/specific organization. Users can select a menu and can see the results which are designed specifically for mobile viewing of email notices of new books and journal articles. E-contents access can also be provided for a variety of databases and digital resources such as the ebooks, theses and dissertations and e-journals etc. Library guides which gives users the best of library guide information such as library use guide, question answering services and library statistics delivering rich contents in a way that works best for users. Mobile based library lending services can also be initiated through mobile phones where libraries can formulate regulations for using mobiles for circulation or reading materials and maintenance of users’ accounts. ILL/document delivery can be made faster using mobile technology. Besides, research consultation and instruction that is a kind of customer care service and reference services may also be provided over mobiles. One step ahead wifi internet access can also be given to the users over mobile phones. Issues concerned with the Use of Mobile Phones: Mobile devices and services deliver or interact with digital content that is more easily tracked and associated with individual users than other forms of information. But as Vollmer (2010) warns – the change from in-person interaction with patrons and content to increasingly virtual, digital, and mobile interaction creates unique challenges for libraries. He says that privacy is one of the most concerned issues in using mobile technology. Libraries have developed strong privacy protections for their users, especially in relation to borrowing records. When users check out physical media such as books, magazines or multimedia materials, they can be assured that the library will not reveal their circulation records or other personal information. But information technology, by contrast, offers the nearly limitless ability to capture granular information on both users and uses of content, with important consequences for freedom of inquiry. While most large data networks are relatively secure and most libraries take care to secure their wi-fi networks, but users communicating from outside of the library may be texting, emailing, or sending/receiving other information via unsecured networks may loss the privacy. Secondly, the diversity and richness of library resources are on full display within the physical library building. Users can speak with librarians, browse the stacks, and use desktop computers for an immersive information search and retrieval experience. But due to the practical considerations—such as connectivity, hardware, and mobile interface design—the library experience through mobile technology has not yet reached this level of interactivity and connectedness. But inspite of above shortcomings, mobile technology holds great promise for enabling libraries to provide enhanced services in a form users and it is increasingly demanding. Therefore, as suggested by Iwhiwhu et al. (2010) library management should explore the possibility of providing mobile phone library services while liaising with mobile phone operators with improved transmitting frequency to avoid network failure at reduced tariff. Telecommunication infrastructures should be put in place for efficient and effective communication between library users and staff, which will engender mobile phone library services. Besides, the library users and staff should be educated on the proper use of mobile phone for library services to eliminate abuse. 368 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education CONCLUSION It can be said that “with the ubiquity of today’s sophisticated mobile devices, information access has shifted increasingly away from the desktop and into mobile environments” (Broussard et al., 2010). Thus, mobile libraries has taken a new mode of information dissemination where at any time and at any place, any person in any way can read any content of interest become a reality, which not only greatly enrich our world creating a more diverse network of information dissemination, but also from the popularity of the network is creating a greater value. But as Lippincott (2008) highlighted, for the mobile library service to be effective, libraries should “consider their re-tooling for mobile users and mobile devices, they should examine the consequences of mobility and the opportunities for innovation in the areas of content, system and tools, services and environment, both physical and virtual”. Further, the librarians have to understand fully the capabilities and potentials of the mobile technology and its use in libraries in near future by providing the quality based services matching with the needs of the user as suggested by Khare (2009). Thus the paper can be ended by saying, opportunities are existed there but the need is to encash them in the favour of libraries to provide maximum benefits to their users. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] Broussard, R., Zhou, Y. and Lease, M. (2010). Mobile Phone Search for Library Catalogs. ASIST October 22–27, 2010 held at Pittsburgh, PA, USA. Available at: https://www.ischool.utexas.edu/~ml/papers/broussard-asist10.pdf. Dhiman, A.K. (2003). Basics of Information Technology for Librarians and Information Scientists. 2 Vols. Ess Ess Publications, New Delhi. Dhiman, A.K. and Rani, Yashoda. (2012). Manual of Digital Libraries. 2 Vols. Ess Ess Publications, New Delhi. Giles, Nicola and Grey-Smith, Sue (2005). Txting Librarians@Curtin. Available at: conferences.alia.org.au/online2005/papers/a12.pdf. Iwhiwhu, B. E., Oghenero, R. J. and Aroghene, E. (2010). Mobile Phones for Library Services: Prospects for Delta State University Library, Abraka. Library Philosophy and Practice (e-journal). Paper 346. Available at: http://digitalcommons.unl.edu/libphilprac/346. Jharotia, A.K. (2015). Mobile Applications and Technologies for Libraries: An Overview. In Salek Chand, M. Natrajan and R.N. Malviya edited “Knowledge Organization in Academic Libraries: Digital India– Digital Libraries”. Library Professionals Association, New Delhi. Pp. 155-170. Kakana, F. (2009). Information Provision to Students using Mobile Phones: A Case Study of the University of Zambia Library. Zambia Library Association Journal. 24 (1-2): 20-28. Khare, N. (2009). Libraries on Move: Library Mobile Applications. In Jagdish Arora edited `E-Content Management: Challenges and Strategies (CALIBER-2009 Papers). INFLIBNET, Ahemdabad. Pp. 272-278. Kroski, Ellyssa (2008). On the Move with the Mobile Web: Libraries and Mobile Technologies. Library Technology Reports. 44 (5). Available at: http://www.alatechsource.org/ltr/on-the-move-with-the-mobile-weblibraries-and-mobile-technologies. Lippincott, J.K. (2008). Mobile Technologies, Mobile Users: Implications for Academic Libraries. ARL. 261: 1-4. Schmidt, J. (2013). LIS: Investigations. INCITE. 34 (3): 14. Taylor, S. and Starling, A. (2004). A Billion Internet-enabled Mobile Phones. Web Developers Journal. Available at: http://www.webdevelopersjournal.com/articles/billion_wap.html. Vollmer, T. (2010). There’s an App for That! Libraries and Mobile Technology: An Introduction to Public Policy Considerations. ALA Office for Information Technology Policy Brief No. 3. American Library Association, Washington (USA). Ye, Chao (2010). Application and Trend of Mobile Digital Library Services. Proceedings of the 2010 International Conference on Information Technology and Scientific Management. (ICITSM 2010 E-BOOK). Scientific Research Publishing, USA. Pp. 170-173. ISBN 1-63102-455-8 369 CHALLENGES IN SETTING UP THE WEB BASED ONLINE PUBLIC ACCESS CATALOGUE (WEB OPAC) AT LIBRARY CUM DOCUMENTATION CENTRE OF ICHR: A CASE STUDY Ramesh Yernagula | Dy. Director (Doc.) | Indian Council of Historical Research | New Delhi | ryernagula@gmail.com, dd.doc@ichr.ac.in Abstract: This paper explains the Challenges encountered in setting up the Web based Online Public Access Catalogue (Web OPAC) of LibSys 7 in the Linux Server and its integration with NATTING functionality of Cisco Router 9091 for automation of Library cum Documentation Centre of Indian Council of Historical Research. LibSys is a commercial library automation package. The developer has made benchmarking general purpose automation software for the library housekeeping services. The paper also shares the technicality for hosting the Web Opac with limited resources and helps the Libraries who are interested to host their LAN OPAC into WebOpac. Keywords: WebOpac, Cyberoam, Natting INTRODUCTION The Library cum Documentation of ICHR is a premier National Resource Centre for historical collection in the Country. The collections consisting of books, journals, microfilms, microfiches and rare special reference books etc. Library automation is the application of Information and Communication Technologies (ICTs) to bring the automated library operations and services. There are number of modern commercial and open/free source software's available integrating various features to automate the operation of library and documentation centre in the profession. Adopting commercial or open/free source software in library automation has some merits and demerits. Depending on the need of Library cum Documentation centre, we chose the Libsys 7 in terms of comparative statement prepared among software to select the software for automation. An OPAC is a mirror of library services. “An OPAC provides the users online access to the library’s catalogue allowing them to search and retrieve records from the online catalogue and depending on the underlying library management software, it also offers several other facilities such as online reservation, borrower status checking and so on” (Ansari and Amita, 2008). “Library catalogue is a primary source of information for the Library’s key resources whether access to them via OPAC or the Web” (Kennedy, 2004). "OPACs are the interfaces and very valuable extensions of the functionality that help user communicate with the collections of a library. The 3rd generation OPACs incorporates features that are characterized by the facilities of World Wide Web (WWW)"( Madhusudhan, m 2011). The Web OPAC module of LibSys 7 is one of the strongest feature for selection of this software. Main functionality of Libsys 7 Web OPAC: These features are succinctly briefed here after comprehensive study of Libsys 7.  Online Public Access Catalogue (OPAC) searchable through the Council website.  Having provision to access the federated Search on local as well as external databases for more fruitful search results.  Has provision to review or rate the title (s) by users in the Webopac.  Having provision can User may give feedback and recommendations through OPAC for purchasing new books. Helps the librarians to judge the needs of the members and accordingly purchase new titles.  User may give feedback and recommend new titles through webOPAC. 370 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education    Having provision of Bulletin Board is available in OPAC for sharing any important information related to Library & Documentation services. Having provision of RSS Feeds. Online information, advertisements and alerts can be fed into the Web OPAC to provide live information / updates to users. Having provision of Z39.50 protocol compliance. software allows catalogue searching which are available on the Internet. Retro conversion of books & journals: The Library cum Documentation Centre has been successfully retro covered more than 50000 records in AACR2 format through Libsys 7. These records are accessible WebOpac of ICHR. Libsys Setup at ICHR: The below Table 1 describe our server installation setup against the minimum recommendation of LibSys developer. The server was acquired in the year 2011. Table 1: LibSys Sever setup developer recommendation wise setup System LibSys Setup at ICHR Server Application Server IBM: CPU: 3 GHz Xeon processor or latest, RAM: Minimum 6-8 GB, HDD: 160-250 GB SCSI or SAS HDD R J-Boss or Tomcat. RDBMS MySQL Operating System Red Hat Linux 9.0 or above. Web Server Apache (Linux) WebOPAC Router for ISP Gateway & NATTING Issue Firewall for Anti Spam . Clients Configuration Cicso Router 9091 Cyberoam Cing100 Pentium IV (or higher) work station, 2GB RAM, 300GB Hard Disk Drive, CD-Drive, Network adapter, Monitor, Preinstalled Windows XP WebOpac of ICHR Screenshot: ISBN 1-63102-455-8 371 Challenges in Setting up the Web Based Online Public Access Catalogue (Web OPAC) At Library cum Documentation Centre of ICHR: A Case Study Major Challenges: We proposed for the automation for Library cum Documentation Centre in 2011. The Competent authority were pleased to accept the proposal for Libsys 7 software and did initiate the retro conversion for books & journals in April 2011. The task was completed in 2012 and made available in Libsys Server OPAC with the following constraints:  Lack of Technical expertise  Lack of Local area Network (LAN) Server  Lack of internet leased line  Financial constraints Until we resolve the above problems, it is not possible to access WebOpac, at the same time, we had initiated to set up to the Local area network (LAN) in T5 category for the entire office and have finished setting to up the Local Area Network (LAN) and made available to access OPAC across the Council in January, 2013. Thereafter, proposed for internet leased line for hosting the Opac on Web. We received an immediate support from the authority to go ahead with limited facilities due to financial constraints i.e 1 mbps speed of internet & a small modem to configure the IP range to access the WebOpac. Meanwhile, the change of administration, we got very good moral and financial support to enhance the infrastructure of the same i.e 1 mbps to 4mbps speed of internet & a modem to Cicso Router and Cyberoam for firewall and Netting Issues. How to forward IP of WebOpac without LAN Server: As such our office doesn't have LAN Server. Hence, it is not possible without LAN Server to fix the Public IP for WebOpac. The Technical expert advised us to fix it in the Router which is using for internet Gateway services and avail its Netting functionality. It was success for configuring the WebOpac and made available in the homepage of ICHR. I wanted to say if the institute/organisation having internet leased line and their library is interested to setup the Web based OPAC subject to availability of their LMS in the server than it is possible to fix the problem for WebOpac Router: The Council has acquired Cicso 2911 for actualization of internet bandwidth alongwith Neting functionality. Cyberoam Unified Threat Management(UTM): Cyberoam Firewall offers stateful and deep packet inspection, zero-hour protection by blocking intrusion attempts, against malware, Trojans and The Gateway Anti-Virus and Anti-Spyware solution. Screenshot of Netting issue: "Network address translation (NAT) is a function by which IP addresses within a packet are replaced with different IP addresses. This function is most commonly performed by either routers or firewalls. This sample chapter from Cisco Press focuses on NAT within routers".( Doyle, J & Carroll, J.2002) 372 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Finally, We successfully implemented with cooperation of the Competent authority of the Council by August 2014. The OPAC is customised to access users in both home page & tab of Library cum Documentation Centre. CONCLUSION Nevertheless, i can state that to facilitate users to access the Web OPAC is the ultimate solution for effective access of library collections and services. ACKNOWLEDGEMENT This work would have not been possible without the continues financial support and moral encouragement of the institute. REFERENCES [1] [2] [3] [4] [5] [6] [7] Ansari, Mehtab Alam, and Amita. (2008). Awareness and Use of OPACs in Five Delhi Libraries.The Electronic Library 26, no.1: 111-29. Doyle, J & Carroll, J.(2002). Network Address Translation, Cisco Press Indu Bhushan,etc. (2011). Migration to web-based library management (libsys 7) and its integration with RFID client software (lsmart),RRI. Kennedy, M.R. (2004). Dreams of perfect programs: managing the acquisition of electronic resources library collections, Acquisitions, & Technical Services 28, no.:449-58. Margam Madhusudhan, (2011). Branding & Marketing, &Strategic Direction, Best Practices & Performance Evaluation of Special Library Services, ICoASL. http://www.libsys.oc.in http://www.ichr.ac.in ISBN 1-63102-455-8 373 APPLICATION OF RADIO FREQUENCY DENTIFICATION TECHNOLOGY (RFID) IN LIS MEDIA CENTRE Vijay Singh | Librarian | (Sushant School of Art & Architecture) | Ansal University | Gurgaon, Haryana | Vijaylibrary1980@gmail.com Vijay Singh Chauhan | Chief Librarian | Bhopal Memorial Hospital & Research Centre | Bhopal | chauhanvijaysingh@rediffmail.com Devendra Mani Pandey | Deputy Librarian | Madan Mohan Malaviya University of Technology | Gorakhpur | dmpandey16@gmail.com Abstract: RFID (Radio Frequency Identification) systems have been used in libraries and LIS Media centre for multiple purposes. RFID developed for military applications in the 1940s, it had found its application in many other areas including the libraries. The system components, standards and protocols for RFID based systems with special reference to library application are discussed in detail. Also discussed are the advantages and disadvantages of RFID application in libraries. This paper briefly traces the origins of this technology and its applications in various sectors. Keywords: Radio Frequency Identification, RFID, Surveillance Systems, Security, Libraries. INTRODUCTION The rapid growth and development of computer and communication technology has changed our society tremendously. To meet the information explosion and high demand of information the libraries are now upgraded to digital library from traditional one. Digital Library service can be regarded as a dramatic improvement of certain aspects of traditional library services. The main purpose of digitization is to overcome the twin tyrannies of time and space.  Radio-frequency identification is emerging as a good way to improve automation and security in Library Systems. For more than five years, libraries all over the world have been taking advantage of radio-frequency identification (RFID) technology. Current market research shows that RFID systems are now used in about 20 million books worldwide. The driver for today's libraries to adopt RFID is the need to increase efficiency and reduce cost. Automation and self-service can help libraries of all sizes toward achieving these aims, and RFID has the added advantage that it can also provide security for the range of different media on offer in libraries. OBJECTIVES OF THE STUDY The main objective of this study was to examine the use of RFID technology in LIS Media Centre for various purposes. In particular:  To analyze the extent of feasibility of RFID in LIS Media center  To identify the efficacy of digital technology in combating ubiquitous thefts  To identify the problems associated with RFID effectiveness  To develop a synergy between RFID facility and library requisites by their juxtaposition  To find the prospects of RFID in digital libraries Rfid (Radio Frequency Identification) Technology: RFID is the latest technology to be used in library theft detection systems. As of late 2005, an estimated 300 libraries were using RFID systems. Unlike EM (ElectroMechanical) and RF (Radio Frequency) systems, which have been used in libraries for decades, RFID-based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling. 374 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Figure 1: RFID technology used in library RFID is a combination of radio-frequency-based technology and microchip technology. The information contained on microchips in the tags affixed to library materials is read using radio frequency technology regardless of item orientation or alignment (i.e., the technology does not require line-of-sight or a fixed plane to read tags as do traditional theft detection systems) and distance from the item is not a critical factor except in the case of extra-wide exit gates. The corridors at the building exit(s) can be as wide as four feet because the tags can be read at a distance of up to two feet by each of two parallel exit sensors. (The devices used for circulation and inventorying are usually called “readers” while the ones used at building exits are usually called “sensors.”) The tags or targets used in RFID systems can replace both EM or RF theft detection targets and barcodes, although the system that 3M introduced in 2000 replaced only barcodes in the belief that EM is superior to RFID for security. [3M did introduce a comprehensive RFID product that replaces both EM and barcodes in 2004]. The Benefits of RFID Technology:  Rapid Charging/Discharging: The use of RFID reduces the amount of time required to perform circulation operations. The most significant time savings are attributable to the facts that information can be read from RFID tags much faster than from barcodes and that several items in a stack can be read at the same time. The other time savings realized by circulation staff are modest unless the RFID tags replace both the EM security strips or RF tags of older theft detection systems and the barcodes of the automated library system—i.e., the system is a comprehensive RFID system that combines  Security and the tracking: It offers very high security. Each tag is identified by a Unique Identification Number (UIN), which can be either factory or manually programmed and then password protected. The excellence of this tag is that the data on the chip that uses sophisticated algorithm techniques cannot be duplicated or manipulated. Hence making it the perfect tool for Secure Access Control.  Simplified patron self-charging/discharging: For patrons using self-charging, there is a marked improvement because they do not have to carefully place materials within a designated template and they can charge several items at the same time. Patron self-discharging, which can be achieved by installing readers in book drops or with self-discharge stations, shifts work from staff to patrons. ISBN 1-63102-455-8 375 Application of Radio Frequency Dentification Technology (RFID) in LIS Media Centre     High reliability: The readers are highly reliable. Several vendors of RFID library systems claim an almost 100 percent detection rate using RFID tags. Anecdotal evidence suggests that is the case whenever a reader is within 12 to 14 inches of the tags, but there appears to be no statistical data to support the claims. High-speed inventorying: A unique advantage of RFID systems is their ability to scan books on the shelves without tipping them out or removing them. A hand-held inventory reader can be moved rapidly across a shelf of books to read all of the unique identification information. Using wireless technology, it is possible not only to update the inventory, but also to identify items, which are out of proper order. Automated materials handling: Another application of RFID technology is automated materials handling. This includes conveyor and sorting systems that can move library materials and sort them by category into separate bins or onto separate carts. This significantly reduces the amount of staff time required to ready materials for reshelving. Given the high cost of the equipment, this application has not been widely used. There were approximately 70 systems in use in North America as of the second quarter of 2005. Long tag life: Finally, RFID tags last longer than barcodes because nothing comes into contact with them. Most RFID vendors claim a minimum of 100,000 transactions before a tag may need to be replaced. Drawbacks of RFID Technology:  High cost: The major drawback of RFID technology is its cost. While the readers and sensors used to read the information are comparable in cost to the components of a typical EM or RF theft detection system.   Vulnerability to compromise: It is possible to compromise an RFID system by wrapping the protected material in two to three layers of ordinary household foil to block the radio signal. Clearly, bringing household foil into a library using RFID would represent premeditated theft, just as bringing a magnet into a library using EM technology would be. It is also possible to compromise an RFID system by placing two items against one another so that one tag overlays another. That may cancel out the signals. This requires knowledge of the technology and careful alignment. Removal of exposed tags: 3M, which recommends EM for security and RFID for tracking, argues that EM strips are concealed in the spines (30 percent of customers) or the gutters (70 percent of customers) of books and are, therefore, difficult to find and remove; while RFID tags are typically affixed to the inside back cover and are exposed for removal. The author found no evidence of removal in the libraries he visited, nor did any of the library administrators contacted by telephone report a problem. That does not mean that there won’t be problems when patrons become more familiar with the role of the tags. If a library wishes, it can insert the RFID tags in the spines of all except thin books, however, not all RFID tags are flexible enough. A library can also imprint the RFID tags with its logo and make them appear to be bookplates, or it can put a printed cover label over each tag.  Exit sensor problems: While the short-range readers used for circulation charge and discharge and inventorying appear to read the tags 100 percent of the time, the performance of the exit sensors is more problematic. They must read tags at up to twice the distance of the other readers. The author knows of no library that has done a before and after inventory to determine the loss rate when RFID is used for security. Lacking data, one can only conjecture that the performance of exist sensors is better when the antennae on the tags are larger. Perceived Invasion of Patron Privacy: There is a perception among some that RFID is a threat to patron privacy. It is argued that the tags contain patron information and/or title information; and that the tags can be read from a distance after someone has taken the materials to home or office. 376 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education The vast majority of the tags installed in library materials contain only the item ID, usually the same number that previously has been stored on a barcode. The link between borrower and the borrowed material is maintained in the circulation module of the automated library system, and—unless a library takes the unusual step of retaining patron borrowing histories—is broken when the material is returned. When additional information is stored on the RFID tag, it is limited to information about the item, typically holding location and call number, but rarely author and/or title. The RFID tags can only be read from a distance of two feet or less because the tags reflect a signal that comes from a reader or sensor. It is, therefore, not possible for someone to read tags from the street or an officebuilding hallway. In order to read tags from a distance of more than two feet, it would be necessary to greatly enlarge the tags or greatly increase the power of the readers. A library has no reason to purchase larger, more costly tags. An electrical engineer at N.V. Philips in the Netherlands estimated that it would require a truckmounted reader to read the tags used by libraries from a distance of more than ten feet. Perceptions, even when mistaken, may have real consequences. The Intellectual Freedom Committee of the American Library Association has responded to concerns about RFID raised by privacy advocates by drafting a set of principles:  Implement and enforce an up-to-date organizational privacy policy that gives notice and full disclosure as to the use, terms of use, and any change in the terms of use for data collection via new technologies and processes, including RFID.  Ensure that no personal information is recorded on RFID tags, which, however, may contain a variety of transactional data.  Protect data by reasonable security safeguards against interpretation by any unauthorized third part.  Comply with relevant federal, state, and local laws as well as industry best practices and policies.  Ensure that the four principles outlined above must be verifiable by an independent audit. The Council of the American Library Association adopted these principles on January 19, 2005. The Intellectual Freedom Committee has continued its work and introduced a set of guidelines for RFID use for discussion at the 2006 ALA Mid-winter Meeting in San Antonio. Among them, the following are the most significant:  Libraries should not use RFID systems to track individual library users Libraries should remove any personally identifiable information from statistical data collected by RFID system.  Due to the potential for eavesdropping, libraries should use hardwire connections and not wireless connections for all communications between RFID systems and the ILS involving personally identifiable information.  Libraries should encrypt information on RFID tags.  Libraries using “smart cards” should use an “opt-in” system that allows library users to choose between “smart cards” and barcode-enabled cards.  Libraries should be aware that independent researchers have concluded that current RFID technology cannot preserve user privacy in the library. The area in which RFID represents the greatest potential threat to patron privacy is the use of the “smart card” as a patron ID card. A “smart card” is an RFID card with encryption. That would make it possible to have the ID card also function as a “debit” card, with value added upon pre-payment to the library and value subtracted when a patron used a photocopier, printer, or other fee-based device, or wished to pay fines or fees. Almost none of the score of RFPs the author has examined include a mandatory requirement for ‘smart cards.” The few that do, ask for that as an option. All stipulate encryption to protect patron privacy. The quality of the encryption is the key to patron privacy. Because of the attention that has been focused on privacy issues, it is important to educate library staff and patrons about the RFID technology used in libraries before implementing a program. The best way to do that is to emphasize that RFID technology is not one technology, but several. E-Z pass is RFID that is meant to be read from a distance. It would be impractical to affix tags of that size and cost to library materials. The same is true of the tags used on pallets in warehouses. Further, a library should stress that it does not store patron information ISBN 1-63102-455-8 377 Application of Radio Frequency Dentification Technology (RFID) in LIS Media Centre on the tags in library materials that it protects patron privacy by breaking the link between borrower and material after the material is returned, and it subscribes to the privacy guidelines in the American Library Association’s Code of Ethics. Several states are considering legislation that would pose restrictions on the use of RFID by retailers and libraries. It is, therefore, important to monitor legislative activity and to be prepared to inform legislators about the differences between retail and library applications, and how libraries protect the privacy of their patrons. Library administrators should be sure to keep their boards informed. Components of RFID System in LIS Media Centre: A complete RFID system is comprised of 3 components: Figure 2: RFID Components     An RFID Tag, composed of a chip attached to an antenna. An RFID Reader connected to a computer, which takes the place of a bar code scanner. It can also be battery powered to allow mobile transactions with RFID tags. The RFID reader is a real time computer, which handles the communication between the information system and the RFID tag. An RFID Antenna connected to the reader, which has a size and a structure that is determined by the distance for communicating and performing at a given stage. This antenna/ reader combination activates the RFID tag and transfers data by emitting radio-frequency pulses. An RFID station, composed of the RFID reader and the Antenna. It can read information stored in the RFID tag and also updates the RFID tag with new information. It generally holds application software specifically designed for the task to perform at this stage. RESEARCH DESIGN The methodology adopted for the study was the use of a survey based on a structured questionnaire including observation. The other sources of data include minutes of meetings, internal reports, briefings, planning documents, schedules etc. the interviews were guided by a set of criteria so as to ensure the full scope of information is extracted. The research is designed with utmost care to every components of RFID technology in the LIS Media Centre, the subject of the study. The investigation is aimed at unearthing the challenges faced by the users. The basic components of RFID from microchips, software & hardware support has thoroughly been looked into to draw productive conclusion. The most crucial parameter of the investigation is the installation of hardware. It’s positioning, quality and the compliance to the RFID specifications and quality has been delved into in fine details. RESULTS Major Issues Faced in LIS Media centre:  To improve the services for user community  Increased material handling time  Increasing theft of valuable materials (rare materials and cost materials) 378 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education     Mis-shelved Materials Poor inventory accuracy and Lack of security arrangements Removal of Installed RFID Tags by Users Initial Activation problem in Tags EVALUATION RFID, as a technology has proved to be an effective data capturing method. In LIS, the implementation was slow but has become a reality. Although the success of the facility has attracted certain concerns. Some of the findings from this study showed:  RFID technology is very costly and cannot change frequently, thus good quality tags should be used so that there is no need to remove exposed tags frequently  Self service of RFID may provide reservations, enquiries and integration with management information and anti-virus protection.  The library may also be provided ‘health safety’ furniture and flexible/adaptable ergonomics.  The library may provide book drop boxes outside the libraries in future. This facility offers unprecedented flexibility and convenience for returning library items at any time of the day even when the library is closed. This system will display the return status and print receipt showing that books are returned.  The library must initiate privacy concerns, inventory control, cost effectiveness, monitoring the effectiveness of RFID and provide adequate user training. RFID system is flexible technology that is convenient easy to use and well suited for automatic operation. Patron satisfaction has become crucial for librarians. Today, many libraries are turning to RFID technology because it has proven itself in terms of security, convenience and efficiency in collection management and effective services for user community. CHALLENGES The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been found to break them. An approach by Ohkubo, Suzuki and Kinoshita using an internal refreshment mechanism seems to protect privacy well but is not scalable. We introduce a specific time-memory trade-off that removes the scalability issue of this scheme. Additionally we prove that the system truly offers privacy and even forward privacy. The technology can also improve circulation and inventory control, which helps to optimize the allocation of labor and financial resources. This means that libraries can relieve their professional employees of routine work and operational tasks. For scientific libraries, this frees up more time for research and other tasks. Libraries are a fast growing application of RFID; the technology promises to relieve repetitive strain injury, speed patron self-checkout, and make possible comprehensive inventory. Unlike supply-chain RFID, library RFID requires item-level tagging, thereby raising immediate patron privacy issues. Current conventional wisdom suggests that privacy risks are negligible unless an adversary has access to library databases. The libraries and librarians globally as well as locally are facing various challenges due to the implementation of ICT, unprecedented growth in printed and electronic resources, recent trends and developments in teaching learning process. Librarians need to face various challenges for providing efficient, effective and personalized value added services and products to the stakeholders. Some of the major challenges faced by librarians are as follows:  Development of Information Infrastructure  Need for Web based Services  Explosive growth of Information  Resource Sharing and Collaboration  Marketing of Library & Information Products  Digital Preservation ISBN 1-63102-455-8 379 Application of Radio Frequency Dentification Technology (RFID) in LIS Media Centre  Security in Digital Libraries CONCLUSION Recent developments in hardware and software for RFID systems have boosted the potential of this technology in library automation and security. 'Today, the one important result for libraries is the ability to use nonproprietary systems, now that the new generation of RFID-chips with standard ISO 15693 (to be integrated into ISO 18000-3) is available. 'With this technology, libraries do not have to depend on one single supplier for tags. As libraries make a long-term investment, which mainly consists of the quantity of tags needed, this is a very important requirement. Integration of RFID with digital libraries will ensure considerable security and facilitate the librarians and information scientists to provide more value added services to user’s community for working comfortably in digital era like LIS Media Centre. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] 380 Backhouse, Gaynor. 2006. RFID: Frequency, standards, adoption and innovation, JISC Technology and Standards Watch. London Kumar, Rakesh. 2008. Role of RFID in Academic Libraries, International Caliber, Allahabad. National Information Standards Organization. 2007. RFID in U.S. Libraries Baltimore. Waddenkeri, Mallikarjun. 2006. RFID TECHNOLOGY IN LIBRARY AND INFORMATION CENTERS: RELEVANCE AND PROSPECTS, 4th International Convention CALIBER, Gulbarga. Lindquist, Mats G. 2003. RFID in libraries - introduction to the issues, Berlin Shahid, Sayed MD, 2005. Use of RFID Technology in Libraries: a New Approach to Circulation, Tracking, Inventorying, and Security of Library Materials, Library Philosophy and Practice Vol. 8, No. 1 Madhusudhan, Margam. 2010. RFID technology implementation in two libraries in New Delhi, Program: electronic library and information systems Vol. 44 No.2 M, Dhanalakshmi. 2009, RFID Based Library Management System, Proceedings of ASCNT, pp. 227 – 234, Noida Das, Raghu. 2002. An Introduction to RFID and Tagging Technologies, IDTechEx Ltd., Cambridge http://www.eff.org/Privacy/Surveillance/RFID/20031002_sfpl_comments.php. http://www.jisc.ac.uk/uploaded_documents/jtap-015.doc Nicholson, S. (1995) Management of the Digital Library: New Techniques for a New Technology. Available online at http://www.bibliomining.com/nicholson/newvl.html H.M. Gladney and J.B. Lotspiech, Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality, D-Lib Magazine, May 1997.http://dlib.org/dlib/may97/ibm/05gladney.html http://glossary.ippaper.com/default.asp?req=knowledge/article/489 http://www.electrocom.com.aupdfs/RFID%20vs%20Barcodes.pdf http://www.srels.org/index.php/sjim/article/view/44623 Bibliotheca RFID Library Systems: http://www.bibliotheca-rfid.com/and http://www.dtechdirect.com/ (distribution partner in the UK and Ireland) C.L.Borgman. Where is the Librarian in the Digital Library. Communications of the ACM, Vol.44(2001), pp6667. ISBN 1-63102-455-8 LIBRARY SECURITY RETHINKING: A STUDY Dr. M. Ananda Murugan | Deputy Librarian | Banaras Hindu University | Varanasi | am9996@yahoo.com Abstract: The libraries are facing various issues such as stealing materials from library materials destructions by the users and insects, design in construction of buildings .The users may do considerable damage to the collection and they may disturb library environment by illegal acts. University libraries spend more and more money towards the acquisition of reading materials such as books and journals in print and other electronic materials. Therefore in this paper an attempt has been made to identify the untoward incidences among the 46 universities in Tamil Nadu. Nature of damages for library resources is mainly mutilation. It is followed by theft, deterioration and destruction. Keywords: Library security, Safety & Security, Library materials INTRODUCTION The collection such as books, periodicals, e-resources, equipments and other materials are valuable information resources in an academic libraries .The information thrust of the users leads increase in collection. National development in all aspects like social economic, education, research, security etc. highly depend on the availability of information. The government and private organizations are spending more money towards the acquisitions of information materials highly depend on the availability of information, the same time every library is losing resources by theft, mutilation, destruction and deterioration, these problems are regularly encountered by the materials of libraries. These are not new for libraries it happens from ancient period, the management of the resources is being part of the library management responsibility. LIBRARY SECURITY The problem of theft – and of the mutilation – of books and other materials held in libraries is not new. Chained in collections provide one mark of the longevity of the problem and indeed. Munn (1935) traces origins back to ancient Egypt. The management of the theft and mutilation has thus long been part and parcel of the librarian’s responsibilities, although it has not been a straightforward task in a service. There are indications that the apparent difference in attitude towards theft and mutilation among the library users is diminishing. Growing need felt among the librarians for the wider dissemination of information about the nature of security issues essential for the untoward incidences occurring in the libraries. Therefore in this paper an attempt has been made to identify the problems and solutions for the untoward incidences. REVIEW OF LITERATURE Abifarin (1997), Allen (1997) and Bello (1998) reported high rate of book theft, mutilation and misplacing of books in Nigerian academic libraries. They suggested measures to reduce the problems, which include tightening security at library entrances and exits, expulsion of students involved in theft and mutilation, provision of multiple copies of heavily used text, reducing the cost of photocopying. Lorenzen (1996) and Holt (2007) identified several such incidents, (i) theft of physical materials; (ii) theft or alteration of data; and (iii) theft of money as major security crime in libraries. Studies conducted by Ajegbomogun (2004), Bello (1998) and Holt (2007) identified rare books, manuscripts and special collections as frequent target of theft and mutilation because of the special demand for in depth studies of such materials. The above studies indicate that the processes that handle access to collection such as acquisition, technical processes, circulation, shelving and storage of items in libraries need to be considered from the security perspectives and assessed by a collection security measurement instrument. The special collections of libraries are vulnerable to theft and mutilation. Valuable and irreplaceable materials are usually stored in these collections. As such, these collections are vulnerable to theft from professional thieves. Otness and Otness (1988) looked at the problem of the theft of older maps from libraries. The two described what they called going plating which was the theft of valuable plates from old maps and atlases. ISBN 1-63102-455-8 381 Library Security Rethinking: A Study Several steps were listed to frustrate thieves. It was speculated that most of the theft of plates was done by professional thieves. Ragains (1991) also reported on this problem. Bahr (1989) concentrated on internal theft a library. Not all theft is perpetuated by patrons. Some library employees take material from the library without properly circulating it. As library employees know how to defeat the security system, this is, according to Bahr, one of the hardest types of theft to prevent. Hendrick and Murfin (1974) theorized that academic libraries were the most vulnerable kind of library to periodical mutilation. They study a large academic research library to determine its periodical mutilation rate and they discovered that the library had a mutilation rate of 9% for periodicals. It has been mentioned that installation of an electronic security system enables to drop 23% of vulnerable activities. It was concluded that the security system was having an influence on student mutilation activity. Book mutilation was reported by Taylor (1981). He was disturbed by the high incidence of book mutilation and vandalism. In particular, he was concerned by the prevalence of underlining and highlighting in library books and by the editorial comments that also were appearing in library books. He compared this damage to putting scratches on a record. Roberts25 (1994) reported the same problems, concentrating on book abuse as it related to bookmarks. Interestingly, Roberts believed that the lack of bookmarks can lead to book mutilation. Lorenzen (1993) did a study of over 100 academic libraries in Ohio to determine the extent of security problems. He discovered that the periodical mutilation rate for the state was only 2.33%. However, the rate was higher for university libraries and 62.5% of university libraries considered periodical mutilation to be a large threat to the library collection. In contrast, not a single seminary library in the state considered this a problem. O’Neill and Boomgaarden (1995) reported on book deterioration and loss in Ohio libraries. It was discovered that nearly 12% of books in 100 Ohio libraries were missing. This compared with a little more than 3% that were unable due to deterioration. Therefore, it appeared that book theft was a bigger problem for libraries than their book deterioration. OBJECTIVES OF THE STUDY The major objectives of the study are   To identify the nature of damage to the collections such as theft, mutilation, destruction and deterioration of the collections in the university libraries. To identify the security procedures to be adopted in the libraries for preventing theft, mutilation, destruction and deterioration HYPOTHESES The following hypotheses have been setup for the study.   There is a significant variation in reasons for theft, mutilation and destruction of the collections among University Libraries. There is no significant difference in the means to solutions for theft, mutilation and destruction of the collections in university libraries. METHODOLOGY Questionnaire method is used for the study. Out of 58 universities, 7 universities are functioning as examining bodies and a well established library exists in the remaining 51 universities. Questionnaires were sent to the librarians of these 51 universities and only 46 questionnaires (90.19%) were responded. DATA ANALYSIS Sample: A planned questionnaire was constructed and administered to the librarians of these 51 universities and that are functioning in Tamil Nadu. Out of 51, only 46 (90.19%) were responded. These 46 respondents were classified according to domain in which the universities are concentrating. Accordingly 9(19.5%) on arts and 382 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education science, 17(37%) engineering, 4(8.7%) medicine, 8(17.4%) multiple domain and 8(17.4%) belongs to other different domains. These universities are further grouped based on type of universities. 7 (15.2%) of respondents are unitary type, 16(34.8%) belongs to affiliated nature, 23(50%) are from private universities. Nature of Damage: The library collections face majority of damages due to theft, mutilation, destruction and deterioration. These extents of damages were identified in three point scale such as Low, Medium and High. The resources were shown in table 1. Table 1: Nature of Damage S. No. 1 2 3 4 Description Low Medium High M St R 14 19 13 Theft 1.9783 0.77428 2 30.4% 41.3% 28.3% 12 15 19 Mutilation 2.1522 0.81561 1 26.1% 32.6% 41.3% 28 18 0 Destruction 1.3913 0.49344 4 60.9% 39.1% .0% 15 21 10 Deterioration 1.8913 0.73721 3 32.6% 45.7% 21.7% The mean and standard deviation are calculated for the above factors. The ranks were assigned based on mean and standard deviation. Among the four factors mutilation has been identified as first and it is followed by theft and deterioration. Destruction seems to be least among university libraries. Nature of damage and Type of Universities: The nature of damage has been further evaluated based on the type of universities and the same is presented in table 2. Table 2: Nature of Damage Vs Type of Universities S. No. Description 1 Theft 2 Mutilation 3 Destruction 4 Deterioration Unitary University L M H 4 3 0 57.1% 42.9% .0% 1 3 3 14.3% 42.9% 42.9% 4 3 0 57.1% 42.9% .0% 2 3 2 28.6% 42.9% 28.6% Affiliated University L M H 3 7 6 18.8% 43.8% 37.5% 5 6 5 31.3% 37.5% 31.3% 10 6 0 62.5% 37.5% .0% 2 10 4 12.5% 62.5% 25.0% Private University L M H 7 9 7 30.4% 39.1% 30.4% 6 6 11 26.1% 26.1% 47.8% 14 9 0 60.9% 39.1% .0% 11 8 4 47.8% 34.8% 17.4% Theft is medium in private universities (9, 39.1%) and affiliated universities (7, 43.8%) where as it is low in unitary type universities (4, 57.1%). It is high in 7 private universities (30.4%); 6 affiliated universities (37.5%) and it is low in 7 private universities (30.4%), 3 affiliated universities (18.8%). It seems that the theft in unitary type universities is nil. Mutilation is high in private universities (11, 47.8%) and affiliated universities (3, 42.9%) where as it is medium in unitary type universities (6, 37.5%). It is medium in unitary type universities (3, 42.9%); 6 affiliated universities (37.5%); private universities (6, 26.1%) and it is low in private universities (6, 26.1%), affiliated universities (5, 31.3%) and unitary type universities (1, 14.3%). Destruction is low in all types of universities i.e. 57.1% in unitary type universities, 62.5% in affiliated universities and 60.9% in private universities. ISBN 1-63102-455-8 383 Library Security Rethinking: A Study Deterioration is medium in unitary type universities (3, 42.9%) and affiliated universities (10, 62.5%) where as it is low in private universities (11, 47.8%). CONCLUSION Almost all libraries nowadays open its stack to the users as open access system and users are freely access with out any restrictions .In security view, the risk factor is high. Books are not items at the risk in libraries, records, CD, DVD and Video cassettes in common places in many libraries collection for a number of years, and in more recent times many libraries have began to build up large videos and optical discs, these items frequently constitute the part of the library collection and their popularity make them attractive targets for theft. The new acquisition books by well established, popular authors books on popular subjects; demand for such materials high and so is the incentive for readers to steal them. Library security is not restricted to the reading materials, it also include safety of staff and users, users behavior ,building safety disaster such as fire, flooding and pest control. Preventing these problems in libraries is a difficult and complicated to the librarians, it is a real problem and it is as serious in the present century. Having safety and security measures and procedures to anticipate all the threats to the entire library is clearly a process in which libraries must participate. