By Masha Garibyan, Simon McLeish, John Paschoud
With the fast elevate within the use of digital assets in libraries, coping with entry to on-line details is a space many librarians fight with. This useful e-book is the 1st to provide an explanation for the foundations at the back of entry administration, the to be had applied sciences and the way they paintings. It offers special case reviews describing how entry administration is being carried out at organizational and nationwide degrees within the united states and Europe, and serves as a realistic advisor to the assets to be had to assist plan, enforce and function entry administration in libraries
Read Online or Download Access and identity management for libraries : controlling access to online information PDF
Best library management books
Please input product description
Numerical facts is in all places and the way top to address and leverage it's a transforming into main issue within the educational global quite often and the tutorial library international specifically. Libraries usually are not simply storehouses and key contacts for library buyers in getting access to numbers, yet also are creditors and clients in their personal facts, that's essential to the functioning of the library itself.
Giving teenagers a room in their personal within the library - one that is enjoyable, fashionable, and unlibrary-like - is a sure-fire method to draw this crucial and fast-growing inhabitants in. teenager areas outlines a step by step plan for making a fresh area or making over an latest one. Drawing from surveys and her personal own youngster advisory panel.
This paintings fulfills the necessity for a conceptual and technical framework to enhance figuring out of data caliber (IQ) and data caliber criteria. The which means and useful implementation of IQ are addressed, because it is suitable to any box the place there's a have to deal with facts and concerns similar to accessibility, accuracy, completeness, forex, integrity, reliability, timeliness, usability, the position of metrics etc are all part of details caliber.
- Creating Web-Accessible Databases
- New Directions in Information Organization
- What's in a Word-list? (Digital Research in the Arts and Humanities)
- Book Clubbing!: Successful Book Clubs for Young People
- Accidental Librarian
- New Approaches to E-Reserve. Linking, Sharing and Streaming
Additional info for Access and identity management for libraries : controlling access to online information
The path of least resistance (and hopefully most usefulness) that the authors of this book have therefore taken is to conflate both, and to use the convenient abbreviation ‘IAM’ to describe our topic of identity and access management. Although for a library, identity management could be regarded as merely a means to the end of access management, for any library that is part of a larger organization, such as a university, college or school, it’s quite likely that the registration of members of the organization (students and staff, for example) will be the responsibility of departments and staff outside the library, such as personnel or student registry.
More details on the growth of digital library services in scope and availability are given in Chapter 10. Users may follow a variety of access routes in order to navigate to an online resource that they are entitled to. g. WebCT). Undergraduate students often use online reading lists as the first port of call. g. EBSCOhost, JSTOR). g. Google Scholar) and from there, follow a link directly to the online resource. What needs to be protected, and why There are a myriad of electronic resources and services that a library may provide access to, internal and external, commercial and freely available.
Guenther (2000, 58–60) gives some good tips on making smart licensing decisions. shtml), to help with licensing decisions. Guenther also advises not to be afraid of negotiating any terms that the library is not happy with. However, while licence negotiations are desirable in order to ensure the best possible access for the end-user, sometimes the library has no choice but to agree with licence conditions that it is not happy with for the sake of securing a good deal or benefiting from a consortium or other shared agreement (Buttler, 2003, 71).