Download as pdf or txt
Download as pdf or txt
You are on page 1of 62

JIMMA UNIVERSITY

COLLEGE OF NATURAL SCIENCES

DEPARTMENT OF INFORMATION SCIENCE

ASSESSMENT ON COLLECTION MANAGEMENT OF ELECTRONIC


INFORMATION RESOURCES IN JIMMA UNIVERSITY LIBRARY
SYSTEM.

BY

OBSA GELCHU

An independent research paper submitted to the department of Information


Science, College of Natural Sciences, Jimma University, in partial fulfillment
for the award of Degree of Bachelor in Information Science

ADVISOR: AMANUEL AYDE (MSC in information science)

JIMMA, ETHIOPIA

May 25, 2016


Approval Sheet

This Independent Research paper titled as, “Assessment on Collection management of


electronic information resources in jimma university library system.” has been read and
approved as meeting the preliminary research requirements of the Department of Information
Science in partial fulfillment for the award of the degree of Bachelor in Information Science,
Jimma University Ethiopia.

Research and Academic Communication Management Team Leader

Advisor: ____________________ signature: __________ Date: ________________

Examiner 1: ____________________ signature: __________ Date: _____________

Examiner 2: ___________________ signature: __________ Date: ______________

Research coordinator: ___________________ signature: __________ Date: ___________

i
Acronyms and Abbreviations
AACR2= Anglo American cataloguing rule second edition

ASCII= American standard code for information interchange

CD-ROM=compact disk read only memory

DOI =digital object identifier

FPC=finite population correction

ICT=information communication technology.

IP=internet protocol

JPG= joint photo graphic expert group.

JULS=jimma university library system

MARC=machine readable card

MIME = Multipurpose information male exchange

OPAC=online public access catalogue

POD=print on demand

RFC =Request for comment

SPSS=statistical packaged social science.

URL= uniform resource locator

VPN=virtual private network

ii
Table of Contents
Acronyms and Abbreviations ................................................................................................................... ii
List of Tables ........................................................................................................................................... vi
List of figures.......................................................................................................................................... vii
Abstract.................................................................................................................................................. viii
Acknowledgement ................................................................................................................................... ix
Chapter One ..............................................................................................................................................1
1.0 Introduction......................................................................................................................................... 1
1.1 Background of the study ..................................................................................................................... 1
1.2 Statement of the problem .................................................................................................................... 2
1.3 Research questions.............................................................................................................................. 2
1.4. Objectives of the study....................................................................................................................... 2
1.4.1. General Objective ........................................................................................................................... 2
1.4.2. Specific Objectives .........................................................................................................................2
1.5. Scope of the study.............................................................................................................................. 3
1.6. Significance of the study.................................................................................................................... 3
1.7 Limitation of the study........................................................................................................................3
Chapter Two..............................................................................................................................................5
2.0 literature review .................................................................................................................................. 5
2.1 Jimma university library system ......................................................................................................... 5
2.2 Electronic Information Resources....................................................................................................... 6
2.3 Types of electronic resources..............................................................................................................7
2.4 Collection Development and Collection Management. ...................................................................... 8
2.4.1 Collection development ................................................................................................................... 8
2.4.2 Collection management.................................................................................................................... 9
2.5 Collection development policy ........................................................................................................... 9
2.6 Technical Processing ........................................................................................................................11
Chapter Three..........................................................................................................................................14
3.0 Methodology..................................................................................................................................... 14
3.1 Introduction....................................................................................................................................... 14
3.2 Research design ................................................................................................................................14