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] 384 Abifarin, A. 1997. Library stock security: The experience of the University of Agriculture Abeokuta, Nigeria. Library and Archival Security, Vol.14, no.1: 11-19. Ajegbomogun, F.O. 2004. Users’ assessment of library security: A Nigerian university case study. Library Management, Vol.25, no.8/9: 386-390. Allen, S.M. 1997. Preventing theft in academic libraries and special collections, Library Archives & Security, Vol.14, no.1: 29-43. Bahr, A.H. 1989. Thief in our midst. Library and archival security, 9 (3/4): 77-81. Bello, M.A. 1998. Library security, material theft and mutilation in technological university libraries in Nigeria. Library Management, Vol.19, no.6: 379-383. Hendrick, C. & Murfin, M. (1974). Project library ripoff: A study of periodical mutilation in a university library. College & Research Libraries, 25(6), 402-4. Holt, G.E. 2007. Theft by library staff. The bottom line: managing library finances, Vol.20,no.2: 85-92. Lorenzen, M. (1993). Security Problems of Ohic Academic Libraries. ERIC Document Reproduction Servics, no. ED 367341. O’Neil, E.T. & Boomgaarden, W.L. (1995). Book deterioration and loss: Magnitude and characteristics in Ohio libraries. Library Resources & Technical Services, 39(4), 394-408. Otness, H.M., & Otness, H. (August, 1988). Going plating Stealing maps from libraries. Western Association of Map Libraries Information Bulletin, 19, 206-10. Ragains, p. (1991). Availability and mutilation of U.S. Geological Survey publication: An analytic study at Montana State University. The reference Librarian, no. 32, 247-57. Roberts, F.X. (March 14, 1994). Bookmarks and the abuse of books. AB Bookman’s Weekly, 93 1125-6. ISBN 1-63102-455-8 OPEN ACCESS JOURNALS IN THE FIELD OF LIBRARY SCIENCE AND INFORMATION TECHNOLOGY: AN ANALYSIS Dr. Anil Agrawal | Assistant Librarian | Central Library | Banaras Hindu University | Varanasi | anilagraw@rediffmail.com Abstract: The paper gives an account of the Open Access Journals in the field of Library Science and Information Technology. On the basis of data collected from the most authoritative online directory of open access journals, i.e., Directory of Open Access Journals (DOAJ), it is found that most of the Open Access journals in the field of Library Science and Information Technology are published form USA (23) with India (2) having a meager contribution. The study shows that most of the journals are published in English language and some of the journals are published in more than one language. The study also reveals that the vast majority of the Open Access journals are published by the non-profit organizations. Keywords: Open access journals, Directory of open access journals, DOAJ, Library Science, Information Technology INTRODUCTION It has been man’s quest to be able to identify, locate and have access to all records of knowledge available anywhere and in any language, which might be of interest to him1. Recent advances in information and communication technologies, especially the Internet and the web has revolutionized scholarly communication, leading to innovations in the conduct of research as well as in the conveyance of ideas to readers 2. The open access sources are playing a vital role in wider dissemination of research works and removing access barriers to research works. The online dictionary of Library and Information Science defined open access journals as “Scholarly periodical that makes full text of the articles. It publishes universally and freely available via internet in easily read format”5. The open access is the worldwide effort to provide free online access to scientific and scholarly research literature, especially peer-reviewed journal articles and their preprints. Essentially it means the provision of free immediate (upon publication), permanent access to research results for anyone to use, download, copy and distribute. There are two type of open access journals : (1) the journals that are available in electronic version only and are published at regular intervals on the internet and do not have any print-on-paper counterpart (2) the journals which are available in both electronic as well as print version4. OBJECTIVE OF THE STUDY The study aims to identify the open access journals in the field of Library Science and information Technology with the following objectives:  To find out the frequency of the open access journals in Library Science and information Technology  To find Year-wise distribution of the open access journals  To identify the leading countries in terms of publishing of Open Access journals in Library Science and information Technology  To know the current status of open access journals  To identify the leading publishers of Open Access Journals  To find out the Language-wise distribution of Open Access Journals  To identify Publishing Pattern and Modes of availability of Open Access journals METHODOLOGY To achieve objectives of the present study, data was collected from the most authoritative online directory of open access journals (DOAJ: http://www.doaj.org/). The DOAJ is designed, developed and maintained by Lund University which, as on 22 July 2015, listed 10,434 open access journals of which 70 journals were listed under ISBN 1-63102-455-8 385 Open Access Journals in the Field of Library Science and Information Technology: An Analysis the subject heading Library Science and 3 Journals were listed under the heading Information Technology. The factual data were imported from the website of the DOAJ in Microsoft Excel format for further analysis in terms of number of journals, year and country of origin, language, formats, etc. RESULT AND DISCUSSION Frequency of open access journals: An attempt was made to identify the frequency of Open access Journals in the field of in Library Science and Information Technology. It may be observed from Table 1, that the frequency of 22 journals are Bi-Annual, frequency of 19 journals are quarterly, frequency of about one-fourth journals are not fixed, frequency of 7 journals is annual, frequency of 5 journals is Fortnightly, and the frequency of 1 journal each is bi-monthly and Tri-Annual. Table 1 shows that frequency of more that 56% of the journals are Bi-Annual and Quarterly. Table 1: Frequency of Journals Periodicity No. of Journals Bi-Annual Quarterly Not fixed Annual Fortnightly Bi-Monthly Tri-Annual 22 (30.1%) 19 (26.0%) 18 (24.6%) 7 ( 9.6%) 5 ( 6.9%) 1 ( 1.4%) 1 ( 1.4%) Total 73 Year-wise distribution of Open Access Journals: The growth in number of Open Access Journal available in DOAJ for the last 13 years was analyzed. Table 2 shows that the maximum number of Journals (14) was published in the 2013 and in the year 2014 no journal was published. It is to be noted that, the existence in DOAJ is not necessarily the year of the founding of the journal, as older journals often have back issues that have not yet been digitized and placed online. It may be observed from the year-wise analysis of open access journals that during the year 2003 to 2010 there were 35 open access journals in the Library Science and Information Technology and from the 2011 to 2015 the number of journals are 38 i.e. number of journals being published in the last 5 years as open access is more as compare to previous 8 years (i.e. from 2003 to 2010). Table 2: Number of Journals Year-wise Year Number of Journals 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 9 3 7 5 2 1 1 7 8 7 14 Nil 9 Total 73 ________________________________________________________________________________________ 386 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Country-wise distribution of Open Access Journals: Open access journals in Library Science and Information Technology are published from 28 different countries. As shown in Table 3, highest number of OA journals are published from USA (23) followed by Iran (5), Croatia and UK (4), Brazil, Netherland , South Korea and Taiwan (3), Canada, Spain. India, Greece and France (2). Data presented in the table indicate that 15 journals are published from 15 countries. The Table shows that USA is the single country from which Open Access Journals are being published much more and no other country comes near USA in terms of publishing of open access journals in the field of Library Science and Information Technology. Table 3 : Country-wise distribution of Open access journals S. No. Countries No. of Journals 1 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. USA Iran Croatia UK Brazil Netherland South Korea Taiwan Canada Spain India Greece France Germany Australia Romania Poland Chile Costa Rica Cuba Czech Republic Egypt Italy Lithuania Pakistan Slovenia South Africa Turkey 23 5 4 4 3 3 3 3 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Total 73 Current status of Journals: Table 4 shows the current status of publishing of the open access journals. It is found that 71 journals are active and two journals have ceased their publications. Table 4: Current status of Journals S.No. STATUS No. of Journals 1. 2. Active Ceased 71 2 TOTAL ISBN 1-63102-455-8 73 387 Open Access Journals in the Field of Library Science and Information Technology: An Analysis Leading Publishers of Open Access Journals: The study of the Table 5 reveals that the vast majority of the open access journals, i.e. more than 93% are published by the non-profit organization. About three-fourth or 74% are published by academic institutions and universities (54 journals); about 19 % are published by associations and societies (14 journals); 5 journals are published by Independent/commercial publishers. The table reveals that majority of open access journals in Library Science and Information Technology are published through Academic institutions, Universities and Associations which are non-profit organization. Table 5: Publisher wise distribution of open access journals __________________________________________________________________ Types of publishers Number of Journals (%) ___________________________________________________________________ Association/societies 14 (19.2 %) Academic institutions/universities 54 (74.0 %) Independent/commercial publishers 5 ( 6.8 %) ___________________________________________________________________ Total 73 ___________________________________________________________________ Language-wise distribution of Open Access Journals: English is the most prominent language of publishing Open access journals in Library Science and Information Technology. Table 6 reveals that out of 73 open access journals, 55 are in English language, followed by Spanish (5), Chinese and Portuguese (4 each), French and German (3 each) and Castilian (2). 8 other languages are represented in publishing of 73 open access journals. Language-wise analysis of OA journals shows that some of the journals are published in more than one language. Table 6: Language wise distribution of open access journals Language No. of Journals English Spanish Chinese Portuguese French German Castilian Arabic Czech Slovak Spanish Italian Farsi Romanian Slovene Korean 55 5 4 4 3 3 2 1 1 1 1 1 1 1 1 Total 84  The number is more than 73 because some of the journals are published in more than one language. Publishing Pattern of OA Journals: Table 7 shows that 45 journals are being published online and they do not have their print versions, whereas 28 journals are published online as well as in printed form. While identifying the modes of delivery of the articles of open access journals, it was observed from Table 8 that 5 journals provide articles in both HTML and PDF format for reading and downloading purposes. One journal each 388 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education provide article in HTML, ePUB and XML format, whereas majority of the journals (66) provide articles in only PDF format. Table 7: Format of open access journal Format No. of Journals (%age) Both print and online 28 (38.3 %) Only online 45 (62.7 %) ______________________________________________________________________________________ Total 73 Table 8: Modes of availability of Open Access journals Modes No. of Journals (%age) Only PDF PDF, HTML PDF, HTML, ePUB HTML, XML 66 (90.4%) 5 (6.8%) 1 (1.4%) 1 (1.4%) Total 73 ______________________________________________________________________________________ CONCLUSION The Open Access journals are now clearly recognized as an essential vehicle for scholarship in the digital world. This is evident from the continuous growth of these journals in different disciplines around the world3. The Open Access journals in the field of Library Science and Information Technology has become the important medium for the Library and information professional to carry out their research. From the above analysis it has been found that most of the Open Access journals in the field of Library Science and Information Technology are published from USA (23) while India (2) having a meager contribution. It is also found that most of the journals are published quarterly and are active. At present, most of the Open Access journals in Library Science & Information Technology are published from academic institutions particularly universities. So, it is now time for Indian universities to take initiatives in publishing Open Access journals. Some of the research organizations in India have started providing free access to their journals over the internet. It may be expected that in the next few years we will see sustainable growth of open access Journals. REFERENCES [1] [2] [3] [4] [5] Husain S (1984). Universal availability of publications: problems and prospects. Annals of Library Science and Documentation. 31(1-2), 38 – 43 Chowdhury G G and Chowdhury S (2003). Information Sources and Searching on the World Wide Web. London, Library Association. Husain, Shabahat and Mohammad Nazim. (2013). Analysis of Open Access Scholarly Journals in Media & Communication. . 33(5), 405-411 Khode, Subhash and Choudhary, Archana. (2011). Analysis of open access journals in the area of library and information science. In Rana, M, S. et.al (Eds.), Benchmark in ICT applications in LIS (pp. 61- 74). Jodhpur : Scientific. Available http://lu,com/odlis (Retrieved on 14.06.2015) ISBN 1-63102-455-8 389 KNOWLEDGE MANAGEMENT IN ACADEMIC LIBRARIES Dr. Rakhi Tyagi | Assistant Professor | Library | K.L (P.G.) Girls College | Meerut | rakhidhruv@gmail.com Abstract: “The development of knowledge management in recent years has become the key concern for librarians and libraries. The Library will be playing a very crucial role in the extension and modification of knowledge. The growing need for knowledge management has influenced every component and operation of a library. Knowledge management requires more effective methods of information handling, speedy transfer of information and linking of information with individuals and their activities. This paper suggests a pragmatic approach to the implementation of Knowledge Management for academic libraries; utilizing the existing staffing, technology, and management structure. This paper also describes the development and use of information and communication technologies (ICT) in the library and information centres.” Keywords: Knowledge management, information management, Tacit Knowledge, Explicit Knowledge, Cultural knowledge. INTRODUCTION In the present information and knowledge era, knowledge has become a key resource. Faced with competition and increasingly dynamic environments, organisations are beginning to realise that there is a vast and largely untapped asset diffused around in the organisation – knowledge. The conventional function of academic libraries is to collect, process, disseminate, store and utilise information to provide service to the university community. However, the environment in which academic libraries operate today is changing. With the growing interest in knowledge management, many questions have been raised in the minds of librarians regarding: the difference between information and knowledge; between information management and knowledge management; who should be in charge of information and knowledge management; would librarians and information professionals with appropriate education and training in library and information science be most suitable for the position of “Chief Knowledge Officer” (CKO) in their organizations; and what libraries can do in implementing knowledge management. Academic libraries are part of the university and its organisational culture. Whatever affects universities also affects academic libraries. The role of academic libraries is changing to provide the competitive advantage for the parent university – a factor that is crucial to both staff and students. Academic libraries as constituents of the parent university should rethink and explore ways to improve their services and become learning organisations in which to discover how to capture and share tacit and explicit knowledge within the library. The changing role of academic librarians as knowledge managers emphasises the need to constantly update or acquire new skills and knowledge to remain relevant to the today’s library environment. Academic libraries may need to restructure their functions, expand their roles and responsibilities to effectively contribute and meet the needs of a large and diverse university community. This article aims to give an overview of knowledge management and its role in academic libraries. What Is Knowledge Management? Colleges, universities, and their libraries are social organizations where workers transform resources for use by consumers through the functions of teaching, research, and service. Also created is a growing amount of transactional information in databases, knowledge embedded in processes and documentation as well as explicit and implicit knowledge in the heads of the workers. As the pace of change increases and people change jobs more frequently, information and knowledge that used to be concentrated in one person or process increasingly is being held by multifunctional teams with limited life spans, operating with rapidly changing systems and environments. Change is the order of the day. Knowledge loss becomes epidemic. Increases in organizational information and change have created a great need to manage knowledge to ensure effectiveness. And in higher education, librarians can play a key role in the knowledge management process. 390 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education The rise of Knowledge Management: As early as 1965, Peter Drucker already pointed out that “knowledge” would replace land, labor, capital, machines, etc. to become the chief source of production. His foresight did not get much attention back then. It was not until 1991 when Ikujiro Nonaka raised the concept of “tacit” knowledge and “explicit” knowledge as well as the theory of “spiral of knowledge” in the Harvard Business Review that the time of “knowledge-based competition” finally came. In his latest book, Building Organizational Intelligence: a knowledge management Primer, Jay Liebowitz stated “In today’s movement towards knowledge management, organizations are trying to best leverage their knowledge internally in the organization and externally to their customers and stakeholders. They are trying to capitalize on their organizational intelligence to maintain their competitive edge.” The thrust of knowledge management is to create a process of valuing the organization’s intangible assets in order to best leverage knowledge internally and externally. Knowledge management, therefore, deals with creating, securing, capturing, coordinating, combining, retrieving, and distributing knowledge. The idea is to create a knowledge sharing environment whereby sharing knowledge is power as opposed to the old adage that, simply, knowledge is power. Various Knowledge concepts: from data to knowledge: Data are simple, discrete, facts and Figures, such as names, characteristics and amounts. Data might be a table of circulation statistics, but once those statistics are arranged, charted, annotated, or organized in a meaningful way to describe say trends in library use, you have information. Information is a bit more complex, for it organizes data for a meaningful purpose. Marc Porat states that “Information is data that has been organized and communicated”. Stehen Abram sees the process for knowledge creation and use as a continuum where data transforms into information, information transforms into knowledge and knowledge drives and undergoing behaviour and decision making. Information is visible, independent from action and decision, different in format after processing, physical product, independent from existing environment, easily transferable and duplicate. Knowledge is invisible, closely related to action and decision, different in thought after processing, spiritual product, identified with existing environment, transferable through learning and not duplicate. Knowledge is an intellectual capital when people out of creation, add value to information. It is generated. Knowledge is classified and modified. It may be indexing. It is shared. Sharing of knowledge is a core element of knowledge management. IT has provided with number of possible solutions for sharing via e-mail, intranet etc. Knowledge is much more complex and a working definition of it was given by Davenport and Prusak in their book on knowledge management entitled Working Knowledge. According to Davenport and Prusak, “Knowledge is a fluid mix of framed experience, values, contextual information, and expert insight that provides a framework for evaluating and incorporating new experience and information. It originates and is applied in the minds of knower. In organizations, it often becomes embedded not only in documents and repositories but also in organizational routines, processes, practices and norms.” While data and information are in a sense bound objects, knowledge is much more a process, a dynamic, or an ability to understand and to share understanding. Knowledge is classified into three types:    Explicit knowledge Tacit knowledge Cultural knowledge. Explicit knowledge: It is formal and easy to communicate to others. It is the knowledge of rationality. That is, policies, rules, specifications and formulae. It is also known as declarative knowledge. Tacit knowledge: It is complex form of knowledge. It has two dimensions namely technical and cognitive. This is personal knowledge, which is in human mind and difficult to formalize and also difficult to communicate. Cultural knowledge: B. B. Chand describes the cultural knowledge as knowledge which includes assumptions and beliefs. It is used to understand, describe and explain the reality as well as conventions. It is also useful to ISBN 1-63102-455-8 391 Knowledge Management in Academic Libraries form the framework among organizational members, recognize the new information and evaluate alternative interpretations and actions. Dimensions of Knowledge Management: The overall objective is to create value and to leverage, improve, and refine the firm's competences and knowledge assets to meet organizational goals and targets. Implementing knowledge management thus has several dimensions including:       KM Strategy: Knowledge management strategy must be dependent on corporate strategy. The objective is to manage, share, and create relevant knowledge assets that will help meet tactical and strategic requirements. Organizational Culture: The organizational culture influences the way people interact, the context within which knowledge is created, the resistance they will have towards certain changes, and ultimately the way they share (or the way they do not share) knowledge. Organizational Processes: The right processes, environments, and systems that enable KM to be implemented in the organization. Management & Leadership: KM requires competent and experienced leadership at all levels. There are a wide variety of KM-related roles that an organization may or may not need to implement, including a CKO, knowledge managers, knowledge brokers and so on. More on this in the section on KM positions and roles. Technology: The systems, tools, and technologies that fit the organization's requirements - properly designed and implemented. Politics: The long-term support to implement and sustain initiatives that involve virtually all organizational functions, which may be costly to implement (both from the perspective of time and money), and which often do not have a directly visible return on investment. Principles of Knowledge Management: Thomas H Davenport has formulated ten principles of knowledge management as listed below:        392 Knowledge Management is expensive Effective management of knowledge requires hybrid solutions of people and technology Knowledge Management is highly political Knowledge Management requires knowledge managers Knowledge Management benefits more from maps than model, more from markets than from hierarchies Sharing and using knowledge are often unnatural acts Knowledge Management means improving knowledge process ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education    Knowledge access in only the beginning Knowledge Management never ends Knowledge Management requires a knowledge contract Benefits of IT in Knowledge Management: The combination of computers, databases, and telecommunications, especially the Internet, provide managers with an incredible number of options for improving the way organisations function. Whenever, IT provides a systematic and professional approach to the management of Information Technology service provision. Adopting its guidance offers users a huge range of benefits that include:          Reduced service costs one Save the time of users as well as staffs; Quality and quantity improvement; Improved user services; Improved customer/user satisfaction through a more professional approach to service delivery; Improved productivity; Information Technology helps to maximizes the benefits; Provides confidence to managed and cover risk to achieve the organizational goal; Faster and easier recovery of data and disseminate the information; and Reducing risks and errors Knowledge Management in Academic Libraries: While the business world is changing in the new knowledge economy and digital age, libraries of all types are undergoing drastic changes also. The new role of libraries in the 21st century needs to be as a learning and knowledge centre for their users as well as the intellectual commons for their respective communities where, to borrow the phrase from the keystone principles, “people and ideas interact in both the real and virtual environments to expand learning and facilitate the creation of new knowledge. As a learning organization, libraries should provide a strong leadership in knowledge management. Unlike those business organizations whose goal for knowledge management is for competitive advantage, most public, academic, and research libraries, with the exception of company libraries (which may be known or called corporate libraries, special libraries, or knowledge centers), have a different orientation and value. Instead of competition, internal use only, and little sharing of knowledge with others outside, the most important mission of public, academic, and research libraries is to expand the access of knowledge for their users. Charged by this mission, libraries should aim their knowledge management goal high. Below are examples of what libraries can do to improve their knowledge management in all of the key areas of library services. Academic libraries are human organisations, so they are subject to the same sort of influences that many other organisations must deal with (Budd, 1998). The changing environment of academic life demands new competencies in academic librarians (Mahmood, 2003). As a result, the knowledge and expertise of academic librarians needs to be seen as the library’s greatest asset. The following section is divided into three main parts. The first part highlights a number of important issues facing academic libraries. The second part looks at how knowledge management practices could be applied in academic libraries. The final 10 part explores the skills and competencies needed to carry out knowledge management activities within academic libraries. Changing Environment and issues facing Academic Libraries:  Multiple formats of information: The rapid growth of information and communication technologies (ICTs) are said to be changing the way academic libraries operate today. Academic library collections are no longer collections comprised almost entirely of printed materials but collections comprised almost of materials in multiple formats and media (Budd, 1998). Information technologies such as computers, multimedia and CD-ROMs are bringing unprecedented abilities to academic libraries in providing services and resources to the university community. Over the past few years, the Web has had a tremendous effect on the growth of information and the speed of transmission. The problem with the ISBN 1-63102-455-8 393 Knowledge Management in Academic Libraries   Web is that, there is no real organisation of information like in the case of libraries. New means to deliver information over the Web places a challenge to academic librarians in terms of helping students make sense of information found on websites. Changing user needs: Academic libraries have to provide information services for users acting in the changing academic environment. Academic librarians need to liaise with library users, faculties and schools to support the effective teaching, learning and research in universities. As Parker and Jackson (1998) explained, liaison is particularly important in a world of resource-based learning where students are encouraged to carry out more independent work and make wider use of a range of learning resources (including electronic information resources). The challenges require academic libraries to offer userfriendly ICT oriented facilities (like remote access to information and services), analyse the changing user needs and give support to users in new academic environments. Changing role of academic librarians: In an age of great change in information formats, delivery models and technologies, an important new role emerges for the academic librarian (CETUS, 1999). Bertnes (2000) argued that knowledge workers will be the most important profession in this century. One of the major roles of academic librarians in the knowledge economy is that of knowledge managers. It is evident that academic librarians can no longer meet the information needs of the university community through the traditional avenue of simply adding to their library collections. Academic librarians need to go an extra mile. They need to understand the information and knowledge needs of users. They should be in a position to map internal and external knowledge that would assist them in increasing their efficiency. In other words, academic librarians should extend their information management roles and enhance their knowledge management competencies. Barriers to Knowledge Management in Academic Libraries: Every library professional who works in academic, public or any special library wants to use the techniques of knowledge management to achieve the organizational goal and provide better service to its users but due to some following barriers they are not able to use that:  There is no co-operation between senior and junior staff.  Generally, the junior staff cannot share their knowledge and ideas when they feel there is no benefit of this in terms of salary increases.  Every library cannot participate in terms of modern technology and its management  Lack of communication skills.  Lack of staff training.  Lack of sufficient budget / funds l Lack of tool and technologies  Lack of Centralised policy for Library Cess SUGGESTIONS The IT and knowledge need to work together and focus on getting the right information to the right people at the right time. The entire librarian and information scientist community should have knowledge management strategy or framework to use the IT to disseminate the information as demanded or required. The following points are identified for the better implementation of knowledge management in libraries mostly in Academic Libraries:  To provide sufficient budget  To provide special fund for the new technologies  To equip library with new technologies with network facility  Inter change of technical staffs among organizations/ libraries  Staff sharing to develop their professional skills  UGC may establish a monitoring centre specially for libraries to monitor the standardisations of library and provide assistance  Organize a training programme and inter-change of staff for time being on National level (at least once in every two year for two months) 394 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education CONCLUSION Knowledge management can be incorporated into many library operations to improve effectiveness. In addition, it offers the opportunity to expand the role of libraries in the academic community and to result in strengthened relationships with related units, inside and outside the university. Knowledge Management is a new field drawing on several disciplines including Library and Information science, knowledge management will require a strong leadership and vision from the top administration, which can influence the organization's knowledge sharing efforts in a positive way. Knowledge Management is a new field drawing on several disciplines including Library and Information Science, In spite of the fact that there are many knowledge base products in the market, none of them is suited for libraries or flexible with the dynamically changing environment in the IT era. Libraries, with limited budget and human resources, should utilize the current management structure and technology to implement Knowledge Management, either bottom up or top-down. With a concerted effort, use of Information Technology in Knowledge Management will help to increase libraries’ operational efficiency and cater to the ever-increasing needs of clientele. Knowledge Management helps library and information professionals in improving the services being rendered to their users. Information technology and systems can provide effective support in implementing knowledge management. Librarians should train themselves and their staff to develop the appropriate knowledge management systems and use information technologies to equipped libraries to provide better, faster and pinpointed services to its clients/ users. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] Abell, A. and Oxbrow, N. (2001). Competing with knowledge: the information Professional in the knowledge management age. London: Library Association. Bansal A (2000). Knowledge management: A Review. DESIDOC Bulletin of Inf. Technol. 20(4): 3-9. Berners L (1998). Semantic Web Road Map. Drucker, Peter. (1993). Post-capitalism Society. Oxford, Great Britain: Butterworth-Heinemann. Knowledge Management Primer. Boca Raton, FL: CRC Press. p.1. Liebowitz, Jay. (2000). Building Organizational Intelligence: A 7. Nonaka, Ikujiro. (1991). “The Knowledge-Creating Company,” Harvard Business Review (Nov.-Dec. 1991):9699. Also, Nonaka, Ikujiro and Takeuchi, Hirotaka. (1995). The Knowledge-creating Company: How Japanese Companies Create the Dynamics of Innovation. New York: Oxford University Press. Probst, G., Raub, S. and Romhardt, K. (2000). Managing knowledge: building blocks for success. Chichester: John Wiley and Sons. Technology and Library Users: LITA Experts Identify Trends to Watch,”(Chicago: LITA, 1999). Available online from http://www.lita.org/committe/toptech/trendsmw99.htm Accessed on 25/07/2015. Rowley, Jennifer. (1999). “What is Knowledge Management?” Library Management 20,no.8:416-419. . ISBN 1-63102-455-8 395 CLOUD COMPUTING AND LIBRARIES Mrs. Anshu Bansal | Professional Assistant | K.L.(P.G.) Girls College | Meerut | anshubansal82@gmail.com Abstract: “Cloud computing technology came up as a boon for libraries and is offering various opportunities for libraries to connect their services with clouds. It is a new technology model for IT services. Cloud computing offers a new dimension in computing, it changes how we invent, develop, scale, update, maintain and pay for applications and the infrastructure on which they are run. In cloud computing data and services reside in massively scalable data centres in the cloud and can be accessed from a web browser. Cloud computing is a way of providing various services on virtual machines allocated on top of a large physical pool which reside in the cloud, in other words cloud computers is capable of collecting large quantity of information and resources stored in personal computers, mobile phones and other equipment and integrate them and put them on the cloud for serving users. The paper presents an overview of cloud computing and its possible applications that can be clubbed with library services on the web based environment. This study may be helpful in identifying and generating cloud based services for libraries.” Keywords: Cloud computing, Models of Cloud Computing, , internet computing, libraries. INTRODUCTION In present scenario, web enabled technologies developed on virtual platforms and generating large opportunities and virtual paths to use their services for the various purposes. Nowadays, cloud computing is emerged as one of the most popular virtual technology for libraries to deliver the services in an effective manner With the advent of Information technology, libraries have become automated which is the basic need towards advancement followed by networks and more effort are towards virtual libraries. The emergence of epublications, digital libraries, internet usage, web tools applications for libraries, consortium practices leads to the further developments in library profession. The latest technology trend in library science is use of cloud computing for various purposes and for achieving economy in library functions. Since cloud computing is a new and core area the professionals should be aware of it and also the application of cloud computing in library science. The need of cloud computing may occur due to the information explosion, problems in accessing the information, save the time of the users and staff, resource sharing problems, problems in library resources management, complex demand of users and attraction of users towards cutting edge technologies. This paper addresses the various aspects of cloud computing, internet computing and E-library CLOUD COMPUTING Cloud computing is not a new technology that suddenly appeared on the web but it is new form of computing. Cloud computing is a kind of computing technology which facilitates in sharing the resources and services over the internet rather than having these services and resources on local servers/ nodes or personal devices. The combination of servers, networks, connection, applications and resources is defined as 'cloud'. Cloud computing is acting as a resources pooling technology for accessing infinite computing services and resources as per demand of users and can be compare with models of pay as you use or utility model same as used for mobile services usages and electricity consumption. Cloud computing is defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud computing is comparable to grid computing, a type of computing where unused processing cycles of all computers in a network are harnesses to solve problems too intensive for any stand-alone machine. 396 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services — such as servers, storage and applications — are delivered to an organization's computers and devices through the Internet. Characteristic of Cloud Computing: The National Institute of Standards and Technology's definition of cloud computing identifies "five essential characteristics":      On-Demand self-service: A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Broad Network Access: Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Resource Pooling: The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. Rapid Elasticity: Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear unlimited and can be appropriated in any quantity at any time. Measured Service: Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. Cloud Computing Models: The umbrella of cloud computing is a big one. Like any technology in the early stages of adoption, there are competing models, each claiming to be the optimal configuration and each, more than likely, suited to specific kinds of businesses and specific kinds of business needs. Indeed, the number of cloud permutations is nearly as diverse as the number of companies using them. Still, over time, there are ISBN 1-63102-455-8 397 Cloud Computing and Libraries consistent models that begin to emerge. Here’s a look at some of the top cloud computing models in production today: 1. Service Models: Though, there are various service models originated on the web but three service models widely used for delivering the different cloud based services that described below:    Infrastructure as a Service (IaaS): Infrastructure-as-a-Service is the first layer and foundation of cloud computing. Using this service model, you manage your applications, data, operating system, middleware and runtime. The service provider manages your virtualization, servers, networking and storage. This allows you to avoid expenditure on hardware and human capital; reduce your ROI risk; and streamline and automate scaling. Platform as a Service (PaaS): This cloud service model could be considered the second layer. You manage your applications and data and the cloud vendor manages everything else. Benefits for using Platform-as-a-Service include streamlined version deployment and the ability to change or upgrade and minimize expenses. Software as a Service (SaaS): This is the final layer of the cloud services model. This allows your services to run programs in the cloud where all portions are managed by the cloud vendor. Your users will have assured compatibility and easier collaboration because all will be using the same software. Your organization won’t need to pay extra licensing fees and you can easily add new users. 2. Deployment Models: Currently, four types of cloud deployment models have been defined in the cloud community:  398 Private Cloud. This is, in many ways, the most common type of cloud computing. Private cloud occurs within a single organization, allowing them to implement virtualization for in-house services. The premise is that internal infrastructure including server, networks, storage and applications will be connected and virtualized, which in turn allows it to move things around in such a way as to maximize efficiency. This is different from a simply virtualized situation in that it allows a higher degree of automation and even a chargeback capability for the other business units. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education    Community Cloud. This type of cloud model uses an external service via a cloud provider, and it’s access by the organization via the Internet. This is probably the most cost-effective way to utilize the cloud. The big concern with this model, of course, is security. Performance is also a concern, in many quarters. Public Cloud: Public cloud is meant for general public use and open to all. This kind of deployment model of cloud computing is developed by any cloud computing agency and having own policy, value, and profit, costing, and charging model. The Hybrid Cloud. This type of cloud made from more than one cloud deployment models that may be public, private, community and other models also, bound together with by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). The Hybrid cloud model is widely used by institutions and organizations because this model provides more facilities and flexibilities in making optimum use of their resources and accomplishing the tasks. CLOUD COMPUTING AND LIBRARIES Cloud computing offers many interesting possibilities for libraries that may help to reduce technology cost and increase capacity reliability, and performance for some type of automation activities. Cloud computing has made strong inroads into other commercial sectors and is now beginning to find more application in library science. The cloud computing pushes hardware to more abs tract levels. Most of us are acquainted with fast computing power being delivered from systems that we can see and touch. In this technological era, libraries are improved constantly by adopting many new IT technologies. The theories of conventional libraries have been changed now a day. Introduction of new and innovative technologies like cloud technology helps libraries to provide better services to the user community. Though libraries have been using some of cloud computing services for over a decade like online databases, large union catalogues as cloud applications, the library community can further adopt the concept of cloud computing to strengthen the power of collaboration or cooperation and to build a major, fused existence on the worldwide network. Examples of Cloud Libraries: Following are some examples of Cloud Libraries:     OCLC Library of Congress ( LC) Columbia Public Library 3. Exlibris ISBN 1-63102-455-8 399 Cloud Computing and Libraries      Polaris Scribd Discovery Service Google Docs / Google Scholar Worldcat Applications of Cloud Computing In Libraries: Cloud computing has large potential for libraries. Libraries may put more and more content into the loud. Using cloud computing user would be able to browse a physical shelf of books, CDs or DVDs or choose to take out an item or scan a bar code into his mobile device. All historical and rare documents would be scanned into a comprehensive, easily searchable database and would be accessible to any researcher. Many libraries already have online catalogues and share bibliographic data with OCLC. More frequent online catalogues are linked to consortium that share resources.      Building Digital Library/Repositories: In the present situation, every library needs a digital library to make their resources, information and services at an efficient level to ensure access via the network. In connection to cloud based digital library software, Duraspace is having two software namely Dspace and Fedora Commons but Dspace is widely used for building digital libraries/ repositories relative to Fedora Commons. Dura cloud provides complete solutions for developing digital libraries/ repositories with standard interfaces and open source codes for the both software. Searching Library Data Web share management system facilitates to develop an open and collaborative platform in which each library can share their resources, services, ideas and problems with the library community on the clouds. On the other hand, the main aim of web- scale services is to provide cloud based platforms, resources and services with cost benefit and effectiveness to share the data and building the broaden collaboration in the community. : OCLC is one of the best example for making use of cloud computing for sharing libraries data for years together. Website Hosting: Website hosting is one of the earliest adoptions of cloud computing as many organizations including libraries preferred to host their websites on third party service providers rather than hosting and maintaining their own servers Google Sites serves as an example of a service for hosting websites outside of the library's servers and allowing for multiple editors to access the site from varied locations. File Storage: To access any files on the internet, cloud computing present number of services such as Flicker, Dropbox, Jungle Disk, Google Doc, Sky Drive and so on. These services virtually share the files on the web and provide access to anywhere and anytime without any special software and hardware. Therefore, libraries can get advantages of such cloud based services for various purposes. For instance, LOCKSS (Lots of Copies Keeps Stuff Safe), CLOCKSS (Controlled LOCKSS) and Portico tools are extensively used for digital preservation purpose by libraries and other organizations. Library Automation: For library automation purpose, Polaris provides variant cloud based services such as acquisitions, cataloguing, process system, digital contents and provision for inclusion of cutting edge technologies used in libraries and also supports various standards such as MARC21, XML, Z39.50, Unicode and so on which directly related to library and information science area. Advantages of Cloud Computing In Libraries:  Cost saving  User centric  Openness  Transparency  Flexibility and innovation  Representation  Availability anytime anywhere  interoperability  Connect and Converse  Create and collaborate 400 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education CONCLUSION Cloud computing increases the profitability by improving resource utilization. Costs are driven down by delivering appropriate resources only for the time those resources are needed. Cloud computing has enabled teams and organizations to streamline lengthy procurement processes. Cloud computing enables innovation by alleviating the need of innovators to find resources, to develop, test, and make their innovations available to the user community. Innovators are free to focus on the innovation rather than the logistics of finding and managing resources that enable the innovation Cloud computing is beneficial as it is flexible, scalable, elastic, pay per usage, economy of scale, cost effective and no maintenance fee for hardware and software etc. The paper attempted how cloud computing helps in freeing libraries from managing technology so that they can focus on collection building, improved services and innovation. Cloud computing encourages libraries and their users to participate in a network and community of libraries by enabling them to reuse information and socialize around information. The Cloud Computing techniques and methods applied to libraries, not only can improve the quality of services and utilization of resources, but also can make more extensive use of cloud computing to our work life. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] Application of Cloud Computing in Libraries. http://www.ijidt.com/index.php/ijidt/article/viewFile/3.4.9/pdf (retrieved on 20/07/2015) Cloud Computing https://en.wikipedia.org/wiki/Cloud_computing#Characteristics (retrieved on 20/07/2015) Cloud Computing and its applications in libraries. http://eprints.rclis.org/22929/1/202.pdf (retrieved on 22/07/2015) Cloud Computing (the cloud) http://www.webopedia.com/TERM/C/cloud_computing.html (retrieved on 25/07/2015) Cloud Computing Service Models. http://www.ibm.com/developerworks/cloud/library/cl-cloudservicemodels/ (retrieved on 25/07/2015) Gupta, Shivani and Abhishek Kumar Maheshwari, and Lokesh Khurana, “Cloud Computing-Virtualization as a Service.” Vision & Quest: Journal of Science, Technology & management, 3, No.1(2012), pp. 8-14 Murley, D. (2009). Law libraries in the cloud. Law Library Journal, 101(2), pp.249-254. Top 4 Cloud Computing Model http://www.unitiv.com/it-solutions-blog/bid/51165/Top-4-Cloud-ComputingModels (retrieved on 24/07/2015) Types of Cloud Service model. http://www.appcore.com/3-types-cloud-service-models/ (retrieved on 22/07/2015) Use of Cloud Computing in Library and Information science field. http://www.ijodls.in/uploads/3/6/0/3/3603729/vol._2_july_-_sept._2012_part-2.pdf (retrieved on 20/07/2015) What Is Cloud Computing? http://in.pcmag.com/networking-communications-software/38970/feature/what-iscloud-computing (retrieved on 25/07/2015) https://www.google.co.in/search?q=models+of+cloud+computing&biw=1024&bih=639&tbm=isch&tbo=u&sourc e=univ&sa=X&ved=0CC4QsARqFQoTCLO_yKvL-sYCFc4GjgodYIkNHQ (retrieved on 22/07/2015) ISBN 1-63102-455-8 401 INTEGRATING ICT IN EDUCATION IS A CATALYST TO PROMOTE UNIVERSAL DESIGN FOR LEARNING FOR STUDENTS WITH SPECIAL NEEDS: NEED, CHALLENGES, AND POSSIBLE SOLUTIONS Ratan Sarkar | Research Scholar | Ramakrishna Mission Vivekananda University | Faculty of Disability Management and Special Education | Coimbatore, Tamil Nadu | ratansarkarju@gmail.com Abstract: Universal design for learning (UDL)is a framework for designing curriculum through modification, adaptation or alternation of goals, methods, contents, materials, instructional strategies, and assessments to enable all learners, despite of their different styles and rates of learning, to gain knowledge, skills, and enthusiasm for learning. The notion of UDL is premised on the philosophy of educational reform which ensures inclusion, equity, and need based quality education by providing multiple means and provisions of representation, action & expression, and engagement. Today the world of education is undergoing a massive transformation as a result of the digital revolution (Collins & Halverson, 2009) and its positive effect. ICTs, which cover internet service provision, telecommunications equipment and services, information technology equipment and services, media and broadcasting, libraries and documentation centres, commercial information providers, network-based information services, and other related information and communication activities, have undoubtedly affected teaching, learning, and research. A great deal of research has proven the benefits to the quality of education. ICTs have the potential to innovate, accelerate, enrich, and deepen skills, to motivate and engage students with special needs, to help relate school experience to work practices, to create economic viability for tomorrow's workers, as well as in strengthening teaching-learning and helping schools change. ICT is also used as remedial and compensatory alternative which circumvent deficits while capitalizing on an individual's strengths. Furthermore, ICT serves as a tool to curriculum differentiation, providing opportunities for adapting the learning content and tasks to the needs and capabilities of each individual pupil and by providing tailored feedback. ICT may fit into a spectrum of instructional approaches, varying from traditional to innovative. Hence, the need of integration of ICT in education to promote UDL cannot be denied. The present paper attempts to bring forth the Role of ICT in education to promote UDL, challenges and possible solutions. Keywords: Information Communication Technology, Universal Design for Learning, Children with Special Needs, Compensation and Remediation. INTRODUCTION Universal Design for Learning (UDL) is a framework that addresses the primary barrier to fostering expert learners within instructional environments: inflexible, “one-size-fits-all” curricula. It is inflexible curricula that raise unintentional barriers to learning. Learners who are “in the margins”, such as learners who are gifted and talented or have special needs, are particularly vulnerable. However, even learners who are identified as “average” may not have their learning needs met due to poor curricular design. In learning environments, such as schools, colleges, and universities, individual variability is the norm, not the exception. When curricula are designed to meet the needs of an imaginary “average”, they do not address the reality learner variability. They fail to provide all individuals with fair and equal opportunities to learn by excluding learners with different abilities, backgrounds, and motivations who do not meet the illusive criteria for “average”. Universal Design for Learning helps address learner variability by suggesting flexible goals, methods, materials, and assessments that empower educators to meet these varied needs. Curricula that is created using UDL is designed from the outset to meet the needs of all learners, making costly, time-consuming, and after-the-fact changes unnecessary. The Universal Design for Learning framework encourages creating flexible designs from the start that have 402 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education customizable options, which allow all learners to progress from where they are and not where we would have imagined them to be. The options for accomplishing this are varied and robust enough to provide effective instruction to all learners irrespective of their difference in styles and rates of leaning. Universal Design for Learning approach is characterized by three main principles- (1) Multiple means of representation (perception, language, expressions, symbols, and comprehension), (2) Multiple means of expression (physical action, expression and communication, and executive functioning), and (3) Multiple means of engagement (recruiting interest, sustaining effort and persistence, and self regulation) which are based on education, psychology, and neuroscience research on learning. It should be noted that UDL does not remove academic challenges, it removes barriers to access. Definition of Universal Design for Learning: A conceptual definition of Universal Design for Learning was provided by the Higher Education Opportunity Act of 2008 (HEOA), which stated that the term UNIVERSAL DESIGN FOR LEARNING means a scientifically valid framework for guiding educational practice that:   Provides flexibility in the ways information is presented, in the ways students respond or demonstrate knowledge and skills, and in the ways students are engaged; and Reduces barriers in instruction, provides appropriate accommodations, supports, and challenges, and maintains high achievement expectations for all students, including students with disabilities and students who are limited English proficient. Need of Universal Design for Learning: Universal design for learning (UDL) can be attained by designing curricula through modification, adaptation or alternation of goals, methods, contents, materials, instructional strategies, and assessments to enable all learners, despite of their different styles and rates of learning, to gain knowledge, skills, and enthusiasm for learning. The notion of UDL is premised on the philosophy of educational reform which ensures inclusion, equity, equality, and need based quality education for one and all. However, the existing curricula is not conceived, designed, or validated for the use of diverse populations of learners in the classrooms which create barriers in mastering knowledge and skills. Inflexible and “one size-fits-all” curricula raise unintentional barriers to learning and the most affected are students with special needs. Many students with special needs fail to master the learning tasks and learning outcomes and cope up in the general settings as the curricula designed fails to provide all individuals with fair and equal opportunities to learn. Therefore the need of UDL cannot be denied as it aims at creating expert learners- learners who can assess their learning needs, monitor their own progress, and regulate and sustain their interest, effort, and persistence while learning a task. Information and communication Technology (ICT): A Conceptual Framework: There is a misconception that ICTs generally refers to ‘computers and computing related activities’. This is fortunately not the case, although computers and their application play a significant role in modern information management, other technologies and/or systems also comprise of the phenomenon that is commonly regarded as ICTs. Pelgrum and Law (2003) state that near the end of the 1980s, the term ‘computers’ was replaced by ‘IT’ (information technology) signifying a shift of focus from computing technology to the capacity to store and retrieve information. This was followed by the introduction of the term ‘ICT’ (information and communication technology) around 1992, when e-mail started to become available to the general public (Pelgrum, W.J. & Law, N., 2003). According to a United Nations report (1999) that ICTs cover Internet service provision, telecommunications equipment and services, information technology equipment and services, media and broadcasting, libraries and documentation centres, commercial information providers, network-based information services, and other related information and communication activities. According to UNESCO (2002) information and communication technology (ICT) may be regarded as the combination of ‘Informatics technology’ with other related technology, specifically communication technology. The various kinds of ICT products available and having relevance to education, such as teleconferencing, email, audio conferencing, television lessons, radio broadcasts, interactive radio counseling, interactive voice response system, audiocassettes and CD ROMs etc. have been used in education for different purposes (Sharma, 2003; Sanyal, 2001; and Bhattacharya & Sharma, 2007). However, the use of ICT in the educative process has been divided into two broad categories: ICTs for Education and ICTs in Education. ICTs for education refers to the ISBN 1-63102-455-8 403 Integrating ICT in Education is a Catalyst to Promote Universal Design for learning for Students with Special Needs: Need, Challenges, and Possible Solutions development of information and communications technology specifically for teaching/learning purposes, while the ICTs in education involves the adoption of general components of information and communication technologies in the teaching learning process. ICT; A Way-out to Revamp Education: Supportive Reviews: The growth of information and communication technologies (ICT) has dramatically reshaped teaching and learning processes in education (Pulkkinen, 2007 and Wood, 1995). ICT for education is more critical today than ever before since its growing power and capabilities are triggering a change in the learning environments available for education (Pajo & Wallace, 2001). The use of ICTs offer powerful learning environments and can transform the learning and teaching process so that students can deal with knowledge in an active, self directed and constructive way (Volman & Van Eck, 2001; and De Corte et al., 2003). At present ICT is considered as an important means to promote new methods of instruction (teaching and learning). It is used to develop students' skills for cooperation, communication, problem solving and lifelong learning (Plomp et al., 1996; Voogt, 2003). A great deal of research has supported ICTs for improving the quality of education (Al-Ansari, 2006). ICTs have the potential to innovate, accelerate, enrich, and deepen skills, to motivate and engage all learners including students with special needs, to help relate school experience to work practices, to create economic viability for tomorrow's workers, as well as in strengthening teaching-learning and helping schools change (Davis & Tearle, 1999, cited by Yusuf, 2005). A report made by the National Institute of Multimedia Education in Japan, proved that an increase in student exposure to educational ICT through curriculum integration has a significant and positive impact on student achievement, especially in terms of "Knowledge Comprehension", "Practical skill" and "Presentation skill" in subject areas such as mathematics, science, and social study (Ciroma, Z. I., 2014). ICT is also used as remedial and compensatory alternative which circumvents deficits by capitalizing on an individual's strengths while learning (D. P. Bryant & B.R. Bryant, 1998; Garner & Campbell, 1987; and McGregor & Pachuski, 1996). The integration of ICT can help revitalize teachers and students. This can help to improve and develop the quality of education by providing curricular support in difficult subject areas. Contemporary learning theory is based on the notion that learning is an active process of constructing knowledge rather than acquiring knowledge. In this domain learning is viewed as the construction of meaning rather than as the memorization of facts (Lebow, 1993). Learning approaches using contemporary ICTs provide many opportunities for constructivist learning through their provision and support for resource-based, student centered settings, and by enabling learning to be related to context and to practice (Berge, 1998). ICT increases the flexibility of delivery of education so that learners can access knowledge anytime and from anywhere. This in turn would better prepare the learners for lifelong learning as well as to improve the quality of learning. In concert with geographical flexibility, technology-facilitated educational programs also remove many of the temporal constraints that face learners with special needs (Moore & Kearsley, 1996). One of the most vital contributions of ICT in the field of education is- Easy Access to Learning. This flexibility has heightened the availability of just-in-time learning and provided learning opportunities for many more learners who previously were constrained by other commitments (Young, 2002). The demand for education in over populated developing countries like India has skyrocketed as education is still regarded as an important bridge of social, economic and political mobility (Amutabi & Oketch, 2003). There exist infrastructure, socioeconomic, linguistic and physical barriers in India for people who wish to access education (Bhattacharya & Sharma, 2007). There exist drawbacks in general education in India as well as all over the world like lack of learning materials, teachers, remoteness of education facilities, high dropout rate etc (UNESCO,2002). ICT has the potential to remove the barriers and it can be used as a tool to overcome the issues of cost, less number of teachers, and poor quality of education as well as to overcome time and distance barriers (McGorry, 2002). ICT presents an entirely new learning environment for students, thus requiring a different skill set to be successful. Critical thinking, research, and evaluation skills are growing in importance as students have increasing volumes of information from a variety of sources to sort through (New Media Consortium, 2007). ICT is changing processes of teaching and learning by adding elements of vitality to learning environments including virtual environments for the purpose. Learning environments need to reflect the potential uses of knowledge that pupils are expected to master, in order to prevent the acquired knowledge from becoming inert 404 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education (Duffy, 1990). In addition, teachers should stimulate pupils to engage in active knowledge construction. This calls for open-ended learning environments instead of learning environments which focus on a mere transmission of facts (Collins, 1996). ICT may contribute to creating powerful learning environments in numerous ways. ICT may also make complex processes easier to understand through simulations that, again, contribute to authentic learning environments. Thus, ICT may function as a facilitator of active learning and higher-order thinking (Jonassen, 1999). The use of ICT may foster co-operative learning and reflection about the content (Susman, 1998). ICTs can enhance the quality of education in several ways, by increasing learner motivation and engagement, by facilitating the acquisition of basic skills, and by enhancing teacher training. Learning approaches using contemporary ICTs provide many opportunities for constructivist learning through their provision and support for resource-based, student centered settings and by enabling learning to be related to context and to practice (Berge, 1998).The teachers could make their lecture more attractive and lively by using multi-media and on the other hand the students were able to capture the lessons taught to them easily. As they found the class very interesting, the teachings also retained in their mind for a longer span which supported them during the time of examination. ROLE OF ICT IN EDUCATION TO PROMOTE UDL The purpose of UDL curricula is not only to help students including students with special needs (SWND) master a specific body of knowledge or a specific set of skills, but also to help them to become expert learners. Expert learners have developed three broad characteristics. They are: a) strategic, skillful and goal directed; b) knowledgeable, and c) purposeful and motivated to learn more. Designing curricula using UDL allows teachers to remove potential barriers that could prevent learners from meeting this important goal. However, UDL framework mainly focuses on three aspects in order to serve its purposes. These three aspects are; the means by which information is presented to the learner, the means by which the learner is required to express what they know, and the means by which the learners are engaged in learning. In this context ICT serves as the best tool to facilitate teaching learning environment by providing multiple means of representation, action & expression, and engagement, as per the needs and capabilities of each individual pupil and by providing tailored feedback. Now, Let us describe how ICT integration in education helps us to promote UDL. I. ICT and Multiple Means of Representation (To support all students to comprehend and perception) Visual support:  Graphics  Movies  Animations  Text  Physical objects and movement Supports visual learners as well as students with cognitive impairment, students with learning disabilities, students with hearing impairment, students with autism spectrum disorder, and to those learners whose second language is English. Auditory Support:  Digital recorder  Wav or MP3 files  Text-to-speech Supports auditory learners as well as students with cognitive impairment, students with learning disabilities, students with speech and language disorder, and to those whose second language is English. Signs Support:  Pictorial signs supports students with intellectual disabilities  Signed English supports students with hearing impairment ISBN 1-63102-455-8 405 Integrating ICT in Education is a Catalyst to Promote Universal Design for learning for Students with Special Needs: Need, Challenges, and Possible Solutions Supports visual learners as well as students with hearing impairment, students with cognition deficits, and students with processing disorders. Captions Support:  Video captions support students with hearing impairment II. Multiple Means of Action and Expression (To enable all learners to express what they know/ learn) Communication Modes:  Speech, Sign, Alternative and Augmentative Communication (AAC) including Speech Generating Devices, Test-to Speech Writing Modes:  Pencil and paper  Computer Visual Modes:  Sculpture  Photos  Movies  Drama Auditory Modes:  Sounds  Music III. Multiple Means of Engagement (To support all learners): Multiple means of engagement includes those tools that assist students to actively engage with learning environment (both input and output). The most successful of these for UDL are those that can engage a diversity of students within the one device or system. Many of these devices will have hidden benefits. These tools may include hardware, software or any kinds of equipments that assist a learner to engage in the learning environment. Such as; Hardware:  Various configurations of keyboards  Range of pointing devices  Trackballs  Joystick  Alternative Mouse systems  Gild point  Touch screens  IWBs  Digital pens  Smart Pen  Intellipen  Alternative computer systems  Micro laptops  iPad Software: Configuration of System or Software  406 Windows/ Mac OS Word-processor configuration ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education  Writing templates or scaffolds Rate Enhancement Software Supports students who may fatigue from the mechanics of writing  Supports students who struggle with reading or writing and may have poor motivation  Reduces errors in literacy processes  Word Talk; Natural Reader; Co: Writer; Text HELP Graphic Organizers  For students with difficulties in organizing information and getting started with writing Multi-media Interactive  Contain tools and functions that enable a range of students to engage with the learning  Framework applications (Clicker 5, Intelli Tools, Classroom Suite, ‘Communicate’ series)  Learning objects from TLF Key Research Evidences about Using ICT to Support SWSN in Inclusive Settings Ensuring UDL General Benefits  Enables greater learner autonomy.  Unlocks hidden potential for those with communication difficulties.  Enables students to demonstrate achievement in ways which might not be possible with traditional methods.  Enables tasks to be tailored to suit individual skills and abilities. Benefits for Students  Computers can improve independent access for students to education (Moore and Taylor, 2000; Waddell, 2000).  Students with special educational needs are able to accomplish tasks working at their own pace (ACE Centre Advisory Trust, 1999).  Visually impaired students using the internet can access information alongside their sighted peers (Waddell, 2000).  Students with profound and multiple learning difficulties can communicate more easily (Detheridge, 1997).  Students using voice communication aids gain confidence and social credibility at school and in their communities (Worth, 2001).  Increased ICT confidence amongst students motivates them to use the internet at home for schoolwork and leisure interests (Waddell, 2000). Benefits for Teachers and Non-Teaching Staff  Reduces isolation for teachers working in special educational needs by enabling them to communicate electronically with colleagues (Abbott and Cribb, 2001).  Supports reflection on professional practice via online communication (Perceval-Price, 2002).  Improved skills for staff and a greater understanding of access technology used by students (Waddell, 2000).  Enhances professional development and the effectiveness of the use of ICT with students through collaboration with peers (Detheridge, 1997).  Materials already in electronic form (for example, from the internet) are more easily adapted into accessible resources such as large print or Braille (Waddell, 2000). Benefits for Parents and Care Givers  Use of voice communication aids encourages parents and care givers to have higher expectations of children’s sociability and potential level of participation (Worth, 2001). ISBN 1-63102-455-8 407 Integrating ICT in Education is a Catalyst to Promote Universal Design for learning for Students with Special Needs: Need, Challenges, and Possible Solutions Challenges to Integrated ICT in Education: There are significant challenges in integrating ICTs use in education. The challenges are categorized as external (first-order) or internal (second order) (Keengwe, Onchwari et al. 2008). According to Snoeyink and Ertmer (2001), first order barriers include lack of equipment, unreliability of equipment, and lack of technical support and other resource related issues. Second-order barriers include both school level factors, such as organizational culture and teacher level factors, such as beliefs about teaching and technology and openness to change. Few major challenges are discussed below     408 ICT Supported Infrastructure and Lack of Resources: India is one of the developing countries that lack the resources and appropriate infrastructure for implementing ICT in education. The effective use of ICT would require the availability of equipment, supplies of computers and their proper maintenance including other accessories. Implementing ICT demands other resources, such as computers, printers, multimedia projectors, scanners, etc - which are not available in all the educational institutions. Besides, ICT requires up-to-date hardware and software. Using up-to-date hardware and software resources is a key feature in the diffusion of technology (Gulbahar 2007) but a rare experience in educational institutions. Insufficient Funds: Effective implementation of technology into education systems involves substantial funding, that is very hard to manage in developing countries like India, where only 1% of total GDP (2015-16) has been allotted for education sector. ICT-supported hardware, software, internet, audio visual aids, teaching aids and other accessories demand huge funds. Afshari, Bakar & Su-Luan et al. (2009) stated that efficient and effective use of technology depends on the availability of hardware, software, and the equity of access to resources by teachers, students an administrative staff. These costs are in most cases inflated and cannot be provided by most developing countries, including India. Political Factors: Sharma (2003) states that the most notable of the barriers to the use of ICT in education in developing countries seems to be the political will of the people in the corridors of power. The allocation of sufficient funds for the educational sector and ICT does not seem to be very attractive to the leaders. It can be seen from the budgetary allocations in third world countries that greater allocations may be for the defense forces rather than education. If the political leaders favour the technology, it will bloom. Here the case of India is worth citing. Teachers' Attitudes and Beliefs about ICT: Teachers’ attitudes have been found to be major predictors of the use of new technologies in instructional settings (Almusalam, 2001). Teachers’ beliefs about teaching and learning with ICT are central to integration. To be successful in computer use and integration, teachers need to engage in conceptual change regarding their beliefs about the nature of learning, the role of the student, and their role as teacher. Hence the successful use of ICT into classroom largely depends on teachers’ attitudes and belief relating to these. In fact, it has been suggested that attitudes towards computers affect teachers’ use of computers in the classroom and the likelihood of their benefiting from training (Kluever, et al, 1994). It is found that less technologically capable teachers, who possess positive attitudes towards ICT, require less effort and encouragement to learn the skills necessary for the implementation of ICT in their design activities into the classroom. Therefore, teachers who have positive attitudes towards ICT itself will be positively disposed towards using it in the classroom (Moseley & Higgins, 1999). Moreover, Harrison and Rainer (1992) found that participants with negative computer attitudes were less skilled in computer use and were therefore less likely to accept and adapt to technology than those with positive attitudes. They concluded that changing individuals’ negative attitudes is essential for increasing their computer skills. Therefore, if teachers want to successfully use technology in their classes, they need to be sufficiently comfortable with technology and have knowledge about its use (Afshari et al, 2009). Lack of Knowledge and Skill: According to Pelgrum (2001), the success of educational innovations depends largely on the skills and knowledge of teachers. Teachers’ lack of knowledge and skills is one of the main hindrances to the use of ICT in education both for the developed and underdeveloped countries. Integrating technology in the curriculum requires knowledge of the subject area, an understanding of how students learn and a level of technical expertise. Moreover, Berner (2003) found that the faculty’s belief in their computer competence was the greatest predictor of their use of computers in the classroom. Very few teachers get adequate training on ICTs during pre-service and in-service teacher education ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education   programme in India. Therefore, lack of knowledge regarding the use of ICT and lack of skill on ICT tools and software have also limited the use of ICT tools in teaching learning situation in India. Internet: What has to be noted is that the changing paradigms of education delivery demand extensive use of ICT and libraries are no longer the only source of information. The internet is now an information highway and needs to be complemented with traditional libraries. It is therefore expected that schools use the internet, but unfortunately the internet is only available in the urban schools. The rural schools have electricity but there is still no internet and where there is Internet access it is very poor. This is also a great challenge for integrating ICT in education in country like India. Maintenance: There have been several initiatives from the Ministry and the private sector to introduce ICTs in schools in the country. However, Government initiatives have been limited by budgetary constraints and Schools that had computers donated by the private sector or bought by government have had challenges in the maintenance and upgrading of the computing equipment. POSSIBLE SOLUTIONS Based on the above mentioned challenges the following solutions can be recommended for successful integration of ICT in education to promote UDL Effective implementation of ICT in education requires commitment from the government of India, administrators, teachers, parents, students, and the community. That is, all the stakeholders and responsible authorities including teachers and other staff should be aware of the importance of technology in developing student’s learning and should strive to overcome the barriers which prevent the use of technology in classroom settings, so that students can benefit effectively from this ICT. Afshari et al, (2009) states that it is crucial to involve those who have a stake in the outcomes, including teachers, parents, students, and the community, and allow them to assist in the creation of the vision by contributing their knowledge, skills, and positive attitude. Therefore, a clear vision of ICT integration in schools that is shared by all members of the school community promotes effective use of ICT in the classroom.  Lack of resources within educational institutions is another major hindrance to the implementation of ICT in a developing country like India. Lack of computers and other ICT-supported tools in the classroom can seriously limit the use of it by a teacher. Limited resources results in lack of computer integration, which in turn results in lack of sufficient computer experience for both pupils and teachers (Rosen & Weil, 1995). The stakeholders and school authorities need to be provided with adequate facilities and resources for effective implementation of ICT.  The Government of India has already taken numbers of initiatives to facilitate education for students with special needs (SWSN). Hence, strategies and proper policies should be formulated for encouraging education of SWSN and training of teachers with respect to the adoption of ICT. Without proper empowering of SWSN and teachers, it is not possible to implement ICT in education.  Moreover, effective implementation of ICT in educational institutions depends on teachers, principals, and other staffs who require in-depth professional development due to lack of knowledge and skills. Vigilant attention needs to be given to in-service teacher training for both teachers and principals and preservice training for newly appointed teachers before joining the regular classes to acquaint them with the important role of technology in schools settings and to train them on how to prepare and use ICT competently. Afshari et al, (2009) states that professional development is necessary for teachers to enable them to effectively use technology to improve student learning. Staff development should be collaboratively created, based on faculty input and school needs. It must prepare teachers to use technology effectively in their teaching. But this training should not consist merely of short workshops or training, which is not enough to build proper knowledge and skills. In relation to this argument, Fullan (1992) suggested that training should not be one-shot workshops, but rather ongoing experiences so that learners/teachers can be kept up to date with ever-changing technologies. During their teacher training programs teachers need to be given opportunities to practice using technology more practically so that they can see ways in which technology can be used to augment their classroom activities.  To implement ICT in the classroom, teachers should feel confident and comfortable using ICT, through the use of ICT on a consistent basis for instructional activities. Teachers must understand the value of ISBN 1-63102-455-8 409 Integrating ICT in Education is a Catalyst to Promote Universal Design for learning for Students with Special Needs: Need, Challenges, and Possible Solutions ICT integration in education to benefit their students and to support meaningful learning. So changing teachers’ negative attitudes is essential for increasing the ICT skills. Therefore, if teachers want to successfully use technology in their classes, they need to possess a positive attitude to the use of technology. Such an attitude is developed when teachers are sufficiently comfortable with technology and are knowledgeable about it use (Afshari et al, 2009). CONCLUSION In the view of above it can be rightly stated that the integration and use of ICT in education have a positive impact on teaching, learning, and research. ICT can affect the representation of education and wider access to the same ensuring active engagement of the diverse students into the teaching learning process. In addition, it will increase flexibility so that learners can access the education regardless of time, geographical barriers, and individual differences. It can influence the way students are taught and how they learn. It would provide the rich environment and motivation for teaching learning process which in turn will help in promoting Universal Design for Learning. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] 410 Abbott, C. & Cribb, A. (2001). Special Schools, Inclusion and the World Wide Web: The Emerging Research Agenda. British Journal of Educational Technology (BJET), Volume- 32, Issue No. - 3, Pp. 331-342. ACE Centre Advisory Trust. (1999). Catch net: The Use of Telecommunications Technology to Provide Remote Support and Training to Young People with Access Difficulties. ACE Centre Advisory Trust. Retrieved from: http://www.ace centre.org.uk/download/catchreport.doc, on 30.07.2015. Afshari, M., Bakar, K. A., Su Luan, W., Samah, B. A., & Fooi, F.S. (2009). Factors affecting teachers’ use of information and communication technology. International Journal of Instruction. Volume-2, Issue No.-1, Pp. 77104. Al-Ansari, H. (2006). Internet Use by the Faculty Members of Kuwait University. The Electronic Library Volume24, Issue No. - 6, Pp. 791-803. Amutabi, M. N. & Oketch, M. O. (2003). Experimenting in Distance Education: The African Virtual University (AVU) and the Paradox of The World Bank in Kenya'. International Journal of Educational Development, Volume-23, Issue No.- 1, Pp. 57-73. Berge, Z. (1998). Guiding Principles in Web-based Instructional Design. Education Media International, Volume35, Issue No. - 2, Pp. 72-76. Berner, J. E. (2003). A Study of Factors That May Influence Faculty in Selected Schools of Education in the Commonwealth of Virginia to Adopt Computers in the Classroom. (Abstract Doctoral Dissertation, George Mason University, 2003). ProQuest Digital Dissertations (UMI No. AAT 3090718). Bhattacharya, I. & Sharma, K. (2007). India in the Knowledge Economy- An Electronic Paradigm. International Journal of Educational Management, Volume- 21, Issue No.-6, Pp. 543-568. Bryant, D. P., & Bryant, B. R. (1998). Using Assistive Technology to Include Students with Learning Disabilities in Cooperative Learning Activities. Journal of Learning Disabilities, Volume -31, Pp. 41-54. Collins, A. & Halverson, R. (2009). Rethinking Education in the Age of Digital Technology. New York: Teachers College Press. Collins, A. (1996). Design Issues for Learning Environments. In S. Vosniadou (Ed.), International Perspectives on the Design of Technology-Supported Learning Environments (Pp. 347–361). Mahwah, NJ: Lawrence Erlbaum. Davis, N.E., & Tearle, P. (Eds.). (1999). A Core Curriculum for Telematics in Teacher Training. Retrieved from: www.ex.ac.uk/telematics.T3/corecurr/tteach98.htm on 30.07.2015. De Corte, E., Verschaffel, L., Entwistle, N., & van Merrienboer, J. (Eds.). (2003). Powerful Learning Environments: Unraveling Basic Components and Dimensions. Oxford: Pergamon/Elsevier. Detheridge, T. (1997). Bridging the Communication Gap for Pupils with Profound and Multiple Learning Difficulties. British Journal of Special Education, Volume- 24, Issue No. - 1, Pp. 21-26. Duffy, T. (1996). Constructivism: Implications for the Design and Delivery of Instruction, Handbook of research for educational telecommunications and technology (Pp. 170-198). New York: MacMillan. Fullan, M. (1992). Successful School Improvement: The Implementation Perspective and Beyond. Philadelphia, USA: Open University Press Garner, J., & Campbell, P. (1987). Technology for Persons with Severe Disabilities: Practical and Ethical Considerations. The Journal of Special Education, Volume- 21, Pp. 24-32. Gulbahar, Y. (2007). Technology Planning: A Roadmap to Successful Technology Integration in Schools. Computers & Education, Volume- 49, Issue No.-4, Pp. 943-956. Jonassen, D. H. (1999).Computers As Mind Tools for Schools: Engaging Critical Thinking (2nd Ed.). Englewood Cliffs, NJ: Prentice Hall. Keengwe, J. & G. Onchwari. (2008). Computer Technology Integration and Student Learning: Barriers and Promise. Journal of Science Education and Technology, Volume- 17, Issue No.-6, Pp. 560-565. Khan, M. S. H., Hasan, M., and Clement, C.K. (2012). Barriers to the Instruction of ICT into Education in Developing Countries: The Example of Bangladesh. International Journal of Instruction, Volume- 5, Issue No. - 2, Pp. Print ISSN: 1694-609. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] Kluever, R. C., Lam T. C., Hoffman, E. R., Green, K. E., & Swearinges, D. L. (1994). The Computer Attitude Scale: Assessing Changes in Teachers’ Attitudes Toward Computers. Journal of Educational Computing Research, Volume-11, Issue No.-3, Pp. 251-261. Lebow, D. (1993). Constructivist Values for Instructional Systems Design: Five Principles Toward A New Mindset. Educational Technology, Research and Development, Volume-41, Issue No. - 3, Pp. 4-16. McGorry, S. Y. (2002). Online, but on Target? Internet-based MBA courses: A case study. The Internet and Higher Education Volume-5, Issue No.-2, Pp. 167-175. McGregor, G., & Pachuski, P. (1996). Assistive Technology in Schools: Are Teachers, Ready, Able, and Supported. Journal of Special Education Technology, Volume- 13, Pp. 4-15. Moore, D. & Taylor, J. (2000). Interactive multimedia Systems for Students with Autism. Journal of Educational Media, Volume- 25, Issue No.-3, Pp. 169-175. Moore, M. & Kearsley, G. (1996). Distance Education: A Systems View. Belmont, CA: Wadsworth. Mumtaz, S. (2000). Factors Affecting Teachers’ Use of Information and Communications Technology: A review of the Literature. Journal of Information Technology for Teacher Education, Volume-9, Issue No.-3, Pp. 319-342. New Media Consortium. (2007). Horizon Report. Retrieved from: www.nmc.org/pdf/2007_Horizon_Report.pdf, on 30.07.2015. Pajo, K., & Wallace, C. (2001). Barriers to the Uptake of Web-Based Technology by University Teachers. Journal of Distance Education, Volume-16, Pp. 70-84. Pajo, K., & Wallace, C. (2001). Barriers to the Uptake of Web-Based Technology by University Teachers. Journal of Distance Education, Volume-16, Pp. 70-84. Pelgrum, W. J. & Law, N. (2003). ICT in Education around the World: Trends, Problems and Prospects. UNESCO-International Institute for Educational Planning. Retrieved from: www.worldcatlibraries.org/wcpa/ow/02d077080fcf3210a19afeb4da09e526.html, on 30.07.2015. Pelgrum, W.J. (2001). Obstacles to the Integration of ICT in Education: Results from a Worldwide Educational Assessment. Computers & Education, Volume- 37, Pp.163- 178. Plomp, T.J., Brummelhis, A.C.A., & Rapmund, R. (1996). Teaching and Learning for the Future. Report of the Committee on Multimedia in Teacher Training (COMMITT). Den Haag: SDU. Pulkkinen, J. (2007). Cultural globalization and Integration of ICT in Education. In K. Kumpulainen (Ed.), Educational Technology: Opportunities and Challenges (Pp. 13–23). Oulu, Finland: University of Oulu. Rosen, L. D. & Weil, M. M. (1995). Computer Availability, Computer Experience, and Technophobia among Public School Teachers. Computers in Human Behavior Volume- 11, Issue no.-1, Pp. 9-31. Sanyal, B. C. (2001). New Functions of Higher Education and ICT to Achieve Education for All. Paper prepared for the Expert Roundtable on University and Technology-for- Literacy and Education Partnership in Developing Countries, International Institute for Educational Planning, UNESCO, September 10 to 12, Paris. Sharma, R. (2003). Barriers in Using Technology for Education in Developing Countries. IEEE0-7803-7724-9103. Singapore Schools. Computers & Education, Volume-41, Issue No.-1, Pp.49-63. Sharma, R. C. (2003). Barriers in Using Technology for Education in Developing Countries. Information Technology: Research and Education, 2003. Proceedings. ITRE2003. International Conference. Smeets, E. (2005). Does ICT contribute to powerful learning environments in primary education? Computers & Education, Volume-44, Pp. 343-355. Susman, E. B. (1998). Co-operative Learning: A Review of Factors that Increase the Effectiveness Of ComputerBased Instruction. Journal of Educational Computing Research, Volume-18, Issue No. - 4, Pp. 303-322. UNESCO. (2002). Information and Communication Technology in Education–A Curriculum for Schools and Programme for Teacher Development. Paris: UNESCO. UNESCO. (2002). Open and Distance Learning Trends, Policy and Strategy Considerations. Paris: UNESCO. Volman, M., & Van Eck, E. (2001). Gender Equity and Information Technology in Education: The Second Decade. Review of Educational Research, Volume-71, Issue No.-4, Pp. 613-634. Voogt, J. (2003). Consequences of ICT for Aims, Contents, Processes and Environments of Learning. In J. van den Akker, W. Kuiper, & U. Hameyer (Eds.), Curriculum landscapes and trends (blz. Pp. 217-236). Dordrecht: Kluwer. Waddell, L. (2000).The Pilot Internet Project: Evaluation Report. RNIB. Retrieved from: https://rocspgce.wordpress.com/send-learners/, on 30.07.2015. Wood, D. (1995). Theory, Training, and Technology: Part I. Education and Training, Voluem-37, Issue No. - 1, Pp. 12-16. Worth, N. (2001). Fountain dale Communication Project. International Journal of Language and Communication Disorders, Volume- 36, Pp. 240-245. Young, J. (2002). The 24-Hour Professor. The Chronicle of Higher Education, Volume- 48, Issue No.- 38, Pp. 3133. http://www.udlcenter.org/aboutudl/whatisudl/conceptofudl.30.07.2015 http://www.pmss.edu.bt/articles/ictineducation. 30.07.2015. ISBN 1-63102-455-8 411 DIGITISATION OF LIBRARY MATERIAL IN ACADEMIC LIBRARY:CHALLENGES AND ISSUES Sushma R. Mawande | Librarian | Lt. Madangopal Mundhada Arts and Commerce College | Chandur Rly Dist Amravati | smawande@ymail.com Abstract: Digitization as a method of preservation is now a global phenomenon as well as the new trend in managing a library collection especially precious ones among academic libraries. Digitization of library collection has become a common activity among libraries. Libraries, are realizing the need to make available their local collection in digital forms to their users apart from subscribing to digitized resources in terms of online databases and e-books. This paper discusses the reasons for digitization and also explains the processes and methodology of digitization. Issues and challenges involved in the process of digitization are also highlighted. Keywords: digitization, academic libraries, information, technology. INTRODUCTION Digitization of information materials is the process of converting analogue information to a digital format .It is one of the newest methods of managing information resources in the new information age, whereby information technology has assisted in making information accessible to people even in their homes. Traditional library materials in the form of books, papers, manuscripts, documents, etc. are converted into electronic formats. Images (such as photographs or maps) are converted into digital representations using some type of scanning device (or digitizer) so that they can be displayed and manipulated on a screen. Digital institutional resources such as theses, manuscripts, special monographs, research papers, or images are of very high value to academic institutions. Cooperation, automation and building of the digital library — all for the enhancement of service delivery in support of teaching and research — are the principal drivers that will shape the collective future of libraries as suppliers of information to the scholarly world DIGITISATION Digitization of library collection has become a common activity among academic libraries. Libraries, more particularly academic libraries are realizing the need to make available their local collection in digital forms to their users apart from subscribing to digitized resourcs in terms of online databases and e-books,. Academic libraries have always been the depositories of intellectual contents such as theses, dissertations, research reports, students’ projects and various published and unpublished works of the faculty members, staff and students. In this context digitization has become bare necessities for academic libraries in digital environment. Witten and David (2003) defined Digitization as the process of taking traditional library materials that are in form of books and papers and converting them to the electronic form where they can be stored and manipulated by a computer. Ding, Choo Ming (2000) has elaborated the works of Getz (1997), Line (1996) and Mckinley (1997) on the advantages of digitization. They maintained that: Digitization is the creation of digital objects from physical, analogue originals by means of a scanner, camera or other electronic device. It is undertaken as part of a process that includes:        Selection Assessment, including of needs Prioritization preparation of originals for digitization metadata collection and creation digitization and creation of data collections submission of digital resources to delivery systems and repositories. ISBN 1-63102-455-8 413 Digitisation of Library Material in Academic Library: Challenges and Issues This process is accompanied along the way by management, including intellectual property rights management and quality control, and evaluation at the end. These steps are essential to ensure that the digital object remains accessible in the long-term. NEED OF DIGITIZATION Library materials especially old manuscripts, photo images, theses, and musical recordings etc that are in danger of being lost in the future and which are mostly historical and valuable needs to be preserved for future use. But the main problems for academic libraries are to select which materials to be digitized and how to get these materials digitized. In this context De Stefano (2001) noted that there were different purposes for digitization. She highlighted the types of materials selected must meet the purpose, selection to enhance access, selection based on content and selection for preservation. Similarly Gertz (2000) outlined that when considering materials for digitization, first criteria will be physical condition of the materials, followed by access, value of content, the demand for the materials, the intellectual property rights, the required infrastructure, cost and sources of funding. Academic libraries are digitizing materials because they know the continuing value of library resources for learning, teaching, research, scholarship, documentation, and public accountability. Another reason of digitization is to make access facilities to these resources. The needs of digitization of library materials are:        To preserve the age old materials for long use which are important and valuable for future? To facilitate new forms of access and use. Better and enhanced access to a defined stock of research material Creation of a single point of access to documentation from different institutions concerning a special subject Support for democratic considerations by making public records more widely accessible Better search and retrieval facilities for library types of materials. To give the institution opportunities for the development of its technical infrastructure and staff skill capacity. PROCESS OF DIGITIZATION The basic process of digitization is fairly simple, though a wide range of sophisticated techniques and tools may be used. Some important processes of digitization are discussed as below. Scanning: Scanning means capturing a digital image. Image resolution is an important part of scanning process. The number of pixels of a row and columns determine the quality of the scanning. Generally scanning done through digital camera and scanners. Both have photo sensor, which consist of a charged coupled device or CCD arrays. The CCD arrays convert the light into electronic signals. Various types of scanners are available such as flat bed scanner, overhead scanner, and drum scanner etc. Scanning is the most cost effective way to create a digital file. The alternative to scanning is to photograph a document using a digital camera. It may be hand held or fixed. Hand held digital cameras are not suitable for archival scanning, but the high hand digital camera has no scanning limitations. The size and shape of materials are also responsible for high speed of scanning. Overhead fixed digital camera present great potential for scanning oversize materials, media in all format. File format: File formats are meant for storing image data. Some most commonly used file formats are:     GIF (Graphic Interchange Format) – 8 bits JPEG (Joint Photographic Expert Group) – 24bits TIFF - 24bits PDF (Portable Document Format) – 32bits Optical Character Recognition (OCR): Another technology involved in digitization is Optical Character Recognition (OCR). When a page is stored as an image, manipulation of the text is not possible as the image file 414 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education contains only a digital representation of a printed page. Thus editing, cut and paste, correction, retrieval is not possible. The usual process by which an image page is transformed into a text file is optical character recognition. The purpose of the whole OCR process is to recognize the letters, words and symbols printed on a page. It also uses spell checkers or other lexical analyzers that make use of context information to correct recognition errors and resolve ambiguities in the generated text. Mark up: An electronic document has no inherent structure other than that of linear character or bite string. Therefore if part of the document has to be made identifiable, convention must be established. So, different identifier/ tag found in an electronic document are collectively referred as mark up. The three commonly known markup languages are:    Standard Generalized Markup Language (SGML) Hypertext Markup Language (HTML) Extensible Markup Language (XML) Metadata: The type of information in describing an electronic product is a great task. The metadata are used for describing information about the technical characteristic of digital file, their location, and a summary of their contents. These are located in the header of a tagged document. The function is to provide users with a standardized means for intellectual access to digitized materials. PDF (Portable Document Format): PDF is the open de facto standard for distribution of electronic documents worldwide. Adobe PDF is a universal file format that preserves all the fonts, formatting colors and graphics of any source document regardless of the application and platform used to create it. It is compact and can be shared, viewed, navigated and printed exactly. ISSUES AND CHALLENGES Although Digitization of library materials seems to be simple, it is a complex process, which carries a lot of issues and challenges .It includes managing budget, staffing, workflow, determining metadata, technical specification etc to make the digitization project a success. The major issues and challenges of digitization are as discussed below. Policy formulation: Many issues related to Digital technology are unresolved since these technologies are undergoing rapid and continuing development .It gives rise to “wait and see” approach. The technology changes very often and therefore the management decision regarding digitization get delayed. The academic library authority/management need to consider that whether the cost and time involved would be commensurate with the benefits before taking any policy decision regarding digitization. The policy of a library for digitization includes the standards and guidelines for digitization of materials of a library. It differs from project to project and library to library. In most cases libraries adopts their own standards and guidelines. However some widely accepted standards such as standard prescribed by Digital Library Federation are commonly referred at the planning stage. Similarly common metadata standards used for this are Dublin Core, RDF, TEL, MARC etc. Normally the standards fall into three major areas i.e. material description, user access and system architecture. Hence at the planning stage of the digitization project ,a good policy regarding standards, formats and protocols should be formulated .Framing of a policy for material to be digitized is a tricky matter. One person cannot judge historical value, utility value, content value and quality value. Therefore a group of experts should discuss on this matter and an overall policy has to be framed very carefully. Legal issues: The academic libraries which are interested to undertake a digitization project need to be aware of the legal issues related to this. They must investigate the copyright laws involved for each item they intend to digitize and also the legal issues affecting its access by users. Thus three issues such as copyright, authencity and Intellectual Property Management must be properly addressed by the libraries. ISBN 1-63102-455-8 415 Digitisation of Library Material in Academic Library: Challenges and Issues Cost: Digitization is an expensive and resource intensive process. In includes cost relating to design, implementation and maintenance. Therefore financial issues related to training of staff, integration of new work process, procurement of machines and equipments, provision of a suitable workspace and the establishment of new systems for digital storage to ensure the preservation of digital heritage must be taken into consideration at the time of planning the digitization programme. However the high cost involved in digitization suggest the need for cost recovery by the library as a small compensation in a way similar to a photocopy service. A digital collection normally includes surrogate copies of all types of library materials, which may be of high interest to a range of potential markets. Since libraries seldom retain copyright for the original works, the permission to access may be given basing upon licensing the use of images in protection of intellectual property of digital assets held by the libraries. Technology Obsolescence: The greatest challenge lies in technology preservation, which entails not only the migration of the data itself, but also the migration and emulation of the technology platform, including devices and the data formats in which the information are created to ensure that it will continue to be accessible on emerging new platforms. File formats are also changing rapidly. The age-old preservation techniques are changing into new techniques. Some strategies to meet these new challenges of technology obsolescence are:      Application of International standards and best practices Policy development for use of latest technology available at the time of initiation of digitization project Selection of hardware, software and other equipments which will be compatible with the future change. Development of skilled manpower to use the available technology Sufficient financial provisions for procurement and maintenance of new technologies. Skilled Manpower: Although there are many problems associated with process of digitization, most libraries feel manpower as the main problem. Since the library and information science processionals are not educated or trained for digitization process, there is need for more training and education for library & information science professionals. Training is the most essential part in digitization process. Handsome training need to be provided regularly to the library staff, particularly those who are engaged in digitization project of the library CONCLUSION It is a challenge for Library & Information science professionals to cope with the change and to adopt the new tools and techniques to make the digitization process fruitful. The process and methodology used in the digitization is a great task. Above all the copyright issue, cost, skilled manpower, technological obsolescence, file format, correction, etc. are various issue related to digitization that must be addressed properly. Digitization has opened up new audiences and services for libraries, and it needs to be integrated into the plans and policies of any institution to maximize its effectiveness. Digitization is a complex process with many crucial dependencies between different stages over time. Utilizing a holistic life-cycle approach for digitization initiatives will help develop sustainable and successful project. REFERENCES [1] [2] [3] [4] [5] [6] [7] 416 J. Feather and R. P. Sturges, International Encyclopedia of Information ad Library Science. 