Professional Documents
Culture Documents
Obsa's Final Research PDF
Obsa's Final Research PDF
BY
OBSA GELCHU
JIMMA, ETHIOPIA
i
Acronyms and Abbreviations
AACR2= Anglo American cataloguing rule second edition
IP=internet protocol
POD=print on demand
ii
Table of Contents
Acronyms and Abbreviations ................................................................................................................... ii
List of Tables ........................................................................................................................................... vi
List of figures.......................................................................................................................................... vii
Abstract.................................................................................................................................................. viii
Acknowledgement ................................................................................................................................... ix
Chapter One ..............................................................................................................................................1
1.0 Introduction......................................................................................................................................... 1
1.1 Background of the study ..................................................................................................................... 1
1.2 Statement of the problem .................................................................................................................... 2
1.3 Research questions.............................................................................................................................. 2
1.4. Objectives of the study....................................................................................................................... 2
1.4.1. General Objective ........................................................................................................................... 2
1.4.2. Specific Objectives .........................................................................................................................2
1.5. Scope of the study.............................................................................................................................. 3
1.6. Significance of the study.................................................................................................................... 3
1.7 Limitation of the study........................................................................................................................3
Chapter Two..............................................................................................................................................5
2.0 literature review .................................................................................................................................. 5
2.1 Jimma university library system ......................................................................................................... 5
2.2 Electronic Information Resources....................................................................................................... 6
2.3 Types of electronic resources..............................................................................................................7
2.4 Collection Development and Collection Management. ...................................................................... 8
2.4.1 Collection development ................................................................................................................... 8
2.4.2 Collection management.................................................................................................................... 9
2.5 Collection development policy ........................................................................................................... 9
2.6 Technical Processing ........................................................................................................................11
Chapter Three..........................................................................................................................................14
3.0 Methodology..................................................................................................................................... 14
3.1 Introduction....................................................................................................................................... 14
3.2 Research design ................................................................................................................................14
iii
3.3 Study area..........................................................................................................................................14
3.4 Study Population...............................................................................................................................14
3.5 Sampling Technique and Sample Size..............................................................................................15
3.6 Data Collection instruments..............................................................................................................17
3.6.1 Questionnaire Design.....................................................................................................................17
3.7 Data analysis ..................................................................................................................................... 18
3.8 Data sources...................................................................................................................................... 18
3.8.1 Primary Sources of Information..................................................................................................... 18
3.8.2 Secondary Sources of Information.................................................................................................18
Chapter Four ...........................................................................................................................................19
Results and discussion ............................................................................................................................ 19
4.0 Introduction....................................................................................................................................... 19
4.1 Demographic Information................................................................................................................. 19
4.2 Electronic resource subscriptions...................................................................................................... 21
4.3 whether culture library use independent subscriptions ..................................................................... 22
4.4 Access type licensor provide in subscription....................................................................................23
4.5 Measures applied in library to control copyright in digital environment..........................................25
4.6 Cataloguing standards of electronic materials. ................................................................................. 26
4.7 Software used for inter library management.....................................................................................29
4.8 Whether the library has weeding policy ........................................................................................... 33
4.7 Years the e-resources remain in collection before weeding..............................................................33
4.9 Access technology applied in library ................................................................................................35
Chapter Five............................................................................................................................................37
5.0 Discussions of findings .....................................................................................................................37
5.1 Findings.............................................................................................................................................37
5.1.1 Mechanism used to manage electronic information resources.......................................................37
5.1.2 Evaluation methods of electronic information resources...............................................................40
5.1.3 Factors affecting the management of electronic information resources ........................................41
5.1.4 Possibility/ways to access the electronic information resources....................................................42
Chapter Six..............................................................................................................................................45
6.0 Conclusions and recommendations...................................................................................................45
6.1 Conclusions....................................................................................................................................... 45
iv
6.2 Recommendations............................................................................................................................. 46
References ..............................................................................................................................................47
APPENDIX A.........................................................................................................................................49
v
List of Tables
Table 4.1 Age Distribution of Respondents.................................................................................. 19
Table4.2 Gender distribution of respondents................................................................................ 20
Table4.3 Respondents education status ........................................................................................ 20
Table4.4 Respondents work experiences...................................................................................... 21
Table4.5 Features provided by the licensor .................................................................................. 24
Table4.6 Major obstacles in dealing with the licensor ................................................................. 24
Table4.7 Limitation imposed by library for copying portion of licensed materials ..................... 26
Table4.8 Culture of organizing electronic materials..................................................................... 30
Table 4.9 Culture to show if library use an integrated OPAC for e-resources ............................. 30
Table4.10 methods to organize the e-resources............................................................................ 31
Table4.11 Weather library system has separate data security policy or not................................. 31
Table4.12 Data security manager if library has separate data security policy.............................. 32
Table4.13 Body responsible for the selection of e-recourses ....................................................... 34
Table4.14 Access method of e-resources...................................................................................... 35
Table4.15 Authorization and authentication of users to use e-resources...................................... 36
vi
List of figures
Figure 4.1 Electronic resource subscriptions ................................................................................ 21
Figure4.2 whether culture library use independent subscriptions ................................................ 22
Figure4.3 Access type licensor provide in subscription ............................................................... 23
Figure4.4 Measures applied in library to control copyright in digital environment..................... 25
Figure4.5 cataloguing standards of electronic materials............................................................... 26
Figure 4.6 software used for inter library management................................................................ 29
Figure4.7 whether the library has weeding policy........................................................................ 33
Figure4.8 Years the e-resources remain in collection before weeding......................................... 33
Figure4.9 Access technology applied in library ........................................................................... 35
vii
Abstract
An electronic information resource is any information sources that the library provides access to
users in an electronic format. These electronic information resources can be accessed via
computer and other devices as much as an electronic network is available. The study was
conducted in jimma university library system to assess users’ problem on the use of library
electronic information material and services available on electronic information resources in the
library system. The cross sectional survey was used for this study. From the 336 total number of
population 40 numbers of respondents were selected. This study was contributed for the library
users, researchers, and curriculum developers in order to find out the problems on materials,
services and users in the Jimma university library system. The future development and success of
academic libraries depends greatly on how they embrace technology in its operation mainly in
the management of electronic resources. The study was an analysis on collection management of
electronic information resources in jimma university library system. The library system uses the
ABCD and Dspace software for the interlibrary management of electronic information resources
in the library. The users can access the collection of electronic information resources in library
and remotely through the campus network. Also researcher tried to identify how the electronic
resources were used in the library and the challenges being faced while trying to offer electronic
resource services. The methodology employed to collect data was the questionnaires. The study
gave insights on the data analysis and findings based on the research objectives. The SPSS
software version 20.0 is used for data analysis. In conclusion the researcher would give
recommendations on what would be done to improve the collection management of electronic
information resources in academic library.