iii
3.3 Study area..........................................................................................................................................14
3.4 Study Population...............................................................................................................................14
3.5 Sampling Technique and Sample Size..............................................................................................15
3.6 Data Collection instruments..............................................................................................................17
3.6.1 Questionnaire Design.....................................................................................................................17
3.7 Data analysis ..................................................................................................................................... 18
3.8 Data sources...................................................................................................................................... 18
3.8.1 Primary Sources of Information..................................................................................................... 18
3.8.2 Secondary Sources of Information.................................................................................................18
Chapter Four ...........................................................................................................................................19
Results and discussion ............................................................................................................................ 19
4.0 Introduction....................................................................................................................................... 19
4.1 Demographic Information................................................................................................................. 19
4.2 Electronic resource subscriptions...................................................................................................... 21
4.3 whether culture library use independent subscriptions ..................................................................... 22
4.4 Access type licensor provide in subscription....................................................................................23
4.5 Measures applied in library to control copyright in digital environment..........................................25
4.6 Cataloguing standards of electronic materials. ................................................................................. 26
4.7 Software used for inter library management.....................................................................................29
4.8 Whether the library has weeding policy ........................................................................................... 33
4.7 Years the e-resources remain in collection before weeding..............................................................33
4.9 Access technology applied in library ................................................................................................35
Chapter Five............................................................................................................................................37
5.0 Discussions of findings .....................................................................................................................37
5.1 Findings.............................................................................................................................................37
5.1.1 Mechanism used to manage electronic information resources.......................................................37
5.1.2 Evaluation methods of electronic information resources...............................................................40
5.1.3 Factors affecting the management of electronic information resources ........................................41
5.1.4 Possibility/ways to access the electronic information resources....................................................42
Chapter Six..............................................................................................................................................45
6.0 Conclusions and recommendations...................................................................................................45
6.1 Conclusions....................................................................................................................................... 45

iv
6.2 Recommendations............................................................................................................................. 46
References ..............................................................................................................................................47
APPENDIX A.........................................................................................................................................49

v
List of Tables
Table 4.1 Age Distribution of Respondents.................................................................................. 19
Table4.2 Gender distribution of respondents................................................................................ 20
Table4.3 Respondents education status ........................................................................................ 20
Table4.4 Respondents work experiences...................................................................................... 21
Table4.5 Features provided by the licensor .................................................................................. 24
Table4.6 Major obstacles in dealing with the licensor ................................................................. 24
Table4.7 Limitation imposed by library for copying portion of licensed materials ..................... 26
Table4.8 Culture of organizing electronic materials..................................................................... 30
Table 4.9 Culture to show if library use an integrated OPAC for e-resources ............................. 30
Table4.10 methods to organize the e-resources............................................................................ 31
Table4.11 Weather library system has separate data security policy or not................................. 31
Table4.12 Data security manager if library has separate data security policy.............................. 32
Table4.13 Body responsible for the selection of e-recourses ....................................................... 34
Table4.14 Access method of e-resources...................................................................................... 35
Table4.15 Authorization and authentication of users to use e-resources...................................... 36

vi
List of figures
Figure 4.1 Electronic resource subscriptions ................................................................................ 21
Figure4.2 whether culture library use independent subscriptions ................................................ 22
Figure4.3 Access type licensor provide in subscription ............................................................... 23
Figure4.4 Measures applied in library to control copyright in digital environment..................... 25
Figure4.5 cataloguing standards of electronic materials............................................................... 26
Figure 4.6 software used for inter library management................................................................ 29
Figure4.7 whether the library has weeding policy........................................................................ 33
Figure4.8 Years the e-resources remain in collection before weeding......................................... 33
Figure4.9 Access technology applied in library ........................................................................... 35

vii
Abstract
An electronic information resource is any information sources that the library provides access to
users in an electronic format. These electronic information resources can be accessed via
computer and other devices as much as an electronic network is available. The study was
conducted in jimma university library system to assess users’ problem on the use of library
electronic information material and services available on electronic information resources in the
library system. The cross sectional survey was used for this study. From the 336 total number of
population 40 numbers of respondents were selected. This study was contributed for the library
users, researchers, and curriculum developers in order to find out the problems on materials,
services and users in the Jimma university library system. The future development and success of
academic libraries depends greatly on how they embrace technology in its operation mainly in
the management of electronic resources. The study was an analysis on collection management of
electronic information resources in jimma university library system. The library system uses the
ABCD and Dspace software for the interlibrary management of electronic information resources
in the library. The users can access the collection of electronic information resources in library
and remotely through the campus network. Also researcher tried to identify how the electronic
resources were used in the library and the challenges being faced while trying to offer electronic
resource services. The methodology employed to collect data was the questionnaires. The study
gave insights on the data analysis and findings based on the research objectives. The SPSS
software version 20.0 is used for data analysis. In conclusion the researcher would give
recommendations on what would be done to improve the collection management of electronic
information resources in academic library.