2d ed. London: Routledge, 2003, pp. 138. R. Carr, “The future of libraries and collection,” Keynote Address to the Fiesole Collection Development Retreat, Oxford, 20 July, 2000. J. Flanders and E. Mylonas, “Digital humanities,” in Encyclopedia of Library And Information Science, M. J. Bate Ed., 3rd ed., 2010, pp. 1557-1568. B. A. Fabunmi, M. Paris, and M. Fabunmi, “Digitization of library resources: Challenges and implications for policy and planning,” International Jopurnal of Africa America Studies, vol. 5, no. 2, pp. 23-36, 2006. P. De. Stefano, “Selection for digital conversion in academic libraries,” College & Research Libraries, vol. 62, no. 1, pp. 58-69, 2001 J. E. Gertz, “Selection for preservation in the digital age: An overview,” Library Resources & Technical Services, vol. 44, no. 2, pp. 97-104, 2000. I. T. Silkroad. Digitization service. [Online]. Available: http://digitizationservice.com/?p=3 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education [8] [9] [10] [11] [12] [13] [14] B. A. Fabunmi, M. Paris, and M. Fabunmi, “Digitization of library resources: Challenges and implications for policy and planning,” International Journal of African American Studies, vol, 5, no. 2, 2006. P. De Stefano, “Selection for digital conversion,” Moving Theory into Practice. Mountain View, A. Kenney and O. Reiger, Ed., CA: Research Libraries Group, 2000. R. Tennant, “Selecting collections to digitize,” Library Journal, vol. 125, no. 19, pp. 26, 2000. UNESCO, IFLA, & ICA. (2002). Guidelines for digitization Projects. [Online]. Available: http://portal.unesco.org P. Ayris. Guidance for selecting materials for digitization. Joint RLG and NPO. Preservation Conference Guidelines for Digital imaging. [Online] Available: www.rlg.org/preserve/joint/ayris.html T. Beamsley, “Securing digital image assets in museums and libraries: A risk management approach,” Library Trends, vol. 48 no. 2, pp. 358-78, 1999. C. Rusbridge. (1998). Towards the hybrid library. [Online]. Available: www.dlib.org/dlib/july98/rusbridge.html ISBN 1-63102-455-8 417 E-LEARNING INITIATIVES IN INDIA: AN OVERVIEW Urmila Devi | Research Scholar | Babamasthnath University | Asthal Bohar, Rohtak | 1977nrana@gmail.com Abstract: This article provides useful information about the e-learning. The aim of this article is to briefly describe the meaning, definition, and initiatives of e-learning in India. In India, the development of e-learning is more successful incorporate segment where it is seen as a means of achieving business goals and also describese-learning merits, demerits and future of the elearning. E-learning has rapidly evolved from a thing of the future to a practical approach towards education. It will continue to be an extremely useful classroom teaching tool as well as self-study platform. Keywords: E-learning initiatives, advantages, disadvantages, future of e-learning, India. INTRODUCTION E-learning is an abbreviation of the term electronic learning with the help of electronic small devices, media or resources. E-learning is essentially the computer and network enabled transfer of skills and knowledge. Elearning applications and processes include web based learning, computer-based learning, virtual classroom opportunities and digital collaboration. Content is delivered via the internet, intranet/ extranet, audio or video tape, satellite TV, and CD-ROM. It can be self-paced or instructor- led and includes media in the form of text, image, animation, streaming video and audio. (Sharma & Rawat 2011-12)1 E-learning has become the happening ground OD learning in recent times. It is the buzzwords, which dictate likes of every learner, irrespective of any religion, cast and academic or professional interest. Now a days every institute and corporate is zapping cutting edge on line and e-learning solutions to augment the efficiency and productivity of their employees and student community. The e-learning solutions have been envisioned with a foresight to dart and smoothen learning processes world over. In addition, with the purpose of increasing the reach of e-learning courses to every individual, mode of blended learning has also been incorporated. Blended learning makes use of traditional learning methodologies to make the subject understandable.(www.librainteractive.com/elearning-future.html.)2 DEFINITIONS OF E-LEARNING Ellitott Masie, one off the renowned experts in e-learning, suggests that e-learning is the use of the network technology to design, deliver, select, administer and extend learning. Cisco Chairman John Chamberstates that e-learning is an internet-enabled learning process whose components can include content delivery in multiple formats, management of the learning experience and community of networked learners, content developers and experts. (Pandey, 2008)3 E-learning initiatives in India: Uses of e-learning applications can raise the level of education, literacy and economic development in under developed and developing countries. In India development of e-learning is more successful incorporate segment where it is seen as a means of achieving business goals. Indian Govt. helps always given preference to the use of ICT as means of mas’ education. In 1984, a project named CLASS (Computer literacy and Social on Schools) started to make a computer literacy as compulsory project for class 11th and 12th by the Indian Govt. In the 7th five year plan and 8th five year plan 2598 Schools and 2371 Schools respectively started computer literacy having foundation step towards elearning in India. During year 2003 with the aim to take at leaving to school in every District across the country. A project was started which will cover 6, 00,000 Schools in India. University Grant Commission higher education was project launched by UGC in collaboration with INSAT named CONTRY WIDE CLASS ROOMS in 1984 to upgrade and enrich quality of education. The first on line education enterprise net varsity with private initiative was taken by national institute of information technology in 1996. In 1991 Indira Gandhi National Open University started telecasting educational programme of Doordarshan. In 1999, it is started to virtual campus initiative with to programs of Bachelor of information technology and advance development in information technology. 418 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Gyandashan education channel was started in 2000 to telecast educational programme round the clock in joint collaboration of Govt. of India, ParsarBharti in IGNOU. Indian Institute of Management Bangalore used elearning face to face teaching. UGC organized a dialogue on “enhancing higher education through e-learning” in collaboration with common wealth of learning CCOL wancover from M-19 November, 2003 at New Delhi. World first educational satellite was started in India in 20 th September, 2001 named EDUSAT to provide education to millions of people at their door step. It enable information to be broadcasted in local language and devoted to long distance learning in India. (Chandwani & Anil Kumar)4 Advantages of e-learning:  Individualized instructions: - e-learning provides individualized instructions suiting to the needs, abilities, learning styles, and interests of the learners.  Easy access: - The learner gets access to learning by breaking all barriers of the time place and distance. The learners can access information and educational contents any time at any place.  Qualitative: - e-learning has a unique feature of arranging an access to unlimited number of time student has.  Effective media:- e-learning can prove an effective media and tool for facing the problems of lack of trained and competent teachers, shortage of schools and the needed infrastructure and material facilities for providing quality education to the number of students residing in for and wide corners of the country.  Different learning styles: - Unlike traditional classroom education, e-learning can cater to different learning styles and promote collaboration among students from different localities, cultures, regions, states and countries.  Flexibility: - The flexibility of e-learning in the terms delivery media and access may prove very beneficial for the learners.  Play-way spirit and learning by doing: - Learning experiences via simulated and gaming techniques, may also provide the advantages of getting richer experiences on the useful pedagogical footings of Play-way spirit and learning by doing or living.  Interesting and motivating: - e-learning may make the students more interested and movated towards learning experiences by having an access to multimedia.  Evaluation and feedback: - It provides opportunities for timely evaluation and feedback for the learning outcomes.  Self pacing: - Self pacing provides a special weightage to the process of learning.  Self-learning and self improvement: - e-learning leads to self learning. It can be utilized for improving technical vocational skills.  Mass learning: - e-learning is a system of mass learning.  Development of manpower resources: - e-learning helps in the Development of manpower resources in the country.  Learning of international level: - A person can attain maximum and latest knowledge of any topic or subject by using internet.  Multi-sided research: - A person can collect complete information about any topic and he can do research on any part of the topic. (Walia, 2011)5. Disadvantage or limitation of e-learning:  Lack of awareness, acceptance and motivation towards use of e-learning.  India has not developed National Policy on e-learning therefore country has not made much progress in systematic development of e-learning.  Lack of co-ordination between the various funding agencies, resulting duplication of efforts and initiative in similar areas of e-learning development and implementation.  Lack of financial provision in the present budgetary system for development of e-learning.( Singh, Ritu, 2014)6  Lack of computer knowledge.  E-learning is more costly than traditional education. ISBN 1-63102-455-8 419 E-Learning Initiatives in India: An Overview     There is no face-to-face interaction and humanistic touch profoundly available in the traditional classroom set up. Lack of provision for teacher training programmer. E-learning adversely affects the eye-sight and some other parts of the body. E-learning is based on the technology. When technical defect occurs, e-learning stop. As a result continuity of learning is broken and there is no progress in e-learning.(Walia, 2011)7 Future of e-learning: E-learning has rapidly evolved from a thing of the future to a practical approach towards education. It will continue to be an extremely useful classroom teaching tool as well as self-study platform. With the rise of virtual reality technology and augment reality solutions, experimental subjects, skill-based learning and military training will come to depend more heavily on e-learning solutions. Various education technology providers are also hinting towards the rise of mobile learning solution as the advance stage of educational technology in the future. I phone and face time based online tutoring has also become popular and is being termed as I-learning platform. Assignment help net is one of the top e-learning companies and a PIONEER in online education. It offers e-learning solution and online tutoring for kids park-12, schools as well as college and University students can access education assistance with service such as online tutoring online programming help, project help, essay writing and editing services and thesis and course work guidance. Visit assignment help net today more information on e-tutoring, e-education, online assignment help, e-learning contents solution, online corporate training as well as writing and editing services. (www.assignmenthelp.net/blog/e-learning education and -its-future-scope)8 Bandwidth will continue to increase to allow more media reach and interactive content to be delivered. However as users becomes even more demanding, the debate on whether there will ever be enough bandwidth will remain to be seen. The wireless WAP enabled device as should mean that we will be able to access e-learning content anywhere we can take over mobile devices. The real future lies not just in the technology but in the potential to integrate several key areas:    Knowledge management of intellectual capital. E-learning to develop this capital. Web enabled electronic performance support productively.(www.elearnity.com)9 systems to use this capital more CONCLUSION E-learning stands for electronic learning with the help of electronic small device, media or resources. So, we can say that it is use of network to extend learning. E-learning is a very useful to make education more effective, so it is appreciated all over the world including India. E-learning has a very wide scope, as by using this one can learn anytime and anywhere and also one can have self-paced learning. Though e-learning has raised the standard of education still it also have some demerits like, lack of financial provision, lack of awareness and motivation, it is very costly etc. But, fore sure, one can not deny that e-learning is revolutionary step in field of education. REFERENCES [1] [2] [3] [4] [5] [6] [7] 420 Sharma, Sanjay and Rawat, Tarun (2011-12) Information communication and educational technology, New Delhi :IPSDPublishan, pp. 78-79. www.librainteractive.com/elearning-future.html Pandey,K.P. (2008) E-learning: Concept, Potenitial and future, Indian Journal of teacher education Anweshika, New Delhi :National council for teacher education, 5 (1), p.3. Chandwani, Anita and Anil Kumar, Shraddha, E-learning initiatives in India available on http://eprints.rclis.org/15721. Walia, J.S. (2011) Information communication and educational technology, Jalandhar :Ahim Paul Publishers, pp. 174-176 . Singh, Ritu,et al. (2014) Development of e-learning and e-content creation in Indian Higher education system: Issues, solutions and suggestions. New Delhi University News: A weekly journal of higher education, Association of Indian universities, 52 (12), pp. 22-23 Walia, J.S. (2011) Information communication and educational technology, Jalandhar :Ahim Paul Publishers, p. 176 . ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education [8] [9] www.assignmenthelp.net/blog/e-learning education and -its-future-scope www.elearnity.com ISBN 1-63102-455-8 421 EFFECTIVE TEACHING USING BLENDED LEARNING MODELS Dr. N. Devaki | Assistant Professor | Department of Education | Gandhigram Rural Institute | Deemed University | devakiaries@gmail.com M. Deivam | Ph. D Scholar | Department of Education | Gandhigram Rural Institute | Deemed University | deivammuniyandi@gmail.com Abstract: Nowadays, eLearning has been adapted in all educational institutes, starting from kindergartens, primary schools, high schools, to the universities. Blended learning is not a new concept, evolving over the last four decades from the use of a combination of classroom formats, books, and handouts to a blend face-to-face instruction and technologically mediated approaches (American Society for Training & Development, 2001). The main objectives of blended learning are to optimize learning outcomes and minimize the cost of the program through “any combination of learning delivery methods, including most often face-to-face instruction with synchronous computer technologies (So & Brush, 2007). In this paper discussed different kinds of blended learning models such as rotation, flex, self blend and Virtual enriched models. Keywords: Blended Learning, Models, Face-to Face instruction, Online Learning. INTRODUCTION Blended Learning is a planned combination of online learning and Face-to-Face (F2F) instruction using a variety of learning resources. It is a flexible learning resources. It is a flexible learning strategy that integrates innovative and technological advances of online learning with interaction and participation of traditional F2F classroom learning. Thorn (2003) describes Blended Learning as a way of meeting the challenges of tailoring learning and development to the needs of individuals by integrating the innovative and technological advances offered in the best of traditional learning. Blended Learning reflects more conscious intentional approaches to designing optional instruction or learning environment following the strategy of blended components while the blended character of traditional instructional contexts in largely the result of habit (tradition), convenience or happenstance (American Management Association). As both the F2F instruction and online learning suffer from limitations, it is natural to combine the strengths of the two into Blended Learning. Combining face-to-face and fully online components optimizes both environments in ways impossible in other formats (Dziuban and Hartman, 2004). 422 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education REVIEW OF RELATED LITERATURE Devaki and Muthuraj (2015) study on Blended Learning for Science Teaching; In this context the researcher for conducted on experimental research to find out the effectiveness of “Blended Learning for Science Teaching” with the sample size 66 of Thambithottam higher secondary school and cheran matriculation school. Investigators selected topic such as the skeletal system, the nervous system, the circulatory system, The Respiratory system from XI standard science text book prescribed by Tamilnadu text book society, Tamilnadu. The Blended Learning environment was created by blending on Evaluation, 3D Model, Online presentation through Interaction Black Board, Working Model, Demonstration, Face to Face Interaction, You tube video through experimental research investigators, administrators and collected the data. The data was statistically analyzed and the findings reveals that there is significant difference in gain scores of pre test and post test scores among higher secondary school students teaching science using “Blended Learning for Science Teaching”. Hence study is the greatest contribution in teaching using Blended Learning environment. Regi P.Mathew (2013) studied Blended Learning Strategy: Teacher Perspective. The investigator tries to understand the awareness of secondary school teachers regarding Blended Learning. The Objectives of the study and nature of data required for their realization, survey method is selected for the present study. A sample of 90 secondary school teachers has been selected from different schools of Thrissur district in kerala. The secondary level teachers have low awareness (53%) of about blended learning strategy. About 35 % of secondary level teachers showed average awareness about blended learning strategy. Only 11.1% of the teachers showed high awareness about blended learning strategy. The government school teachers are having average awareness. The secondary level government aided management school teachers are having low awareness about Blended learning strategy. The secondary level private school teachers are having low awareness about Blended learning strategy. The current study reveals that the secondary school teachers are not fully aware about the potentials of Blended learning practices for classroom instruction. Clement C.hen and Keith T.Jones (2007) study conducted on Blended Learning Vs. Traditional classroom setting: Assessing Effectiveness and student perceptions in an MBA Accounting Course. The journal of Educators online, Volume 4, Number 1, January 2007; Objectives: To find out the course Effectiveness of Blended and Traditional classroom teaching among M.BA Students; To find out the M.BA students perception towards Blended Learning and Traditional classroom Accounting course. Survey was conducted MBA students at a university of Northern United States. One group of students enrolled traditional classroom course (n=38) and other group of students enrolled blended learning course. Findings: There is no significant difference between the two instructional methods of traditional and blended learning course. The general course effectiveness assessed through five point scale from 1 (Strongly disagree) to 5 (Strongly agree) and‘t’ test used to examine the comparative differences. Based on the survey result traditional classroom setting to add the value in terms on instructional clarity; blended learning course participation indicated that their analytical skill improved and willing to enroll if they offered. Accounting program administrators have the opportunity to maintain or increased enrollments. Not significant difference between blended course and traditional classroom course outcome of learning. Jeyanthi . R (2014) study conducted on Effectiveness of Blended Learning Method in Teaching Practical Chemistry. Objective: To find out the effectiveness of Blended Learning Chemistry through Blended Learning Method. Sample: The investigator chose 50 student of standard XI from government girls higher secondary school in Dindigul by Purposive sampling technique 25 students of Section ‘A’ as Experimental group and 25 students of section ‘B’ as Control group, pre-test, treatment and post test. The investigator measured the score by the prescribed format given by the government of examination, Tamilnadu. The multimedia package with animated practical chemistry was used to experimental group. The practical chemistry taught through demonstration method for control group. Result: There is no significant difference between the control and experimental group in pre-test scores of their practical chemistry. There is significant difference between the control and experimental groups post test score of their practical chemistry at 0.001 level of significant. This gives the evidence of teaching practical chemistry through blended learning is more effective than the teacher demonstration method. ISBN 1-63102-455-8 423 Effective Teaching Using Blended Learning Models Balarable Yashau (2006) study conducted on The effects of Blended E-Learning on Mathematics and Computer Attitudes in Pre-Calculus Algebra; The Montana Mathematics Enthusiast Vol. 3. No.2 PP.176-183; Objectives: To find out the influence of Blended E-Learning on students attitude towards mathematics and computers. Methodology: The one semester experiment was conducted. Data were collected beginning and end of the semester. The MINITAB software was used to analyze the data. The 70 students were randomly selected (second year pre-calculus course) from king fahd university of Petrolem & minerals, Dhahran Saudi Arabia. The experiment was conducted via tow mode of learning both online and offline learning. Offline learning as a control group and Online learning as a experimental group. The offline mode of instruction is face-to-face instruction was conducted three times in a week. The online learning (WebTC) was as used as a delivery mode of Learning. In this mode of learning students solve the problem using MATLAB (Mathematical Software). Findings: The subjects have positive attitude towards mathematics and computer. The analysis of variance shows not statistically significant change in student attitudes towards that computer confidence and anxiety subscale. Sivasankar. A (2011) study conducted on Development, Valuation and Effectiveness of Blended Learning Modules on Teaching of Science at B.Ed level. Objective: To integrate the personal touch of conventional faceto-face learning and e-learning; To find out the level of achievements through Blended Learning modules in science subjects; To analyse the achievement of students teachers with respect to personal variables through blended learning; To evaluate the effectiveness of blended learning modules in science subjects; To find out the e quest of student teachers learning science through blended learning; To study the ICT readiness of Blended Learning; To find out relationship between e quest and ICT readiness of student teachers learning through blended learning; Sample: A sample OF 40 student teachers were selected from MASS colleges of Education as the control group and 40 B.Ed student teachers were selected from SASTRA University as the experimental group. They were purposive sampling technique used in this study. Method: There pre-test, Treatment, post-test equivalent group experimental design was adopted in the study. Findings: The blended learning strategy is effective in improving the post test achievement of student teachers in science and improving the post test e quest scores of student teachers. There is significant difference is there mean scores of achievement in science subject of Experimental and Control group. Through this experiment blended learning is more effective than traditional classroom practice. INGREDIENTS OF BLENDED LEARNING Live Events: Synchronous, teacher-led learning environments in which all learners participate at the same time. Teacher may use lecture, demonstration, discussion or computer-based instruction to all the students in live. For many learners, nothing can replace the ability to tab the expertise of a live teacher. It can be in real classroom or can be in virtual. Self-paced learning: Learning experiences that the learner completes individually at his own pace and on his own time such as recorded live events, Internet-based or CD-ROM-based; it implies on-demands learning at a pace that is managed or controlled by the learner. Collaboration: It implies a more dynamic communication and interaction among many learners that brings about knowledge sharing. Collaborative learning has more advantage which are not available from traditional instruction because a group can accomplish meaningful learning and solve problems better than any individual can alone. It can be extended from discussion in the live classroom to synchronous communications in chat room or in open discussion forums and asynchronous communication by using e-mail and threaded discussion. Assessment: It is both live and online measure of learner’s knowledge to determine prior knowledge as well as to measure learning transfer. Performance Support: These are the reference materials that enhance learning, retention and transfer. It may be printable reference, downloaded multimedia learning objects, documentation etc; 424 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education MODELS OF BLENDED LEARNING Rotation model: In the Rotation model of blended learning: within a given course, a student rotates on a fixed schedule between learning online in a one-to-one, self-paced environment and sitting in a classroom with a traditional face-to-face teacher. Station-Rotation model: Station Rotation – a Rotation model implementation in which a given course or subject (e.g., math), student rotate on a fixed schedule or at the teacher’s discretion among classroom based learning modalities. The rotation includes at least one station for online learning. Other stations might include activities such as small group or full class instruction, group projects, individual tutoring, and pencil and paper assignments. Lab Rotation model: Lab Rotation – a Rotation model implementation in which within a given course or subject (e.g., math). Students rotate on a fixed schedule or at the teacher’s discretion among locations on the brick and mortar campus. At least one of these spaces is a learning lab for predominantly online learning, while the additional classroom(s) house other learning modalities. The Lab rotation model differs from the station rotation model because students rotate among locations on the campus instead of staying in one classroom for the blended course or subject. Flipped Classroom: Flipped Classroom – a Rotation model implementation in which within a given course or subject (e.g., math), students rotate on a fixed schedule between face-to-face guided practice (or projects) on campus during the standard school day and online delivery of content and instruction of the same subject from a remote location (often home) after school. The primary delivery of content and instruction is online, which differentiates a Flipped Classroom from students who are merely doing homework practice online at night. The Flipped Classroom model accords with the idea that blended learning includes some element of student control over time, place, path, and / or pace because the model allows students to choose the location where they receive content and instruction online and to control the pace at which they move through the online elements. Individual Rotation model: Individual Rotation – a Rotation model implementation in which within a given course or subject (e.g., math), students rotate on an individually customized, fixed schedule among learning modalities, at least one of which is online learning. An algorithm or teacher(s) sets individual student schedules. The Individual rotation model differs from the other Rotation models because students do not necessarily rotate to each available station or modality. ISBN 1-63102-455-8 425 Effective Teaching Using Blended Learning Models Flex model:Flex model of blended learning features an online platform that delivers most of the curricula. It is the model where most of the learning is done online and the face-to-face model exists to provide on-site support for flexible and adoptive, as required basis through in-person tutoring sessions and small group sessions. Self Blend model: The self-Blended model is a fully individualized approach that allows students to choose to take one or more coursed online to supplement their traditional schools catalog. Maximum part of the learning is done online, but the students still attend face-to-face classes. Enriched Virtual Model: Enriched Virtual model – a whole school experience in which within each course (e.g., math), students divide their time between attending a brick and mortar campus and learning remotely using online delivery of content and instruction. Many Enriched Virtual programs began as full time online schools and then developed blended programs to provide students with brick and mortar school experiences. The Enriched Virtual model differs from the Flipped Classroom because in Enriched Virtual model differs from the brick and mortar campus every weekday. It differs from the Self Blend model because it is a whole school experience, not a course by course model. CONCLUSION The blended learning programs must be developed in making learning more accessible, engaging and relevant. It provides more flexible learning opportunities and reduces the amount of time spent on face to face learning activities. These programs are relatively cheap to repeat or use with large groups of learners. This explores new approaches to learning and technologies. There are different kinds of instructional designs of blended learning is there. Each model has some unique features and similarities also there. Hence, teachers have to choose appropriate instructional models according to subject content as well as circumstance. REFERENCES [1] [2] [3] [4] [5] [6] [7] 426 Nehru R.S.S. (2014). Blended learning, New Delhi: APH Publishing House. Begum Jahitha. A. (2011), ICT in Teaching and Learning. New Delhi: APH Publishing House. Harjeet Kaur Bhatia (2012). Reflections on blended learning and peer collaboration in Teacher Education, New Delhi: Global books organisation. Akkoyunlu, B., & Yilmaz-Soylu, M. (2008). A study of students’ perceptions in a blended learning environment based on different learning styles. Educational Technology and Society, 11(1), 183-193. Vaughan, N. (2007). Perspectives on blended learning in higher education. International Journal on E-Learning, 6(1), 81-94. Garrison, D.R., & Vaughan, N.D., (2008). Blended Learning in Higher Education, San Francisco: Jossey- Bass Wiley Imprint. Allen, E., Seaman, J., & Garrett, R., (2007). Blending In: The Extent and Promise of Blended Education in the United States, Needham, MA: Sloan-C. http://sloanconsortium.org/publications/survey/pdf/Blending_In.pdf ISBN 1-63102-455-8 LIS SERVICES IN E & M LEARNING TECHNOLOGY Dr. Durga Prasad | Librarian | Central Digital Library | Shree Ganpati Institute of Technology | Ghaziabad | drdurgaprasad387@gmail.com Deepak Shukla | Librarian | AIIMS | Delhi | deepakshuklaonline@gmail.com Abstract: Mobile learning is new and modern confection education field. It is currently difficult to define, conceptualize and discuss. It could perhaps be a wholly new and distinct educational format, needing to set its own standards and expectations. Mobile learning has becomes anther very important complement to the traditional ways of learning after digital learning. The development of the third generation mobile communication technology 3G provides a more adequate technical basis for mobile learning. The integrated objective of m-learning and elearning is to explore and to accumulate useful knowledge over and above faster coping, searching and to distributing. The present paper discusses in E-learning & M- learning, its needs of e-learning modules, forms, M-learning technologies, components, motivating factors, virtual communication tools, M-learning development, advantages and disadvantage, role of librarians in M-learning technologies and future developments. Keywords: E-learning, M-learning, Components, 3G Technologies, Virtual Communication, Tools. INTRODUCTION New wave and Information Communication and Technology (ICT) provide computer enhanced learning process which is commonly known as e-learning is a growing and dynamic environment which has given a new shape to higher education besides classroom teaching. E-learning are now the global scenario providing learning facilities in e-mode to such learning programme in which learning and also the course content is delivered to learners electronically though CD ROM, DVD, INTERNET and on-line E-learning has emerged as one of the most interactive, effective and revolutionary technologies of education in which the learner and learning providers remain connected with each other via email, video conferencing, discussions forums, instant messages and chat room etc. E-learning has been emerged as the most powerful system of making information, instructional content and learning experiences accessible at learner’s computer though electronic technology. Historical Trace out of e-learning- The e-learning is the extension of distance education learning in ICT era, which enables learners and teachers to engage in synchronous as well as asynchronous interaction across space, time and their own pace. CONCEPTS OF E-LEARNING In simple terms learning though Internet technology is known as e-learning. ‘E-learning is the use of new multimedia technologies and the internet to improve the quality of learning by facilitating access to resources and services as well as remote exchanges and collaboration.’ ‘E-learning is the delivery of education, which includes activities related to instruction, teaching and learning though various electronic media, such as internet, intranet, extranet, satellite television, video/audio tape or CD ROM.’ ‘E-learning is pedagogy empowered by digital technology.’ Thus, e-learning is interactive learning though digital technologies.’ What is E-Learning? E-learning is approach to facilitate and enhance learning though both computer and communication technology. Such device can include personal computers, CD-ROMs, Digital Television, PDAs and Mobil Phones. Communication Technology enables the use of the Internet- Mail, Discussion forums, collaborative softer and real learning system. COMPONENTS OF E-LEARNING Following are the popular and common e-learning components ISBN 1-63102-455-8 427 LIS Services in E & M Learning Technology        Learning Management system or Learning content Management system. Content. Collaboration. Testing and assessment. Skill & Competence. E- Commerce. Internet video based service. E-LEARNING SOFTWARE There are many software available for e-learning. Here I quote some open source & commercial e-learning software. Open Source Software:  Atutor  DeceboLMS  Dokes  Internet  Word Circle  Site@schools Commercial Software:  Blackboard  eCOllege  Inquisiq  Grade point  Learn eXact  Web CT NEED FOR E-LEARNING Today, the information needs of the users have increased enormously so much that no single library on its own can meet their needs. This has necessitated the need for effective linkages and co-operation between libraries and information centers for sharing of available resource & information through network services. Network email, online access, use of CD-Rom, software and hardware system etc. are now being used for resource sharing. The Swami Vivekananda says about education and library’ “Education is not information that is put into your brain and runs riot there undigested all your life. You have more education they any man who has got by heart a whole library. If education were identical with information the libraries would be the greatest in the world.”     MOTIVATING FACTORS FOR E-LEARNING Due to globalization of business, it is essential to bring employees together at the same time; it is possible through e-learning. Corporate sector wants enhancement in their competitiveness by training to manpower. Employees want to enhance their learning opportunities. Wide spread proliferation of information technology has enable the employees to have access to Internet. Mobile-Learning (M-learning) Technology: Mobile learning through the use of wire mobile technology allows anyone to access information and learning materials from anywhere and at anytime as a result learner have control of when they want to learn and from which location they want to learn. Also all human have right to access learning materials and information to improve their quality of life regardless of where they live, their status and their culture. mobile learning, through the use of mobile technology, will allow citizens of the world to access learning materials and information from anywhere and at anytime. Learners will not have to wait for a certain time to learn or to a certain place to learn. With mobile learning, learners will be empowered since they can learn whenever and wherever they want. Also, learners do not have to learn what is prescribed to them. They can use the wireless mobile technology for formal and informal learning where they can access additional 428 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education and personalized learning materials from the internet or host organization. Teacher can use the mobile technology to access training material and information when they need it for just-in-time training just-in-time learning encourages high level learning since learner’s access and applies the information right away rather than learns the information and then applies the information at a later time. Trainer are empowered since they accuse the mobile technology to communicate with learned from anywhere and at anytime. Basic SIP Commands:  INVITE- Initiates a session. This method includes information about the calling and called users and the type of media that is to be exchanged.  ACK- Sent by the client who sends the INVITE? ACK is sent to confirm that the session is established. Media can then be exchanged.  BYE- Terminates a session .This method can be sent by either user.  CANCEL- Terminates a pending request, such as an outstanding INVITE. After a session is established a BYE method needs to be used terminate the session.  OPTIONS- Queries the capabilities of the server or other devices. It can be used to check media capabilities before issuing an INVITE.  REGISTER- Used by a client to login and register its address with a SIP registrar server. M-Learning Tools Used: SIP is an application- layer control protocol that can establish, modify, and terminate multimedia sessions (conference) such as Internet telephony calls. SIP can also invite participants to already existing sessions, such as multicast conference. Normally SIP uses UDP and TCP port 5061 for SSL communication. SIP protocol is very similar to HTTP, so if you have some knowledge about HTTP, then it is easy to learn SIP. SIP doesn’t transfer session data like audio, video. RTP (Real Time Protocol) is used for that, SIP just helps to open RTP streams. Role of librarians in M-learning: The following are the role the librarian in M-learning  M-learning nowadays becomes the order of the day and it is being used to impart education.  Librarians are the information intermediaries who can help the users in making use of e-resources  The librarians need to be made aware of the internet and the resources available therein and how to make efficient use of them.  The idea behind m-learning module is to train both the librarians as well as the users regarding the efficient use of e-resources.  The emphasis is on the resources related to librarianship in addition to general topics of interest. M-Learning Technologies: M-learning technologies used to support different educational configurations in terms of place and time video conferencing for example, is a same time. Different place technology. Whereas email can support different time, different place. The Following figure shows technologies used in m-learning and their advantage. Different place Same place ISBN 1-63102-455-8 Synchronous interaction Group interactive video Desktop interactive video Chat sessions Audio conferencing Collaborative groupware whiteboard Classroom- based instruction Black boards Teaching theater In-class lab and groupware Presentation tools Asynchronous interaction Online discussion forums E-mail Voice mail Video mail Video on demand web casting collaborative document editing Shared use Laboratory assignments Self-paced programmes in central facility 429 LIS Services in E & M Learning Technology Issues in M-learning today M- Learning: Today M-learning is considered as alternative tools of empowering knowledge and skills. It is also treated as alternative means for classroom teaching. Now with the help of it is possible to deliver the information with highest degree of precision which is not possible with traditional skills. It has overcome several constraints of traditional system. But still there are some issues such as. Figure1: Mobile learning using 3G Technology VIRTUAL COMMUNICATION TOOL The following tool are they are;  E-mail; e-mail is used by information workers, librarian and other for formal and learning and teaching activities  Mailing list; it is possible to send e-mail to groups using mailing lists. The process is managed by a hosting service that maintain a list of all the different different discussion list and people who subscribe to them. It is run by a mail server.  News groups; the user can read and post message in a single environment than a series of e-mail arriving at different times. Here an individual will send a message to a central source ,which then copies it to individuals and other news groups.  Bulletin boards; bulletin boards provide a facility for discussion under various topic heading and not in real time. Many library and information services provide bulletin boards within their websites as means of enabling their customers to discuss ideas and share information.  Web forms; web form are often used as a means for providing a reference service within a library or information unit they are commonly based in  Reference service  Administration of servicing such as mentoring programmes  As a tool for obtaining information from participant on e-learning programme  Polling; polling enables us to setup a survey/questionnaire and obtain feedback for a wide range of people  Instant messaging; it enables us to send and display a message on someone’s screen in a matter of seconds. It means the staff who is working on a busy reference or help point may message a colleague with a question and obtain response.  Chat or conferencing ; this enables users to hold a live discussion by sending each other short written messages.  Internet telephony ; in this tool a user can make calla by using the internet. An individual can make distance phone calls through the computer and the internet without paying long-distance phone charges. 