viii
Acknowledgement
First and for most glory to be the almighty God who made all thing possible. I would like to take
this opportunity to express my heartfelt gratitude to my Excellence advisor Mr.Amanuel Ayde
(MSC in information science) for his constructive comments and frequent follow up of my study
from its beginning to its completion throughout the year. My indebted and prime gratitude also
goes to my family for their financial and moral support while I was conducting this research. In
addition, I would like to thanks all Jimma university main library staff workers for devoting their
time in answering the questions. Finally I would like to extend my deepest and special thanks to
my friends for their supporting in all my duty. Also I extend thanks for those who help me in day
to day activities of this research paper writing.
I would like to thanks the college of natural sciences and Department of information science for
their contribution in making my learning a success.
ix
Chapter One
1.0 Introduction
1.1 Background of the study
Evolution and growth of e-publishing industry in the field of ICT has given birth to electronic
resources. It is an umbrella term for all digital resources. Digital information exists in a format
that a computer can store, organize, transmit and display without any intervening conversion
process. It is described as ‘born digital’. They refer to the use of information technology in the
production of publication and the electronic distribution of text through computer terminals.
These resources play an important role in the creation, transmission and storage of information
(Johnson, 2004)
Electronic resources encompass many genre, formats, and storage and delivery mediums. It is a
combination of those resources that are ‘born digital’ and ‘made digital’. The storage refers to
the medium used to store and deliver contents to the users. The delivery medium may be a CD-
ROM, a magnetic tape or a server that is accessed through the Internet (Johnson, 2004). Thus
electronic information arena involves resources covering a wide variety of materials, including
indexing and abstracting services, electronic books and serials, electronic databases offered by
information aggregators, document delivery services and web sites. Many of these resources may
be locally mounted on a library’s server or they may be accessed remotely by modem or through
direct Internet connections maintained by the library (Sivaraj, 2007).
Electronic resources located and remotely accessed by librarians have been characterized by
continuous, incremental growth in products and services. They present unique considerations
like comparing various delivery and access media for the same content, complex pricing
structures, access to retrospective files, copyright, security, bibliographic control, indexing,
archiving and contractual licensing issues and high expenses. The wide spread availability of
electronic resources posed new challenges in the library acquisition process such as site
licensing, copy right issues and means to provide access to various electronic resource (Sivaraj,
2007)
Best standards and practices are still in the development stage to handle the compatibility of the
systems, standard format, interoperability, data encoding and transmission scheme to convey
information.
1
1.2 Statement of the problem
The phenomenon of collection management of electronic information resources in jimma
university library system was still a recent development. There was a need to study the various
models, guidelines and procedures and collaborative approach towards access to e-resources.
The literature review indicates that no exhaustive work on the topic has been done stating the
general guidelines, policy, licensing principle of e-resources, access and use of e-resource by
jimma university library system. In the light of the above facts a need has been felt to undertake
the research on the topic- “Collection Management of Electronic Information Resources in
jimma university library system: The study enabled to learn all the important aspects of
collection management of e-resources in greater depth and collections to reap the benefit of
electronic resources.
2
To investigate the evaluation method of electronic information resources in the library
To assess factory affecting the collection management of electronic information resources
in the library.
To investigate the possibility to access the electronic information resources in the library
To assess the improvement required to improve collection management of electronic
information resources in the library.
To investigate how electronic information resources enable for the research output.
The study was to investigate the collection management of electronic information resources in
jimma university library system .The activities was performed starting from March 2015 up to
May 2016.Thie study was conducted in Jimma University library system. The staff workers
were the part of the study. The study area was Jimma University library system. Questionnaire
was used for data collection. SPSS version 20.0 was used for data analysis.
3
Researcher unable to conduct the interview with respondents due to time limitation, as a
result the fifth research question remains without got the answer.
Due to lack of researcher’s experiences on the research, the required objectives were not
handedly achieved.
4
Chapter Two
2.0 literature review
Jimma University is caring out the responsibility of academic and research activities given to it
by the Ethiopian Ministry of Education. In addition to its traditional information services through
print materials, Jimma University afford electronic information resources freely to its academic
staffs, other non-academic staffs and students to enhance academic work and research activities
by delivering electronic information resources through its library systems.
5
Collection management in the field of library management is a classic topic. It has become
complex owing to the diversity in the presentation of information in different formats and varied
electronic resources.
Many studies have been conducted worldwide on the changing scenario of collection
management due to the impact of information and communication technology. They have
examined the process of collection management in addition to its specific elements and identified
factors with broad implications in the new information environment. While examining and
analyzing the status of research in collection management various sources have been identified,
which serve as an invaluable and practical guidelines for collection management.
The review of literature in this area is of prime importance for the present research study as it
reveals a series of changes that have occurred in collection management since the origin and
beginning of libraries. It pinpoints the various stages of development that have taken place since
its inception. It is able to throw light on what further research has to be done, especially to deal
with this change from collection management of print documents to electronic resource
management. It identifies any lacunae where a study has to be carried out forward in library
collection management.
The proliferating growth of various electronic resources in the present digital environment opens
up new horizons across a broad array of issues related to the access, availability of information in
different formats, collection policy agreements, licensing agreements, copy right issues, resource
sharing, preservation and collection assessment. There is enormous literature available on this
subject of collection management of electronic resources.
The investigation was carried out by reviewing the studies related to the existing scenario of
collection management policies, problems and current practices in the field of academic libraries.
6
Related literature on collection management of electronic journals accessed through networks
and download from the web. These articles are grouped under collection management: concept
and characteristics of e-resources on collection management, collection development policies,
changing dimension of collection development to collection management and related case
studies and user studies will be conducted by researchers in jimma university library system.
They would be categorized, analyzed and their findings would be interpreted.
