Return to relevance

2015 ◽  
Vol 31 (1) ◽  
pp. 2-6
Author(s):  
Robert Fox

Purpose – In order to continue to respond to patron needs in a relevant way, it is necessary to continuously reevaluate the central message that the library website is intended to convey. It ' s necessary to question assumptions, listen to user needs, and shift our paradigm to make the library web presence as effective as possible. Design/methodology/approach – This is a regular viewpoint column. A basic literature review was done prior to the column being written. Findings – The library Web site remains, in many respects, the “first face” of the library for patrons. To remain relevant, traditional methodologies used in library science may need to be set aside or catered to the needs of the patron. Originality/value – Various methods regarding design philosophy are explored which may be of use to information professionals responsible for the design and content of the library Web sites.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Katie Elson Anderson

Purpose This paper aims to provide information and promote discussion around the social media platform TikTok. Design/methodology/approach Research, literature review. Findings Libraries and library and information professionals should be aware of the potential of TikTok for engagement and information sharing. Originality/value Adds to the research on the social media platform TikTok.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Devendra Dilip Potnis ◽  
Joseph Winberry

PurposeThis literature review aims to identify conscious, intentional, repetitive and transferrable information-related decisions and activities (i.e. information practices) for individuals to alleviate their information vulnerability. Information vulnerability refers to the lack of access to accurate, affordable, complete, relevant and timely information or the inability to use such information, which can place individuals, communities or society at disadvantage or hurt them.Design/methodology/approachConceptual literature review.FindingsThis review presents seven conscious, intentional, repetitive and transferrable information practices to alleviate information vulnerability.Practical implicationsDue to the transferability potential of the seven information practices, diverse populations in varied contexts could refer to, adapt and benefit from appropriate combinations of information practices and their manifestations. The framework can be used by individuals for alleviating information vulnerability. Thus, this paper responds to the call for conducting action-driven research in information science for addressing real-world problems. Information professionals can help individuals select and implement appropriate combinations of seven information practices for alleviating information vulnerability.Originality/valueWe propose (1) a parsimonious, episodic framework for alleviating information vulnerability, which depicts the inter-relationship among the seven information practices and (2) a three-dimensional plot with information access, use and value as three axes to map the manifestation and outcome of alleviating information vulnerability.


2009 ◽  
Vol 19 (4) ◽  
pp. 408-424 ◽  
Author(s):  
Anssi Tarkiainen ◽  
Hanna‐Kaisa Ellonen ◽  
Olli Kuivalainen

PurposeThe purpose of this paper is to increase understanding of the effects of web site extension on the parent‐magazine brand in the context of experiential goods, and to identify factors that are related to success.Design/methodology/approachThe paper focuses on the relationship between consumers' experiences on magazine web sites and their loyalty towards the print magazine.FindingsThere are different ways in which the web site can complement the print version. The first mechanism is related to engaging in more frequent communication with the magazine's readers, and the second is related to consumer‐initiated interaction between other readers. In both cases something is offered that cannot be obtained from the print magazine, but is assumed to complement it.Originality/valueThe paper increases understanding of brand extensions with regard to experiential goods, but more research is needed on the factors that are related to extension success.


2015 ◽  
Vol 33 (6) ◽  
pp. 1163-1173 ◽  
Author(s):  
Kobra Taram ◽  
Abbas Doulani

Purpose – The purpose of this paper is to explore webometric analysis of keywords and expressions of the biochemistry field of study via LexiURL Searcher. Design/methodology/approach – Interfaces for assisting users with information access have received considerable attention. Along with the extraction of data on Web sites for webometric purposes (e.g. link analysis, ranking of Web sites, etc.), LexiURL Searcher presents some information on the arrangement of links among different Web sites. Such capability enables users to identify one or more Web sites around their intended subject and, accordingly, explore all Web sites linked with their identified Web site(s). LexiURL Searcher has preceded webometric analysis by considering the main expressions and keywords derived from the MeSH database. Findings – The worldwide survey indicated that links from countries such as England, Japan, Germany, Australia and Canada were among the Web sites that are most used in biochemistry. Alternatively, other countries such as Singapore, Thailand and Poland had the most advantageous links to the outside world, whereas South Africa, New Zealand and The Netherlands had the least link effect. Biochemistry, being a specialized domain, would benefit greatly from site linking and would provide users the most assistance in information processing. Originality/value – Most webometric studies remain on the level of link analysis and Web site statuses; however, this paper gives information on the common thread Web sites based on a standard thesaurus.


2016 ◽  
Vol 44 (1) ◽  
pp. 1-6
Author(s):  
Mike McGrath

Purpose – This paper aims to review the current library and information science (LIS) literature for document supply, resource sharing and other issues such as open access (OA) that have an impact on the service. Design/methodology/approach – The approach is based on the scanning of about 150 journals, reports, Web sites and blogs. Findings – Nearly all material reviewed is freely available, continuing the trend of increasing OA. As always, these days, much is happening on the OA front. Big deals and Scholarly Communications are reviewed along with ebooks, users and of course ILL. Originality value – The only regular literature review that focuses on interlending, document supply and related issues.