430 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education   Video conferencing ; it requires specialists and very expensive machines are used in video conferencing. Virtual worlds; used for e –learning within universities, it is possible to through dimensional virtual world Developing Library Services in M-learning Environment: Repid spread of information communication technologies, Recent reduction in technology costs and increasing PC awareness in learner are very much attractive. Many libraries are in the process of delivering the information services and resources through the online chat rooms, e-mail services, list serves, or fee online databases and reference services, teleconferencing and toll free numbers. Access to information Resources: Student at remote sites must get the information resources supporting their learning. Computer search services should be extended with full text document delivery. Library should provide full text documents. In a step ahead the e-learning the library can setup the digital library. Digital library will break all the barriers of data transfer. It can store a large amount of information in various forms i.e., text, audio, video, graphic material. Learners can make effective search for the information in digital libraries with sophisticated search engines and download into his or her system. Budgetary support: Considerable infrastructure such as hardware, software and manpower requires heavy investment. Organization who wants to start e-learning system should have enough funding Copyright: Libraries need to distribute copies of the same information to the distance learners. So librarian must be familiar with the sufficient right to acquire intellectual property. Consultation services: Consultation can be conducted through e-mail, toll free telephone services, pre – packged mail out information or scheduled remote site visits. Inter-library lone and consortia sharing: Today there is one or the form of network or cooperation is existing in the form of associations or consortia. Such as INFLIBNET, DELNET, CALIBNET etc. further each of the member library possess the computer, online systems and network. The effective electronic transmissions of document demand helps quicker inter library loan and information services. Instruction and training: One of the main problem in e-learning system that learner should have sufficient knowledge and skills of usage of the information technology in the web based education require much training as the e-learning involves different types of multimedia files. Interaction: There is a lack interaction between learner and subject specialist. It may possible for subject expert availability. But teacher may be possible to access via e-mail. Some time face interaction can be made possible through online conferencing. E-learning designer should need to increase the interactivity Quality of the Service: To ensure the higher quality of the services to its user regular survey is required to test the material and they should be repackaged on periodical basis. References services: electronically references on the inter is gaining more popularity reference librarian In the distance education programme learner can use forms to make research queries with the ready reference services in the form frequently asked question (FAQ) is most convenient for the learner. Speed of Network: To access the learning material it is very much required to connect internet. As e-learning involves multimedia file, higher speed of network with sufficient bandwidth is required. ISBN 1-63102-455-8 431 LIS Services in E & M Learning Technology Figure2: A live video of classroom on 3G mobile phone Advantages the following the advantage of M-leaning  Lower costs  Time savings  Flexibility  Faster response  Greater effectiveness  Better competitiveness  M-learning complements the process and can help reach out the masses.  M-learning lies in its ability to cover distances.  The consistency that e-learning provides, e-learning is learning is done at the learners.  Learning resources can be pace easily developed using a variety of standard packages.  One can make use of, and link into other resources available on the internet  Online delivery cheap as there are no printing or distribution costs  It is easy to track learner activity and progress.  Electronic learning where the student can access the study modules through web, irrespective of the location, time etc.  It is interactive and can serve as a substitute for a classroom teaching environment Disadvantage  Many people find it daunting, especially at first  The student and tutor need reliable to a computer and internet.  The student and tutor need basic information technology skills 432 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education           Training is required for both tutor and student The development of high-quality learning materials is time consuming and expensive. Online tutoring can be more time- consuming than face to face tutoring. Learning is a social process and many people enjoy face to face interactions. The use of the large virtual learning environments is expensive and may demand additional equipment and specialized staff. Some learning environments require state of the art computer and the most update browser Blended solutions can be expensive as they may involve the development of expensive online learning resources and providing technology based support as well as face- to face support. FUTURE DEVELOPMENTS Automatic Response to question: Problems of learners received, the server should be in accordance with the method of matching. Browsing questions and answers: Learners though the system should visit the other student’s question and corresponding answers, in order to achieve knowledge-sharing with each other to improve. Sending notification of teaching activities: System should send notification to students when they go out to, so that students can be in touch with the educational institution at any time, replacing a lot of inconvenience. CONCLUSION In IT era information needs are changing and demands of LIS profession are also varying. Due to rapid advancement in computer communication as well as information technology worldwide exchanges of information is possible. Thus technology takes us to the globe anywhere at any time for any theme. The dimension of new information technology brings the world to any one before the people while they site before the computer with internet connectivity. But Mobile technologies are development rapidly, and the functionalities available on mobile devices grow more numerous and complex every day. These technological advancements, coupled with widespread availability and relatively low cost of mobile devices, represent a tremendous opportunity to leverage the power and ubiquity of mobile. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] Allan & Barbara. E-learning and Teaching in Library & Information Services, 2002, Facet publishing, London. Anandkrishnan, M. “e-learning: substitute or supplement?” paper presented in xx IATLIS national conference, Madras Chennai 21-23 Pp. 123-129. Annandan, C. & Gangatharan, M. 2002, Digital Library: From Technology to Culture 1st Edition, New Delhi: Kanishka Publisher. EUROPEAN COMMISSION. The e-learning action plan: Designing tomorrow’s education, 2001. Available in http:www.study mentor.com/study mentor/. Joshi, Vinod “e-learning to the wisdom” the Hindu October 15.2003. Keegan, Desmond, “the future of learning: From e-learning in of m learning” Information Analysis.2002.11, Pp4465. Kohei Arai, Herman Tolle “Efficiency improvement of e-learning document search engine for mobile browser” International Journal of research and review in computer science (IJRRCS) Vol.02. No.06; dec.2011, Pp12871291. KOOHANG, A. and HARMAN, K. Open Source: A metaphor of learning. Information Science Journal. 8, 2005, p.75-86. NICHOLS, M. E-learning in context, E-Primer Series 2008 Available in : http//akaotearora.ac.nz/download/ng/file/group-661/877-1…..e-learning-in-context pdf. Riggs, D.E “Distance education: rethinkikingpractices, implementing new approaches” collage and research libraries 58, 1997.Pp. 208-209. Sangam S L and Vantal R M “e- learning and libraries in offering LIS education” Paper presented at xx IATLIS national conference, Chennai, 21-23. Nov. Pp. 123-129. Seppala & H .Alamaki, “Mobile learning in teacher training” Journal of computer Assisted learning (2003)19. Srivastava, D.K.- E-learning : A New way of Education, University News 43 (26) 2005,27-3. Supyan Hussin, Mohd Radzi Manap, Zaini Amir & Pramela Krish, “ Mobile learning Readiness among Malaysian Students at Higher learning Institute” Asian Social Science; Vol. 08, No. 12; 2012, p276-283. Vathal, R.M.- Introducing Electronic Information Resources through E-learning mechanism. University News 42 (14) (2004) 5-11 Why e-learning is so powerful? [www.zdnetindiacom/specials/elarning/]. 2 December 2003. ISBN 1-63102-455-8 433 LIS Services in E & M Learning Technology [17] [18] 434 Wu Junqi, Qi Lili, Zhaengbing Hu, “3G Phone-Based mobile learning for improving K-12 Teachers’ educational technology in rural area” ,2010 Second International Workshop on education technology and computer Science,P821-825. Yazhen Zhang, Jian Li. “Application of 3G-Based mobile learning in teacher training” 2011 Fourth Conference on information and computing, P27-29. ISBN 1-63102-455-8 RELEVANCE OF ICT IN TEACHER EDUCATION R. Kington | Research scholar | Gandhigram Rural Institute Deemed University | Gandhigram | kingstonkings2010@gmail.com Dr. N. Devaki | Assistant Professor | Gandhigram Rural Institute Deemed University | Gandhigram | devakiaries@gmail.com Abstract: We are living in the knowledge based society. Knowledge today is not only power, but also a promising asset for both individual development and social well being In the modern context, education alone can provide the most dependable and most effective apparatus for accelerating sustainable growth and development in all domains of human activities, In order to function effectively in the emerging knowledge society, the teachers have to learn to collect relevant information, to analyze and make decisions and to master new knowledge and to accomplish diverse tasks collaboratively. Information Communication Technology (ICT) is an emerging area of communication technology application. ICT involves a wide spectrum of audio-visual and media-technology inputs and networks and it has brought about a paradigm shift in education service based upon them. ICT is the latest tool for making teaching and learning effective and performance based. Teacher education, an essential component of general education, must take advantage of ICT advancements. ICT- enabled teacher preparation is the need of the hour. It is in this context, developing an ICT culture is an essential part of the process of integrating ICT in to all the transactions of teacher education. In fact, ICT involves both teacher educators and student teachers. Keywords: Teacher Education, ICT, ICT Development Skills. INTRODUCTION The professional development of teacher educators necessitates an elaborate process of harnessing the diverse ICT resources. Yet the access to and use of ICT in teacher education are limited to teacher education institutions which are known for their resource-base. Suitable modalities are evolved for the effective use of ICT in teacher education, such as transmission, manipulation and dissemination relevant knowledge, skills, attitudes and values of information, as accurately and efficiently as possible. This paper is an attempt to highlight the relevance and potentials of ICT in teacher education in the contemporary Indian perspective. Teacher Education: In teacher education, the teacher has a major role in educational development whether he approaches his work actively or passively. He can influence development adversely by opposing innovation or merely remaining mute in the face of a growing need for reforms; on the other hand, he can participate actively as the initiator himself or an interpreter of the plans devised by others. Significance of ICT in Teacher Education Programme: The most critical factor in the successful integration of ICT’s into teacher education is the extent to which the teacher education have use of ICT’s in their own teaching practices, To Effectively harness the power of the new information and communication technologies to improve learning ICT DEVELOPMENT SKILLS ICT helps he teacher trainees for preparing lesson plans for their class by referring downloading the latest materials available for the topics under discussion teaching from different web sites declaring on the topic in the World Wide Web. It is the need of the time that today’s teacher should possess the ability to use computer based technologies. As the primary goal of teacher education is to focus more on pedagogy and not on technology, the introduction of ICT will help to make the instruction more learners centered and successful. Some of the Important Skills Developed By ICT are: ISBN 1-63102-455-8 435 Relevance of ICT in Teacher Education      Development of Intellectual Skills: The intellectual skills consists critical thinking and problem solving skill. ICT helps to develop creativity of the teacher trainees by using software’s, these software’s help them to become problem solves. Development of Learning Skills: ICT helps in the development of independent learning or self learning through a host of tutorials and interactive packages within built self-test and scoring tools. Development of Personal and Inter –Personal Skills: Development of personal and inter –personal skills include cultural transference obtaining while chatting through sharing ideas through e-mail. There are educational websites for extending assistance to solve homework grammatical or mathematical or science or software programme related problems exposure a practices prevailing different parts of the world will enhance one’s skills like these relating to time management communication etc. Development of Soft Skills: It helps to develop ‘friendship from worldwide level through sharing their ideas opinions etc. It will help to develop tolerance, cooperativeness, empathy, creativity, communication, time management patience and confidence among the teacher trainees. Development of Web Designing Skills: The teacher trainee can create their own website related to their respective subjects. They can plan it according to their creativity level. This may be helpful for students to make reference or to clear their further doubts, faraway from the teacher i.e., even when they are at home or while teachers are holidaying at distant places. ICT IN TEACHER EDUCATION The brains grow and thrive continuously throughout our life. One recent information Suggest that, brain is like plastic, which means it changes continuously and sprouts out its nervous endings in response to environmental stimuli and experiences. Brain changes physically in the classroom where students are gaining meaningful and reverberating experiences. So the activities of teachers which are essential for good classroom interaction among the students can be of the following:  Help the learner to pay attention  Eliminate destructor  Open “mental files”  Provide choices  Encourage self-directed learning  Capitalize on “prime time”  Fill unallocated time-extended or enrich extra time To apply all these successfully in the life of a learner; within his total active hours in a day, a teacher requires quality training along with accommodation of modern tools, techniques, methods and methodologies of ICT in the teacher education programmes in a more systematic way. Quality Improvement through ICT for Teacher Education: The improvement of quality through integration of newer technologies is not only important but also is indispensable. Improvement of quality in managerial efficiency may be enhanced by proper applications of required technologies which require efficient managerial training. A teacher is a manager in the classroom situation. So development of proper managerial quality among the student teacher should also be incorporated in Teacher Education. In teaching-learning process, some basic components are required for quality improvement. There is no difference of opinion regarding the integration of ICT into the system of Teacher Education. ICT can be mentioned when used in education. A teacher can develop the following qualities by using ICT:    436 Learning at one’s own pace, choice and time. Exploring information as and when required. Developing of proficiency of assessing, processing and communicating Information. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education         Increasing quality and quantity of creativity and thinking ability. Non linear access of information through hypermedia. Extending ability to solve complex problems. Developing artistic sense. Increasing efficiency in teaching process. Making comfortable in using tools of information age. Hypermedia increases the natural forms of working mind. Decreases cost of education in terms of money, time and energy. ICT IN TEACHING AND LEARNING ICT in teaching and learning is about exploiting the full capabilities of technology to open new perspective for both teachers and students. At the same time, it is unwise to ignore traditional styles and models of learning as well as ideas from the past that were not implemented in the mass school but were precious exceptions. Therefore, we need to start with things that we are already doing, but consider them a new. Lot of possible areas are there for the use of ICT in teaching and learning like presentation, Calculation, completing assignments, information sources and some of the other possibilities are immediate oral communication, reading, writing, science experiments and observations, school use of general and professional applications, virtual laboratory and organization of the learning process. Researchers have proved that ICT can change the way of teaching and especially useful in supporting student-centered approaches to instruction and promoting collaborative activities. STEPS FOR INTEGRATING ICT IN TEACHING-LEARNING PROCESS ICT in teaching-learning process involves in the following steps. Step 1: Awareness: To instruct and creating awareness of ICT among teachers. Step 2: basic knowledge: To create and insert the basic knowledge of the modern technology those are involved in teaching and learning towards teachers. The basic knowledge are,  Nature of media  Use of media in teaching learning process.  Implementing the media in teaching Step 3: Proper Training: It is needed to give proper training to teachers about the equipment and instrument, which are utilized and involved in teaching. Step 4: Implementation / put into practice: After receiving training, the teachers should implement his training in his teaching and evaluation. Step 5: Follow-up activities: While implementing new technology, there may so many difficulties and experiments arise. These may be eradicated through sharing and consulting the experts. Awareness Basic Knowledge Proper Training Implementation Follow - Up ISBN 1-63102-455-8 437 Relevance of ICT in Teacher Education TEACHING-LEARNING PROCESS Advantages of Using of ICT in Teaching-Learning Process:  First hand experiences: The learners can feel the first hand experience is the best type of educative experience.  Variety: The learner can enjoy the variety-ness of the ICT.  Clear images: Clear images are formed when we see, hear, touch, taste, and smell as our experiences are direct, concrete and more or less permanent.  Freedom: The learners can work freely without the interruption of the teacher.  Helpful in attracting attention  Based on maxims of teaching Example: Concrete to abstract Known to unknown Learning by doing  Relatively cheaper and more economical.  Any number of students may enroll themselves.  Learners can do part-time course development  No restriction on the pace of learning  Saving of energy and time  Encouragement to healthy classroom interaction  Immediate reinforcement to learners. PEDAGOGY-ICT INTEGRATION The inclusion of both pedagogy and technology as core competencies of teachers acknowledges that integrating ICT in education for teaching and learning is far broader than the simple acquisition of these two sets of competencies. Competencies of integration are neither competencies of pedagogy alone nor competencies of technology. Rather competencies of integration are about the appropriate selection, use, mix, fusion and integration of sets of competencies including those covered under pedagogy and technology. TEACHER EDUCATORS’ ROLE IN PEDAGOGY-ICT INTEGRATION There are four broad stages in the way that Teacher educators use ICT as support to teaching and learning. Specializing in the use of ICT Transforming Creating innovative learning environments Understanding how and When to use ICT Infusing Facilitating learning Learning how to use ICT Applying Enhancing traditional teaching Becoming aware of ICT Emerging Stages of ICT usage ICT Development Supporting work performance Pedagogical usages Of ICT Fig: Pedagogy-ICT Integration 438 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Emerging: Institutions at the initial stages of ICT development demonstrate emerging approach. Such institutions have just started their journey in the ICT field. To start with the administrators and Teacher educators begin to explore all the possibilities and consequences of using ICT in the institutional management and adding ICT to the curriculum. The emerging approach phase to ICT development focuses on technical functions and uses of ICT. Applying: In the secondary phase, the administrators and teachers use ICT for tasks already carried out in institutional management and in the curriculum. Institutions at this stage adapt curriculum in order to increase the use of ICT in various subject areas with specific tools and software such as drawing, designing, modeling and applications of specific tools. In applying approach phase to ICT development, Teacher educators use ICT for professional purposes, focusing on improving their subject teaching with a range of ICT applications. They integrate ICT with their classroom teaching and use ICT to support their training and professional development. Teacher educators gain confidence in a number of specialized ICT tools that can be applied to teaching of their subject areas. Infusing: At the third stage, infusing approach involves integrating or embedding ICT across the curriculum and is seen in those institutions that now employ a range of computer based technologies in laboratories, classrooms and administrative offices. Teacher educators explore new ways in which ICT changes their professional practices. In the fusing approach to ICT development, ICT infuses all aspects of teacher educators’ professional lives in such ways as to improve student learning and the management of learning processes. It supports the active and creative teachers who are able to stimulate and manage the learning of students, integrating a range of preferred learning styles and uses of ICT in achieving their goals. In this approach, Teacher educators fully integrate ICT in all aspects of their professional lives to improve their learning and as well as, the learning of their students. In this approach it becomes quite natural to collaborate with other teachers in solving the common problems and sharing their experiences with others. TRANSFORMING In the transforming approach to ICT development, Teacher educators and other staff members regard ICT as a natural part of their everyday life of institutions that they begin to look at teaching learning process in new ways. The emphasis changes from teacher centered to learner centered. Teachers together with students, expect a continuously changing teaching methodology designed to meet individual learning objectives. The adoption of ICT in the classroom follows in stages. At first, teacher discovers ICT tools such as presentation software. This follows the application of ICT in place of previous instructional activities, such as power point presentation in place of a lecture. As teacher becomes familiar with ICT in the subjects, new ways of using ICT are explored so that his previous classroom delivery mechanism begins to change. In time, his classroom practice is transformed as learner centered and students use ICT to solve real problems. To integrate ICT with pedagogy properly, capacity building programmes should be provided to teacher educators. CONCLUSION The Quality of Teacher Education and ICT can be improved successfully in classroom teaching learning systems and instructional practices. But the proper teaching and learning theories are also to be incorporated with technology framework. The teachers should also be creative so that they can use the customized plans to bring in the technologies best suited for a particular classroom situation. To achieve the goals and to arrive at the desired objectives of quality teacher education by the effective applications of ICT can help us to travel fast in this information age. Undoubtedly, ICT has brought about many challenges and opportunities for education. The educational system needs to come to terms with these new challenges and take full advantages of the opportunities. If educational institutions have to ensure that their students leave the institutions as confident individuals capable of using new technology creatively and productively then their teachers should have the competence to integrate the emerging technologies and the digital content with all their operations. ISBN 1-63102-455-8 439 Relevance of ICT in Teacher Education REFERENCE [1] [2] [3] [4] [5] [6] [7] [8] [9] 440 Surender Dahiya(2005) ICT enabled Teacher education, University News 43(18). Alexis and Mathews(2011), Fundamentals of Information technology, Vikas publishing house, New Delhi. Mujibal Hasan Siddiqui (2004), Technology in Teacher education, APH, Publishing Corporation, New Delhi. J.M. Arul Sekar and K. Thiyagu (2007), Information and communication technology in education, prophet publishers, Trichy. S.K. Mangal (2012), Educational Technology, Tandon Publications, Ludhiana. NCERT (2000), Nation Curriculum Framework for School Children, New Delhi, Publication Division, NCERT. J. M. Arul Sekar & Thiyagu K (2007), Information and Communication Technology in Education, Prophet Publishers, Tiruchirappalli. Sreedevi P.S (2014), ScienceEducation : Innovstions and InstructionalStrategies, Dominant Publishers, New Delhi. www.education.nic.ssa ISBN 1-63102-455-8 AWARENESS OF OPEN SOURCE SOFTWARE FOR THE LIBRARY PROFESSIONALS N. Chidambaranathan | Assistant Librarian | Valliammai Engineering College | SRM Nagar, Kanchipuram District (Tamilnadu) | nathan1234in@gmail.com, nathan1234in@yahoo.co.in G. Elanjiyam | Librarian | Anand Institute of Higher Technology | Old Mahabaliburam Road, Chennai (Tamilnadu) | elanjiyamg@gmail.com, aihtlibrary@gmail.com Abstract: The rapid growth of information explosion, users have more difficulties to find the relevant information through the internet. To solve the problem, open source software and commercial software have become nowadays to manage and retrieve the relevant information. This paper is discussed about varies types of library open software such as Integrated Library Management software, VuFind, SOPAC, Backlight OPAC, National Resource Centre for Free/Open Source Software (NRCFOSS), Green Stone (Software), DSpace, EPrints, KOHA (software), Joomla, Drupal, Fedora, NewGenLib, Evergreen (Software), advantages of open source software and disadvantage of open source software. Keywords: Open Source Licenses, VuFind, SOPAC, Backlight OPAC, National Resource Centre for Free/Open Source Software (NRCFOSS), Green Stone. INTRODUCTION Free/Open Source Software (FOSS) is very useful for software industry and the general public. Open Source software is freely available in the internet. Open Source software is growing globally, particularly in developing countries. In many government sectors open source software are used frequently. Open Source software are used all types of areas. Nowadays many schools, colleges and universities are used open source software. In the field of Library and information science many open source software are available in the field of OPAC, Library automation and the digital library. SOFTWARE Computer software or simply software is any set of machine-readable instructions that directs a computer's processor to perform specific operations. Computer software includes computer programs. The word software is also sometimes used in a more narrow sense, meaning application software only. At the lowest level, executable code consists of machine language instructions specific to an individual processor – typically a central processing unit (CPU). A machine language consists of groups of binary values signifying processor instructions that change the state of the computer from its preceding state. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages that are easier and more efficient for humans to use (closer to natural language) than machine language. High-level languages are translated, using compilation or interpretation or a combination of the two, into machine language. Software may also be written in a low-level assembly language, essentially, a vaguely mnemonic representation of a machine language using a natural language alphabet. Assembly language is translated into machine code using an assembler [1]. OPEN SOURCE SOFTWARE Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) usergenerated content or (legally defined) open-content movements. The open-source model, or collaborative competition development from multiple independent sources, generates an increasingly diverse scope of design perspective than one company development alone can sustain long term. And a report by the Standish Group (from 2008) states that adoption of open-source software models has resulted in savings of about $60 billion per year to consumers [2]. ISBN 1-63102-455-8 441 Awareness of Open Source Software for the Library Professionals OPEN SOURCE LICENSES An open-source license is a type of license for computer software and other products that allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions. This allows end users to review and modify the source code, blueprint or design for their own customization, curiosity or troubleshooting needs. Open-source licensed software is mostly available free of charge, though this does not necessarily have to be the case. Licenses which only permit non-commercial redistribution or modification of the source code for personal use only are generally not considered as open-source licenses. However, opensource licenses may have some restrictions, particularly regarding the expression of respect to the origin of software, such as a requirement to preserve the name of the authors and a copyright statement within the code, or a requirement to redistribute the licensed software only under the same license (as in a copy left license). One popular set of open-source software licenses are those approved by the Open Source Initiative (OSI) based on their Open Source Definition (OSD) [3]. INTEGRATED LIBRARY MANAGEMENT SOFTWARE An integrated library system (ILS), also known as a library management system (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed. An ILS usually comprises a relational database, software to interact with that database, and two graphical user interfaces (one for patrons, one for staff). Most ILSes separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include:  acquisitions (ordering, receiving, and invoicing materials)  cataloging (classifying and indexing materials)  circulation (lending materials to patrons and receiving them back)  serials (tracking magazine and newspaper holdings)  the OPAC (public interface for users) Each patron and item has a unique ID in the database that allows the ILS to track its activity. Larger libraries use an ILS to order and acquire, receive and invoice, catalog, circulate, track and shelve materials. Smaller libraries, such as those in private homes or non-profit organizations (like churches or synagogues, for instance), often forgo the expense and maintenance required to run an ILS, and instead use a library computer system [4]. VuFind: VuFind is an open source library search engine that allows users to search and browse beyond the resources of a traditional OPAC. Developed by Villanova University, version 1.0 was released in July 2010 after two years in beta.VuFind operates with a simple, Google-like interface and offers flexible keyword searching. While most commonly used for searching catalog records, VuFind can be extended to search other library resources including but not limited to: locally cached journals, digital library items, and institutional repository and bibliography. The software is also modular and highly configurable, allowing implementers to choose system components to best fit their needs. As of March 2012, a total of 64 institutions are running live instances of Vufind including the Georgia Tech Library, the London School of Economics, the National Library of Ireland, Yale University, and the DC Public Library [5]. SOPAC: SOPAC (Social Online Public Access Catalog) is a Drupal module that provides true integration of your library catalog system with the power of the Drupal content management system while allowing users to tag, rate, and review your holdings. User input is then incorporated into the discovery index so that SOPAC becomes a truly community-driven catalog system. Other features include:       442 Faceted browsing Ajax-empowered interface with native jQuery support 100% customizable interface via the Drupal template system Ability to remove search limiters Saved searches Integrated renewals, holds placement, and fine payment ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education  Ability to customize the user experience via the administrative control panel  Ability to create custom functionality via a Drupal sub-module Because SOPAC depends on Locum to connect to your integrated library system, it has the potential to work with any ILS [6]. Backlight OPAC: Located in Charlottesville, the University of Virginia (UVA) offers 56 bachelor’s, 79 master’s, and 54 doctoral degree programs in a variety of fields such as architecture, business administration, education, engineering, law, medicine, nursing, and the arts and sciences. One of the top public research institutions in the country, UVA has more than five million print volumes, nearly 463,000 e-books, and dozens of electronic databases in its library collection. In 2014, the UVA Libraries replaced their previous discovery platform with EBSCO Discovery Service (EDS), a research solution that streamlines access to library resources through a single search box. With superior relevance ranking that quickly surfaces pertinent search results and a robust API that integrates with the Libraries’ Blacklight-driven interface, EDS has given librarians a more reliable research tool to offer students and faculty [7]. LibraryFind: LibraryFind® makes finding information in the library easier. LibraryFind gives you the ability to search the library catalog, online databases, image collections, and other resources with one search. Currently, LibraryFind provides a general search which is most useful for undergraduate work, but it can also be used as a starting point for deeper research.LibraryFind ® is software developed by the Oregon State University Libraries, in part funded from a grant from the State Library. More information on the development of LibraryFind can be found at the LibraryFind Project Website [8]. National Resource Centre for Free/Open Source Software (NRCFOSS): National Resource Centre for Free/Open Source Software (NRCFOSS) is an organisation created and financed in India by the Department of Information Technology, Ministry of Communication and Information Technology, Government of India in April 2005.It is jointly administered by the Chennai Division of Centre for Development of Advanced Computing (C-DAC) and the AU-KBC Research Centre of Anna University. Some state governments, for example Kerala, already have programmes to popularize FOSS among the masses especially among the students. The founding of NRCFOSS is the first initiative by the Government of India in the direction of making efforts for increasing the acceptance of FOSS at a national level. NRCFOSS is designed to give a boost to the efforts to popularize FOSS products among lay computer users of India. NRCFOSS has caused the introduction of elective papers in FOSS in the syllabi and curriculum of Anna University.[4] The syllabi is applicable to around 250 engineering colleges affiliated to Anna University. It has prepared the entire course material for these elective papers and made it available for free download. NRCFOSS has organized a series of workshops and seminars in different parts of India to popularize the idea of FOSS. It developed the FOSS Lab Server as an archive of various resources that are essential for the students taking FOSS courses. It contains source code, documentation and mailing list archives. NRCFOSS developed Bharat Operating System Solutions a GNU/Linux distribution made specifically for the Indian environment. The latest version of this Free/Open Source Software, BOSS GNU/Linux v4.0, was released in February 26, 2011. This software supports eighteen Indian languages out of a total of twenty-two constitutionally recognized languages in India at the desktop level [9]. OPEN SOURCE SOFTWARE IN INDIAN LIBRARY Green Stone (Software): Greenstone is a suite of software tools for building and distributing digital library collections on the Internet or CD-ROM. It is open-source, multilingual software, issued under the terms of the GNU General Public License. Greenstone is produced by the New Zealand Digital Library Project at the University of Waikato, and has been developed and distributed in cooperation with UNESCO and the Human Info NGO in Belgium. Greenstone may be used to create large, searchable collections of digital documents. In addition to command line tools for digital collection building, Greenstone has a graphical Greenstone Librarians Interface (GLI) used to build collections and assign metadata. hrough user selected plugins, Greenstone can import digital documents in formats including text, html, jpg, tiff, MP3, PDF, video, and Word, among others. The text, PDF, HTML and similar documents are converted into Greenstone Archive Format (GAF) which is an XML equivalent format. A project on SourceForge was created in October 2005 for ISBN 1-63102-455-8 443 Awareness of Open Source Software for the Library Professionals version 3 of Greenstone. In 2010, Greenstone version 2.83 was included, along with the Koha Integrated Library System, in an Ubuntu Live-Cd [10]. DSpace: DSpace is an open source repository software package typically used for creating open access repositories for scholarly and/or published digital content. While DSpace shares some feature overlap with content management systems and document management systems, the DSpace repository software serves a specific need as a digital archives system, focused on the long-term storage, access and preservation of digital content. DSpace is a set of cooperating Java web applications and utility programs that maintain an asset store and an associated metadata store. The web applications provide interfaces for administration, deposit, ingest, search and access. The asset store is maintained on a file system or similar storage system [11]. EPrints: EPrints is a free and open-source software package for building open access repositories that are compliant with the Open Archives Initiative Protocol for Metadata Harvesting. It shares many of the features commonly seen in document management systems, but is primarily used for institutional repositories and scientific journals. EPrints has been developed at the University of Southampton School of Electronics and Computer Science and released under a GPL license [12]. KOHA (software): Koha is an open source Integrated Library System (ILS), used world-wide by public, school and special libraries. Koha is web-based ILS, with a SQL database (MySQL preferred) backend with cataloguing data stored in MARC and accessible viaZ39.50 or SRU. The user interface is very configurable and adaptable and has been translated into many languages. Koha has most of the features that would be expected in an ILS, including:           Various Web 2.0 facilities like tagging, comment, Social sharing and RSS feeds Union catalog facility Customizable search Circulation and borrower management Full acquisitions system including budgets and pricing information (including supplier and currency conversion) Simple acquisitions system for the smaller library Ability to cope with any number of branches, patrons, patron categories, item categories, items, currencies and other data Serials system for magazines or newspapers Reporting Reading lists for members [13] Joomla: Joomla is a free and open-source content management system (CMS) for publishing web content. It is built on a model–view–controller web application framework that can be used independently of the CMS.Joomla is written in PHP, uses object-oriented programming (OOP) techniques (since version 1.5) and software design patterns, stores data in a MySQL, MS SQL (since version 2.5), or PostgreSQL (since version 3.0) database, and includes features such as page caching, RSS feeds, printable versions of pages, news flashes, blogs, search, and support for language internationalization. As of February 2014, Joomla has been downloaded over 50 million times. Over 7,700 free and commercial extensions are available from the official Joomla! Extension Directory and more are available from other sources. It is estimated to be the second most used content management system on the Internet [14]. Drupal: Drupal is a free and open-source content-management framework written in PHP and distributed under the GNU General Public License. It is used as a back-end framework for at least 2.1% of all Web sites worldwide ranging from personal blogs to corporate, political, and government sites. It is also used for knowledge management and business collaboration. The standard release of Drupal, known as Drupal core, contains basic features common to content management systems. These include user account registration and maintenance, menu management, RSS feeds, taxonomy, page layout customization, and system administration. The Drupal core installation can serve as a simple Web site, a single- or multi-user blog, an Internet forum, or a 444 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education community Web site providing for user-generated content. As of April 2015, the Drupal community has provided more than 30,000 contributed modules. Such modules alter and extend the core capabilities, behavior, and appearance of a Drupal site. The Drupal community comprises more than one million members (as of October 2013) and 31,000 Developers (as of February 2014). "The Drupal Overview", a feature of the project web site, describes it as a content management framework. Drupal also describes itself as a Web application framework, as it meets the generally accepted feature requirements for such frameworks. Although Drupal offers a sophisticated application programming interface for developers, basic Web site installation and administration of the framework requires no programming skills. Drupal runs on any computing platform that supports both a Web server capable of running PHP and a database to store content and configuration [15]. Fedora: Fedora (or Flexible Extensible Digital Object Repository Architecture) is a digital asset management (DAM) architecture upon which institutional repositories, digital archives, and digital library systems might be built. Fedora is the underlying architecture for a digital repository, and is not a complete management, indexing, discovery, and delivery application. It is a modular architecture built on the principle that interoperability and extensibility are best achieved by the integration of data, interfaces, and mechanisms (i.e., executable programs) as clearly defined modules. Fedora supports two types of access services: a management client for ingest, maintenance, and export of objects; or via API hooks for customized web-based access services built on either HTTP or SOAP. A Fedora Repository provides a general-purpose management layer for digital objects, and containers that aggregate mime-typed datastreams (e.g., digital images, XML files, metadata). Out-of-the-box Fedora includes the necessary software tools to ingest, manage, and provide basic delivery of objects with few or no custom disseminators, or can be used as a backend to a more monolithic user interface. Fedora supports ingest and export of digital objects in a variety of XML formats. This enables interchange of objects between Fedora and other applications, as well as facilitating digital preservation and archiving.    Digital Object Model The FEDORA digital object model allows aggregation of both metadata and digital content as "datastreams", regardless of format and physical location. FEDORA objects can include content from external or distributed repositories. Digital Objects can be modeled to represent many types of entities from digital texts, publications, photos, videos, and datasets. Digital objects can have associated "behaviors" that can provide different views of the object, or that can produce dynamic transformations of digital object content. Relationships The FEDORA digital object model supports the ability to assert semantic relationships using the Resource Description Framework (RDF). Relationships between objects and within objects can be indexed using a semantic triplestore that enables queries over the entire repository of digital objects. Repository Service is based upon four main Application Programming Interfaces (APIs): manage, access, search and metadata harvesting via OAI-PMH. The system is scalable and flexible and Fedora users have adopted the repository as a core component of many applications and platforms. The Fedora Project is currently supported by the DuraSpace organization [16]. NewGenLib: NewGenLib is an integrated library management system developed by Verus Solutions Pvt Ltd. Domain expertise is provided by Kesavan Institute of Information and Knowledge Management in Hyderabad, India. NewGenLib version 1.0 was released in March 2005. On 9 January 2008, NewGenLib was declared Open Source Software under GNU GPL. The latest version of NewGenLib is 3.1.1 released on 16 April 2015. Many libraries across the globe (mainly from the developing countries) are using NewGenLib as their Primary integrated library management system. NewGenLib has following main modules  Acquisitions  Technical Processing  Serials management  Circulation  Administration ISBN 1-63102-455-8 445 Awareness of Open Source Software for the Library Professionals    MIS Reports Task to do today (daily scheduler) OPAC Some advanced functional features:  Android mobile and tablet capable  Integration with Twitter helping send messages of transactions directly to users’ Twitter accounts.  Flexibility of defining own search field in OPAC.  Enhanced contents and interactive OPAC like Availability of Book jackets, Google preview, Comments/ Book review, Tagging, Favorite reading list, etc.  Zotero compliant OPAC  RSS Feeds in OPAC  Faceted Browsing (Refining search results)  Suggestion for other books in the rack  RFID supports  Provision for frequently used predefined templates along with freedom of defining own customized data entry template s in Cataloguing  Configurable SMS system - a proof of transaction.  Integration with Gmail or paid mailbox account. This enables automatic sending of email to patrons during issue /return.  Enhanced Report Module for generating in .csv format with a provision for wide customization.  Provision for integrating with Vufind SOPAC (Ex: OPAC of the Library of Bangalore University).  Catalogue can be harvested through Google site map, and thus the visibility of the library can be further improved [17]. Evergreen (Software): Evergreen is an open source Integrated Library System (ILS), initially developed by the Georgia Public Library Service for Public Information Network for Electronic Services (PINES), a statewide resource-sharing consortium with over 270 member libraries. Beyond PINES, the Evergreen ILS is deployed worldwide in hundreds of libraries, and is used to power a number of statewide consortial catalogs. In 2007, the original Evergreen development team formed a commercial company around the software, Equinox Software, which provides custom support, development, migration, training, and consultation for Evergreen. As of 2014, several more companies and groups also provide support and related services for Evergreen [18]. Advantages of Open Source Software:  Lesser hardware costs  High-quality software  No vendor lock-in  Integrated management  Simple license management  Lower software costs  Abundant support  Scaling and consolidating Disadvantages of Open Source Software:  No Free Support  Lower Security  High Maintenance Overhead 446 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education CONCLUSION Most of the school, college and university libraries are prefer the open source software. Open source seawares provide direct and active role to librarian to reshaping their libraries. Integrated Library Management software, VuFind, SOPAC, Backlight OPAC, National Resource Centre for Free/Open Source Software (NRCFOSS), Green Stone (Software), DSpace, EPrints, KOHA (software), Joomla, Drupal, Fedora, NewGenLib and Evergreen (Software) are very useful in the field of library and information science. At present all the students and staff members are using Digital libraries frequently. In this situation Open Source Software training programs are needed in the field of Library and Information Science professionals. The library science professionals should know enough knowledge in the field of Open Source Software and they should guide the users in the digital library section. REFERENCE [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] https://en.wikipedia.org/wiki/Software https://en.wikipedia.org/wiki/Open-source_software https://en.wikipedia.org/wiki/Open-source_license https://en.wikipedia.org/wiki/Integrated_library_system https://en.wikipedia.org/wiki/VuFind https://www.drupal.org/project/sopac https://www.ebsco.com/success-stories/story/university-of-virginia https://osulibrary.oregonstate.edu/libraryfind.html https://en.wikipedia.org/wiki/National_Resource_Centre_for_Free/Open_Source_Software https://en.wikipedia.org/wiki/Greenstone_(software) https://en.wikipedia.org/wiki/DSpace https://en.wikipedia.org/wiki/EPrints https://en.wikipedia.org/wiki/Koha_(software) https://en.wikipedia.org/wiki/Joomla https://en.wikipedia.org/wiki/Drupal https://en.wikipedia.org/wiki/Fedora_Commons https://en.wikipedia.org/wiki/NewGenLib https://en.wikipedia.org/wiki/Evergreen_(software) https://www.outsource2india.com/software/articles/open-source-software.asp https://besthostingsearch.net/tutorial/open-source-software-advantage-disadvantage/ ISBN 1-63102-455-8 447 MANAGEMENT OF INSTITUTIONAL REPOSITORIES IN ACADEMIC LIBRARIES BY USING D-SPACE Tribeni Devi | Professional Assistant | North Guwahati College | Assam trivenidevi04@gmail.com Lavita Deka | Librarian | Dr. ABS College of Education | Assam lavitadeka45@gmail.com Abstract: Institutional repositories are online databases of scholarly materials such as articles, reports and datasets to enable and faster sharing, discovery and archiving of scholarly resources produced at a given institution. Institutional repositories are development in managing digital objects for effective utilization. It includes variety of research output of any organization. It includes variety of research output of any organization. An institutional repository might also include other digital assets generated by academics, such as administrative documents, course notes, learning objects, or conference proceedings. It is a means to ensure that the published work of scholars is available to the academic community even after increases in subscription fees or budget cuts within libraries.An institutional repository provides scholars with a common platform so that everyone in the institution can contribute scholarly material to promote cross-campus interdisciplinary research. In college libraries different types of publications are published either department wise or the college own publication. For managing those repositories in college libraries digital networked environment is required. There are a number of open-source software packages for running a repository. These are D Space, E-Prints, Fedora, Opus, Greenstone etc.For building digital library and institutional repositories D Space is one of the essential and important software. This paper discusses about Institutional repositories managing through D Space in digital environment, features of D Space, supporting organization of D Space, how it provide services towards user communities etc. In this paper also discuss about benefit of managing institutional repositories in academic libraries. Keywords: Institutional Repositories, D Space, Argonet, @mire Academic Libraries. INTRODUCTION Institutional repositories represent an important open access channel and are relatively new developments in scholarly communication process compared to open journals and subject-specific repositories. It means digital collections that capture and preserve the intellectual output of university communities. An institutional repository (IR) consists of formally organized and managed collections of digital content generated by staff, students, faculty at an institution the content of these repositories can be available for integration with the institution campus library and course management systems and can also be made available to other institution as well as to the general public.An institutional repository can be viewed as a "...a set of services that a university offers to members of its community for the management and dissemination of digital materials generated by the institution and its community members." For a university, this material includes, monographs, eprints of academic journal articles—both before and after undergoing peer review as well as electronic theses and dissertations. An institutional repository might also include other digital assets generated by academics, such as administrative documents, course notes, learning objects, or conference proceedings. The broad view of institutional repositories as a means to manage and preserve effectively an institution’s knowledge base and intellectual assets results in the content of IR expanding beyond e-prints to include research materials forms of institutional intellectual outputs, which are generally not published or preserved elsewhere.  