viii
Acknowledgement
First and for most glory to be the almighty God who made all thing possible. I would like to take
this opportunity to express my heartfelt gratitude to my Excellence advisor Mr.Amanuel Ayde
(MSC in information science) for his constructive comments and frequent follow up of my study
from its beginning to its completion throughout the year. My indebted and prime gratitude also
goes to my family for their financial and moral support while I was conducting this research. In
addition, I would like to thanks all Jimma university main library staff workers for devoting their
time in answering the questions. Finally I would like to extend my deepest and special thanks to
my friends for their supporting in all my duty. Also I extend thanks for those who help me in day
to day activities of this research paper writing.
I would like to thanks the college of natural sciences and Department of information science for
their contribution in making my learning a success.

ix
Chapter One
1.0 Introduction
1.1 Background of the study
Evolution and growth of e-publishing industry in the field of ICT has given birth to electronic
resources. It is an umbrella term for all digital resources. Digital information exists in a format
that a computer can store, organize, transmit and display without any intervening conversion
process. It is described as ‘born digital’. They refer to the use of information technology in the
production of publication and the electronic distribution of text through computer terminals.
These resources play an important role in the creation, transmission and storage of information
(Johnson, 2004)
Electronic resources encompass many genre, formats, and storage and delivery mediums. It is a
combination of those resources that are ‘born digital’ and ‘made digital’. The storage refers to
the medium used to store and deliver contents to the users. The delivery medium may be a CD-
ROM, a magnetic tape or a server that is accessed through the Internet (Johnson, 2004). Thus
electronic information arena involves resources covering a wide variety of materials, including
indexing and abstracting services, electronic books and serials, electronic databases offered by
information aggregators, document delivery services and web sites. Many of these resources may
be locally mounted on a library’s server or they may be accessed remotely by modem or through
direct Internet connections maintained by the library (Sivaraj, 2007).
Electronic resources located and remotely accessed by librarians have been characterized by
continuous, incremental growth in products and services. They present unique considerations
like comparing various delivery and access media for the same content, complex pricing
structures, access to retrospective files, copyright, security, bibliographic control, indexing,
archiving and contractual licensing issues and high expenses. The wide spread availability of
electronic resources posed new challenges in the library acquisition process such as site
licensing, copy right issues and means to provide access to various electronic resource (Sivaraj,
2007)
Best standards and practices are still in the development stage to handle the compatibility of the
systems, standard format, interoperability, data encoding and transmission scheme to convey
information.

1
1.2 Statement of the problem
The phenomenon of collection management of electronic information resources in jimma
university library system was still a recent development. There was a need to study the various
models, guidelines and procedures and collaborative approach towards access to e-resources.
The literature review indicates that no exhaustive work on the topic has been done stating the
general guidelines, policy, licensing principle of e-resources, access and use of e-resource by
jimma university library system. In the light of the above facts a need has been felt to undertake
the research on the topic- “Collection Management of Electronic Information Resources in
jimma university library system: The study enabled to learn all the important aspects of
collection management of e-resources in greater depth and collections to reap the benefit of
electronic resources.

1.3 Research questions


1. What are the mechanisms used to manage the electronic information resources in the
library?
2. How the collections of electronic information resource in the library were evaluated?
3. What are factors that affect the collection management of electronic information resource
in the library?
4. What are the possibilities to access electronic information resources available in the
library?
5. What improvements are required to improve the collection management of electronic
information resource?