Online databases
Online database is a collection of e-books, e-journals by various publishers in different fields that
can be accessible online. Some of these resources are provided at no cost to libraries in
developing countries, while others require some fee payable as subscription. However, access to
these databases provides researchers with thousands of scholarly journals articles in one field of
specialization or research (Bozimo, 2007)
Digital information
Digital information is a method by which printed information resources in the libraries and
information centers can be converted to electronic form by digital means. It is a recent
technology thereby information materials in paper format are converted by machine into
microfilm and other miniature form in order to have quick and easy access to them by electronic
means. The mechanism by which information in paper format is converted to digital information
is called digitization. However, the advantages accrue from the world of digitalization of
libraries in the provision of access to primary electronic sources from any remote geographic
location and multiple accesses to a single resource are quite enormous. Nevertheless, as special
and valuable collections are confined to certain institutions, users from different institution,
research centers etc have to travel a long way to access the materials.
7
(Ellis, D.& oldman ,H, 2005) opined that researchers from different institution further away from
library or information center where the printed information resource is found felt that digitized
resources would allow them to get hold of materials more easily without problem, hence, most
researchers are of the opinion that digitalization of certain materials in the library would be a
huge benefit in terms of accessibility to relevant information.
Electronic journals
As result of the development of internet, researchers and public library institutions have cognized
the quality and capabilities of Information and Communication Technologies(ICTs) as
‟‟effective means to exchange results from findings , to get around barriers by full transfer of
intellectual property rights, from the author to publisher and to improve on the hitherto slow
turnaround of traditional publishing (Corria, A.M.R and Neto,M.D, 2002).This development has
therefore resulted to growing number of electronic journals, pre-print(e-print), archives, and
electronic books. However, electronic journals relatively provide efficient access to information,
hence they are easy to distribute to library clientele than the traditional print information.
CD-ROM databases
CD-ROM databases are electronic information resources that are damped on the CD-ROM
storage device. CD-ROM databases allow users access to relevant databases without internet
connectivity in libraries. It is therefore cost effective than online databases, as information can
conveniently be accessed offline without paying for telecommunication fee.
The introduction of CD-ROM has led to the use of e-journal collections in the reference library
and an increase in the states of libraries (Oduwole, A.A, 2001). Besides this CD-ROM database
is of great value over conventional (print) information resources if the system is networked, as
library patrons at their respective terminals could access information without coming to the
library (Oduwole, A.A, 2001).
Vendors offer bundle or package a number of resources, titles, or images that have an impact on
the selection process from title by title selection to an aggregate approach (George, Vicki, 2000).
Licensing
One of the key issues that a library considers in acquiring any new electronic resource is about
the purchase of the resource or only obtaining the copyright and licensing issues to use it. Many
of the traditional fair use rights that libraries have enjoyed for print materials are no longer
assured in the new electronic age of information. Today dealing with licensing agreements for e-
resources have become unavoidable for acquisition librarians. As the number of available
databases rapidly increases the variety of licensing restrictions and special clauses applicable to
them seem to grow at a more rapid rate (Holden, Jesse, 2010).
Vendor Relationship
Librarians have to deal with vendors’ for Web accessible databases and journals, sign a license
agreement with a publisher or distributor before being able to access the resource. The basic
librarian/vendor relationship form is products and standards where librarians and vendors
collaborate to improve service to library patrons. These license agreements vary widely from
different vendors and are not standard and predictable. Vendors should invest a considerable
amount of time in establishing and maintain personal relationship with libraries. Decisions to
work with particular vendors and publishers should be made objectively, to ensure that the fairest
prices and best practices are obtained on behalf of the library’s users (Holden, Jesse, 2010).
Resource Sharing
Another important factor that influenced the library collection development is resource sharing.
This concept is old but gained momentum with computer network environment paying way for
consortia. Resource sharing is one of the components of cooperative collection development and
management. It began decades ago as a means to alleviate problems of lack of space, high costs
of periodicals, limited budgets and costly duplication especially for less used materials. .
Resource Sharing was adopted as no library can independently satisfy the needs of its users. It
links users with needed material and information regardless of where that material is located.
(Michael.k, Buckland, 1989) Writes that resource sharing has two uses they are collaborative
cooperation amongst libraries and effective utilization of technology.
10
In the emerging digital environment resource sharing has expanded to include consortia
agreements to purchase group access to electronic resources at discount prices. The objective of
these consortia is to share resources, mostly periodicals, followed by books, tutorials, reference
sources, thesis, dissertations that are available in electronic form. A consortium facilitates access
to full text databases, journals articles, research papers and other information resources in
electronic form. It was practiced as an agreement among libraries in the system leading to
cooperation (Michael.k, Buckland, 1989).
11
users are authenticated they would be able to use all e-resources regardless of where they are
physically located.
Publishers have set up and developed a number of standardized ways of allowing remote access
to their users. These methods include:
IP Access- Database and electronic journal vendors allow IP authentication for a specific
range of IP addresses.
Generic Passwords based approach- Allows users to use numbers or codes that are
standardized for a particular organization. This approach is effective when resources are
licensed for use by a consortium.
User account coupled with IP source detection.
X.509 certification that gives a particular machine the right to use a particular name. The
name is verified by checking the ‘certificate authority’.
Proxy Server: It is a computer that offers a computer network service to allow clients to
make indirect network connections to other network services.
Virtual Private Network (VPN): A proxy server is capable to connect are mote user
with specified resources, but in some cases distant offices and remote users are required
accesses to the institutional network as if they are actually, physically on the institutional
intranet.
Providing access to e-resources facilitated easy retrieval to the library user but created many
challenges to the collection development librarian. They have to consider the various access
licenses that involved significant ongoing obligations like access given to anyone who access the
library through Internet, only to onsite user, only to anyone who comes into the library, access
permitted for offsite users, access provided at different access nodes located on the campus,
permission to print, copy or download from the resource, number of copies permissible,
permission to make copies of the e-resource for inter library loan purpose, right to archive the
material and termination of license agreements.
Therefore it would be observed that the nature of acquisition work would be changed
significantly from traditional to electronic environment. Electronic information resources that
have been selected by the library need to be organized for easy retrieval and access by users, for
which access management must be addressed from the user’s perspective.
12
Preservation: Preservation is an essential part of collection management in large academic
libraries. The advent of electronic information resources would be changed the nature in which
preservation strategies were carried and implemented (Nisonger, Thomas E, 2001).
13
Chapter Three
3.0 Methodology
3.1 Introduction
The purpose of this section was to present the methods and procedures that the researcher used in
carrying out the study. Attempt was made to describe step by step, the methods, procedures and
other devices was used to collect, analyze and interpret data. It also shows what steps was taken
to ascertain the validity and reliability of instruments was used.