Essential characteristics of an institutional repository: The major features of institutional repositories are, 448 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education I. II. III. IV.  Institutionally defined. Scholarly content. Cumulative and perpetual. Inter-operability and open access. Benefit of institutional repositories:I. Collecting and curating digital output. II. Managing and measuring research and teaching activities. III. Opening up outputs of the institution to a worldwide audience. IV. Enabling and encouraging interdisciplinary approaches to research. V. Facilitating the development and sharing of digital teaching materials and aids. VI. Maximizing the visibility and impact of these outputs as a result etc. Open source software D Space: D Space is one of the digital repository software, created as a joint project of MIT libraries and the Hewlett-Packard Company, and publicly released in November 2002 as an open source software. It allows us to capture documents in any format like in text, audio, video and datasets etc. it has BSD license. For building digital library and institutional repository, D Space is one of the reliable software. It is built in java platform. D Space installation required many software bundles. Documents can be uploaded in D Space whenever required, that is why it is very important for academic library to maintain institutional repositories. D Space software supports next generation digital archiving that is more permanent and shareable than current analog archives. D Space provides a way to manage research materials and publications in a professionally maintained repository to give users greater accessibility and visibility over time. Who use DSpace: DSpace is the most widely used digital repository software in the world. It is used by libraries, universities, research centres, non-profit organization, government agencies, archives and private sector companies to manage collect and share all types of digital documents including digital images, articles, videos, datasets, working papers and archives. It is an open source repository software which is typically used for creating open access repositories for scholarly and or published digital content. DSpace is handled by Dura Space. It has BSD license. For building digital library and institutional repository DSpace is one of the best software. It is a soft of choice for academic, non-profit and commercial organizations for building open digital repositories. All types of organization use DSpace who support a variety of types of digital assets management needs some examples,        Libraries of all types: To collect, manage and publicly display collections of archival material such as digitized or scan documents, images or oral histories. Corporate Archives: Manage both public and private archives. Non-Governmental organization/ non-profit organization:Collect and publish datasets, reports, working papers, position papers, fact sheets etc. Research Centres:Collect and disseminate research outputs, working papers. Business:Collect and organize internally restricted digital assets such as images, corporate histories, electronic records etc. Schools- primary and secondary educational institutions:Collect and share student project, disseminate locally produced open educational resources. Higher Educational institutions:Collect, manage, shares student work, disseminate faculty research, open access research datasets, open educational resources. ISBN 1-63102-455-8 449 Management of Institutional Repositories in Academic Libraries by Using D-Space Why use D Space in Academic library: Largest community of users and developers worldwide: - It has over 250 institutions that are currently using the D Space software within their organization in a project and production environment.     Free open source software completely customizable to fit your needs: - One can fully customize the look and feel of D Space website so it will integrate seamlessly with their own institution’s website and can be more intuitive for their users. Use by educational, government, private and commercial institution: - The platform of D Space is not only used by higher education institutions, who the platform was initially developed for, but also additionally the software has broader appeal. Can be installing out of the box: - Each DSpace implementation is unique. While the technology is fairly easy to install and set up. Can manage and preserve all types of digital content: - The DSpace application can recognize and manage a large number of file formats at MIME types. Some such formats are PDF and word documents, JPG, MPG, TIF files. Registered Service Provider: Registered service providers have made an investment in the D Space technology and commitment to work cooperatively with Dura Space organization to best serve the community of users. There are many lists of registered service providers (RSP). They are as follows,     Argonet: - It has been working in the area of institutional repository since 2007 and is developing scientific data, repository solution based on DSpace, fedora and other open source products. @mire: - Even since the beginning in 2006 @mire has been 100 per chant committed to DSpace services and add-on modules. CINECA:- Cineca, a non-profit consortium of universities and the Italian ministry of university and research, since 1969 has been supporting, hosting and customizing open source solutions for Epublishing and digital repositories since 2003 including DSpace and fedora. D-Square technologies: - India, is focused on providing services in solutions in the field of institutional repositories and libraries using the open-source platform D Space. Long sight: - Long sight provides comprehensive support for carefully selected open source software, including D Space, to education and non-profit organizations. CONCLUSION Institutional repositories offer a strategic response both to the opportunities of the digital networked environment and the systemic problems in the today's scholarly journal system. This response can be applied immediately, reaping both short-term and on-going benefits for universities and their faculty and advancing the transformation of scholarly communication over the long term. One of the major uses for DSpace is an institutional repository. It follows the librarian’s inclination to create and manage system that would be as easy as possible to implement and use. DSpace is designed as open source application software that an organization and an institution could run with relatively few resources. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] 450 Liber. Library. Uu.ml/index.php/lq/…/8396. Www.Dspace.org/introduction/index.html. Thakuria, Juli 2008. ‘Building an institutional repository with DSpace’, Planner. Tyler Q. Walters April1 2007, ‘The new Academic Library-Building Institutional Repositories to support changing Scholarly and research processes’, Baltimore, Maryland. Heery, R. and Anderson, S. (2005) ‘Digital repositories review’ other. Joint Information Systems Committee. Olivia, Silas Marques De 2011 IATUL Proceedings, ‘Benefits and challenges of OA and institutional Repository Implementation in Seventh-day Adventist University Libraries: An International Perspective, Andrews University. Www.openscholarship.org. Giesecke, Joan 2011, ‘Institutional Repositories: Keys to Success’university of Nebraska- Lincoln. http://www.arl.org/sparc/IR/ir.html. ISBN 1-63102-455-8 AWARENESS OF ‘BIG DATA’ AMONG THE LIBRARY PROFESSIONALS IN THE RESEARCH LIBRARIES OF ODISHA Dr. Sanghamitra Dalbehera | Librarian | Institute of Technical Education & Research | S.O.A University | Bhubaneswar | sanghamitra348@gmail.com Abstarct: ‘Big data’ means reflecting on the implications that the accumulation and analysis of an enormous amount of digital data have for organizations and for their information management strategies. According to Wikipedia “Big data” is “the term for a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications.” Libraries have amassed an enormous amount of machine-readable data about library collections, both physical and electronic. Librarians are well skilled to discuss with researchers the value of data management and sharing strategies, and to increase their awareness of metadata standards and practices and institutional repositories. Librarians have expertise and experience with institutional repositories, and libraries have a legacy of preserving knowledge for future generations. Librarians advocate open access and, as such, are advocates of the value of open data. Librarians can act as intermediaries, linking faculty with peers in other disciplines to facilitate interdisciplinary research. The focus of this paper is on the knowledge of library professionals in the research libraries of Odisha about OCLC’s WorldCat database of global library holdings and includes work by other library organizations to expose their data using big data concepts and standards. Keywords: Bigdata, Hadoop, Technology, Library. INTRODUCTION Big data normally comprise of heterogeneous dataset, both structured and unstructured and also containing diverse data and file formats. It is very difficult to locate and retrieve the relevant information in real time from the universe of big data. The main elements of "Big Data" consists of: the degree of complexity within the data set ;the amount of value that can be derived from innovative vs. non-innovative analysis techniques and the use of longitudinal information supplements the analysis . The dataset acting as a component of the big data may consist of a statistical database, an unstructured dataset of collection of web pages, a natural language text, a dataset of message posts in social networking website, a live data stream, a collection of unstructured data files, etc. The official definition of ‘big data’ namely is: ‘high-volume, high-velocity and high-variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision making’ ;Gartner (2013). Laney (2001) emphasized three key tendencies: (a) the remarkable volume of transactional data generated by e-commerce and the willingness of companies to retain this information; (b) the speed of data creation produced by the interaction between organizations and customers; and (c) the opportunity to integrate and manage a wider variety of information, with different formats and structures. These three trends became the three basic attributes of ‘big data’—i.e. volume, velocity and variety, which are known as the three basic v-attributes of big data. As a matter of fact research libraries collect a host of usage and transactional data created by users as they interact with their systems and services. They are aware with this type of data –and are waking up the potential value that can be extracted from what at the moment is largely, unstructured data. Librarians are often at the forefront within institutions in both recognising the opportunities the data presents, and acting on this data. They are helping inform collection management decisions, designing new forms of interactive, game-like participation and collaborating in strategic institutional initiatives in student learning analytics. ATTRIBUTES OF BIG DATA Big data is high-volume, high-velocity and high-variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision making.  Volume: Big data uses massive datasets, including for example meta-data from internet searches, credit and debit card purchases, social media postings, mobile phone location data, or data from sensors in cars and other devices. The volume of data being produced in the world continues to increase rapidly. So new tools have been developed to analyse them such as NoSQL and the open source software Hadoop.  Variety: Big data often involves bringing together data from different sources. Currently it appears that big data analytics mainly uses structured data, e.g. in tables with defined fields, but it can also include unstructured data. For example, it is possible to obtain a feed of all the data coming from a social media ISBN 1-63102-455-8 451 Awareness of ‘Big Data’ Among the Library Professionals in the Research Libraries of Odisha     source such as Twitter. This is often used for ‘sentiment analysis’, i.e. to analyse what people are saying about products or organisations. Data can come from a variety of sources (typically both internal and external to an organisation) and in a variety of types. With the explosion of sensors, smart devices as well as social networking, data in an enterprise has become complex because it includes not only structured traditional relational data, but also semi-structured and unstructured data. Structured data: This type describes data which is grouped into a relational scheme (e.g., rows and columns within a standard database). The data configuration and consistency allows it to respond to simple queries to arrive at usable information, based on an organisation’s parameters and operational needs. Semi-structured data: This is a form of structured data that does not conform to an explicit and fixed schema. The data is inherently self-describing and contains tags or other markers to enforce hierarchies of records and fields within the data. Examples include weblogs and social media feeds. Unstructured data: This type of data consists of formats which cannot easily be indexed into relational tables for analysis or querying. Examples include images, audio and video files. Velocity: In some contexts, it is important to analyse data as quickly as possible, even in real time. Big data analytics can be used to analyse data ‘in motion’, as it is produced or recorded, as well as data ‘at rest’ in data stores. A potential application of ‘in motion’ analysis is in credit card payments. The velocity of data in terms of the frequency of its generation and delivery is also a characteristic of big data. Conventional understanding of velocity typically considers how quickly the data arrives and is stored, and how quickly it can be retrieved. In the context of Big Data, velocity should also be applied to data in motion: the speed at which the data is flowing. The various information streams and the increase in sensor network deployment have led to a constant flow of data at a pace that has made it impossible for traditional systems to handle. Benefit from Big Data: The benefits obtained from big data are  Technology and Application  High-speed networking:  Cluster computer programming:  Extending the reach of cloud computing  Machine learning and other data analysis techniques  Widespread deployment  Security and privacy: REVIEW OF LITERATURE Many of the big data applications have to do with operational and/or transactional data, shedding light on operations, supply chain, or distribution channel performance or on customer/consumer behavior ;Vance (2011). Big data, in particular, has the potential to add value by providing transparency with immediate performance feedback, experimentation with quick results, more precise segmentation, more objective decision-making (algorithms rather than humans), and new products; Manyika, et. al .(2011). Big data and business analytics bring new capabilities to the party, and we need to discuss how they fit within the knowledge management/intellectual capital universe. More power and decreased costs have led to an ability in many firms to store ever greater amounts of data and conduct more in-depth analysis on a regular basis, either through their own IT systems or in the cloud; Bussey (2011)&Vance (2011). Cloud services are available at reasonable costs by any number of big providers, including such well-known names as amazon.com, Google, and Microsoft. While surrendering the data to a second party gives away some level of control, security may actually be increased as the larger providers are usually more experienced at keeping data away from prying eyes. As volume, velocity, and variety have increased, along with dropping costs, they have allowed increased analysis of the new databases, enabling better strategic, tactical, and operational decision-making; Beyer & Laney (2012). Big data has grown accordingly, bringing new metrics such as data storage into the mix ;Liebowitz (2013) & Manyika et. al.(2011) and the new buzz words we all associate with this important trend. It’s important to remember, however, that the size of the databases is only one piece of the equation. As we know from knowledge and intelligence approaches, the information and data don’t reveal their full value until insights are drawn from them. And so, big data becomes useful when it enhances decision-making. Decision-making is enhanced only when analytical techniques are applied and some element of human interaction is applied; Zhao (2013). 452 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education The capacity of analyzing big data increasingly becomes a business differentiator: there are companies who outperform their peers thanks to their ability to apply analytics to their own data. These companies are known as analytical competitors ;Davenport and Harris (2007). Big data’, considered by some the new path to technological progress and economic welfare, presupposes the deployment and implementation of information systems enabling the creation and collection of digital data. These systems, which represent already mundane parts of everyone’s daily existence, make bureaucracies and organizations function, and let people participate in the life of modern societies; Lyon (2001). Analytics is what connects ‘big data’, in logical and practical terms, with value creation. More specifically, ‘[a]nalytics is the process of developing actionable insights through problem definition and the application of statistical models and analysis against existing and/or simulated future data’ ;Cooper (2012: 3). Big data simply means business intelligence at a larger scale. [...] We’re building Retention Science to help businesses make sense of data more easily and turn data into actionable campaign recommendations. [...] Retention Science focuses on the data points that will positively increase the accuracy of our recommendations to our clients. [...]Whenever we engage a new client, we set experimental and control groups so we can clearly measure our benefits and focus on improving our results. We leverage machine learning technology to continuously improve our algorithms so we can make more accurate campaign predictions to help our clients maximize customer retention; Bloomberg (2013). Franklin et al. (2005) have proposed the idea of dataspaces and the development of DataSpace Support Platforms (DSSP), as a means of addressing the challenges of information management of the organization’s many diverse but often inter-related data sources. This paper suggest that for each participant in the dataspace, the catalog should include the schema of the source, statistics, rates of change, accuracy, completeness, query answering capabilities, ownership, and access and privacy policies. Siwach (2014) proposed an approach for identifying the encoding technique to advance towards an expedited search over encrypted text leading to the security enhancements in big data. Cárdenas et al. (2013) have given the differentiators of traditional and big data and emphasized on volume, variety and velocity of the data. In the paper they investigated security from first generation ‘Intrusion detection systems’ to third generation ‘Big Data in analytics’. Focus is on big data security and the use of cluster Infrastructures that makes it more reliable and available. Lesk (2013) has highlighted the role of librarians by stating that the significance of analytics for libraries is that the skills needed for this work are similar to data management skills, and if, as is likely, all large libraries are doing web analytics, they are employing people who have that set of skills, and combined with librarianship, are 2/3 of the way to being scientific data curators. Vemuganti (2013) concluded that metadata and its management is an often ignored area in enterprises with multiple consequences. The absence of robust metadata management processes lead to erroneous results, project delays and multiple interpretations of business data entities. These are all avoidable with a good metadata management framework. BIG DATA IN THE RESEARCH LIBRARIES OF ODISHA Libraries, the bastions of information, are adapting to accommodate for the growth of data resources and provide data literacy instruction. Research libraries in Odisha have been most impacted by this evolution; many federally funded research grants have recently required data management plans (DMP) as part of the application process. In 2011, the National Science Foundation (NSF) began to require DMPs with all grant proposals and many other funding institutions have followed suit. The role of data librarians are needed in four key areas: (1) organization, (2) search and access of internal datasets, (3) awareness of external data sources, and (4) to serve as authorities on copyright and intellectual property issues. To equip librarians with these essential data-specific skills, “data curation” programs are becoming common in library and information schools. OCLC offers a programme , titled Collective Insight: Driven by Shared Data addressed the issue of libraries and Big data. Here, participants watched videos from previous OCLC Symposia and came together online to chat, the conversation starting with the question: “What are your thoughts about the kinds of information that when shared create new potential, and how would those uses help to benefit our user communities?” .There were two kinds of Big data librarians are mainly involved in. The first has to do with assisting researchers in data management tasks. Many librarians from larger research-oriented institutions discussed what they were currently doing, how their “data repositories” needed to be improved, and the challenge of sharing with other institutions etc. The second kind of Big data that libraries are involved in would be assessment data i.e. data visualization. One noted that even as one may “know what matters and what to asses, it now takes an entirely separate skill set to be able to do it!” The underlying theme of the conversation seemed to me that paying evercloser attention to areas that can be measured had the potential to not only help libraries make the case that they serve a useful function and help meet desired goals, but also to help libraries in aggregate to be more useful when that data is shared more broadly. The Summon provides , at the core of the Summon service is a single & unified index as a SaaS solution. This unique architecture, which ensures that all users are searching the same system, allows us to gather and analyze ISBN 1-63102-455-8 453 Awareness of ‘Big Data’ Among the Library Professionals in the Research Libraries of Odisha user behavior data from the hundreds of millions of Summon searches performed by millions of users— including researchers from the largest and most prestigious academic and research libraries around the world. All users searching across the same unified index, no matter how customized their local Summon site might be, is the key to capturing meaningful and interpretable data. This data can expose behaviors that illustrate true usage of library services, as opposed to the usage of a small number of participants being observed in an unfamiliar situation such a usability study with defined tasks. So for the Library initiatives in the Big Data, the library administration and management examine what types of big data sets their library could be gathering and analyzing using big data tools. They should work on the following questions:- Does your library have an opportunity to measure something new, some massive data set which previously was out of your reach because of software and hardware constraints? From the side of big data curation, could your library, as part of storing your faculty’s scholarly research and making it accessible, also store and mount your faculty’s raw research data for others to use? What types of big data could you use to make better decisions about collection development, big data curation at your institution by providing guidance to storing and making accessible big data sets. Now is the opportunity for your library to understand the issues and opportunities big data offers to researchers, administration, and the librarians at your institution. There are many collaborative initiatives launched all over the world by the library and information services organizations. Some of them are as below.      DataOne, Data Conservancy and Data to Insight Center have all been funded by NSF through DataNet. MetaArchive, a dark preservation archive making use of peer-to-peer technology, andGeoMAPP, focused on the preservation of local/state government spatial data were both funded by Library of Congress’s NDIIPP program. The Library of Congress’s NDIIPP program has given rise to the National Digital Stewardship Alliance, which includes members from academia, industry, and government, convened to work on Content, Standards and Practices, Infrastructure, Innovation, Outreach. DataCite is an organization founded by several European national libraries and including some North American libraries to work with the publishing industry to develop the mechanisms to assign persistent, unique identifiers to datasets so that they can be cited. The Digital Preservation Network is the newest and perhaps the most ambitious. BIG DATA TECHNOLOGIES Big Data technology can be broken down into two major components – the hardware component and the software component, as shown in the figure below. The hardware component refers to the component and infrastructure layer. The software component can be further divided into data organisation and management software, analytics and discovery software, and decision support and automation software. The layered architecture of Big Data consists of following elements:Data Organisation and Management: This layer refers to the software that processes and prepares all types of structured and unstructured data for analysis. This layer extracts, cleanses, normalises and integrates data. Two architectures – extended Relational Database Management System (RDBMS) and the NoSQL database management system – have been developed to manage the different types of data. Extended RDBMS is optimised for scale and speed in processing huge relational data (i.e., structured data) sets, adopting approaches such as using columnar data stores to reduce the number of table scans (columnar database) and exploiting massively parallel processing (MPP) frameworks. On the other hand, the NoSQL database management system (NoSQL DBMS) grew out of the realisation that SQL’s transactional qualities and detailed indexing are not suitable for the processing of unstructured files. Data Analytics and Discovery: This layer comprises two data analytics software segments – software that supports offline, ad hoc, discovery and deep analytics, and software that supports dynamic real-time analysis and automated, rule-based transactional decision making. The tools can also be categorised by the type of data being analysed, such as text, audio and video. Decision support and automation interface: The process of data analysis usually involves a closed-loop decision making model which, at the minimum, includes steps such as track, analyse, decide and act. To support decision making and to ensure that an action is taken, based on data analysis, is not a trivial matter. From a technology perspective, additional functionalities such as decision capture and retention are required to support collaboration and risk management. There are two decision support and automation software categories: transactional decision management and project-based decision management software.. CONCLUSIONS 454 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education ‘big data’ applications can help tackle several societal problems by implementing new surveillance-based data gathering technologies, and the wide use of algorithms and profiling procedures that have unexplored social implications. The magnitude of the data issue requires collaboration by research libraries, researchers, the university, funders, software and hardware technologists, national organizations and policy makers to grapple with the issues of data management, curation, storage and preservation. Librarians advocate open access and, as such, are advocates of the value of open data. Librarians can act as intermediaries, linking faculty with peers in other disciplines to facilitate interdisciplinary research. It is largely the librarians’ role to create and provide data management services that meet this new grant specification. In addition to providing DMP guidance, libraries have entered into the data lifecycle by taking on the task of housing and preserving the data generated from student and faculty research projects in data repositories. Librarians are well placed to discuss with researchers the value of data management and sharing strategies, and to increase their awareness of metadata standards and practices and institutional repositories. Librarians have expertise and experience with institutional repositories, and libraries have a legacy of preserving knowledge for future generations. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] Bloomberg. (2013a) Company Overview of Retention Science. Business Week, Internet Software and Services. http://investing.businessweek.com/research/stocks/private/snapshot.asp?privcapId=154080 Bussey, J. (2011) ‘Seeking safety in clouds’, The Wall Street Journal, September 16, p. B8. Beyer, M.A. and Laney, D. (2012) ‘The importance of ‘big data’: A definition’, Retrieved from https://www.gartner.com/doc/2057415. Cárdenas, Alvaro A. Manadhata, Pratyusa K. and Rajan, Sree (2013). Big Data Analytics for Security Intelligence. Big Data Working Group Cloud Security Alliance. Cooper, Adam.(2012). What is Analytics? Definition and Essential Characteristics. CETIS Analytics Series 1(5): 1-10. Davenport, Thomas H. and Jeanne G. Harris. (2007). Competing on analytics: the new science of winning. Boston: Harvard Business School Press. Franklin, Michael. Halevy, Alon and Maier, David (2005). From databases to dataspaces: a new abstraction for information management. SIGMOD Rec. 34(4):27--33 Gartner. (2013). IT Glossary. http://www.gartner.com/it-glossary/big-data/ Lyon, David. (2001). Surveillance society: Monitoring everyday life. Buckingham and Philadelphia: Open University Press Lesk, Michael (2013). Curators of the Future. New Technology of Library and Information Service. 29(3): 1-7 Liebowitz, J. (ed.) (2013) Big data and business analytics, Boca Raton, FL: CRC Press/Taylor & Francis. Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C. and Hung Byers, A. (2011) Big data: The next frontier for innovation, competition and productivity, McKinsey Global Institute Laney, Doug.(2001). 3D Data Management: Controlling Data Volume, Velocity, and Variety. Technical report, META Group, 6 February Siwacch, Gautam and Esmailpour, Amir (2014). Encrypted Search & Cluster Formation in Big Data. IN ASEE 2014 Zone I Conference, University of Bridgeport, Bridgpeort. Vemuganti, Gautam (2013). Metadata Management in Big Data. Infosys Labs Briefings. Vol.11 No. 1. Vance, A. (2011a) ‘The data knows’, Bloomberg Businessweek, September 12, pp. 70-74. Zhao, D. (2013) ‘Frontiers of big data business analytics: Patterns and cases in online marketing’, in J. Liebowitz (ed.) Big Data and Business Analytics, Boca Raton, FL: CRC Press/Taylor & Francis ISBN 1-63102-455-8 455 MOBILE APPLICATIONS AND INFORMATION RESOURCES FOR LIBRARY USERS Jatinder Kumar | Librarian | Baddi University of Emerging Sciences & Technology | Solan | Himachal Pradesh | jksamyal@gmail.com Dr.Suman Sumi | Assistant Librarian | Panjab University | Chandigarh | sumangood@gmail.com Abstract: With a massive eight billion user of mobile phone around the world, it is predicted that Internet access from Mobile devices will exceed from the desktop computers within 5 years. These statistics are hardly surprising as we can see new advancements in Information and Communication Technology and the rise in mobile phone use. People want to stay connected where ever they are in this competitive world. The market of smart phones is booming as these offer numbers of free applications such as e-mail, web search, video chat, games, social media, productivity tools, e-learning, entertainment etc. literally on your palm. The libraries are not far away from this technology and have started exploring new educational applications to keep themselves connected with patrons. There are number of libraries which are offering Mobile Application or Mobile Websites to its clients to access library catalogue, resources, user’s accounts or search from various databases. There is positive response of the patrons as they found these services easier than to physically visit the libraries. Keywords: Mobile Applications, Web-based Library services, Mobile Technology in Libraries. INTRODUCTION The recent developments in Information Technology (IT) have given the platform to all libraries and information centres to provide variety of resources and launch special services for the patrons. The libraries nowadays are being accessed with mobile devices including cell phones, PDAs, Laptops, tablets and e-book readers. The trend of physically accessing and using library resources is going to vanish soon. The cutting edge mobile technology for patron empowers them to access library resources and services everywhere. The portable library WebPages, OPACs and Educational Applications have established a new relation with the patrons called Mobile Web Presence of Library. The online web services include portable instructional resources, library virtual tours, online catalogue, SMS service, reference services, event book and notifications etc. The worldwide subscription to telephone services has touched 6 billion, which is equivalent to half of the world populations. At present 90% of world population is within the mobile range. China is leading mobile phone subscribers list with over 1 billion of its population use cellular services followed by India with nearly 75.21% of total country population subscribe to mobile services. In a latest survey report every Indian spends approximately 3 hours per day on Smartphone. It is also found in survey that there are 7 million people using e-learning platform worldwide. These statistics show that people like to interact and share the information with others online, which has given a boom to mobile based information services. The ITU has predicted that Internet access from Mobile devices will exceed from the desktop computers within 5 years. It is also positively expected that by 2017 the production of cell phones will surpass the total population on earth. In recent times the cell phones have become more data-capable and can save millions of records and files within fewer space. They offer much better technology and interface than desktops. The cell phones primarily used for making calls, accessing web, listening music, playing games, reading books, watching TV shows and communicating with friends. Mobile phone has been adjudged one of major way of communication and entertainment over the last 20 years. The information managers or librarians need to be aware of all these technological changes and upgrade themselves as well as their library resources to meet the future informational needs of the patrons. 456 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education OBJECTIVES OF THE STUDY The objectives of the study are;      To make library professionals aware of cutting edge mobile technology being used. To know various advantages of Web 2.0 social media tools. To introduce available web services accessible through mobile devices. To know some mobile based application for information community. To explore some designing platform to build mobile applications. Development of Mobile Phones A mobile phone also known as a cell phone is a device that can make and receive telephone calls over a radio link whilst moving around a wide geographic area. The cellular networks are provided by various mobile phone operators that allow phone users to access information on their devices and also interconnect to the public. In addition to simple telephone functions, a modern mobile phones also support a wide range of other services such as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming and photography. Mobile phones that offer these and more general computing capabilities are referred to as smart phones. The first hand-held mobile phone was demonstrated by John F. Mitchelland Dr Martin Cooper of Motorola in 1973, using a handset weighing around 2.2 pounds (1 kg). In 1983, the DynaTAC 8000x was the first to be commercially available. From 1990 to 2011, worldwide mobile phone subscriptions grew from 12.4 million to over 5.6 billion, penetrating about 70% of the global population. Source: http://en.wikipedia.org/wiki/Mobile_phone. The world's first commercial automated cellular network was launched in Japan by NTT in 1979, initially in the metropolitan area of Tokyo. In 1981, this was followed by the simultaneous launch of the Nordic Mobile Telephone (NMT) system in Denmark, Finland, Norway and Sweden. Several countries then followed in the early-to-mid 1980s including the UK, Mexico and Canada. In 1983 the DynaTAC mobile phone was launched on the first US 1G network by Ameritech. It cost US$100 million to develop, and took over a decade to hit the market. The phone had a talk time of just half an hour and took ten hours to charge. Consumer demand was strong despite the battery life, weight, and low talk time, and waiting lists were in the thousands. Source: http://www.adotas.com/2013/06/get-smart-about-mobile-marketing/ In 1991, the second generation (2G) cellular technology was launched in Finland by Radiolinja on the GSM standard, which sparked competition in the sector as the new operators challenged the incumbent 1G network operators. Ten years later, in 2001, the third generation (3G) was launched in Japan by NTT DoCoMo on the WCDMA standard. This was followed by 3.5G, 3G+ or turbo 3G enhancements based on the high-speed packet access (HSPA) family, allowing UMTS networks to have higher data transfer speeds and capacity. Source: http://en.wikipedia.org/wiki/Mobile_phone. By 2009, it had become clear that, at some point, 3G networks would be overwhelmed by the growth of bandwidthintensive applications like streaming media. Consequently, the industry began looking to data-optimized 4thgeneration technologies, with the promise of speed improvements up to 10-fold over existing 3G technologies. The first two commercially available technologies billed as 4G were the WiMAX standard (offered in the U.S. by Sprint) and the LTE standard, first offered in Scandinavia by TeliaSonera. Source: http://teleinformation.com/2012/07/mobile-phone-systems-overview/ ISBN 1-63102-455-8 457 Mobile Applications And Information Resources For Library Users MOBILE APPLICATIONS FOR EDUCATIONAL INFORMATION There is large number of Mobile Applications being used which have their own importance in information world. Some of Mobile Applications based on relevancy, accuracy and contents for library users are discussed here. Keeping in view the Patrons’ preferences and financial constraints, we have chosen some paid or similar application to enlist here;  Spreadsong: This application provides nearly 24000 free to read classic literature by eminent authors like Aristotle, Charles Dickens, Plato and Oscar Wilde. The application includes ebooks, and audio books. Ebooks are in pdf format and can be downloaded on your mobile phone, whereas audio books can be listened online or offline. The application is free of cost for iPhone, iPod, iPad, Android smart phones. Website: http://www.spreadsong.com/  Dropbox: Dropbox is used to store, sync and share files online and across the networked environment. Dropbox is a free service that lets you bring all your photos, docs, and videos anywhere. Any file you save to your Dropbox is accessible from all your computers, iPhone, iPad and even the Dropbox website! The application is free of cost for iPhone, iPod, iPad, Android smart phones and BlackBerry. Website: https://www.dropbox.com/  Evernote: Evernote creates text, video, and audio memos. All content within Evernote is searchable, including text within snapshots. Notes can be synchronized to Mac, PC, and Web. Evernote works with iPhone, iPod touch, iPad, Android, BlackBerry, Palm, and Windows Mobile. Price: Free. Website: http://www.evernote.com  iSSRN: iSSRN is Created by the Social Science Research Network (SSRN), iSSRN provides access to more than 260,000 research papers in the social sciences and humanities from scholars worldwide. Articles can be e-mailed or viewed on the device. iSSRN works with iPhone and iPod touch. Price: Free. Website: http://ssrnblog.com/2009/11/19/ssrns-iphone-app-issrn-is-available/  OECD Factbook: OECD Factbook 2010. Created by the Organization for Economic Co-operation and Development, this app presents current economic, social, and environmental statistics. The data is organized into 12 categories, such as Population and Migration, Production and Income, Labour, Science and Technology, and more. Each category offers a range of specific sub-topics with data organized into tables. More countries than ever are covered in greater detail, enabling direct comparisons for many indicators between OECD Members and Brazil, China, India, Indonesia, Russian Federation and South Africa. OECD Factbook 2010 works with iPhone, iPod touch, and iPad. Website: http://www.oecd.org/publications/factbook/  TED Talks: This app by TED Conferences contains the entire TEDTalks library of more than 700 video presentations. Ability to sort by recency, popularity, tags, or themes. Save talks for offline viewing. TED works with the iPad. Website: http://itunes.apple.com/us/app/ted/id376183339/  Medscape WebMD is a popular medical site, with tons of information. It is both a well regarded and well trusted site as far as medical news and contents goes. In 2009 the developers of WebMD decided to bring this information to mobile devices and launched an app called Medscape. Medscape is now the most popular medical app for download. It is used by medical students, physicians, nurses almost everybody in the medical profession. Besides all features of an app, there is also a medical news function that keeps the user up to date with new advancements in medical sciences. Website: http://www.medscape.com/  458 Earthviewer: Earthviewer is one of the coolest e-learning apps. It serves as a time machine to explore the geological, geographical history of the world. The app has a 3D globe on the right hand side which rotates allowing you to select your region of interest. On the lift hand side is a virtual slider which will take you back ro earlier ages as far as 540 million years. You can see weather information and temperature map of past 100 years to till time. Website: http://www.hhmi.org/biointeractive/earthviewer ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education  Khan Academy: Khan academy is a famous non-profit organization created by an educator called Salman Khan. It was started with the intention of providing a high class education to anyone, anywhere. There are lectures, tutorials, exercise in languages ranging from English to Norwegian to Kannada. The Khan Academy receives funding and support from the Bill and Melinda Gates Foundation. Google and the Carlos Slim Foundation are also known contributors. Website: https://www.khanacademy.org/  Coursera: Coursera is another education app with a difference. It connects students, professionals and other learners from everywhere with free online courses. These courses are ones offered by top notch colleges and academicians. Only the best of the best is provided by Coursera. These courses are taught in 14 different languages and come from over a hundred top tier global institutions and universities. There are over 20 subject areas with over 600 courses. These of course are more formal lectures than what Khan Academy or TED has to offer. Website: https://www.coursera.org/  My Open Courses: My Open Courses is the Indian take on Coursera. After downloading the app you sign in through some form of social media or email. You are presented with a list of categories in the left hand panel. The categories are many ranging from engineering and sciences to humanities and design. Once the category is selected you can see the list of lectures and professor who is taking them. There are lots of professors from IITs and IISc, so you are getting some quality stuff here. The courses are accompanied by syllabus, videos and other relevant documents. There is also an introduction of professor before the start of a course. My Open Courses is an initiative started by the National Programme on Technology Enhanced Learning which aims at using Technology to spread education to everyone. It is funded by Ministry of Human Resource Development in India. My Open Courses has 25 courses, 1300 subjects and over 11000 hours of videos. Website: http://myopencourses.com/  NASA App: The NASA App is released by NASA themselves to showcase the contents regarding developments and ongoing missions of the organization. The app opnes p to a grid of its contents like images, videos, missions, tweets, news, programs etc. All the latest news and articles released by NASA are uploaded here first along with videos from around the agency. There are over 9000 videos that immerse you completely and keep you watching for hours. This app has something for everyone – from kids to students to space geeks. It is very informative and graphics that captivate you in from the very start. Website: http://www.nasa.gov/centers/ames/iphone/#.U99jbaOB8a8 CREATING MOBILE WEBSITES, OPACS/SOPACS AND APPLICATIONS There are number of online tools available for developers to build mobile websites and applications. Some of them are given below:      Android Developers is Resource for creating Android applications. It Includes developer’s guide, tutorials, and videos. Access: http://developer.android.com AirPac (Innovative Interfaces) offers a mobile version of the Innovative Interfaces library catalogue. It Includes features such as cover images, integrated library locations with Google Maps software, request and renew items, and more. Contact Innovative Interfaces for pricing. Access: http://www.iii.com/products/airpac.shtml Boopsie is specializing in public and academic libraries and universities. Boopsie can deliver mobile applications that are compatible with all Web-enabled phones. Contact the site for a price quote. Access: http://www.boopsie2.com/ Create an iPhone Optimised Website using JQTouch is developed by freelance Web Designer and Developer Matthew Leak. It outlines one way to create an iPhone-friendly version of a Web site. Coding examples are included in this tutorial. Access: http://www.tuttoaster.com/create-an-iphone-optimisedwebsite-using-jqtouch/ Library Anywhere is created and sold through LibraryThing, Library Anywhere is a mobile catalogue for any library. It Includes mobile Web and apps for iPhone, Blackberry, and Android. Prices range from $150 annually for schools to $1,000 annually for universities (additional fees may apply). Access: http://www.librarything.com/forlibraries ISBN 1-63102-455-8 459 Mobile Applications And Information Resources For Library Users           MobileTuts+ contains tutorials for all mobile developers, regardless of platform. Topics include techniques for building mobile apps and mobile Web sites. Access: http://mobile.tutsplus.com/ MobiSiteGalore builds a mobile Web site in less than 60 minutes. No technical or programming knowledge required. Packages range from basic (cost: free) to unlimited (cost: $24.99 per month). Access: http://www.mobisitegalore.com/ MoFuse helps us to build a mobile version of an existing Web site or blog with the MoFuse (short for Mobile Fusion) content management platform. Plans range from $7.95 per month to $199 per month. All accounts come with a 14-day risk-free trial. Access: http://mofuse.com/ Mobile Web Best Practices 1.0 is Created by the World Wide Web Consortium (W3C). This document specifies guidelines for developing Web-based content for mobile devices. Access: http://www.w3.org/TR/mobile-bp/ LIBRARIES USING MOBILE WEBSITES Adelphi University Libraries Mobile (AU2GO) offers library hours, library staff contact information, a link to the library’s blog “biBLIOGraphy,” and more. Access: http://m.adelphi.edu/library/ Albertsons Library, Boise State University offers various ways to find the library and its contents. An interesting feature is the inclusion of a “Find in Our Building” category, which lists call number locations and popular locations such as study rooms and computers, each linked to an animated floor map. Access: http://library.boisestate.edu/m North Carolina State University (NCSU) Libraries provides elegant interface with icons representing categories such as room reservations, group finder, and Webcams. Another interesting feature is the ability to view the number of available library computers. Access: http://www.lib.ncsu.edu/m/home/?browse=iphone PENNLibraries, University of Pennsylvania presents multitude of information at your fingertips, such as mobile versions of databases, image search, library video clips, and more. Access: http://www.library.upenn.edu/m/ University of California Riverside Libraries has glossy icons designate many useful categories, including research guides, library workshops, and links to the library’s social media profiles. Access: http://m.library.ucr.edu / Virginia Tech University Libraries provides simple but effective layout and offers important information, such as library hours, contact information, catalogue search, and library maps. Access: http://m.lib.vt.edu/ CONCLUSION During the last decade we have seen tremendous changes in the working and management of Information Technology in libraries which has revolutionized the resources and services of the parent organization. The library patrons are now getting feature rich services and seem more satisfied than before. In India there are a few cases where the institutional library has its own mobile application for easy access of library collection and services, but with the widespread of new technology the days are not far when we will see huge number of mobile based services to be offered by various libraries in the country. It is anticipated that with easy and cheap availability of technology the libraries would create and offer their own web pages, OPACs, Apps and e-contents accessible through mobile devices. There is no doubt that smart phones have created a new world for information seekers with amazing service through mobile web. And it is believed that in coming five years Internet adoption will continue to increase with the help of portable devices. The libraries are most advantageous, as they can highlight there services, resources and activities to their patrons and can always stay connected with them. The coming generation of students will be getting the habit of reading books while walking, watching movies during journeys, downloading classrooms notes from library web pages, watching their favourite TV shows in free time, Chatting with friends & family and a lot more. This may sound strange but the fact is that we (librarians) have to get ready and equip ourselves for tomorrow’s world when everyone will ask information through mobile devices by using various applications of information sharing. 