1.4. Objectives of the study

1.4.1. General Objective


The main objective of the study was to assess preferred collection management of electronic
information resources activities carried out in jimma university library system.

1.4.2. Specific Objectives


The specific objectives related to the present study were as follows:
 To investigate the mechanism used to manage the electronic information resource in the
library.

2
 To investigate the evaluation method of electronic information resources in the library
 To assess factory affecting the collection management of electronic information resources
in the library.
 To investigate the possibility to access the electronic information resources in the library
 To assess the improvement required to improve collection management of electronic
information resources in the library.
 To investigate how electronic information resources enable for the research output.

1.5. Scope of the study

The study was to investigate the collection management of electronic information resources in
jimma university library system .The activities was performed starting from March 2015 up to
May 2016.Thie study was conducted in Jimma University library system. The staff workers
were the part of the study. The study area was Jimma University library system. Questionnaire
was used for data collection. SPSS version 20.0 was used for data analysis.

1.6. Significance of the study


The study would be to introduce the vital roles of collection management of electronic
information resources for research production of academic staffs and JULS in saving their time
and money. It was took a long way in knowing the importance, efficiency and effectiveness of
collection management of electronic information resources in the jimma university library
system. By the study, jimma University Library Systems would be use as a bench mark in
assessing their electronic information resources provision to enhance productivity of their end
users. Not only jimma university library system but also other researchers and development
institutions and other organizations working on research and development would be the
beneficiary from the study.

1.7 Limitation of the study


The researcher faced within the following drawbacks during conducting the research.

 Lack of time to accomplish all tasks.


 Resources/Financial limitation.
 Lack of willingness from the respondents to answer all questions properly.

3
 Researcher unable to conduct the interview with respondents due to time limitation, as a
result the fifth research question remains without got the answer.
 Due to lack of researcher’s experiences on the research, the required objectives were not
handedly achieved.

4
Chapter Two
2.0 literature review

2.1 Jimma university library system


The study was conducted in jimma university library system. It is located to south of west of the
country which is 350 km from Addis Ababa. Jimma is the home of different ethnic diversity
where different private university colleges and governmental higher institution are actively
engaged in producing skilled citizens who would be take part in the Ethiopian growth and
transformation policy. Jimma University is one of higher institution found in Ethiopia having
five colleges, two institutions and school of graduate studies (College of Natural Sciences,
College of Social Sciences and Law, College of Public Health and Medical Sciences, College of
Business and Economics, College of Agriculture and Veterinary Medicine, Jimma Institute of
Technology, Institute of Educational and Professional Development and School of Graduate
Studies) working the University’s core vision and mission. In parallel to its academic activities,
Jimma University is well known to the neighbor community and other communities in the nation
by community based education strategy having the motto “We are in the Community”. This is to
alleviate various community problems by the intervention of experts through scientific
investigations (jimma university, 2013).
Jimma University Library System (JULS) is established as a University Library in 1999,
commissioned to promote the Instructional, Research, and Public Service goals of the entire
University Community through the expert provision of information. It provides both
conventional and electronic information services through all its branch libraries (Main Library-
1999, Agriculture and Veterinary Medicine College Library-1952 Health Sciences Library-1985,
Education Library-2003, Technology Library-2004, Social Sciences Library-2004, Graduate
Studies Library-2004, Law Library-2005, Business and Economics College Library-2010,
Females library-2010) to meet the its core mission and vision (jimma university, 2013).

Jimma University is caring out the responsibility of academic and research activities given to it
by the Ethiopian Ministry of Education. In addition to its traditional information services through
print materials, Jimma University afford electronic information resources freely to its academic
staffs, other non-academic staffs and students to enhance academic work and research activities
by delivering electronic information resources through its library systems.