14
and would give in-depth information and provide better and comprehensive information on e-
resource used in their university. So, the intention of the researcher was to assess relevant
information from those population based on sample taking techniques.
2
z * p*q* N
n 2 2
……………… (Kothari, 2004)
E * ( N 1) z * p * q
WHERE:-
N= total population
p =population proportion at which the sample size is maximum (at p=0.5 and q=0.5,
p*q=0.25)
q=1-p
2
z * p*q*N
n 2 2
E * ( N 1) z * p * q
15
2
322 . 6944
n
0 . 8375 0 . 9604
n=179
To check the finite population correction (FPC) the researcher divided the determined sampled
size to the population. If the result was greater than 5% (i.e. n/N>5%N), FPC would be used to
adjust the final sample size unless the required sample size can be accepted as it is (Kothari,
2004).
n
FPC formula: n
f
1 c
n 179
c 0.533
N 336
Since the value of c was greater than 5%, the researcher uses finite population correction (FPC)
to have the correct sample size.
n
FPC formula: n
f
1 c
nf=179/ (1+0.533)=116
Therefore, the researcher identified that, sampled size of staff workers was 116.but for the limitation
of business and time researcher was took 40 numbers of respondents.
Sample size determination is the act of choosing the number of observations or replicates to
include in a statistical sample. The sample size was an important feature of any empirical study
16
in which the goal was to made inferences about a population from a sample. In practice, the
sample size used in a study was determined based on the expense of data collection, and the need
to have sufficient statistical power. In complicated studies there would be several different
sampled sizes involved in the study.
17
3.7 Data analysis
The analysis of data was done at the end of the data collection. The responses were categorized
on the basis of information provided by respondents. Statistical Package for Social Sciences
(SPSS version 20.0) was used to analyze the data. The data was presented and interpreted using
frequency distribution tables, percentages, pie chart and bar charts. The SPSS version 20.0 has
the incredible capabilities and flexibilities of analyzing huge data within seconds and generating
an unlimited gamut of simple and sophisticated statistical results.
18
Chapter Four
4.0 Introduction
This chapter presents the analysis and data collected from sampled respondents. In all, Fourty
(40) questionnaires were distributed to both male and female staff member of the jimma
university library and Fourty (40) questionnaires were retrieved.
The analysis was done based on items in the questionnaire and organized in line with the
research questions and objectives stated in chapter one and they are presented in the form of
frequency distribution tables and pie charts and graphs to give better explanations and also make
the analysis easier. These modes of data presentations were generated from survey data with the
aid of Statistical Package for Social Science (SPSS) version 20.0.
20-30 29 72.5
30-40 9 22.5
above 50 2 5.0
Total 40 100.0
As the above table 4.1 indicates that 29(72.5 %) of the respondents were age between20-30,
9(22.5 %) of the respondents said that the age were between30-40, 2(2 %) of the respondents
were age greater than 50 age. This implies that most of the respondents were between20-30,
19
which accounts about 29 respondents from the total of 40(100 %). Based on this clue researcher
concluded that most respondents lie in the age of 20-30 year, who are very energetic and can
help the institution to achieves its target or objectives.
male 19 47.5
female 21 52.5
Total 40 100.0
As the above table 4.2 indicated that, 21 (52.5%) of respondents were female, and 19(47.5%)
respondents from total population 40(100%) were male. This table implies that most of the
respondents were female who were working in main library. This confirms the perception that
administrative duties is highly resides in the hands of female employees. Based on this table the
researcher concluded that male workers are not equally participated in the management of library
collection. This unequal participation of male and female workers in the management of
collection of library material indicates male workers has no more interest as female workers did.
Table4.3 Respondents education status
Certificate 1 2.5
Diploma 7 17.5
Degree 28 70.0
Master 4 10.0
Total 40 100.0
As indicated in the above table 4.3, 1(2.5%) of respondents were certificate holder, 7 (17.5%) of
respondents were diploma holders, 28(70.0 %) respondents were degree holder and 4(10.0 %)
respondents were master education level holders. This table implies that most of the library staff
members are degree holders in their education level. Based on this information researcher
20
concluded that the library has well educated man power to achieve objective and goal of the
library which pave the way to provide the effective and up to dated information/ service for their
users.
5 and 15 37.5
above
Total 40 100.0
As the above table4.4 indicates that 8 (20.0 %) of the respondents said their work experience was
1-3 Years, 17(42.5 %) of the respondents were said their work experience was 3-5 Years and 15
(37.5 %) respondents said their work experience was above 5 years from total population of
40(100.0%) respondents. This table implies that most of the respondents were 3-5 Years’
experience in main library staff members. Based on this output the researcher concluded that the
library has an experienced man power to launch good administration in management of library
resources and services for its researchers/users.
21
As the above figure 4.1 indicates that 14(35.0%) respondents said that library staff uses
independent subscription, 7(17.5%) respondents said that library staff uses consortia for
subscription, and 19(47.5%) respondents of total population of 40(100.0%) said that library staff
use both independent and consortia subscription for electronic information resource in library.
This implies that the university library staff uses consortia and independent subscriptions for
electronic information material in their library. Based on this information, researcher concluded
that the library system uses both independently and consortia methods for the subscription of the
e-resources.
As the above figure 4.2 indicates that 12(30.0%) respondents said that library staff use direct
from publisher subscription of independent subscription, 5(12.5%) respondents said that library
staff use vendor impendent subscription and 8(20%) respondents said that library staff use
aggregator independent subscription. But 15(37.5%) of respondents are refused with the
independent type of subscription of electronic information resources of the library. This implies
that, the library system did not use the independent type of subscription for their electronic
information resources within the library. E-subscriptions provide immediate access to each issue
of Monthly Review, annually via website–that is, on the first of the month, without any delay–
and offer an affordable way to support the work. E-subscribers receive access to the Monthly
Review Archives website which contains individually indexed PDF versions of every article
published in monthly review magazine, journal, newspapers, and research materials for the
collection development of the library materials. Stay up-to-date with the world’s largest
collection of research papers in optics and photonics. The SPIE (Society of Photographic
22
Instrumentation Engineers) Digital Library provides engineers and scientists with the latest
information on light-based technologies. Subscriptions are available for individuals (with limited
downloads) or for institutions (with limited downloads). Individual SPIE (Society of
Photographic Instrumentation Engineers) with more than 430,000 papers spanning biomedicine,
communications, sensors, defense and security, manufacturing, electronics, energy, and imaging,
the SPIE digital library is the most extensive research database available on optics and photonics
research. Digital Library subscriptions are available for personal use and are good for one year.
