scholarly journals Fund Allocations for Information Resources in China’s Key Universities

1999 ◽  
Vol 60 (2) ◽  
pp. 174-178 ◽  
Author(s):  
Jin-Chuan Ma ◽  
Sha Li Zhang

Libraries in China’s key universities will be the bases for collecting and managing information resources that serve their own user communities and will be an integral part of information resources for the China Academic Library and Information System as well. Allocating adequate materials funds from the university operational budget is essential if these libraries are to adequately support their learning and research communities. This article examines the current situation these libraries are facing and makes proposals for changes.

2021 ◽  
Vol 14 (1) ◽  
pp. 87-103
Author(s):  
Yosefina K.I.D.D Dhae

This  research aims to present the results of the study about the information management practice through conducting an Information Audit (IA). The research was conducted at Language Centre of Nusa Cendana University in Kupang – East Nusa Tenggara. The information audit was conducted to examine (1) the existing information resources available to the staf of Language Centre and (2) to find out the information problems faced by the staf in the Language Centre.Case study research methodology was applied with document analysis, questionnaire and interviews were used for data collection. All data were analysed manually, where data from questionnaire was generated directly to Microsft Excel to create a list of information resources. Further, Thematic analysis method was used to analyse the interview data to find general themes of information problem. Study found that documents, websites,and information system were the information resources used by the staf. While, People, Timeliness, and Technology were the main information problems faced by the staf. This study recommended that Language Centre must create an information policy, conduct a digital literacy or computer training for the employees to improve their performance in using technology and create an integrated information system. It is also important that university can also conducting information audit for whole units, faculties in Undana in order to create a general information policy for university to have a better information management practice as well as to help the university to achieve its strategic goals. Keywords: Information Management, Information Audit, Information Resources, Case Study,                             Information problems.  


Author(s):  
Elaine Wei San Kong ◽  
Dickson K. W. Chiu ◽  
Kevin K.W. Ho

In recent years, social media have had a vast number of users and attracted academic libraries to use this new media to connect with their user communities. It allows librarians to communicate and share information with, and even provide services to users. This study examines the Pao Yue-kong Library at the Hong Kong Polytechnic University (PolyUL) that has been using social media to promote their information resources and services. However, throughout websites observations and tracking records on Facebook, Twitter, and YouTube of the PolyUL, it was found users are not as numerous as other commercial organizations. Some recommendations were suggested to the PolyUL for enhancing communication with its users.


Author(s):  
Ramneek Singh ◽  
Amrit Kaur

Information seeking is a fluid and situation dependent activity where a seeker’s actions are influenced by access to information, perceived quality, and trust in the information source. The situation is more intense if the information seeker is a physically disabled person. This demands a call for a regular study and development of information system and management of information services for persons with disability The University of Delhi has more than 1200 students and teachers with disabilities in its various colleges and departments. Very little is known about the techniques employed by them when looking for information, what kinds of source formats they prefer to use and how these sources are used, what barriers they confront, how they feel about the process, and how they can be helped to better exploit the information resources available to them. This chapter investigates and finds the answers to the above questions by using survey methods of research. It also incorporates the use of information and assistive technology for information sought by the physically challenged students and teachers.


2018 ◽  
Vol 63 (1) ◽  
pp. 12
Author(s):  
Serhii D. Bushuiev ◽  
Mykola I. Tsiutsiura

The work is devoted to the development of an information system that would consider the specific characteristic features of processes for a particular higher education institution (HEI), rather than those offered by existing systems that developed for HEI with other (personal) needs. The important thing is that the information system of IT "HEC" is constantly evolving, increasing and modifying its ability to ensure and improve the management of the University. The information system must perform functions related to the improvement of decision support processes in the analysis, regulation and forecasting of the HEI. The system must solve the problems associated with the collection, processing and storage of current and accumulated information in the data banks; with the computerization of the document circulation of an educational institution; with ensuring open access to information resources of an educational institution and a number of equally important activities of the University.


Author(s):  
M. V. Noskov ◽  
M. V. Somova ◽  
I. M. Fedotova

The article proposes a model for forecasting the success of student’s learning. The model is a Markov process with continuous time, such as the process of “death and reproduction”. As the parameters of the process, the intensities of the processes of obtaining and assimilating information are offered, and the intensity of the process of assimilating information takes into account the attitude of the student to the subject being studied. As a result of applying the model, it is possible for each student to determine the probability of a given formation of ownership of the material being studied in the near future. Thus, in the presence of an automated information system of the university, the implementation of the model is an element of the decision support system by all participants in the educational process. The examples given in the article are the results of an experiment conducted at the Institute of Space and Information Technologies of Siberian Federal University under conditions of blended learning, that is, under conditions when classroom work is accompanied by independent work with electronic resources.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2015 ◽  
Vol 31 (2) ◽  
pp. 76-86 ◽  
Author(s):  
Somaly Kim Wu ◽  
Heather McCullough

Purpose – The purpose of this paper is to presents the very recent development of e-journal publishing services at the University of North Carolina (UNC) at Charlotte. In 2011, the J. Murrey Atkins Library at UNC Charlotte created a new unit in the library, the Digital Scholarship Lab (DSL), which partners with faculty and graduate students in the use of digital and networked research tools to create, disseminate and store new knowledge. E-journal publishing and hosting are among the suite of services offered by the DSL, and we currently publish three journals (https://journals.uncc.edu/). Design/methodology/approach – This report provides an overview of the context of our library’s decision to begin publishing journals, including a discussion of our university’s becoming more research-intensive, our university system mandating increased efficiencies and sharing research with the state citizens, and the library’s own goals of raising awareness of and supporting open access. Also outlined are the technical and procedural choices made, important activities undertaken to develop, define and publicize the new services, campus response to the service and next steps. Findings – This report provides detailed accounting of how a large academic library implemented an electronic publishing service to support open access scholarship. Important activities such as marketing communication, policies development and technical/procedural activities are defined and results described. The report provides observation and lessons learned for academic libraries in development and support of electronic journals. Originality/value – Library as the publisher is a new concept. This report will be of interest to many libraries who are considering offering publishing services and to libraries that currently offer publishing services.


Sign in / Sign up

Export Citation Format

Share Document