460 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education REFERENCES [1] Griffey, Jason. “Mobile technology and libraries”. Neal-Schuman Publishers, Inc., NewYork, 2010. Web. 21 August 2012. <http://www.neal-schuman.com/uploads/pdf/0242-mobile-technology-and-libraries.pdf> [2] http://developer.android.com [3] http://library.boisestate.edu/m [4] http://library.boisestate.edu/m [5] http://m.adelphi.edu/library/ [6] http://m.lib.vt.edu/ [7] http://m.library.ucr.edu / [8] http://mobile.tutsplus.com/ [9] http://mofuse.com/ [10] http://myopencourses.com/ [11] http://ssrnblog.com/2009/11/19/ssrns-iphone-app-issrn-is-available/ [12] http://tele-information.com/2012/07/mobile-phone-systems-overview/ [13] http://www.boopsie2.com/ [14] http://www.evernote.com [15] http://www.hhmi.org/biointeractive/earthviewer [16] http://www.iii.com/products/airpac.shtml [17] http://www.lib.ncsu.edu/m/home/?browse=iphone [18] http://www.lib.ncsu.edu/m/home/?browse=iphone [19] http://www.librarything.com/forlibraries [20] http://www.librarything.com/forlibraries [21] http://www.medscape.com/ [22] http://www.mobisitegalore.com/ [23] http://www.nasa.gov/centers/ames/iphone/#.U99jbaOB8a8 [24] http://www.oecd.org/publications/factbook/ [25] http://www.spreadsong.com/ [26] http://www.tuttoaster.com/create-an-iphone-optimised-website-using-jqtouch/ [27] http://www.w3.org/TR/mobile-bp/ [28] https://www.coursera.org/ [29] https://www.dropbox.com/ [30] https://www.khanacademy.org/ [31] Library Technology Reports. “On the Move with the Mobile Web: Libraries and Mobile Technologies.” ALA Tech Source, 2012. Web. 21 August 2012. <http://www.alatechsource.org/ltr/on-the-move-with-the-mobile-web-librariesand-mobile-technologies> [32] Lippincott, Joan K. “Mobile technologies, mobile users: Implications for academic libraries.” Association for Research Libraries, 2012. Web. Web. 21 August 2012. < http://www.arl.org/bm~doc/arl-br-261-mobile.pdf> [33] Mobithinking. “Global mobile statistics 2012 Home: all the latest stats on mobile Web, apps, marketing, advertising, subscribers and trends”. Web. 20 August 2012. <http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats> [34] Wikipedia: The free encyclopaedia. “List of countries by number of mobile phones in use.” Web. 21 August 2012. <http://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_inuse> [35] Wikipedia:The free encyclopaedia.“Mobile Phone.”Web.20August 2012. <http://en.wikipedia.org/wiki/Mobile_phone> ISBN 1-63102-455-8 461 GENDER EQUATION: ROLE OF ICT’S IN WOMEN EMPOWERMENT Dr. Anjani Kumar Jha | Professor | Technia Institute of Advanced Studies | journlistanjani@gmail.com Abstract: Empowerment, the goal of development is deferred as the process by which individuals; organizations and communities gain control and mastery over social and economic conditions over democratic participation. (Freire, 1970: Zimmerman and Rappaport ,1988) However, there has been much debate on just what constitutes improved living condition and how they should be achieved. Nevertheless, to improve one’s living status, information regarding ‘how to improve’ the condition need to be provided, which is the basic level of improvement. Probably the provision of such information especially to the marginalized, can balance the gender equation. To balance this, the divide between the ‘haves’ and the ‘have-not’ needs to be bridged for which, there is a possibility of using the crucial media and the ICTs. Keywords: Empowerment, Gender, ICT, Mass Media, Women. INTRODUCTION Larry Shore (1980) in his book, “Mass Media for Development: A re-examination of Access, Exposure and impact”, says, “What was apparent from the results of research in rural development over the past two decades is the need to consider communication not as a single independent variable but as both dependent and independent in a complex set of relation ship with social economic and political structures and processes”. Defining Information and Communication Technologies: ICTs are defined by communication researchers, sociologists, and activists in a number of ways. ICTs are defined as a diverse set of technologies and resources which create, disseminate, store, bring value addition and manage information. ICTs are used as a broad tool for amalgamation knowledge existing in remote databases. Knowledge thereby becomes the fundamental resource for all economic and developmental activities. ICTs are considered as a matrix of Formal Communication system x Non-formal communication systems x ICTs where the formal communication systems and ICTs include a set of technologies, which range from the traditional print media to the modern digital technology implying Formal Communication ICTS Non-formal Communication Newspapers X Magazines TV Computers usage X Networking X Interpersonal communication Radio x Hence the matrix will be ICTs x Non-formal communication Women Empowerment The concept of women empowerment is operationally conceived as women’s awareness on various factors of empowerment. These factors of empowerment were broadly conceptualized as  Health and Family Welfare  Education  Social and Economic Development  Skills Development and Employment For the purposes of pilot study only two factors of empowerment were considered. In Fact, Shore (1980) has quoted studies on the content of newspapers, radio and TV, which suggest that information relevant to development was given less preference that trivial, and non-development oriented 462 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education subjects. The poor, disadvantaged, marginalized section especially in rural areas of third world lived in a state of “Under Communication”. Everett Rogers as early as in 1969, observed on one of this visits to a village in a developing nation, “the only Radio in the village, owned by the president of the village council was turned to music rather than to news of the outside world’. In fact, not much has changed in the urban and rural India, although even slums in the urban areas and most of the village households own a TV in the contemporary times, as they still watch entertainment and music oriented channels. PILOT STUDY METHODOLOGY For the pilot study, in the two states i.e. Karnataka and Tamil Nadu, a sample of 80 in each district was selected. In Karnataka urban 30 women in the age group of 18-60 were randomly picked from Bangalore South area. The Karnataka rural respondents of 30 women were randomly obtained from Gajanur. In case of Tamil Nadu, the Tamil Nadu urban respondents of 30 women were randomly picked from Hosur and the Tamil Nadu rural respondents were from Talavadi picked randomly. Data was collected from these respondents with the help of a questionnaire administered personally by the researcher and research assistants. Information thus collected was converted into numerical data and frequency was tabulated which was then converted into percentages. Percentages was provided regarding the access of media and ICTs by the respondents and the KAP and IS analysis was carried out to find the empirical information regarding the knowledge, attitude and practice of the various factors of empowerment and the sources from which the information was obtained from. DATA ANALYSIS The researcher initially wanted to know whether there was any access to media and ICTs for the basic reasoning that without any access, the media and the ICTs will have no role to play in increasing awareness of the respondents.. Incidentally, the information thus obtained could check on the ‘knowledge Gap Hypothesis’ proposed by ‘Tichenor, et al. According to this hypothesis “ As the infusion of mass media information into a social system increases, segments of the population with higher socio-economics status tend to get this information at a faster rate than the lower status segments, so that the gap in knowledge of these two segments tends to increase rather than decrease’. This hypothesis is ‘true’ in the present scenario of the sample as the demography of the sample related to access to media shown that the lower the socio-economic status of the population, the lesser is the access which is in concurrence with the ‘knowledge gap hypothesis’. ANALYSIS AND INTERPRETATION I Access to Media Karnataka – U Karnataka – R N = 30 N = 30 Urban No of Persons Percentage Urban No of Persons Percentage Newspaper Reading 28 84% Newspaper Reading 16 48% Magazines 27 81% Magazines 10 30% ISBN 1-63102-455-8 463 Role of Information Literacy in Curriculum Multiple Responses: The above two tables related to access to newspaper and magazines, very clearly indicate that the access to and reading of newspapers among Karnataka urban respondents are comparatively more than those in Karnataka rural. Women respondents in rural areas are mostly illiterates with little or no interest in reading . II – Radio Listeners Karnatake – U Karnataka – R Radio Listeners AIR % FM % Radio Listeners AIR % FM % N = 30 20 60% 26 78% N = 30 20 60% 26 78% Multiple Responses: Interestingly, more people especially the women respondents in the urban areas were found to listen to FM stations. It appears that as was found by Everett Rogers in early 70s, generally people tune on to Radio for music. The FM, which is predominantly music oriented, is extremely popular everywhere due to its easy access, mobility and financial viability.In fact, the respondents rarely quoted as listening to AIR for news, talks and other serious matter even in the rural Karnataka area (Gajanur). Women respondents hardly listened to the programme “ Mahileyarigagi” or the Agricultural information: III: TV VIEWERS Karnataka – U N = 30 Karnataka – R No of Persons Percentage TV Viewers 30 100 % N = 30 No of persons Percentage TV Viewers 75% TV as a media of information does not have much to offer relating to the IEC strategies (Information, Education and Communication) as per the information obtained from the respondents, and it appears that the IEC should be changed to information, entertainment, communication instead of education. Most of the households even in the rural area (Gajanur)owned a TV set. Many of them also had cable connection. This is an interesting fact to note because though they were not very economically sound, they owned a TV and paid for the cable net work. Although, according to ‘Johari window’ –a 2 x 2 matrix, which claims that development of community goes parallely with media development, it is interesting to note the paradox here. IV: Access to ICTS (Digital Technologies mainly Computers) KARNATAKA URBAN Don’s have Computers Number Percentage 11 33% Don’t use computer Number Percentage 13 39% Use of computers though Number 6 5 4 5 2 Purpose Typing Surfing e-mail Other The sampled women respondents for the pilot study belonged to an age group of 25-55. Although all of them were educated, only 6 numbers of the respondents used computers. However, non surfed for any kind of information on women or gender issues. It is rather alarming to note that the educated, well informed women don’t bother to bridge the gender divide. 464 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education KARNATAKA RURAL –GAJANUR The situation in Karnataka, as far as the sample and the urban/rural disparity with regard to use of computers for information dissemination is concerned, it appears that the urban women are as bad or as good as their rural counterparts (urban 6 women used computers/whereas rural 2 used computers) V: ACCESS TO MEDIA – TAMIL NADU Tamil Nadu – Urban Newspaper Tamil Nadu – Rural Magazine Reader Newspaper Reader N=30 Magazine Reader Reader No % No % 21 63 19 57 N=30 No % No % 8 19 10 30 *Multiple Responses: For Tamil Nadu Urban area, the Pilot study was conducted at Hosur. The random sample of women selected was not very literate. The pilot study clearly indicated that the independent variable and their impact on the dependent variable cannot be studied in isolation (Larry & Shone, 1980) and as is in the case of Johari Window. Comparing Gajanur with Talavadi we find the number of news paper readers are more in Gajanur. A case in point to mate is that Gajanur has an NGO and Christian missionary working towards eradicating illiteracy. VI : Radio Listeners and TV Viewers Incidentally, Timil Nadu does not have a FM Station at Hosur. It appears that if they had a Fm Station, then the respondents would have only listened to that. Tamil Naduj – Urban Tamil Nadu – Rural Radio Listeners N=30 TV Viewers Listerners Radio Listeners TV Viewers Listerners No % No % 16 51 28 84 No % No % 15 50 30 100 N=30 A very notable fact is that women in both Karnataka Urban and Tamil Nadu urban areas were fond of watching TV. In fact, they watched TV mainly for entertainment purposes and news. In rural areas TV was the most popular media, mainly watched for entertainment and serials. It is not surprising to note that TC as a media of entertainment has such high impact that they tend to think its for real. VII : Access to ICTS (Digital Technologies) The access to and use of ICTs is more or less the same as in case of Karnataka Urban and Rural even in Tamil Nadu Urban and Rural areas. Tamil Nadu – Urban Don’s have Computers Number Percentage 20 60% ISBN 1-63102-455-8 Number 04 Don’t use computer Use of computers Percentage Number 12% 6 4 4 4 4 Purpose Typing Surfing e-mail Any other 465 Role of Information Literacy in Curriculum Tamil Nadu – Rural Don’s have Computers / Don’t Use Know about Computers Use of computers at NGO Number Percentage Number Percentage Number Percentage 20 60 13 39 03 09 In Tamil Nadu Talavadi area nearly 39 % of the women respondents knew what computers were though they were unable to use it. VIII: Analysis of KAP (Knowledge, Attitude, Practice) An in-depth analysis of KAP will be conducted as per the Osgoods scale, for the final study. However, for the pilot study just the frequency of the responses was calculated. Here, we provide you with an overview of the results. VIII (A): Health and Family Welfare – Karnataka Urban. Although the educated, well informed women of Bangalore were aware of MMR vaccination and strongly agree it is needed, not all have administered their wards with MMR Vaccine.      They do not fully agree that Leprosy is curable. Bangalore educated women are not fully aware of single child norm of the government. Practice spacing between children only to some extent. Avoid eating fatty foods only to a certain extent. Although aware fully about yoga and its usefulness, practice yoga and avoid salt and sugar to some extent. VIII (B) Health And Family Welfare – Karnataka Rural  Illiteracy being a major factor, awareness is less in case of MMR vaccine, tetanus for pregnant women, spacing between children, fatty foods being injurious to health, menopause problems, etc.  Women respondents in rural areas are not at all aware of single child policy.  All the respondents are fully aware of HIV and take complete care against it. IX (A) Health And Family Welfare –Tamil Nadu Urban  The sampled women respondents at Hosur were both educated and illiterates and were not at all aware of MMR vaccine.  Although they were aware of Malaria and Cholera, they did not bother much to boil water for drinking and keep surroundings clean. This was very evident as observed by the researcher. It is very ironical that Hosur being an urban district it appears to be under-developed.  Paradoxically, although women agreed that Yoga was good for health and one should not over eat fatty foods, they did not practice it.  As in case of Karnataka Urban, even Tamil Nadu respondents were unaware of single child policy. IX (B) Health And Family Welfare – Tamil Nadu Rural  Like in case of Karnataka Rural, awareness and practice of MMR vaccine was not found.  The respondents were aware of Vitamin E for children and to some extent provided food with Vitamin E for Children.  A notable factor is the single child policy of the government which respondents are not aware of.  An important fact was that respondents were fully aware of AIDS and they took complete care to avoid it. X (A) Education – Karnataka Urban 466 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education   It appears that Bangalore’s educated women are not very aware about non-formal school for drop-outs and distance education programmes and have not undergone any form of distance education. Most of them although aware of computers and their tremendous usage, do not use computers. It is already observed earlier that among the 30 respondents, hardly six of them use computers. X (B) Education – Karnataka Rural  Although Gajanur has a Christian missionary and an NGO working towards empowering women, many facts they were not aware of. Like for instance night school, non-formal school,. Dropout, educational loan, female literacy, adult education etc. in fact, when asked about their attitude towards educational loan, they did not respond. XI (A) Edcuation – Tamil Nadu Urban  Midday meal programme may not be very popular in Tamil Nadu. Incidentally, some of the women were aware of it and some were not.  Although the respondents claimed they aware of female literacy being comparatively low, it appears that they did nothing about it because many of them were illiterates. XI (B) Education – Tamil Nadu Rural  In Talavadi area, there were no NGOs and they were mostly illiterates and they were not aware of many of the factors regarding education. They were not aware of night school programmes, non-formal school for dropouts, female literacy being low etc.  Although some were aware of computers, they did not know about its usage. Neither were they fully aware of government schemes for women’s literacy.     INFORMATION SOURCE Most respondents quoted TV and non-formal communication as sources of information. Most rural respondents depended mainly on non-formal source. At places where they were NGOs, respondents said, information was being collected by the NGOs through computers and passed on to them through interpersonal channels. Neither the Karnataka Urban nor the Tamil Nadu Urban respondents quoted ICTs as sources. CONCLUSION According to the pilot study, there is an imbalance in the Gender equation with the role ICTs play in empowerment.     Illiteracy in rural areas creates a gender imbalance, which needs to be bridged. Formal communication systems are mainly used by women for entertainment purposes. The imbalance in gender equation is more so related to socio-economic and political conditions. Bridging this digital-divide and creating a balanced gender equation requires meticulous need based study of every situation, improving the socio-economic conditions, considering a situational genderwise communication and ICT policy by the government. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] Castells, M: The information age economy, Society and culture; Oxford, UK, Blackwell Publishers 1997. Chambers, Robert: Rural Development: Putting the last first: New York, 1983. Foster, George M: Traditional culture and the Impact of Technological change. New York, Harper, 1962. Melkote S. R & K. Kandath: Look at the Discipline and practice of Development Communication in Critical issues of Development, New Delhi Sage, 2001. Melkote S. R and Steeves H Lestie: Communication for Development in the Third World, New Delhi, Sage 2005. Rogers, Everett: Communication and Development, Reflections on diffusion research: New Delhi Sage, 1976 Schramm, Wilben: Communication and Development, Communicator, April 1977 Tichenor, P.J. et al: Mass Media Flow and Differential Growth in Knowledge Public Opinion Quarterly. ISBN 1-63102-455-8 467 ROLE OF INFORMATION LITERACY IN CURRICULUM Mohd. Hanif | Librarian | IPFT (Govt. of India) | Udyog Vihar | Gurgaon (HR) | mohd.hanif1984@yahoo.in Abstract: This paper provides the meaning and definition of information literacy. It highlights the module and SCONUL seven pillars model IL. It also suggests students’ improvement information literacy by faculty and librarian By Ellen Breen and Helen Fallon of Project/Coursework-related classes, Stand-alone (one-shot) classes.The last during few years Information and communication technology has change the modern society as well as in information explosion. For that people should be information and digital literate. Information literacy is associated with training and skills imparted by the teachers and librarians at the primary, secondary level to postgraduate and doctoral level. Many developed countries have implemented information literacy in their curriculum so they can access and use information effectively. Keyword: Information Litracy, ICT, Web2.0, Learning, Skill INTRODUCTION The rapid development in Information and communication Technology (ICT) has made an impact and influence on society. It has effect on the various fields such as education, science & technology, medicine, business, agriculture, health and so on. The main motive and objective of the Information literacy curriculum is to incorporate students learning and critical thinking. Faculty member and library staff collaboration is the best medium to improve and achieve goal of Information Literacy. They can personally take interest and motivate students to adopt and apply to enhance their Information Literacy skills. New applications (various software), technology (ICT), web tools (Web 2.0 and 3.0) and internet development making path for participatory and collaborative learning. Educational Institutions should conduct an assessment of the IL competency level of students. What is Information Literacy? Information literacy is a set of abilities requiring individuals to "recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information." Information Literacy Curriculum: The Internet is changing the way people find and use information. In 1995, the Purdue Libraries Faculty adopted the Goals and Objectives for our Information Literacy Curriculum. Fig. 1: What is Information Literacy? "Librarians at Purdue University have developed one of the best sets of learning outcome statements in use today." 468 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Since the development of our own goals, the Information Literacy Competency Standards for Higher Education have been developed by the Association of College and Research Libraries and approved by the American Association for Higher Education. The Libraries Faculty Curriculum Committee coordinates development of the curriculum materials. Information literacy should focus on identifying various shortcomings and including these in student’s curriculum. Henri (1999) coined the term “information literate school communities” which describes and emphasis factors, attributes, goals and practices on learning environment than to teaching for the development of informed students. Fig. 2: Types of Information Literacy ACRL Definition of Information literacy is a set of abilities requiring individuals to “recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information.” (Information Literacy Competency Standards for Higher Education, ACRL, 2000) There are various types of literacy which are Functional, Multicultural, Media Literacy, Computer, Digital, Technology etc. Fig. 3: Information Literacy ISBN 1-63102-455-8 469 Role of Information Literacy in Curriculum Five ACRL Standards for Information Literacy are: a) b) c) d) e) Access information effectively and efficiently; Identifies and addresses information need; Evaluates and thinks critically about information; Uses information effectively for a specific purpose; and Uses information ethically and legally “Information literacy is not about analytic thinking or neutral cognitive processes but about improving student opportunity and capacity to design and forge life worlds in a range of text-based communities and economies” (Cope & Kalantzis, 2000). Sconul Seven Pillars Model Information Literacy The circular nature of the model demonstrates that becoming information literate is not a linear process; a person can be developing within several pillars simultaneously and independently, although in practice they are often closely linked each pillar is further described by a series of statements relating to a set of skills/competencies and a set of attitudes/understandings. It is expected that as a person becomes more information literate they will demonstrate more of the attributes in each pillar and so move towards the top of the pillar. Fig. 4: Seven Pillars of Information Literacy : How do students require these skills? Now Information literacy is gaining importance in transforming education, training and also regarded as central pillar to education system. Application of information and communication technology has made vast impact on learning and solving problems more than basic reading, writing and calculating skills. However, it is widely recognized that in even the most technologically advanced countries, efforts to prepare students for the information age have been only partially successful and implementation of recommendations from information skills research have been slow and difficult to implement (e.g. Kuhlthau, 2001; Rogers, 1994). Information literacy function as intermediate to bridge the gap of digital divide through various forms in India such as ‘echoupals’, common services centres’ gyandoot’, ‘community information centers’, UGC Infonet, INDSET, Epgphatshala, village knowledge centers’, etc. Henri (1999) coined the term “information literate school communities” which emphasis on the learning skills and development than to teaching and simply informed, it also includes various component, features, aims and objectives and applications. 470 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Project/Coursework-related classes  Introduction of Digital Information literacy.  Visiting of library by the students at the beginning of academic session.  Compulsory to attained library orientation programme.  Introduction of Fundamental Library coursework so that student familiar with library resources and activities.  Project work, homework and assignment using materials available in library. Stand-alone (one-shot) classes This course will help students in supporting their course work. They are not compelled to attend this course. It is organized for short session. These could include sessions on effective use of the online public access catalogue (OPAC), e-journal, e-learning, online searching, database searching etc. CONCLUSION Libraries can take participative activation to engage students in the effective delivery of information literacy programmes. Librarian and their staff can be used formal course modules for delivering IL, for example Engineering or Medical colleges’ librarian can introduce a course on effective search and use of e-journals to all the first year students through library orientation. It can be use live demonstrations with practical training hand followed by class lecture. The following methods would be useful for implementing information literacy skills education. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] Breen, Ellen and Fallon, Helen.(n.d) Developing student information literacy to support project and problembased learning. Retrieved from http://www.aishe.org/readings/2005-2/chapter17.pdf Breivik, Patricia Senn. Student Learning in the Information Age. Phoenix, AZ, Oryx Press, 1998, p 49 Edzan, N.N. (2008). Information Literacy Development in Malaysia: A Review. Libri, 2008, vol. 58, pp. 265–280. Retrieved from http://www.researchgate.net/ publication/ 236470269_Information_l iteracy_development_in_Malaysia_A_review Cope, B., & Kalantzis, M. (Eds). (2000). Multiliteracies: Literacy learning and the design of social futures (pp.203-234 London: Routledge. Henri, J. (1999). The information literate school community: Not just a pretty face. In J. Henri & K. Bonanno, (Eds.). The information literacy school community: Best practice. Wagga Wagga: Centre for Information Studies, Charles Sturt University. The SCONUL Seven Pillars of Information Literacy Core Model For Higher Education. SCONUL Working Group on Information Literacy April 2011. Retrieved from http://www.sconul.ac.uk/sites/default/fil es/documents/coremodel.pdf Gedam, Pranali B and Agashe, Ajay T.(n.d) Information Literacy Competencies and Programmes in India. Retrieved from http://crl.du.ac.in/ical09/papers/index_files/ical-88_100_227_2_RV.pdf Moore, Penny.(n.d) An Analysis of Information Literacy Education Worldwide. Retrieved from http://portal.unesco.org/ci/en/file_download.php/33e3dd652a107b3be6d64fd67ae898f5Information+Literacy+Edu cation+(Moore).pdf Kuhlthau, Carol C. (2001) Rethinking libraries for the information age school: vital roles in inquiry learning. Keynote Address, International Association of School Librarianship Conference & International Research, Forum on Research in School Librarianship, July 9, 2001 Auckland, New Zealand. URL: http://www.scils.rutgers.edu/~kuhlthau/Presentations.htm Vishwas Jeet Rajbanshi, Dr. Sharad Kumar Sonker and Mithilesh Kumar, (2015). Information Literacy in Curriculam: An important Role in students Learning and Critical Thinking, proceedings of the International Conference “Grey to Green” held on 11-12 April 2015 at TIAS, Delhi, pp.528-532. Websites [1] [2] [3] [4] [5] [6] http://www.sconul.ac.uk/sites/default/files/documents/coremodel.pdf https://www.lib.purdue.edu/services/instructor-services/curriculum http://www.lib.umt.edu/library-information-literacy-curriculum http://crln.acrl.org/content/71/10/534.full http://njla.pbworks.com/f/Info_Lit_Brochure_Revised_2-12-10.pdf http://www.sconul.ac.uk/sites/default/files/documents/coremodel.pdf ISBN 1-63102-455-8 471 OPEN ACCESS REPOSITORIES (OARS) IN INDIA: AN EVALUATIVE STUDY Dr. Rajesh Kumar Singh | Assistant Librarian | Central Library| Banaras Hindu University | Varanasi | rksb17@yahoo.com Abstract: The open access repository collects, stores, disseminates digital resources and also preserves digital materials for long term usage. An effective operational open access repository requires alliance among librarians of Institute/University, information scientists, record managers, faculties of University, researchers and policy makers. The open access repositories have been identified through internet browsing. The resulting 69 OARs have been explored from OpenDOAR(The Directory of Open Access Repositories ) for the present study. This paper is the first of its kind that attempts to identify and evaluate open access repositories in India. It also gives a comprehensive listing of open access repositories in India available in public domain and evaluates growth rate of OARs, software usage, content type, repository type and subject coverage of OARs in India. Keywords: Open access repositories, Institutional repositories, Digital libraries. Digital library software and Open source software INTRODUCTION In the information society, free flow of information is a fundamental principle for bridging the knowledge gaps between privileged and under-privileged communities. Social inclusion and economic empowerment are also achieved in a society where citizens have universal access to the information and knowledge, ranging from public information to specialized or customized information related to one’s profession, vocation or culture. Open access to information and knowledge is a key contributor in provisioning universal access to information and knowledge. The appearance of information and communication technologies has been accelerated and offers opportunities to fast, cost effective and efficient electronic communication of information. Open Access Repositories (OARs) are the ventures of Information Communication Technology which have become boon to the open access initiatives. Budapest Open Access Initiative (2002) described the concept of “open access as scholarly literature’s free availability on the internet, permitting any user to read, download, copy, distribute, print, search or link to the full texts these articles, crawl them for indexing, pass them as data to software or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself.” According to Crow (2002), “an institutional repository is a digital archive of the intellectual product created by faculty members, research staffs and students of an institution with few barriers to access” Chang (2003) has also defined as “Institutional repository as new method for capturing, collecting, managing, disseminating and preserving scholarly works created in digital form by constituent members of an institution” In simple words we can say OARs are those repositories which are being made open to make the content accessible to the user group of a particular organization or at the global level. In 1991, IBM discovered digital library software to manage collection of digital files. This software was grappled with key issues of storage, maintenance, retrieval and display digital content. This was first effort towards the open access repository software. Today, there are number of leading softwares available to create OARs. Among these open source softwares, DSpace, Eprint and Greenstone are more popular open source software. In India, open access repositories movement was started in 2004 and is also gaining momentum around the country due to following reasons:     472 To support open access movement; To make available the public funded research outputs by the researchers to the end users/clientele; To make available open access to the universities/ institutions research output; To support digital preservation of knowledge and research output for future; To support “Digital India Project” of India. ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education OBJECTIVES The main objectives of the present study are as follows:      To investigate the total numbers of open access repositories in India; To identify the year wise growth of OARs in India; To find out the type of repository and subject coverage of OARs developed in India; To ascertain the type of content included by the OARs; To identify the widely used open access repository software; To find out the number of records available in each OAR. METHODOLOGY The study, surveys the various Open Access Repositories registered with OpenDOAR (the Directory of Open Access Repositories).This has been performed during the period starting from January to July 2015.The author has visited websites of different OARs to understand their policies and other features. SCOPE AND LIMITATION The present study has been delimited with the OARs which are registered with OpenDOAR (the Directory of Open Access Repositories). This directory is most widely used and conventional directory in the present time. Although a large no of repositories have been developed in India but still good number of repositories have not been registered with OpenDOAR. This is the limitation of present study. MAJOR FINDINGS Major findings of the study are given below: Number of Repositories in India In India, many universities and research institutes have developed repositories for archiving publications and documents. It is not limited to science and technology but covers other subjects also. Sixty nine open access repositories have set up in India as indicted by OpenDOAR ( the Directory of Open Access Repositories) till 30th June 2015.The table no.1 provide us names and URL address of registered OARs. Name of OARs Architexturez South Asia Social Science Cyber Library ARIES, Digital Repository Digital Knowledge Repository of C DR I (DKR@CDRI) URL of IR http://www.architexturez.net/ http://socsccybraryamu.ac.in/ http://210.212.91.105:8080/jspui/ http://dkr.cdri.res.in:8080/dspace/index.jsp Eprints@CMFRI (CMFRI Digital Repository) Dyuthi (Digital repository of Cochin Uni. of Science & T.)) DigitalLibrary@CUSAT DIR@IMTECH IR@NPL IR@CECRI http://eprints.cmfri.org.in/ http://dyuthi.cusat.ac.in/ http://dspace.cusat.ac.in/jspui/ http://crdd.osdd.net/open/ http://npl.csircentral.net/ http://cecri.csircentral.net Institutional Repository@CSIO Institutional Repository of Intectual Contributions of Delhi Technological University E Knowledge Center http://csioir.csio.res.in http://www.dspace.dce.edu DSpace@GIPE (DSpace @ Gokhale Institute of Pol. and Eco.) DSpace @ GGSIPU Indian Academy of Sciences: Publications of Fellows Eprints@IARI http://dspace.gipe.ac.in IACS Institutional Repository http://arxiv.iacs.res.in:8080/jspui ISBN 1-63102-455-8 http://ekcenter.fdrindia.org/ http://14.139.60.216:8080/xmlui http://repository.ias.ac.in http://eprints.iari.res.in 473 Role of Information Literacy in Curriculum KrishiKosh (฀฀฀฀฀฀฀) RAIITH Dspace at IIT Bombay (DSpace@IITB) http://krishikosh.egranth.ac.in/ http://raiith.iith.ac.in http://dspace.library.iitb.ac.in/jspui/ Indian Institute of Astrophysics Repository (DSpace@IIA) E-Repository@IIHR (Knowledge Repository of Indian Institute of Horticultural Research) DSpace at Indian Ins. of Manag. Kozhikode (DSpace@IIMK) Indian Institute of Management Kozhikode Digital Library Institutional repository@VSL Indian Institute of Petroleum Institutional Repository Electronic Theses and Diss. at Indian Ins. of Science (edt@IISc) Open Access Repository of IISc Research Publications Bhagirathi (IIT Roorkee Repository) Research Archive of Indian Institute of Technology http://prints.iiap.res.in http://www.erepo.iihr.ernet.in/ openagri (Open Access Agricultural Research Repository) EPrints@IITD Librarians' Digital Library (LDL) Kautilya Digital Repository at IGIDR (Kautilya@igidr) eGyankosh DSpace@INFLIBNET http://agropedialabs.iitk.ac.in/openaccess/ http://eprint.iitd.ac.in/dspace https://drtc.isibang.ac.in/ http://oii.igidr.ac.in:8080/jspui http://www.egyankosh.ac.in http://ir.inflibnet.ac.in INFLIBNET’s Institutional repository ShodhGanga: A reservoir of Indian theses National Aerospace Laboratories Institutional Repository DSpace@IMSC DSpace at IUCAA ICRISAT Open Access Repository (OAR) http://ir.inflibnet.ac.in http://shodhganga.inflibnet.ac.in/ http://nal-ir.nal.res.in/ http://www.imsc.res.in/xmlui http://www.iucaa.ernet.in:8080/jspui/ http://oar.icrisat.org/ Eprints @MDRF Eprints@SBT MKU DSpace at M S University Mahatma Gandhi University Theses Online Management Development Institute - OAR (DSpace@MDI) ePrints@MoES:Open Access Digital Repository http://mdrf-eprints.in/ http://eprints.bicmku.in/ http://14.139.121.106:8080/jspui/ http://www.mgutheses.org/ http://dspace.mdi.ac.in/dspace http://moeseprints.incois.gov.in/ OpenMED@NIC NIRT Institutional Repository (EPrints@NIRT) DRS at National Institute Of Oceanography (DRS@nio) National Science Digital Library (NSDL) NOPR (NISCAIR Online Periodical Repository) Dspace@NITR Eprint@NML http://openmed.nic.in/ http://eprints.nirt.res.in/ http://drs.nio.org/ http://nsdl.niscair.res.in/ http://nopr.niscair.res.in/ http://dspace.nitrkl.ac.in/dspace/ http://eprints.nmlindia.org/ Osmania University Digital Library [OUDL] DeepBlue Knowledge Repository@PDPU RRI Digital Repository (Raman Research I. Digital Repository) Etheses - A Saurashtra University Library Service dspace @ sdmcet http://oudl.osmania.ac.in/ http://spmlib.pdpu.ac.in:8080/xmlui/ http://dspace.rri.res.in/ 474 http://dspace.iimk.ac.in/ http://www.iimk.ac.in/gsdl/cgi-bin/library http://vslir.iimahd.ernet.in:8080/xmlui http://library.iip.res.in:8080/dspace http://etd.ncsi.iisc.ernet.in/ http://eprints.iisc.ernet.in/ http://bhagirathi.iitr.ac.in/dspace/ http://raiith.iith.ac.in/ http://etheses.saurashtrauniversity.edu/ http://210.212.198.149:8080/jspui ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education DSpace@TU Knowledge Repository Open Network (KNoor) DSpace at Vidyanidhi http://dspace.thapar.edu:8080/dspace/ http://dspaces.uok.edu.in:8080/jspui/ http://dspace.vidyanidhi.org.in:8080/dspace/ University of Mysore - Digital Repository of Research, Innovation and Scholarship (ePrints@UoM) Archives of Indian Labour Vidya Prasarak Mandal - Thane http://eprints.uni-mysore.ac.in/ http://www.indialabourarchives.org/ http://dspace.vpmthane.org:8080/jspui/index.jsp Dspace at Vidyasagar University http://14.139.211.206:8080/jspui/ Digital repository of West Bengal Public Library Network http://dspace.wbpublibnet.gov.in:8080/jspui/ Table no. 1: List of OARs registered under OpenDOAR Growth of OARs in India Table no. 2 shows that growth rate of OARs in during the period 2004-2015. Growth rate of OARs is highest in 2006 and lowest in 2013 and 2015. In 2006, 11 repositories were added. This result reveals that the numbers of OARs is not growing continuously with time. Year 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 No. of OARs added 01 04 01 03 05 10 09 08 05 11 08 04 Growth Rate (%) 01.44 05.79 01.44 04.34 07.24 14.49 13.04 11.59 07.24 15.94 11.59 05.79 Table no. 2: Growth rate of Repositories (Year-wise) Digital Library Software Usage In India, OARs are rapidly growing with the help of open source softwares. The following table no. 3 depicts that the DSpace open source software created by MIT libraries and HP Labs is the most widely used repositories software among all the others. A total of 42 (60.86%) OARs running on this platform followed by Eprint open source software 20(28.98%). Software used No of OARs Dspace 42 Eprint 20 Others (Greenstone, Nitya, Drupal, 07 Calibre, Archilexturez, HTML, Table no. 3.Digital library software usage of OARs %age 60.86 28.98 10.14 Content Type The developed open access repositories manage the repository contents by such as published papers, theses, unpublished papers, conference proceedings, multimedia objects etc.The present study shows that a large number of OARs have more than one type of content. Table No. 4 shows a clear picture of the content type of the OARs of India.The data shows a total of 55 (79.71) OARs preserve published papers which is highest followed by 31 (41.92) others (Multimedia objects, patents, software, learning object..etc). ISBN 1-63102-455-8 475 Role of Information Literacy in Curriculum Content type No. of OARs 55 %age Published papers (Preprint, post print, conference proceeding, research reports, book chapters.etc.) Theses 29 Unpublished papers 22 Others (Multimedia objects, patents, software, learning 31 object..etc.) Table no. 4: Content type-wise OARs 79.71 42.02 31.88 41.92 Repository Type There are different types of repositories in India. The study reveals that most of the repositories are institution based. A total of 44 (63.78%) repositories were created by an institutions/universities. Only 07(10.14%) & 05(07.24%) have been created respectively for e-theses & e-journals. Table no. 5 shows a clear understanding of the result. Type of repository No. of %age OARs Research Institutional/departmental 44 63.78 Research cross-Institutional 04 05.79 E-thesis 07 10.14 e-journal 05 07.24 Learning and teaching & others 08 11.59 Table no. 5: Repository type-wise open access repositories Number of Digital Records Based on data and statistics of table no. 6, it appears that there is a vast difference amongst the OARs in terms of average number of digital records. Only 13 (18.84%) OARs have uploaded more than 10,000 digital records and 25 (32.23%) have uploaded less than 1000 digital records. Numbers of digital record No. of OARs %age Less than 1000 digital records 25 79.71 Less than 5000 digital records 22 42.02 Less than 10000 digital records 09 31.88 More than 10000 digital records 13 44.42 Table no. 6: Numbers of digital records available at open access repositories Subject Wise OARs Due to information explosion, universe of knowledge has been divided into many subjects. Study shows that Science repositories are highest in number 30 (43.47%) followed by Engineering 20 (28.98%), Arts & Humanities14 (20.28%), Medical Science 6(08.69%) and Agriculture, Food and Veterinary 2(02.89%). It is clear from the present study that in most cases one repository archives more than one subject. Table No. 7 shows detailed result of subject-wise repositories registered with OpenDOAR. Subject No of OARs Agriculture, food and veterinary 2 Science (Physical & biological ) 30 Medical Science 6 Engineering 20 Arts & Humanities 14 Table no. 7: Subject-wise Distribution of OARs 476 %age 02.89 43.47 08.69 28.98 20.28 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Some Other Findings The present study finds some other results that cannot be shown in the tabulation form. These finding are given below.        