Downloads made by the individual Digital Library subscriber are for the sole use of the
subscriber. By engaging to the SPIE digital library, the library system provides the various
electronic information resources for the library collection by subscribing the agreement which
provided by the SPIE digital library. The subscription made by the library is may be, monthly,
weekly, or annually subscription based on the will of the library.
23
Table4.5 Features provided by the licensor
all 2 5.0
Total 40 100.0
As the above table 4.5 indicates 8(20.0%) respondents said licensor provide electronic link
feature, 18(45.0%) respondents said licensor provide access to database feature,3(7.5%)
respondents said that licensor provide archival/backup copy feature, and 9(22.5%) respondents
said that licensor provide electronic link and access to database feature of total population
40(100.0%.). This implies that the licensor provide database access feature in their license
(agreement) for electronic information resources for the library. Based on this information
researcher concluded that the licensors provide access to the database feature for the library and
followed by providing the electronic link for the library to connect the library to their database
server. As the results, users can access those databases and access through the link provided by
the licensor.
Table4.6 Major obstacles in dealing with the licensor
Total 40 100.0
As the above table 4.6 indicates 10(25.0%) respondents said, the major obstacles during dealing
with licensor was disparity in the bargaining power, 19(47.5) respondents said, the major
24
hindrances during dealing licensor for electronic information resources was inflexibility on the
part of vendor,8(20.0%) respondents said, the major problem during dealing with licensor was
fitting license agreements to the need of library, 1(1.5%) respondent replied, the most obstacle
during dealing with the licensor was delay of supply and 2(2.5%) respondents of total population
40(100.0%) said that the major problems was not known what to look for during dealing with the
licensor for material in collection. This implies that the major obstacle in the library during
dealing with the licensor was inflexibility on the part of vendor. From this the researcher
concluded that the major problems that occur when dealing with the licensor to have electronic
information resources for the library collection were inflexibility on the part of vendor.
25
measure software to protect the copyright of electronic information resources in digital
environment.
nothing 5 12.5
Total 40 100.0
As the above table 4.7 indicates 27(67.5%) respondents were said the library system stop access
for a specific period of time for the material that was licensed during the access time in library,
2(5%) respondents were said that the library cancel the membership of the users who try to copy
some portion of licensed material during the access time in the library, 6(15.0%) respondents
were said the library file a case to prevent the copy of licensed material for the effective library
management and 5(12.5%) respondents were said that the library system has no any methods to
prevent the users from copying the portion of licensed material. This implies that the library
system stop to access for a specific period of time to prevent the users from copying some
portion of licensed materials without the permission of the library, which is responded by
27(67.0%) respondents of total population 40(100.0%). From this researcher concluded that the
library systems control the security of licensed material from copying some portion of it by
stopping the access of licensed materials for specific period of time.
26
Figure 4.5 cataloguing standards of electronic materials.
As the above figure 4.5 indicates 6(15%) respondents were said library system uses AACR2
standards for cataloguing the electronic information resources, 5(12.5%) respondents were
responded that library system use MARC standard to catalogue the electronic information
resources, 22(55.0%) respondents were said that the library use metadata (Dublin core) standard
to catalogue the electronic information resources, and 7(17.5%) respondents were said that the
library system use all three cataloguing standards(i.e. AACR2,MARC and metadata) for
cataloguing electronic information resources in digital environment of library system of total
population 40(100.0%). This implies that the library system uses metadata (Dublin core)
standard for the cataloguing of the electronic information resources which responded by
22(55.0%) respondents of total population 40(100.0%). The Dublin Core metadata standard is a
simple yet effective element set for describing a wide range of networked resources. The Dublin
Core standard comprises fifteen elements, the semantics of which have been established through
consensus by an international, cross- disciplinary group of professionals from the scholarly fields
of librarianship, computer science, text encoding, museum and archive management, among
others. Those Fifteen elements of Dublin core are used to identify the particular digital object
within the library (Quam, 2000). These elements of Dublin core are listed as follows.
Title: The name given to the resource by the creator or publisher.
Creator: The person(s) or organization(s) primarily responsible for the intellectual content of the
resource; the author.
27
Subject: The topic of the resource; also keywords, phrases or classification descriptors that
describe the subject or content of the resource.
Description: A textual description of the content of the resource, including abstracts in the case
of document-like objects; also may be a content description in the case of visual resources.
Publisher: The entity responsible for making the resource available in its present form, such as a
publisher, university department or corporate entity.
Date: The date the resource was made available in its present form.
Type: The resource type, such as home page, novel, poem, working paper, technical report,
essay or dictionary. It is expected that type will be chosen from an enumerated list of types.
Format: The data representation of the resource, such as text/html, ASCII, Postscript file,
executable application or JPG image. Format will be assigned from enumerated lists such as
registered Internet Media Types (MIME types). MIME types are defined according to the
RFC2046 standard.
Identifier: A string or number used to uniquely identify the resource. Examples from networked
resources include URLs and URNs (when implemented).
Source: The work, either print or electronic, from which the resource is delivered (if
applicable).
Relation: The relationship to other resources. Formal specification of relation is currently under
development.
Coverage: The spatial locations and temporal duration characteristics of the resource. Formal
specification of coverage is also now being developed.
28
Rights management: - A link (URL or other suitable URI as appropriate) to a copyright notice,
a rights-management statement or perhaps a server that would provide such information in a
dynamic way (Quam, 2000).
29
accommodation of the various electronic information resources, dissertation, thesis and various
researches for the further study. This software (i.e. Dspace) was used for interlibrary
management to have an archive of electronic information resources which their requirement is
high degree in values.
Table4.8 Culture of organizing electronic materials
yes 37 92.5
No 3 7.5
Total 40 100.0
As the above table 4.8 shows 37(92.5%) respondents were agree with the organization of the
electronic information material, and 3(7.5%) respondents of total population 40(100.0% ) were
not agree with the organization of the electronic information materials in the library. This table
indicates that almost all respondents were agreeing with the organization of electronic material in
the library.