2015 ◽  
Vol 12 (1) ◽  
pp. 14-30
Author(s):  
Tomoko Kajiyama ◽  
Isao Echizen

Purpose – The purpose of this paper is to propose an effective educational system to help students assess Web site risk by providing an environment in which students can better understand a Web site’s features and determine the risks of accessing the Web site for themselves. Design/methodology/approach – The authors have enhanced a prototype visualization system for helping students assess Web site features and use them to identify risky Web sites. The system was implemented with our graphical search interface for multi-attribute metadata called “Concentric Ring View” and was tested using 13,386 actual and dummy Web sites and 11 Web site attributes. Findings – The testing revealed several distinguishing attributes of risky Web sites, including being related to “play”, having monotone colors, having many images, having many links and having many pages with much text in smaller font size. A usability test with 12 teenaged female students demonstrated that they could learn to identify some features of risky Web sites. Originality/value – As students cannot live in a safe cyberspace environment forever, they should be taught how to identify risky Web sites. We proposed an educational system to help students assess Web site features and identify high-risk Web site and verified the effectiveness of this system.


2016 ◽  
Vol 34 (6) ◽  
pp. 927-944
Author(s):  
Mehdi Dadkhah ◽  
Shahaboddin Shamshirband ◽  
Ainuddin Wahid Abdul Wahab

Purpose This paper aims to present a hybrid approach based on classification algorithms that was capable of identifying different types of phishing pages. In this approach, after eliminating features that do not play an important role in identifying phishing attacks and also after adding the technique of searching page title in the search engine, the capability of identifying journal phishing and phishing pages embedded in legal sites was added to the presented approach in this paper. Design/methodology/approach The hybrid approach of this paper for identifying phishing web sites is presented. This approach consists of four basic sections. The action of identifying phishing web sites and journal phishing attacks is performed via selecting two classification algorithms separately. To identify phishing attacks embedded in legal web sites also the method of page title searching is used and then the result is returned. To facilitate identifying phishing pages the black list approach is used along with the proposed approach so that the operation of identifying phishing web sites can be performed more accurately, and, finally, by using a decision table, it is judged that the intended web site is phishing or legal. Findings In this paper, a hybrid approach based on classification algorithms to identify phishing web sites is presented that has the ability to identify a new type of phishing attack known as journal phishing. The presented approach considers the most used features and adds new features to identify these attacks and to eliminate unused features in the identifying process of these attacks, does not have the problems of previous techniques and can identify journal phishing too. Originality/value The major advantage of this technique was considering all of the possible and effective features in identifying phishing attacks and eliminating unused features of previous techniques; also, this technique in comparison with other similar techniques has the ability of identifying journal phishing attacks and phishing pages embedded in legal sites.


2012 ◽  
Vol 30 (3) ◽  
pp. 457-471 ◽  
Author(s):  
Kristina L. Southwell ◽  
Jacquelyn Slater

PurposeThe purpose of this paper is to discover whether digitized materials from special collections libraries can be accessed using screen reader technology.Design/methodology/approachThe researchers looked at 69 US academic library web sites from the ARL in 2011 to determine whether textual materials sampled from their digitized special collections were readable with screen reader technology.FindingsThe researchers found that 42 percent of the sampled digital collection items are screen‐readable, while 58 percent are not readable.Research limitations/implicationsScreen readers are not evaluated against one another for effectiveness with digital collections. Library web site pathways to digital special collections were not evaluated with screen readers.Originality/valueThis is the first study to examine the accessibility of digitized special collections materials to persons using a screen reader.


2006 ◽  
Vol 19 (2) ◽  
pp. 84-86
Author(s):  
Jennifer Paustenbaugh

PurposeThe purpose of the paper is to provide a tribute to the life and work of library fund‐raiser Gwen Leighty.Design/methodology/approachThe paper uses personal knowledge and references to Academic Libraries Advancement and Development Network (ALADN) and LIBDEV web sites.FindingsThe paper finds that fundraising is connecting with people and the journey that each development officer must make while raising funds for their library.Originality/valueThe paper presents a brief history of ALADN and the valuable contribution one person made to the cause of library fund‐raising.


2020 ◽  
Vol 37 (8) ◽  
pp. 7-9
Author(s):  
Israel Odede

Purpose The paper aims to critically examine the bibliographic utility as a roadmap to increase library consortia and provide an insight into a new library consortia strategy that integrates librarians into a system of sharing both resources and knowledge. Design/methodology/approach This study adopted a literature review approach with a focus on bibliographic utility as a necessary prerequisite for effective library consortia, which is a paradigm shift from the concept of individual ownership to a collective access of distributed network resources and knowledge. Findings The reviewed literature indicated that significant bibliographic utilities and integrated library systems are factors that shaped and developed consortia activities in libraries. Originality/value The bibliographic utility has limited literature, and a few published scholarly studies have combined bibliographic utility and library consortia as strategies to share resources and knowledge


Sign in / Sign up

Export Citation Format

Share Document