scholarly journals When One Plus One Remains One

2014 ◽  
Vol 58 (4) ◽  
pp. 265 ◽  
Author(s):  
Elaine Mael

Following the trend for library mergers of various configurations, the recent union of a state university with a private specialized university, each with its own library, provides insight into this ongoing phenomenon. The issues involved in such a vision occur on many fronts, including administrative decisions, technological implementation, physical plant management, and staff commitment. All of these require considerable strategic planning, sometimes in the shadow of time constraints. The author addresses the challenges, the benefits, and the potential problems resulting from the merger of two university libraries and the implications for other libraries considering a similar amalgamation.

2004 ◽  
Vol 23 (2) ◽  
pp. 79-91
Author(s):  
Adrian Carr ◽  
Rita Durant ◽  
Alexis Downs

This paper proceeds from the widespread assumption – apparently, a truism – that the longevity of corporations is very much beholden to the success in their processes of strategic planning and the manner in which they learn from, and adapt to, those processes. The predominant strategic paradigm used in corporations, that of the rational planning school, assumes that language is transparent and time is linear. Such assumptions don't hold up in a complex world. Emergent strategy [8,50,63] has the potential to address the current challenges of organizations by shifting the language and talk about strategizing. Rather than talk about the challenges faced by top managers [14,25], emergent strategizing, for example, talks of “communicative interaction” and “focusing attention on what [is] going on now” [64, p. 158]. Mintzberg's disdain for the divination techniques of the Delphi Oracle [51, p. 238] notwithstanding, we suggest that characteristics of the Delphic Oracle [52] mirror many of those of both emergence and strategy and, therefore, may offer insight into the effective development of emergent strategies at lower and middle levels of the organization. Our method for understanding emergence is abduction, as developed by Charles Franklin Peirce and the pragmatists. A playful reinterpretation of the Delphic Oracle can provide a way to imagine the roles of organizational actors in strategic emergence.


2005 ◽  
Vol 24 (4) ◽  
pp. 163 ◽  
Author(s):  
Laura Tull

<span>In the fall of 2002, Ohio State University along with the University of Washington, the University of Western Australia, Washington State University, and Glasgow University entered into a development partnership with Innovative Interfaces. The goal was to develop a module to manage electronic resources, integrated into Innovative’s Millennium library system. The product, Electronic Resource Management (ERM), became available in 2004 and is based on the work of the Digital Library Federation Electronic Resources Management Initiative. This article focuses on one aspect of ERM, the integration of the module with the Web OPAC, and describes how the Ohio State University Libraries replaced a back-end database with ERM to support lists of electronic resources on their Web site.</span>


2019 ◽  
Author(s):  
Mia Partlow ◽  
Karen Ciccone ◽  
Margaret Peak

Presentation given at TRLN Annual Meeting, Durham, North Carolina, July 1, 2019. The Hunt Library Dataspace was launched in August 2018 to provide students with access to the tools and support they need to develop critical data skills and perform data intensive tasks. It is outfitted with specialized computing hardware and software and staffed by graduate student Data Science Consultants who provide drop-in support for programming, data analysis, statistical analysis, visualization, and other data-related topics.Prior to launching the Dataspace the Libraries’ Director of Planning and Research worked with the Data &amp; Visualization Services department to develop a plan for assessing the new Dataspace services. The process began with identifying relevant goals based on NC State University and the NC State University Libraries’ strategic priorities. Next we identified measures that would assess our success in relation to those goals. This talk describes the assessment planning process, the measures and methods employed, outcomes, and how this information will be used to improve our services and inform new service development.


2018 ◽  
Vol 29 (1) ◽  
Author(s):  
Marisa Zapata ◽  
Stephen Percy ◽  
Sona Karentz Andrews

Propelled by many factors, including a newly appointed Board of Trustees responsible for governance of our university, resource shortages, and enrollment swings, Portland State University embarked on a strategic planning effort in 2014 with the intent of reunifying a divided campus and creating a bold vision for moving forward in the next five years. While committed from the start to goals of diversity and inclusion, the planning process itself generated greater awareness of and commitment to equity—a bolder vision of empowerment that creates a responsibility to understand and mitigate negative, but often unintended consequences of, campus decisions and action—particularly as they impact groups that have experienced institutional racism and injustice. Equity emerged not only as a goal, with intendant initiatives for action, but also as a commitment to conscientious ongoing attention to decision-making that embraces utilization of an equity lens.