Only 37 open access repositories ( 53.62%) have working on OAI base; Growth rate of OARs in India is quite low in comparison to the developed countries; Only 8 (11.59%) open access repositories have learning objects and multimedia e-documents; The open access repositories comprises mainly two type of search options viz., simple search and advance search; All open access repositories have Boolean search facilities and users can browse by author, title and date; Some Institutes have not provided total number of records; All open access repositories are considered as same object of theses and dissertations. CONCLUSION Open access repositories are boon to the open access movement. It is now recognized as a necessary element to answer the digital challenges due to the fund restrictions and soaring price of academic research journals. The present study shows that the growth of OARs in India is much low in comparison to developed countries. Therefore, awareness of creation of open access repository is essential and the funding agencies should have mandatory open access so that creation of the repositories or depositing publications to the open access repositories becomes compulsory. Now it is very obvious that the open access repositories are one of the best option which can be used every universities/institutions to make their research output widely available and accessible to the interested users throughout the world. REFERENCES Budapest Open Access Initiative (14 February 2002), "Budapest Open Access Initiative," available at: http://www.soros.org/openaccess/read.shtml. Accessed on 15 June 2015. [2] Chang, S.H. (2003), “Institutional repositories: the library’s new role”, OCLC Systems and Services, Vol. 19 No. 3, pp. 77-9. [3] Crow, Raym (2002), The Case for Institutional Repositories: A SPARC PositionPaper, The Scholarly Publishing and Academic Resources Coalition, Washington, DC, available at: http://www.arl.org/sparc/IR/ir.html. http://www.soros.org/openaccess/read.shtml. Accessed on 15 June 2015. [4] http://www.opendoar.org/find.php?cID=99&title.India.Accessed on 21 June 2015. [1] ISBN 1-63102-455-8 477 DIGITAL LIBRARY AND ITS ADVANTAGES S. D. Singh | Galgotias Institute of Management & Technology | Greater Noida | U.P. | sdsingh2008@gmail.com Shrikrishan Thapliyal | Galgotias Institute of Management & Technology | Greater Noida | U.P. | krishanlibrarian@gmail.com Abstract: We are in the age of a networked society where IT in addition to its use in all spheres of human activity has been used extensively to record; each and every Library is slowly getting digitized. In the past few years procedures for digitalizing books at high speed and comparatively low cost have improved considerately with the result that it is now possible to digitized million of books per year. This article will discuss the factors that will necessitate those traditional libraries to get digitized as well as the introduction, and its advantages of digital Libraries the field of digital libraries will be limited if viewed only as a sub field of prior research interest to realize its full potential, the field must be viewed as a union of sub field from a variety of domains combined with additional goal.. KEYWORDS: Digital Library, Definition, Equipments. Advantages INTRODUCTION A digital library is a managed collection of information with associated services where the information is stored in digital format and accessible over a network where is it require, digital library is an organized collection of digitalized in digital form which can be accessible by a computer on the network by using any protocol. The majority of the holding of a digital library is in the computer readable form and also acts as a point of access to other online sources. Digital libraries are being created today for diverse communities and in different field e.g. education, science, culture, health etc. library automation has helped to provide easy access from any collection, different library is a collection of digital documents like books, journals, images, maps, video, and audio with methods of access and retrieval. We are in the age of a networked society where information technology is addition to use in all spheres of human activity has been used extensively to record. Large amount of electronic data stored and preserve. A digital library preserves the rare document as well as a good portion of printed literature that would be of significant relevance to the society today. Digital libraries have received wide attention in the recent years allowing access to digital information from any where across the world. In the past few years procedures for digitalizing of books at high speed and comparatively low cost have improved considerably with the result that it is now possible to digitize million of books per year, the term which have been vogue at different time include; paperless library, electronic library, virtual library, libraries without boundaries and more recently digital library. The term digital library is used to refer to a system whose function is to extend electronic access. The digital libraries mean different things to different people. A digital library would maintain a major part of its collections in computer, a digital library has a strong presence on the internet with a have page for the library providing an integrated access interface. WHAT IS DIGITAL LIBRARY? Digitalization is the part of computerization, digitalization means; there we can find the information through computer in digital form. Digital library, a global virtual library, is a library of thousands of networked electronics libraries. A digital library is a collection of digital objects a collection of research papers is a typical example, when this collection get significant large user of digital library can not examine each paper individually to find if its subject interest them, to address this problem. Digital librarians create an interface to stand between the content of the collection and the user. 478 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education On CD ROM, the amount of data limited to several hundred megabytes per disk, but access is generally much faster than on an internet connection, several CD ROM can be combined in a set and because the disk are small , a large libraries can physical space. In the past, the problems had been involved in that digital libraries have been very expensive to develop, this is become people where programming them all from scratch. Lot of people and organizations has digital collections, why should each digital library be a reinvention of the wheel? Another problem is interoperability, where many organizations have collections. Digital library contain diverse information for use by many different users. Digital libraries range in size from tiny to huge they can use any type of computing, equipment and any suitable software, the digital libraries are organizations that provide the resources; including the specialized staff to select, structure, offer, intellectual access to interpret distribute. Preserve the integrity of, and ensure the persistence over time of collections of digital work so that they are readably and economically available for use by a defined community or set of communities. Digital library is an organized searchable collection in digital format, and then the future of digital libraries will reflect a more toward integrated service functions and collection development and management similar to the traditional library organizations. DEFINITION Digital libraries are very different from traditional libraries yet, is other they are remarkable similar people do not change because new technology is invented they still create information on that has to be organized, stored and distributed, they still need to find information that others have created and use it for study, reference or entertainment. A digital library is a machine readable representation of materials which might be found in a university library together with organizing information intended to help users find specific information. A digital library service is an assemblage of digital computing, storage, and communicating machinery together with the software needed to reprise emulate, and extend the services provided by conventional libraries based on paper and other materials means of collecting, storing, cataloguing, finding, and disseminating information (Edward A. Fox) A digital library is a special library with focused collection of digital objects that can include text, visual materials, audio materials, video materials stored, an electronic media format along with means for organizing, storing and retrieving the files and media contain in the library collections. Figure1. Great advantages of digital libraries ADVANTAGES The advantages of digital libraries as a means of easily and rapidly accessing books, archives and images of various types are now widely recognized by commercial interest and public bodies alike. Traditional libraries are limited storages space, digital libraries have the potential to store much more information the uses can get ISBN 1-63102-455-8 479 Digital Library and Its Advantages his/ her information on his own computer screen by using the internet. The unprecedented of activities in digital library can be attributed. The digital library offers significant and value addition to library services improved information retrieval and enhanced document delivery of digital libraries. Digital libraries greater access to digital contents can be managed and provide a way to enrich the teaching and learning environment. Digital library systems can be accessed simultaneously. Libraries have marched hand in hand adapted and adopted themselves, when any new technology has evolved paving way for electronic libraries , networked libraries, digital libraries, virtual libraries etc. Networking Digital library can provide the link to any other resources of other digital library very easily, sharing can be achieved. Space Whereas traditional libraries are limited by storage space, just digital library and digital information requires very little physical space to contain the term. Traditional libraries have always been centered in physical space with physical collection. No Physical Boundary User of digital library need not go to the library physically, all the users can get their beneficial information all over the world from an internet, and it’s very useful to digital library users. No Time Boundary Traditional library maintain the time table but digital library provide the information any time, users can access any time with any information in across the world. Access Approach Digital library provides access to much richer contents in a more accessible; they can easily more from catalogue to the particular book then to a particular topic or other. Information Retrieval Modern approach to information retrieval from a computer, digital library provide very user friendly, interfaces, then giving click able access to its resources, search can be based on metadata and on full-text (or other content based indexing) Multiple Accesses The same resources can be used at the same time by a number of users. Easily Accessible Others  On-line library catalogue through internet gives access to bibliographic records of million books and details of holding of academic and research.  Help the libraries go get recent publication from the publishers.  Help in resources sharing facilities.  It saves the library manpower and funds.  Help inter library loan.  Help to search information to their users at faster rate through online communication.  Researchers and scientist will get information with minimum time.  The digital library is ideal in support of students receiving their schooling using distance learning education.  Digital library need not be dependent on each user having a particular type of computer or even a computer at all. 480 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education   Digital libraries can be customized so user can have access to what they want and need to use. E-Publication data can be maintained up to date so that the buyer will be able to purchase the latest version of publications. PRIMARY EQUIPMENTS FOR DIGITAL LIBRARY These components are very essentials to create digital library. The noted below are the requirement of digital library as follows:          Desktop computers with supporting accessories Input capture devices: Scanner and Digital Camera. Printer CD/DVDs or other external storages devices UPS (Uninterrupted power supply) high power 24 hour cable for networking Converter Networks Multimedia Interface Software The software requirements of digital library as indicated below:    Linux operating systems Digital library software like GREENSTONE and D-SPACE Editing Software Human Ware The key skills are required for digital library staff as indicated below:    Management skill Technical skill Subject skill CONCLUSION Day by day the cost of digitized is decreasing, online publication automated increasing. Slowly all the libraries would be digitalized in the country. Digital India Week in being celebrated across the nation these days, digital India is an ambitious program of the GOI to make India a digital country; digitalization consolidates the security systems of a library and makes its study materials available to a large number of users GOI said. Digital libraries are amongst the most advance form of information systems; as such development of digital libraries requires integration of many information technologies. The digital libraries are emerging as a growing interdisciplinary area of research and education for information communication technology, computer science, and library science. REFERENCE [1] https://en.wikipedia.org/wiki/Digital_library [2] Trivedi Mayank: Digital libraries: functionality, usability, and accessibility. Lib.Phil.Pract., 2010. http://www.webpages.uidaho.edu/~mbolin/trivedi-diglib.htm. [3] Arora Jagdish: Building Digital Libraries: An Overview (DESIDOC Journal) publications.drdo.gov.in › Home › Vol 21, No 6 (2001) [4] Use of multiple digital libraries: a case study - uclic, [5] www.uclic.ucl.ac.uk/annb/docs/abhsnbkJCDL.pdf [6] Jharotia, Anil Kumar “Empowering Knowledge for all: Role of Digital Library” published in the proceedings of the International Conference of Indian Library Association held on 12-15 Nov.2008. http://librarydotcom.webs.com/researchpapers.htm [7] Arms, Williams Y., “Digital Libraries”, Cambridge, MA: The MIT Press, 2000. ISBN 1-63102-455-8 481 POWERING EDUCATION WITH MOBILE TECHNOLOGY THROUGH M-LEARNING Vijay Laxmi | Library Incharge (Professional Assistant) | Department of Social Work | University of Delhi | chetanutkarsh1996@gmail.com Anil Kumar Jharotia | Librarian | Tecnia Institute of Advanced Studies | GGSIP University | Delhi | aniljharotia@yahoo.com Abstract: In many ways, mobile technology is motivating the younger generation to use modern gadgets for learning purposes. Mobile library services can meet people's needs for information in a fast-paced society. Latest technological developments present an overview of trends in mobile tools and applications for libraries, including the internet mobile, mobile multimedia and SMS etc. This paper focused on application of mobile computing and its possible applications that can be mobile with library services on the web based environment. This study may be helpful in identifying and generating mobile based service for libraries. Keywords: e-Learning, ICT, Library Services, Mobile Learning, Mobile Technology. INTRODUCTION M-learning as a phenomenon has been in process, unintentional progress since the late twentieth century. The unintended consequence of smaller and faster computing is the enabling of an anywhere and anytime learning. In the course of scientific discovery products are produced which have novel application that are wholly unintentional. This is the unplanned nature of science – phenomena occur and exist before being named and investigated. Students learn through new technology before educators have inquired to their attributes. In this way we now play a game of catch-up. Fig.1: M-Learning The world today is a technology-driven place to dwell in where the age of machines has taken over and has definitely ensured a comfortable life for us. The ability of mankind to use science in an efficient way has led to many inventions and opened up myriad possibilities to explore. We all live in the digital smart age where we have access to technology at our fingertips. Things that we thought to be impossible to achieve back then have been made possible now as we have eliminated the time and place factor. Today, as a result of developments and advancements in information and communication, the mobile technology becomes essential for connecting with internet. Users are currently more positive about accessing and seeking information from their mobile phones. Mobile is a device through which people access their information and do business. With the recent advancement of mobile technologies, such as smart phones, digital cameras and PDAs (Personal Digital Assistants), and tablet PCs mobile learning provides opportunities for formal and informal education in a wide range of settings. DEFINITION OF MOBILE LEARNING According to Wikipedia, mobile learning can be defined as "Learning across multiple contexts, through social and content interactions, using personal electronic devices." It's really the same concept of eLearning only the 482 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education electronic media platform is specifically clarified as personal devices or portable technology. With this type of learning, employees or students have the ability to access training content anywhere they can use their mobile device. The exploitation of ubiquitous handheld technologies, together with wireless and mobile phone networks, to facilitate, support, enhance and extend the reach of teaching and learning Harris’s (2001) defines it “M-learning is the point at whit mobile computing and E-learning intersect to produce an anytime, anywhere learning experience.” Hoppe, Joner (2003), “M-learning is e-learning using a Mobile device and wireless transmission.” WHAT IS M-LEARNING? Mobile learning is the ability to obtain or provide educational content on personal pocket devices such as PDAs, smartphones and mobile phones. Educational content refers to digital learning assets which includes any form of content or media made available on a personal device. Fig.2: Meaning of M-Learning Mobile learning involves the use of mobile technology, either alone or in combination with other information and communication technology (ICT), to enable learning anytime and anywhere. Learning can unfold in a variety of ways: people can use mobile devices to access educational resources, connect with others, or create content, both inside and outside classrooms. Mobile learning also encompasses efforts to support broad educational goals such as the effective administration of school systems and improved communication between schools and families. Enterprise mobility With the introduction of cloud-based systems, the term “enterprise” that was used earlier with a limited group of people or companies has extended its reach to small and medium sized organisations. Education is the new kid on the block and this sector is experiencing technology transformation in almost every area. Be it providing digital training, conducting online examinations or anything in between, we’ll experience technology adoption in every area going forward. Enterprise mobility may seem to be an intimidating jargon, but if one can imagine students sitting at home and watching videos of their teacher explaining scientific concepts on their tablets, or think about college students finding their next class location on their handhelds, it becomes more tangible. System of Learning From the days of the Gurukulas to the high-end schools and colleges, we have come a long way, not only through breakthroughs in infrastructure but also in the concept of education as a whole. We have gone through the system of writing and memorising in copies to storing digital notes on a high-end device. In India, we are ISBN 1-63102-455-8 483 Powering Education With Mobile Technology Through M-Learning slowly witnessing mobility solutions being introduced into our education system. One can now find lectures delivered online and presentations created and transferred through internet or applications in a secured way. The idea has already been solidified and several mobile apps are being built to access this information. Mobile devices have made the world smarter for students. They can reduce the time and money with the support of these devices, as they don’t have to travel anywhere to get in touch with teachers or their institutes. Institutes and colleges are using the mobile solutions in order to make learning fun, accessible and environmentallyfriendly for their students. Learning is a never-ending process and mobile applications are being developed to meet the learning needs with respect of time and money. Universities can manage students’ data, which consists of attendance, admission status, fees, performance report, and results using mobility solutions. It is tedious to manage the details like class schedules, teacher schedules, event management, class roster, discussions and announcements for the institutes, schools and universities. Therefore, a right solution is needed to cope with these upcoming challenges. Now, students can read books on mobile through mobile App namely “Rockstand” which free available on Apps Store in smart mobile. Mobile Education Mobility solutions have brought about a paradigm shift in the education industry. When we compare the learning process of students with earlier days, there has been a remarkable change today. Earlier, it was necessary for students to attend colleges and schools to gain knowledge. The teacher and the classroom were the only platforms for students to learn new things and then there was the age and time-limit for students to learn new things. Mobile technologies have made it possible for anyone to learn without taking location into consideration. Today, there are many software and mobile application development companies which are providing mobile applications for institutes and colleges to streamline their learning practices. These solutions are proving to be productive and effective mobile learning for students and teachers. Videos pause as soon as the student takes her eyes off the screen, the device vibrates to bring the student’s attention back to the material, and teachers get feedback on which parts of their video lecture the students had the most difficulty with. Students can also create their knowledge graphs and based on their past learning and use the mobile app to receive recommendations on what courses to pursue next and this is just the beginning. To conclude, like in all the other fields, enterprise mobility has transformed the education sector as well, with educational institutes, teachers and students benefiting significantly from this uber popular movement. Recognizing the gravity of its essence, IT companies have also made notable contributions, helping educators to leverage education apps, software and mobile devices in conveying information among the students. It is definitely the magic of mobility that has motivated the younger generation to use modern gadgets for learning purposes along with traditional textbooks. Mobile Phones and Library Services For some years now, people have been creating applications which can be downloaded to mobile phones in addition to the software supplied with them. Examples include mapping software, games, mobile email clients and software which provides a way of uploading photos or other content to the user’s blog or social networking accounts. Until recently the take-up for these applications was relatively low, but iPhone users download a great many more applications than owners of other phones ICT has collapsed barriers and promoted fast communication and interactions across boundaries. The need to meet life's basic challenges and responsibilities has informed the invention and the use of information technologies. Libraries are deeply interested in channels for the transmission of information, such as telephones and telephone lines, cellular networks, cable television, and the Internet. The Internet and World Wide Web (www) have made it possible for university teachers, researchers, and students to locate what they need without going to the library. Most academic libraries have started exploring the viability of Internet technologies. These would support library-to-user, user-to-library, and user-to-user online interactions. 484 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Mobile Technology in Libraries Mobile technology has now come up with “Libraries in hand” trend. Our librarians are in move to mobile determine how these devices are affecting information access and ensure that they are communicating with patrons and providing web content in the most appropriate and effective ways. Our librarians must be prepared to take this challenge and put this effort to increase the market and demand for mobile access to personalized facts and information anytime, anywhere on one s own handheld device. Since mobile handled devices truly are personal devices, search histories and physical locations can be harnessed to produce more accurate, individualized information and services users on the go don’t want to wait for list of web result, libraries today are covering most of the technologies given by mobile industry like PDA s Blackberry, iPod, Cell Phones, UM PC s (ultra mobile PC) and mobilizing library contents in a portable from suit able for small screen and delivering short service in the form of contents/information with device s multiple Fig.3: M-Technology in Library searching features. Librarians will need to become proficient in using these devices to enable users to access them anywhere from anytime and anyplace.           HOW ANDROID APPLICATION HELPFUL TO USERS? They can Search the collection, View new arrivals and also access their account. Users can reserve books as well as request a book for check out from their mobile phones. Users can renew items from their mobile. If library server has a public domain IP then your users can access from their homes using GPRS/Wifi facility on their mobile. If library server is only accessible via LAN then your users can access within the LAN using their Wifi facility on their mobile. Users can now access library from their Smart phones. ADVANTAGES OF USING MOBILE IN LIBRARIES Mobile phones and other mobile technology devices have created a way for library and users. Mobile technology is helping services providers increase habitual users. Library provide the increasingly using the complexity of their supported mobile technology to attract new users and retain old ones. The user can also sent request for ILL, reference query, suggestions and complains. Libraries will also reply the same though automatically mail and Short Message Services. Users can read m-book on smart phone and tablet through “Rockstand” mobile App which free download from ‘Google App Store”. CONCLUSION Libraries are moving forward in providing access to digital collections via mobile devices. In the near future, more and more people will be able to experience digital collections in the palm of their hand through a mobile phone. No longer do visitors have to visit a library to find a computer with internet access. In order to meet these requirements, libraries are also facing some challenges. Though mobile communication technology is not a problem, our librarians should know how to use this technology to serve our readers. We have to think about the ISBN 1-63102-455-8 485 Powering Education With Mobile Technology Through M-Learning access authority to our data bank, otherwise the may be a tort incurred. How to find a proper operator whose gateway is trustworthy to cooperate with us. Besides, user interfaces are nearly always varied and lack of standards. We have several operators and it’s laborious to develop services. Now, Users can read books on smart phone through m-learning. REFERENCES [1] Brown, J. S., Collins, A., & Duguid, P. (1989). Situated cognition and the culture of learning. Educational Researcher, January-February, 32-42. [2] Donald, J. (1995). Disciplinary Differences in Knowledge Validation. In N. Hativa & M. Marincovich (Eds.), Disciplinary Differences in Teaching and Learning: Implications for Practice (pp.7-18). [3] Entwistle, N. (1997). Introduction: Phenomenography in Higher Education. Higher Education Research & Development, 16(2), 127-34. [4] Fairweather, P.G. & Gibbons, A.S. (2006). Introduction to special issue on learning objects. Educational Technolocy, 46(1), 7-9. [5] Jharotia, Anil Kumar (2012). “M-Learning is the future of e-learning: A new dimension in library services” Conference proceeding of National conference on beyond librarianship: Search for new frontier held at G.B.U on 21-22 Sept. 2012. Vol-1 pp.203-210. [6] Kroski, E. (2008), "On the move with the mobile web: libraries and mobile technologies", Library Technology Report, Vol. 44 No. 5, p. 38. [7] Kirschenman, J. (2001). The Electronic Prometheus and its Consequences for Art Education. International Journal of Art & Design Education, 20 (1), 11–18. [8] Kearsley, G. (Ed.) (2005). Online learning: Personal reflections on the transformation of education. NJ: Educational Technology Publications. [9] Naidu, S. (2005). Researching Distance Education and E-learning. In C. Howard, J. V. Boettcher, L. Justice, K. Schenk, P. Rogers, & G. A. Berg (Eds.), Encyclopedia of Distance Learning, Volume 1-IV, Pages 1564-1572, Idea Group, Inc.: Hershey PA. [10] Newspaper “Financial Express”, 29 June 2015 [11] Stahr, Beth (2009), “SMS library refrence service options” Library Hi Tech News, Number 3 / 4: pp.13-15. [12] Traxler, J. (2005). Use of mobile technology for mobile learning and mobile libraries in a mobile society, p. 44, In G. Needham and M. Ally (Eds.). M-libraries: Libraries on the move to provide virtual access, Facet, London. Websites [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] 486 http://www.m-learning.org/knowledge-centre/whatismlearning http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.1087 http://emeraldinsight.com/ http://blog.galaxyweblinks.com/wp-content/uploads/2012/06/M-learning.jpg http://1.bp.blogspot.com/_9WwRmOHZKHA/TM14kNeQWHI/AAAAAAAAAF4/mw2eufAgJQ/s1600/mLearning-Feature-Sets.png http://www.upsidelearning.com/blog/wp-content/uploads/2010/06/mLearning_wordcloud-e1277286032624.jpg http://www.upsidelearning.com/blog/wp-content/uploads/2010/07/mobile_learning_demand1e1280413173331.jpg http://www.dashe.com/blog/wp-content/uploads/2012/02/mlearning-v-elearning-devices4.jpg http://kevincorbett.com/wp-content/uploads/2012/06/mobile-learning-kc.jpg http://edpstuff.blogspot.in/p/edp-in-mobile.html http://mtotowajirani.com/wp-content/uploads/2010/09/mobile-2.0.png http://librarydotcom.webs.com http://www.litmos.com/training-platform/mobile-learning-definition http://www.ifets.info/journals/13_3/3.pdf http://www.mobl21.com/Basics_Of_Mobile_Learning.pdf http://www.unesco.org/new/en/unesco/themes/icts/m4ed/ ISBN 1-63102-455-8 WEB 2.0 APPLICATIONS IN LIBRARY SERVICES: SPECIAL FOCUS ON LIBRARY & INFORMATION SCIENCE BLOGS B.Vijayalakshmi | Librarian | Sarada Library | Sri Sarada College for Women | Tirunelveli | vijayanew@gmail.com Dr.A.Thirumagal | University Librarian | Manonmaniam Sundaranar University | Tirunelveli Abstract: Web 2.0 is defined intersection of web application features that facilitate participatory information sharing, interoperability, user-centered design and collaboration on the World Wide Web. The purpose of this paper is to highlight the importance & ease use of web 2.0 tools on Library Services. Web 2.0 helps to bridge between digital divide of different types of Users. It provides new Learning Environment to the users. This paper focuses on Blogs. Blog platforms provide easy and convenient website management and can be used to produce attractive websites with great features. It could be used in Libraries to provide Modern Library Services. Keywords: Web2.0, Library 2.0, ICT on Library Services, Innovative Library Services, Blogging INTRODUCTION Web 2.0 is defined intersection of web application features that facilitate participatory information sharing, interoperability, user-centered design and collaboration on the World Wide Web. A Web 2.0 site allows users to interact and collaborate with each other. In Web2.0, Blogging is an important tool to use easily. Blog platforms provide easy and convenient website management and can be used to produce attractive websites with great features. Other website publishing options require cost, in-depth knowledge of HTML coding, and/or complex web publishing software. So that with the help of a blog, Librarians can promote library's services, resources, and programs online. WEB 2.0 APPLICATIONS IN LIBRARY SERVICES: Web 2.0 technology is creating a more “Interactive” environment for scholarly communication. Through social media, researchers have more routes to express their ideas. They may present their opinions not only in writing but also through multimedia, including audio, broadcast, video, photo and so on. “Knowledge sharing” is one of the motivations of scholarly communication. To them, web 2.0 is a multidimensional which enables knowledge sharing to satisfy the needs of researchers in their discussions and communications with others on interdisciplinary subjects. A variety of Web 2.0 communication tools help to save researchers energy and offer wider channels to communication processes. Librarians can use the internet to communicate, share ideas and offer support for a long time through use of web2.0 tools which present opportunity for large scale professional collaboration and cooperation. Web 2.0 tools are weblogs, wikis, podcasts, RSS feeds, photo-sharing, social bookmarking, instant messaging, social media networks and so on. Librarians can provide virtual learning environment by online access. OPAC, WEBOPAC are very useful to the Users. Librarians need to acquire skills to effectively utilize web 2.0 tools & they have to impart skills for the users to use these tools effectively. These Library Services attract the non visitors of the Library also to use Library Services at their home. IMPORTANCE OF USING WEB 2.0 FOR LIBRARY SERVICES: The applications of web 2.0 can broaden the walls of the Libraries. It allows Users to comment, review and re-use of information or service with the application of web 2.0 tools. So that, Librarians can gets the feedback from the users without any formal procedures. Thus the users also can express their views or needs to the Librarian without any hesitation or any other barrier. Library 2.0 is the product of application of web 2.0 tools in libraries. Library 2.0 was first coined by Michael Casey in his blog Library Crunch. According to the use of Web2.0 tools in library activities is known as Library 2.0. ISBN 1-63102-455-8 487 Web 2.0 Applications In Library Services: Special Focus On Library & Information Science Blogs Blogging: The word blog is a contraction of "web log", a phrase not so commonly used these days. The term "weblog" was coined by Jorn Barger on 17 December 1997. In the simplest definition of the term, a blog is a log of your thoughts, ideas, useful links, photos, videos, or the latest news. Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order. Most blogs are interactive, allowing visitors to leave comments and even message each other via widgets on the blogs and it is this interactivity that distinguishes them from other static websites. Many blogs provide commentary or news on a particular subject; others function as more personal online diaries. A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability of readers to leave comments in an interactive format is an important part of many blogs. Most blogs are primarily textual, although some focus on art (Art blog), photographs (photoblog), videos (video blogging), music (MP3 blog), and audio (podcasting). Microblogging is another type of blogging, featuring very short posts. Posts are actually arranged in reverse chronological order, which means that when you visit a blog on the web, the latest story will appear at the top of the website, and the earlier ones will descend in order beneath it, by how recently they were published to the web. Online Blogging Platform: An online blogging platform is the software you use to publish your content to the web. Just as you might have a choice about which word processor or web browser to use, there are also a range of different online blogging platforms available to you. Hosted Blogging Platforms: By far the easiest way to get started is a hosted blogging platform. The most popular choices here are Blogger.com and WordPress.com. Both of these services are free to use, and you can start a blog very easily, with a minimum of setup. Themed Blog Sites Blogabond.com – A site dedicated to travel blogs with map integration and more. BlogCheese.com – A video blogging website. BusyThumbs.com – A blog site specifically for your text messages and camera phone images. Freelog – Designed for video blogging and completely free. Trippert.com – Create and share blogs of your travels. Ufem.com – Blogging site specifically geared towards women. It offers multiple themes and plugins. Xanco.com – Another moblogging site for you to share all your mobile communications with friends and family. WordPress Powered Blogetery.com – Offers multiple templates, anti-spam, free sub-domain and more. BlogRox.com – Runs on WordPress and offers 50MB of free online space. Blogsome.com – Based out of Ireland, this site uses the WordPress MU platform, large choice of themes. Edublogs.com – WordPress powered blogging for educators. WordPress.com – Not only can you install WordPress on your own sites, you can use the same software on their site and save yourself all of the technical work. Blog Applications in Library Services: All the Web 2.0 applications can be implemented through Blogs. It facilitates the Librarian to provide various Library Services through online. Some ways are explained below. Library Events: In the blog, we could publish our Library Events to the Users & the world. Announcements: In the blog, Librarian could give important announcements which need to be circulated. 488 ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Web OPAC: Web OPAC is a library catalog on the Web or Intranet. Users can search the required information by connecting to Uniform Resource Locator (URL) of Web OPAC anytime during the day and from anywhere in the world. Gallery: Librarian could upload photos in the Blog. Thus we could attract the Users towards our Blog. Alerts: In the Blog, we could publish important News Alerts, New Books Alerts & so on. Fresh Picks: Library Resources could be updated online for the benefit of the users. FAQ: Frequently Asked Questions could be updated in the Blog. So that Users could know about the Library Rules & Regulations. Useful Links: Useful Links could be added to the website. So that Users could get connected to the world wide web through Library blog. Online User Survey: Librarian could take user survey online. So that, library resources & services could be enhanced. Feed Back: Librarian could get feed back online. A form could be created for getting feed back. RSS: Rich Site Summary is a format for delivering regularly changing web content. It allows users to easily stay informed by retrieving the latest content from the sites interested in. Users save time by not needing to visit each site individually. E Mail Alert service: It is email updates of the automatic delivery of latest relevant information at the mail box. Through this, Librarian can send Library News & Events, New Arrivals, Any Announcements at the User’s desktop. SMS Alert Service: Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. Through this, Librarian can connect with the Users while they are mobile. E-mail reference Service: Through this Users can ask Queries from anywhere. Librarian could publish the e-mail address in the blog. Telephone Reference: Users can ask Queries to the Librarian over phone. Librarian could publish the telephone number in the blog. Chat Reference: Users can ask the Librarian online. They could get reply immediately. User's Magazine Online: Here we could publish User’s articles online. So that Users will be happy to see their work online. Carrier Guidance: Librarian could give carrier Guidance & various opportunities online for the benefit of the users. Educational Guidance: Librarian could give Educational Guidance online by creating separate link for Educational Guidance. Multimedia: Librarian could upload Audio & Video files through Blogs regarding Library. ADVANTAGES Blogs can be updated online from any computer with internet access. This can be a big advantage for Librarians who want to be able to make frequent updates to their website. Some plug-in allow for automatic updating of Twitter, Face book, and other social networking / social bookmarking sites. This has the advantages of both increasing our exposure and providing our website with valuable back links that will enhance Library Blog’s presence on the search engines. Probably the primary reason to consider using a blog platform for Library is the ease in making changes and updates. Content can be added quickly and easily, including text, images, audio, and video. It can also be quickly made radical changes in the appearance of the blog by changing just the master settings of readymade templates. PROBLEMS OF BLOGS ISBN 1-63102-455-8 489 Web 2.0 Applications In Library Services: Special Focus On Library & Information Science Blogs Following are some of the problems may arise due to the use of blogs; hence library staff has to be careful about these aspects,  Copy right issues related to information being published on a blog.  Confidentiality of information. CONCLUSION Michael Casey’s vision was a with the advent of Library 2.0, the transformation of librarian’s role and library services that the shift would result in taking the traditional library to the next level of course the virtual library. Especially, Blog platforms provide easy and convenient website management and can be used to produce attractive websites with great features. It could be used in Libraries to provide Modern Library Services. So that Librarian could reach & attract the Users towards Library. As Blog is visible to the world, Librarians could expose the Library Resources, Services & Activities to the World. Thus, Web 2.0 tools are important tools for Librarians to provide right services to the right users. REFERENCES [1] Abungu, P. S. (2012). Application of Web 2.0 tools in Delivering Library Services: A Case of selected Libraries in Tanzania. Retrieved 2015, from SCECSAL XXth Conference hosted by KLA on 4th-8th June 2012: https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&cad=rja&uact=8&ved=0CEMQFjAF&url= http%3A%2F%2Fwww.researchgate.net%2Fprofile%2FPaul_Muneja%2Fpublication%2F258831592_Application_of_ Web_2.0_tools_in_Delivering_Library_Services [2] Bansode, S. Y., & Pujar, S. M. (2008). BLOGS: A Online Tool for Library Services . Retrieved 2015, from International CALIBER-2008: http://ir.inflibnet.ac.in/dxml/bitstream/handle/1944/1269/48.pdf?sequence=1 [3] Chua, A. Y. (2011). e journals. Retrieved 2015, from Evidence Based Library and Information Practice: http://ejournals.library.ualberta.ca/index.php/EBLIP/article/view/9474/7860 [4] Karami Tahereh, T. O. (2006). THE 27TH ANNUAL CONFRENCE: Embedding Libraries in Learning And Research. Retrieved 2015, from eprints: http://eprints.rclis.org/10824/1/IATUL_Paper2.pdf [5] Kulkarni, S. N. (2003). Web OPAC: An Effective Tool for Management ofReprints of ARI Scientists. Retrieved 2015, from Inflibnet: http://ir.inflibnet.ac.in/dxml/bitstream/handle/1944/225/cali_56.pdf?sequence=1 [6] Prasad, H. N., & Singh, S. (2008). Blogs Application in Developing Library & Information Services. Retrieved 2015, from International CALIBER-2008: http://ir.inflibnet.ac.in/dxml/bitstream/handle/1944/1273/49.pdf?sequence=1 [7] http://www.masternewmedia.org/independent_publishing/blogging-how-to-blog/guide-to-publishing-first-blog20071104.htm [8] http://www.whatisrss.com/ [9] http://en.wikipedia.org/wiki/SMS [10] http://en.wikipedia.org/wiki/Web_2.0 [11] http://en.wikipedia.org/wiki/Blog [12] http://librarykvpattom.wordpress.com/ 490 ISBN 1-63102-455-8 APPLICATION AND USES OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) IN ACADEMIC LIBRARY, SHIATS, ALLAHABAD: A STUDY Monisha Gray | Assistant Librarian | Sam Higginbottom Institute of Agriculture Technology & Sciences | Allahabad | monisha.gray@shiats.edu.in Abstract: The papers also determine the satisfaction level of users regarding research work, online database services and infrastructure facilities. Suggestions have been given to make the service more beneficial in the library users of FHS Shiats. Allahabad. Information Communication Technology (ICT) in fact is changing the way the librarian view information sources. Professional associations, research organizations publisher is treated as the speedy, accurate and effective way of communication among academic, research, executives and business communities. Hence, internet for information service/ current awareness service in the library is gaining momentum and becoming popular too. It is also true that internet has become a part of library environment today. Information and Communication Technology (ICT) has transformed library services globally. Most current information are recorded in electronic format, ICT has also contributed immensely to the performance of librarians in the discharge of their duties such as in cataloguing, reference services, circulation management, serials control etc. ICT has contributed to the library in the following specific ways. Keywords: ICT, Social Media, Mobile, Library. INTRODUCTION ICT has changed the traditional methods of library activities and services providing new dimensions for teaching, learning and research in higher educational institutions. With the help of ICT tools, it is possible to store, retrieve, disseminate and organize information by creating websites and databases. Information is now published both electronically and by print making it accessible to users according to their demands. It is important to assess the ICT applications in library and information centers in the 19 context of changing user needs. This section includes studies related to the application of ICT in libraries both in India and abroad. Now in the present time user information software also working the fist user is in a Delhi and second user in Allahabad that operate computer or laptop. This is very important for a Academic Libraries & users Information and communication technology (ICT). It plays a vital role in bringing about changes This age of ICT the role of the public library has changed drastically in developed countries. They are providing more cultured and user friendly information services to their patrons. In this view, Academic libraries in developing college & universities are using these facilities very slowly due to shortage of funds, skilled manpower and other support. REVIEW OF LITERATURE Hussain and Abalkhail (2013) The study clearly revealed that the majority of users of the library used the circulation service. The study found that a majority of research scholars consult the reference books for research work followed by undergraduate students who used the library circulation service. Antherjanam & Sheeja (2008) carried out a study to find out the impact of ICT on LIS and its major shifts and practices in university library of CUSAT. The major findings of the study were:(a) Users are making very good use of the available ICT facilities.(b) With the help of telephone, e-mail, Fax etc. reference queries are answered faster than before.(c) SDI, CAS etc. are also done faster than before.(d) Issue & return of books, renewals are done faster than before.(e) Book selection, price checking are also done very efficiently using ICT.(f) About 90% of the users of the library search OPAC for getting information about the where about of books. NEED FOR THE STUDY ISBN 1-63102-455-8 491 Application And Uses Of Information Communication Technology (ICT) In Academic Library, SHIATS, Allahabad: A Study Education is a lifelong process therefore anytime anywhere access to it is the need Information explosion is an ever increasing phenomena therefore there is need to get access to this information Education should meet the needs of variety of learners and therefore IT is important in meeting this need It is a requirement of the society that the individuals should posses technological literacy We need to increase access and bring down the cost of education to meet the challenges of illiteracy and poverty-IT is the answer     OBJECTIVES OF THE STUDY To find out the applications of ICT skills in LIS professionals to modernize the libraries. To understand how ICT tools can be applied to provide, Innovative services to the users. To analyze the barriers in collection of e-resources in academic libraries. To know the practical opinion of the users and libraries about the application of ICT. METHODOLOGY The study is based on the Primary data collected from the selected Academic Libraries. A Structured questionnaire was designed based on ICT applications the questionnaire was divided into seven major applications of ICT Tools. E-group, e-mail, fax, Internet, Intranet, Mobile Phone, Video Conference, 125 questionnaire was distributed among various Academic Libraries out of which 110 were respondent (88%).Both primary and secondary data were used for the present research. Primary data have been collected from the users of colleges and university library (Academic Libraries). The Secondary data were collected from the web sites and Prospectus of institutions, Research journals, Magazines, Reports and conference proceedings. ICT-Based User Services ICT has been a means to bring quality services. Systematic planning of its introduction and application will assure that the technology based information services are sustainable, and enhances the ability of library. In the present scenario, the library and information centers at global level are able to provide access to IT based services. Use of ICT in libraries enhances users satisfaction. It provides numerous benefits to library users. Some of the benefits are:       Provide speedy and easy access to information Provides remote access to users Provides round the clock access to users Provides access to unlimited information from different sources Provides information flexibility to be used by any individual according to his/her requirements Provides increased flexibility Facilitates the reformatting and combining of data from different sources Libraries are also providing various ICT-based services to their user, including the following       492 Electronic document delivery Networked information resources Delivery of information to user desktops Online instructions Provision of Web access to OPACs Online readers advisory services ISBN 1-63102-455-8 National Conference on Library Information Science and Information Technology for Education Fig. 1: ICT Tools Data Analysis The study was carried out in ten Academic Libraries the information to these respondents is shown in table 1. S.No. Description Total Percentage 1 Engineering Shiats. Allahabad 6 60% 2 FHS Shiats. Allahabad 4 40% 100% Table 1. Information about Respondents Seven major applications of ICT Tools, such as e-group, e-mail, fax, Internet, Intranet, Mobile Phone, Video Conference. Were identified for this study and same is shown in table 2.The table and the figure shows all the respondent uses all the facilities but the highest is mobile phone with (90%) and e-mail (89.09), Intranet (86.36) and Internet with (81.81). The use of Mobile Phones is high due to its fast and easy way of communication. S.No 1 2 3 4 5 6 7 Name of ICT Tool E-Group E-mail Fax Internet Whats up Mobile Phone Video Conference No. of 86 98 40 90 90 99 30 Percentage 78.18 89.09 36.36 81.81 86.36 90 27.27 Rank 5 2 6 4 3 1 7 Table 2.ICT tools for Academic Libraries LIBRARIAN YES NO TOTAL 17 15 32 53% 47% 100 Table 3. Librarian Use a ICT Tools To understand whether the functions and objectives of the library laid down or not for that we asked this question to the librarians of 32 colleges and 53% librarians said it has been laid down whereas 47% librarians said it not being laid down. Here it is very difficult to get exact conclusion because the variation of data is quite close in nature. ISBN 1-63102-455-8 493 Application And Uses Of Information Communication Technology (ICT) In Academic Library, SHIATS, Allahabad: A Study ICT helps librarian to share information with patrons and students in the easiest way for digital library environment. Librarian can use in three broad activities in library and information services. The major three are Information communication, Knowledge distribution n and knowledge organization Name of ICT Tool E-Group E-mail Fax Internet Whats aap Mobile Phone Video Conference Male 30 50 20 40 14 53 15 Female Total 28 55 20 45 16 55 13 Total 58 105 40 85 30 108 28 Percentage 52.72 95.45 36.36 77.27 27.27 98.18 25.45 Table 3 is a Cross tabulation of ICT Tools and gender and shows that female professionals are using mobile phones more than other media and female respondent uses live video Conference. CONCLUSIONS The application of ICT tools are increasing in Academic Libraries especially in Engineering College Shiats. Allahabad and FHS Shiats. Allahabad due to the development of technologies. According to the respondent ranking Mobile phone is in 1st position due to easy access at any time anywhere. There is a Lack of LAN facility in most of the Academic Libraries so the usage of Internet is less which was shown in the table 3.The Academic Libraries must increase the Video Conferencing facilities which enables the users to maximize the usage of ICT based activities and services. It has been observed that very few libraries are offering Video conferences it is due to fewer consortiums. If consortium with other libraries will increase the usage of Video conferencing will also increase. Information is considered as fifth need of human in ranking. In this paper the study has been done a research for application of Information communication Technology (ICT) and uses of ICT tools in Academic Libraries, to find out the application of ICT skills in SHIATS, Allahabad Library. REFERENCES [1] Ahmad, N., & Fatima, N. (2009). Usage of ICT products and services for research in social sciences at Aligarh Muslim University. DESIDOC journal of Library and Information Technology, 29(2):.25-30. [2] Is ICT Infrastructure capable to accommodate standardized library management systems? : Case studies of library automation from public sector universities in Islamabad (Pakistan). Available:http://www.crl.edu.ac.in/ical09/papers/indes_files/ical-44_191_402_1_RV.pdf [3] ivakumaren, K.S; Geetha, V.; and jeyaprakash, B., “ICT Facilities in university Libraries: A Study” (2011). Library philosophy and Practice (e-journal). Paper 628. http://digitalcommons.unl.edu/libphilprac/628 [4] A. Saleem [et al.] (2013). Application and Uses of Information Communication Technology (ICT) in Academic Libraries: An Overview, International Journal of Library Science 2013, 2(3): 49-52 494 ISBN 1-63102-455-8