Table 4.9 Culture to show if library use an integrated OPAC for e-resources
No response 1 2.5
Yes 28 70.0
No 11 27.5
Total 40 100.0
As the above table 4.9 indicates 28(70.0%) respondents were said that the library system use an
integrated OPAC for the management of e-resources, 11(27.5) respondents said that the library
system did not use an integrated OPAC for the management of e-resources and 1(2.5%)
respondent of total population 40(100.0%) was not aware about the integrated OPAC for the e-
resources. This results concluded that the library system use an integrated OPAC for the material
of e-resources management. The library system uses this OPAC user interface which was the
interface that the librarians developed for the end users to access the materials that they included
30
for the library collection within the help of ABCD software to have the digital library for the
modernized or effective management of library services to provide the information of materials
in the form of electronic form than providing in the form of hard copy which can consume the
assets of the library. Through this OPAC user interfaces, the library users can search the
materials which exist in the library by using subject, title and author of the publication.
No organize 17 42.5
Classified 7 17.5
DOI(digital 1 2.5
object identifier)
Alphabetical 12 30.0
all 3 7.5
Total 40 100.0
Table 4.10 indicates 7(17.5%) respondents said that library system use classification method to
organize the e-resources, 1(2.5%) respondent said that library system use DOI (digital object
identifier) to organize the e-resources, 12(30%) respondents said that the library system use the
alphabetical arrangement to organize the e-resources, and 3(7.5%) respondents replied the library
system use classified, DOI and alphabetical to manage the e-resources.but17(42.5%) respondents
of total population 40(100.0%) said the library system did not organize the e-resources. The
result indicates that the library system did not organize the e-resources. By the above information
researchers concluded that the library system did not use any organization method to organize its
e-resources for the management purpose.
Table4. 11 Weather library systems have separate data security policy or not
31
Alternatives Frequency Percent
Yes 24 60.0
No 16 40.0
Total 40 100.0
As the above table 4.11 indicated 24(60%) respondents indicated that the library system has its
own separate data security policy, but 16(40%) respondents’ of total population 40(100.0%) said
the library system did not has its own separate data security policy. This table implies that the
library system has its own separate data security policy. The library system uses the security the
special security software like anti-plagiarism software to protect the special security of electronic
information resources within the library.
Table4.12 Data security manager if library has separate data security policy
No responses 12 30.0
Technician 6 15.0
Total 40 100.0
As the above table 4.12 indicated 9(22.5%) respondents said computer professionals manage the
data security, 13(32.5%) respondents said LIS professionals manage the data security and
6(15%) respondents said technicians manage the data security. This table implies that LIS
professional manages the data security. But 12(30%) respondents from total population
40(100.0%) said the library system did not has separate data security policy as incited under
table 4.11. Based on this clue, the researcher concluded that the library system has the separated
data security policy which was protected by the LIS professionals.
32
4.8 Whether the library has weeding policy
33
defined life time electronic materials remain in the collection before weeding. Based on this
information, the researcher concluded that the library system did not clearly defined the year that
one particular electronic information resources live in the collection before it would be weeded
from the library collection. From this the researcher concluded that some library system was
familiar with the weeding policy of the electronic materials which was performed by every 5
years. But some of the library staff members were not aware the life cycle of electronic
information resources were weeded from the library collection.
Table 4.13 Body responsible for the selection of e-recourses selection
Faculty 2 5.0
Scholars/Students 4 10.0
all 2 5.0
Total 40 100.0
As the above table 4.13 indicated that 2(5%) respondents said that faculty staff is responsible for
the selection of e-resources, 4(10%) respondents said scholars/students responsible for the
selection of e-resources, 28(70%) respondents said the library staff responsible for the selection
of e-resources, 4(10%) respondents said Faculty and scholarly/students were responsible the
selection of e-resources and 2(5%) respondents of total population 40(100%) said the all
presented part have equal responsibility to select e-resources for the library collection
development. This implies that library staffs were responsible to select e-resources for the library
collection development. From this the researcher concluded that the library staff was responsible
for the selection e-resources for the library collection development.
34
Table4.14 Access method of e-resources
internet 12 30.0
Total 40 100.0
As the above table 4.14 implies 12(30) respondents answer showed that library allow the users to
access e-resources in the library, 14(35%) respondents were said users can access the e-resources
remotely through campus network, 12(30%) respondents said users access the e-resources
through internet, and 2(5%) respondents of total population 40(100%) said users can access e-
resources through campus network and in library. This implies that the users can access e-
recourses remotely through campus network. So based on this clue, the researcher concluded that
the users can access the library resources remotely through campus network.
35
This Figure confirms that IP address based was access technology used in library. Based on this
information, the researcher concluded that the library system provides the users to access the e-
resources by using the Ip address technology for the research purpose.
Ip address 22 55.0
Total 40 100.0
As the above Table 4.15 indicates 22(55%) respondents were replied users authenticated and
authorized by the IP address, 10(25%) respondents said users authenticated and authorized by
login password, 6(15%) respondents said users were authenticated and authorized by public
keys/certificate, 1(2.5%) respondent said users authenticated and authorized by browsing the
library webpage, and 1(2.5%) respondent of total population 40(100%) said users were
authenticated and authorized by using IP address and login password to access the e-
resoures.This implies that users were authenticated and authorized by using an IP address to
access the e-resources in library. From this the researcher concluded that the users were
authenticated and authorized by using the IP address and followed by using login password to
access the e-resources in the library.
36
Chapter Five
5.1 Findings
The important issues were found in the data collection on collection management of electronic
information resources in jimma university library system. The data was collected from Jimma
university main library staff members. From the study findings it was noted that various factors
affected the collection management of electronic information resources in jimma university
library system. The major challenges identified were inflexibility on the part of vendor during
the license dealing for the selection of electronic information resources of the library collection
development, stop the access of licensed electronic information resources from copying the
portion of it for the specified period of time which is not prove the effective protection of the
copyright, the limitation of ABCD software that used for the integrated interlibrary management
due to its absence of link to access the electronic information resources which is available within
the library, not all respondents were oriented about the methods to organize the electronic
information resources in the library, some respondents were not informed the separate data
security policy in the library, some of the respondents know only the existence of the weeding
policy of the library but they were not oriented the life cycle of electronic materials remain in the
collection before weeding from the library, lack of students did not considered as the responsible
body to select the electronic information resources for the library collection development, and
the access methods that the users use to access the electronic information resources only through
the campus network which is not accessed somewhere else without the campus network.