2020 ◽  
Author(s):  
Sheryl Chatfield ◽  
Kristen DeBois ◽  
Erin Orlins

Data consists of interview recordings and transcripts housed in the May 4 Archive, established within the Kent State University Libraries in 1990. The archive contains oral history interviews with individuals who were present at events leading up to and including the May 4 shooting. Interviews were largely conducted on campus during memorial activities that occur each year on May 4. Interviewers were archive staff and interviewees consisted of former university students, alumni, faculty, and administrators, and community members, including some individuals who were adolescents in 1970. @font-face {font-family:"MS Mincho"; panose-1:2 2 6 9 4 2 5 8 3 4; mso-font-alt:"MS 明朝"; mso-font-charset:128; mso-generic-font-family:modern; mso-font-pitch:fixed; mso-font-signature:-536870145 1791491579 134217746 0 131231 0;}@font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-536870145 1107305727 0 0 415 0;}@font-face {font-family:"\@MS Mincho"; panose-1:2 2 6 9 4 2 5 8 3 4; mso-font-charset:128; mso-generic-font-family:modern; mso-font-pitch:fixed; mso-font-signature:-536870145 1791491579 134217746 0 131231 0;}p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman",serif; mso-fareast-font-family:"MS Mincho"; mso-fareast-theme-font:minor-fareast; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi; mso-fareast-language:JA;}.MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; mso-fareast-font-family:"MS Mincho"; mso-fareast-theme-font:minor-fareast; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi; mso-fareast-language:JA;}div.WordSection1 {page:WordSection1;}


2021 ◽  
Vol 2113 (1) ◽  
pp. 012074
Author(s):  
Qiwei Ke

Abstract The volume of the data has been rocketed since the new information era arrives. How to protect information privacy and detect the threat whenever the intrusion happens has become a hot topic. In this essay, we are going to look into the latest machine learning techniques (including deep learning) which are applicable in intrusion detection, malware detection, and vulnerability detection. And the comparison between the traditional methods and novel methods will be demonstrated in detail. Specially, we would examine the whole experiment process of representative examples from recent research projects to give a better insight into how the models function and cooperate. In addition, some potential problems and improvements would be illustrated at the end of each section.


2019 ◽  
Vol 9 (1) ◽  
pp. 69-74
Author(s):  
A. Naseer ◽  
B. Mini Devi

Rapid changes in information and communication technology require application of managerial techniques, human resource management and integration of several technologies in library and information Centers. The present research aims at studying the extent of job enlargement in selected eight state university libraries in Kerala. Data of the study was gathered from a total of 266 qualified and permanent library and information science professionals. Analysis of data was done using SPSS and Micro Soft excel. The important finding of the research is that there is no significant level of job enlargement among library and information science professionals. It also finds that job enlargement situation of libraries in the universities in Kerala is low and different. The study reveals that there is significant variation in the level of job enlargement among the university libraries in Kerala. The highest level of job enlargement is found in Sree Sankaracharya University of Sanskrit, Kalady followed by Kannur University.


2021 ◽  
Vol 65 (1) ◽  
pp. 23
Author(s):  
Anita K. Foster

The Ohio State University Libraries’ Serials and Electronic Resources team tracked reports of problems with electronic resources through a ticketing system, but had not used the system functions to articulate the work involved in supporting such resources. When a new Electronic Resources Officer was hired, the librarian reviewed the type of statistics provided to management and identified an opportunity to more fully document reported problem and staff effort. With the help of team members, a mechanism was created to highlight different types of problems through the application of a controlled vocabulary developed specifically for that environment. Once the vocabulary was available and in use, after some time, terms were evaluated for efficacy, and for how the use of the vocabulary enabled analysis of the trouble-shooting process. Following an analysis by the Electronic Resources Officer of the terms after being in use for some time, the ways that staff were involved in the workflow was changed, leading to faster responses and more consistent communication of information to patrons and vendors. This paper describes the process of developing the controlled vocabulary, the insights found following implementation, and the changes to the workflow that came from that analysis.


Sign in / Sign up

Export Citation Format

Share Document