LIS 454 Class 9 - PowerPoint PPT Presentation

1 / 28
About This Presentation
Title:

LIS 454 Class 9

Description:

White Paper on Electronic Journal Usage Statistics ... Was that the Rubicon, Lethe, or Styx we just crossed? Access conditions for E-content. ... – PowerPoint PPT presentation

Number of Views:52
Avg rating:3.0/5.0
Slides: 29
Provided by: chap3
Category:
Tags: lis | class | lethe

less

Transcript and Presenter's Notes

Title: LIS 454 Class 9


1
LIS 454 Class 9
  • Impact of networked electronic resources on
    public services
  • Access management
  • Usage statistics

2
E-journals and the international arena
E-journals
Lack of discussion
Access
Developing nations
Industrial nations
Discussion levels
Discussion levels
Language
Economics, archival policies, homogeneity of
collections
3
Resources
  • Coalition for Networked Information
  • Liblicense Licensing Digital Information
  • http//lib.colostate.edu/tutorials/databases.swf
  • Gold Rush
  • White Paper on Electronic Journal Usage
    Statistics
  • Web Analytics Managing the Digital Enterprise
    Professor Michael Rappa
  • ICOLC Statement on Electronic Information

4
Access management
  • It is about who should have access to what and
    how access should be managed.
  • For example, the access needs for ARL
    institutions are impressive. Expenditures on
    e-resources are huge.

5
Licensing-Usage-Access
Licensing
Access
Usage
Budget and finance
Library instruction
Librarians expertise
Library staff
End-user interest
Research trends and curricula
Standards and benchmarks
6
Hunter, K. (2005). Access management challenging
orthodoxies. Journal of Library Administration,
42(2).
  • Increased use Increased value (USAGE)
  • If value increases, that value should be
    reflected in some way financiallyyou should be
    able to monetize the increase in value.
  • Every year I expect to have more use and more
    functionality and perhaps even more content (at
    least within the same set of titles) for the same
    or less money

7
The Bad according to Hunter.
  • Elsevier is big ()therefore is accused of
    monopoly power. Microsoft is big and therefore
    bad. How about IBM? Or the State of CA, which I
    believe has 25 of the members of the National
    Academy of Sciences? Heck, what about the USA,
    which typically produces 35 and 45 of the
    research in most disciplines? Surely, that means
    that the U.S is big, monopolistic, and bad.

8
A Snapshot in Time ARL libraries and electronic
journal resources/ Mary Case/2004
  • Between 1994/95 and 2001/2002 expenditures on
    e-resources by research libraries grew 400.
  • E-journals account for 92 of the money spent in
    2001/2002.
  • Total number spent in 2001/2002 almost 1.4
    million.
  • The most common duration of license agreements
    was one year.

9
Beware of The Big Deal
  • Journal Packages
  • Multiple-year subscriptions
  • Cancellation limitation clauses

10
Usage strongly related to access management
  • ILL
  • Electronic reserves (a privilege!)
  • Course packs (almost like selling crack)
  • Distance education
  • Remote access

11
Non disclosure clauses
  • They prohibit subscribers from comparing terms to
    determine if they actually received the best deal
    available.
  • State laws may prohibit those clauses
  • The best Anti-consortia tool invented.

12
Access management
  • It requires a deep understanding of licensing,
    its conditions, and vocabulary.
  • Appendix D. Data Element Dictionary. Electronic
    Resource Management. The Report of the DLF
    Initiative.
  • Appendix E. ERMS Data Structure. Electronic
    Resource Management. The Report of the DLF
    Initiative.

13
Some innovations Shibboleth
  • Shibboleth Open source standards-based access
    management solution based on SAML.
  • It provides access to electronic content on the
    basis of individual users attributes (staff,
    employee, student, alum, etc.) rather than
    personal credentials of the individual, network,
    or generic password.

14
Advantages
  • More clear and simplified user authentication.
  • Keeping the privacy an important feature of
    access to information

15
Managing access also involves security
  • Who may hack a library literature database?
  • Identification
  • Authentication
  • Authorization
  • Accountability

16
Some basic security principles
  • Are the people using their services who they
    claim to be?
  • Are they members of our community?
  • Do they have permissions to use these services?
  • Is their privacy being protected? (Why is this
    important?)

17
Some basic words
  • Identification The act of pre-assigning a unique
    marker or token (username) to an individual, etc.
  • Authentication The act of validating that an
    entity producing a token is the one to which the
    token was assigned.

18
Some basic words
  • Authorization The act of ensuring that the
    entity is afforded access only to the services
    and data required to support allowed tasks.
  • Accountability appropriate administration of
    identification, authentication, and
    authorization, ensuring that only the authorized
    entity can exercise its individual authority.

19
Electronic journal usage stats (Luther)
  • Lack of comparable data ( you are hiding
    something from me)
  • Lack of context (how should we measure activity?)
  • Incomplete usage data (data in various forms and
    formats)
  • Marketing ( The infomercial factor)
  • Content Provided (delays and embargos)
  • Interface affecting usage (user experience)

20
Electronic journal usage stats
  • Economic model (Journal title unit of analysis)
  • User privacy (are you being monitored? The legal
    obligation of protecting the users identity).
  • Login in as a user.

21
My profile some strategies
22
Library issues
  • Budget justification
  • What is it?
  • Library instruction for electronic resources
  • Impact on selection
  • What is the impact about?
  • Current holding are too limited and users select
    articles from databases no available at the
    library
  • User driven vs. publisher driven

23
Julia Blixrud ARL and academic libraries
  • The problem inconsistent and unreliable data on
    electronic use.
  • Collection of data to determine if the increasing
    amount of money being paid for electronic
    resources was in fact well-spent.

24
Data for what?
  • Funding libraries need to prove that
    expenditures are justified.
  • Funding libraries need to demonstrate that users
    want and use the electronic information and
    services being provided.
  • Funding libraries have to compete for resources.
  • Benchmarking purposes

25
Managerial decisions
  • What difference does it make? Administrative
    clarity regarding the assessment program. (This
    is a management issue).
  • Libraries need to make data available to those
    who do administrative decision making).

26
Read (choose only three or pick an oucast),
integrate very graciously, and email comments
for next class.
  • Peter, T. (2003). Was that the Rubicon, Lethe, or
    Styx we just crossed? Access conditions for
    E-content. Library Collections, Acquisitions
    Technical Services, 27, 213-223.
  • (2004). Carrico, J. Licensed to ILL A beginning
    guide to negotiating e-resources licenses to
    permit resource sharing. Journal of library
    Administration, 40 (1/2), 41-54.

27
More chances to be gracious
  • Hunter, K. (2005). Access management challenging
    orthodoxies. Journal of Library Administration,
    42 (2), 57-70.
  • Fowler, D. C. (2005). Licensing An historical
    perspective. Journal of Library Administration,
    42 (3/4), 177-197.
  • Gerhard, K. (2005). Pricing models for electronic
    journals and other electronic academic materials
    The state of the Art. Journal of Library
    Administration,(3/4), 1-25.

28
As a reference only
  • Emery, J. (2005). Is our best good enough?
    Educating End-Users about licensing terms.
    Journal of Library Administration, 42 (3), 27-39.
Write a Comment
User Comments (0)
About PowerShow.com