37
about the independent types of subscription the researcher propose the question and the result
obtained from the 12(30.0%) respondents of total population 40(100.0%) indicates the library
system apply the independent types of subscription to develop the collection of electronic
information resources in the library. The independent type of subscription provides the library to
sign the agreement to access the particular electronic information resources for specified period
of times. The subscription agreement may be monthly subscription or annual subscription
according to the library requirements. But the result obtained from 15(37.5%) respondents of
total population indicates the library system did not use the independent subscription for the
development of electronic information resources in the library. Through the subscription the
licensor provides the various applications for the library system. As the result obtained from the
15(37.5%) respondents of total population 40(100.0%) indicates the licensors provide the backup
copy for the library system. In this archival backup copy the librarians can down load and
reserve the material for the feature use. The result obtained from the 13(32.5%) respondents of
total population 40(100.0%) indicates the licensor provides both archival access and backup
copy access during the license conducted. It implies the licensor provides the backup copy for
the library during the license agreement between librarian and the resource owner.
When the librarians sign the license agreement within the consortia/direct from the publishers
they provides the certain features. As the result obtained from the 18(45.5%) respondents of total
populations 40(100.0%) indicates (Table 4.5) the licensors proves the access to database features
and result obtained from 9(22.5%) respondents indicates the licensor provides the electronic link
feature for the digital library. The result obtained implies that the licensors provide the database
access for the library system.
The resource provided from the licensors was protected from the users to prevent to copy some
of its portion by using the various methods. The result obtained from the 33(82.5%) respondents
(Figure 4.4) indicates the library system uses the special security measures for the first rank and
the result obtained from the 3(7.5%) respondents of total population 40(100%) the library system
uses the anti-plagiarism software to protect the security of the licensed materials for the digital
library. This implies the library system uses the special security measures to protect the data
security of the digital library.
38
To protect the copyright of electronic information resources in the library the library system
imposes some limitation to the users. As the result obtained from the 27(67.5%) respondents
indicates (Table 4.7) the library systems stop the access of electronic information resources from
the users, the result obtained from the 6(15%) respondents indicates the library system file case
to protect the security of the licensed materials. But the result obtained from the 5(12.5%)
respondents of total population 40(100%) indicates the library system did not control the security
of electronic information resources in the digital environment. These show the library systems
stop the access of electronic information resources for some specified period of time.
For the effective management of electronic information resources the library system should have
to organize the electronic information resources within the library. As the result from the
37(92.5%) respondents indicates (Table 4.13) the library staff members were aware the
organization of electronic information resources in the library, but the result obtained from
3(7.5%) respondents indicates some library staff members were not aware the organization of
electronic information resources in the library. This implication implies the library staff members
were aware the organization of electronic information resources in the library. In the
organization of electronic information resources in the library the library systems use an
integrate interfaces to access the e-resources from the library. As the result obtained from the
table 4.8 shows 37(92.5%) respondents were agree with the organization of the electronic
information material, and 3(7.5%) respondents of total population 40(100.0% ) were not agree
with the organization of the electronic information materials in the library. This result indicates
that almost all respondents were agreeing with the organization of electronic material in the
library.
In the management of electronic information resources, the library system uses the data security
policy within the library. The data security policy of electronic information resources were
protected by certain profession. As the result from the 28(70%) respondents the library system
uses an integrated OPAC interface for the interlibrary management purpose.
The management of electronic information needs the data security policy to protect it from the
damage. To protect the data security library system responsible the body who protect the data
security from the damage. As the result indicates from 13(32.5%) the LIS professionals were
responsible to protect the data security from the damage, the value obtained from the 12(30%)
39
indicates the library system did not have the separated data security policy. This indicates the
data security in the library was protected by the LIS professionals and some respondents did not
aware data security policy and body responsible for. For the effective library managements in
digital environment the library systems use the interlibrary software. As the from the 21(52.5%)
respondents indicates (Figure 4.6) the library system use the ABCD software for the interlibrary
management, the result obtained from the 15(37.5%) respondents indicates the library system
uses both Dspace and ABCD software for the interlibrary management purpose, and the result
from the library system uses Dspace for the interlibrary management of electronic information
resources. This implication indicates the library system uses ABCD software and followed by
Dspace for interlibrary management purpose. The purpose of interlibrary loan as defined by the
American Libraries Association Interlibrary Loan Code and Explanatory Supplement (revised
2008) is the process by which a library requests material from, or supplies materials to, another
library. The ABCD software delivery includes any service, locally or at a distance, that involves
sharing a library's own collection with its own patrons can access the resources available within
the library through OPAC (online public access catalogue). The ABCD software was the
software that the library uses for the creation of digital library which contains various modules
such as Loan module, acquisition module and circulation modules. The researchers or patrons
could check the materials availability remotely through the campus network by using the user
interface OPAC. This ABCD software was used for inter library loan systems to borrow the
books to its patrons. The second software ranked in this inter library management is Dspace
which was used for the integrated library management for the digital library purpose, which was
preserves the accommodation of the various electronic information resources, dissertation, thesis
and various researches for the further study. This software (i.e. Dspace) was used for interlibrary
management to have an archive of electronic information resources which their requirement is
high degree in values.
41
was the fitting the license agreement to the need of library. This result indicates the major
obstacles/factories in effective and efficiency management of electronic information resources in
the digital environment was the inflexibility on the part of vendor. This means that the licensor
take the agreement and remain without providing the required services for the library.
Creator: The person(s) or organization(s) primarily responsible for the intellectual content of the
resource; the author.
Subject: The topic of the resource; also keywords, phrases or classification descriptors that
describe the subject or content of the resource.
Description: A textual description of the content of the resource, including abstracts in the case
of document-like objects; also may be a content description in the case of visual resources.
Publisher: The entity responsible for making the resource available in its present form, such as a
publisher, university department or corporate entity.
42
Date: The date the resource was made available in its present form.
Type: The resource type, such as home page, novel, poem, working paper, technical report,
essay or dictionary. It is expected that type will be chosen from an enumerated list of types.
Format: The data representation of the resource, such as text/html, ASCII, Postscript file,
executable application or JPG image. Format will be assigned from enumerated lists such as
registered Internet Media Types (MIME types). MIME types are defined according to the
RFC2046 standard.
Identifier: A string or number used to uniquely identify the resource. Examples from networked
resources include URLs and URNs (when implemented).
Source: The work, either print or electronic, from which the resource is delivered (if
applicable).
Relation: The relationship to other resources. Formal specification of relation is currently under
development.
Coverage: The spatial locations and temporal duration characteristics of the resource. Formal
specification of coverage is also now being developed.
Rights management: - A link (URL or other suitable URI as appropriate) to a copyright notice,
a rights-management statement or perhaps a server that would provide such information in a
dynamic way (Quam, 2000).
The electronic information resources that catalogued can be accessed by the library users. To
allow the users to access the electronic information resources, the library systems have to
determine the venue to access. As the result obtained from the 14(35%) respondents indicates
(Table 4.12) the library system allow the users to access the electronic information resources
through the campus network, the result from 12(30%) respondents indicates the library system
allow the users to access the electronic information resources in the library and the result from
the 12(30%) respondents of total population 40(100%) indicates the library systems allow the
users to access the electronic information resources through the internet. This indicates the
43
library system allow the uses to access the electronic information resources through campus
network, internet and also in the library.
The digital library uses the various access method technologies to deliver the services of
electronic information resources within the library. As the result from the 21(52.5%) respondents
indicates (Figure4.9), the library system provides the e–resources access by the IP address based
technology, the information obtained from the 17(42.5%) respondents of total population
40(100.0%) indicates the library system proves the services of electronic information resources
by proxy server based technology. This implies that the library system provide the services of
electronic information resources by IP based technology. To access the electronic information
resources through Ip based technology, the users must be authorized and authenticated from the
library management. As the result from 22(55%) respondents indicates (Table 4.15) the library
system authenticate and authorized the users by introducing the Ip address of the digital library,
the result from the 10(25%) indicates the users of digital library authenticated and authorized by
login password to access the electronic information resources from the library. This implies the
digital library authenticated and authorized by the IP address of digital library system to access
the resources within the library.
44
Chapter Six
6.1 Conclusions
The study was aimed at assessing the collection management of electronic information resources
in jimma university library system and classification in case of Jimma University staff library.
The qualitative-quantitative and descriptive methods of research were used to conduct the study.
The researcher has gathered information by distributing questionnaires, then analyzing data from
the Jimma university staff library.
The effective management of electronic information resources plays the great role to provide the
effective services to the library users. The need of the digital information materials has been
increased from time to time instead of the using the hard copy of the library materials. To satisfy
the users’ interest the library systems was trying to shift the traditional physical library to the
digital library to avoid the large expenses of the hard copy of materials in the library which needs
high budget and high physical storage space in the library.
Based on the finding of the study, the researcher drawn following conclusions:
The library system develops the collection management of the electronic information
resources by licensing the agreement within the consortia. Through the subscription of
the electronics information resources the vendors provides the features like link to
electronic and the access to the data base for the specified period of time through
independent types of subscription. The data security policy was protected by special
security measure.
The result obtained indicates the library system did not have the determined evaluation
period of the time for the evaluation of the electronic information resources in the library.
In the management of the electronics information resources the major factors affecting
the management of the electronic information resources was the inflexibility on the part
of vendor at the time license agreement.
The library systems allow the users to access the electronic information resources through
the Ip address based technology to access the resources from the distance remotely and in
45
the library. The library users were authenticated and authorized through Ip address of the
digital library. These enable the users to login to the systems by username and the
password to access the electronic information resources of the library.
6.2 Recommendations
Based on conclusions drawn from the results of the study to maximize the quality of collection
management of electronic information resources in jimma university library system, the
following recommendations are made.
The library system administrator should have to clearly orient the weeding policy of
electronic resources and its life cycle starting from the creation to weeding/disposition.
The library collection developer/administrator should have to introduce and avoid the
inflexibility from the part of vendor during the subscription of electronic information
resources for the efficient and effective services.
The librarian of the library system should have to try to organize the collection of
electronic information resources for the effective management of the library services like
the printed materials.
The library administration should take into account the scholars/students during the
selection of the electronic information resources for the library collection development.
46
References
Alive, M & Leidner,D.E. (2001). Knowledge management and knowledge Management system.
Conceptual foundation and research issue.
Bozimo. (2007). paper presented at the elFL.Net work shop on capacity building. Nigeria
university,october 15.
Corria, A.M.R and Neto,M.D. (2002). The role of e-print archieves in access to and
dissemination of scientific grey literature. lisa-a case study of national library of portugal.
Ellis, D.& oldman ,H. (2005). the english literature researcher in the age of internet,in.
Haridason, S. a. (2009). Impact and Use of E-resources by social scientists in national social
science Documentation Center(NASSDOC),india.
Holden, Jesse. (2010). Acquisition in the New information Universe. Nwe York: Neal schuman
publishers.
Kothari, C. (2004). Research Methodology. (2. ed., Ed.) india: New Age International(p)LTD
,publisher.
Michael.k, Buckland. (1989). The role of collection and the scope of collection development
(Vol. vol 45). journal of documentation.
47
Nisonger, Thomas E. (2001). the internet nad Collection management in academic libraries.
Sivaraj, D. &. (2007). Use of internet by students ,faculty member s and research scholaris in
Banner Amman institute of technology (Vol. 13). An Analysis.
48
APPENDIX A
JIMMA UNIVERSITY
COLLEGE OF NATURAL SCIENCES
DEPARTMENT OF INFORMATION SCIENCE
1. Name of library_____________
2. Age range a) 20-30 b) 30-40 c) 40-50 d) 50 and above
3. Gender a. male b. Female
4. Work experience_______________
5. Educational level
a) Diploma b) degree c) other (please specify) ______________
Section two. Questions for specific objectives
49
b) Vendor
c) Aggregator
Any other (Please Specify) ___________________
2.5. What measures are applied to control the copyright/ digital rights of e-resources?
a) Special security measures
b) Anti plagiarism software
Any other (please specify) __________________
2.6. What limitations are imposed by the library for copying portions of licensed materials that
has been forbidden?
a) Stop access for a specific period
b) Cancel membership
c) File a case
Any other (Please specify) _______
50
2.7. What standards are used to catalogue electronic resources in your library?
a) AACR2
b) MA RC
c) Metadata (Dublin core)
2.8. Which software is used for inter library management?
a) Greenstone
b) dspace
c) Koha
d) Abcd
Any other (Please specify) _______
If yes do you follow an integrated OPAC for print and e-resources? a.Yes b. No
2.12. Does your library have a digital library of e-collections a.Yes b.No
51
b) LIS professional
c) Technician
Any other (Please specify) _____________
a) 2 years c) 4 years
b) 3 years d) 5 years
Other (please specify) __________
2.15. Who plays the major role in the selection of library collection?
a) Faculty
b) Scholars / Students
c) Library Staff
Any other (Please specify) ________
2.18. How are authorized users identified and authenticated to use e-resources in your library?
a) IP address
b) Login passwords
c) Public keys/certificate
d) Developing protocols
Any other method please specify________
52