5
Collection management in the field of library management is a classic topic. It has become
complex owing to the diversity in the presentation of information in different formats and varied
electronic resources.
Many studies have been conducted worldwide on the changing scenario of collection
management due to the impact of information and communication technology. They have
examined the process of collection management in addition to its specific elements and identified
factors with broad implications in the new information environment. While examining and
analyzing the status of research in collection management various sources have been identified,
which serve as an invaluable and practical guidelines for collection management.
The review of literature in this area is of prime importance for the present research study as it
reveals a series of changes that have occurred in collection management since the origin and
beginning of libraries. It pinpoints the various stages of development that have taken place since
its inception. It is able to throw light on what further research has to be done, especially to deal
with this change from collection management of print documents to electronic resource
management. It identifies any lacunae where a study has to be carried out forward in library
collection management.

2.2 Electronic Information Resources


Electronic information resources are a method by which information is stored electronically and
made accessible through electronic systems and networks. In addition to that „Electronic
information resource‟ is a broad term that includes a variety of different publishing
reproductions, including OPACs, CD-ROMs, online database, e-journals, e-books, internet
resource, print-on-demand (POD), e-mail publishing, wireless publishing, electronic link and
web publishing etc (Haridason, 2009).

The proliferating growth of various electronic resources in the present digital environment opens
up new horizons across a broad array of issues related to the access, availability of information in
different formats, collection policy agreements, licensing agreements, copy right issues, resource
sharing, preservation and collection assessment. There is enormous literature available on this
subject of collection management of electronic resources.
The investigation was carried out by reviewing the studies related to the existing scenario of
collection management policies, problems and current practices in the field of academic libraries.

6
Related literature on collection management of electronic journals accessed through networks
and download from the web. These articles are grouped under collection management: concept
and characteristics of e-resources on collection management, collection development policies,
changing dimension of collection development to collection management and related case
studies and user studies will be conducted by researchers in jimma university library system.
They would be categorized, analyzed and their findings would be interpreted.

2.3 Types of electronic resources

Online databases
Online database is a collection of e-books, e-journals by various publishers in different fields that
can be accessible online. Some of these resources are provided at no cost to libraries in
developing countries, while others require some fee payable as subscription. However, access to
these databases provides researchers with thousands of scholarly journals articles in one field of
specialization or research (Bozimo, 2007)

Digital information
Digital information is a method by which printed information resources in the libraries and
information centers can be converted to electronic form by digital means. It is a recent
technology thereby information materials in paper format are converted by machine into
microfilm and other miniature form in order to have quick and easy access to them by electronic
means. The mechanism by which information in paper format is converted to digital information
is called digitization. However, the advantages accrue from the world of digitalization of
libraries in the provision of access to primary electronic sources from any remote geographic
location and multiple accesses to a single resource are quite enormous. Nevertheless, as special
and valuable collections are confined to certain institutions, users from different institution,
research centers etc have to travel a long way to access the materials.

7
(Ellis, D.& oldman ,H, 2005) opined that researchers from different institution further away from
library or information center where the printed information resource is found felt that digitized
resources would allow them to get hold of materials more easily without problem, hence, most
researchers are of the opinion that digitalization of certain materials in the library would be a
huge benefit in terms of accessibility to relevant information.
Electronic journals
As result of the development of internet, researchers and public library institutions have cognized
the quality and capabilities of Information and Communication Technologies(ICTs) as
‟‟effective means to exchange results from findings , to get around barriers by full transfer of
intellectual property rights, from the author to publisher and to improve on the hitherto slow
turnaround of traditional publishing (Corria, A.M.R and Neto,M.D, 2002).This development has
therefore resulted to growing number of electronic journals, pre-print(e-print), archives, and
electronic books. However, electronic journals relatively provide efficient access to information,
hence they are easy to distribute to library clientele than the traditional print information.
CD-ROM databases
CD-ROM databases are electronic information resources that are damped on the CD-ROM
storage device. CD-ROM databases allow users access to relevant databases without internet
connectivity in libraries. It is therefore cost effective than online databases, as information can
conveniently be accessed offline without paying for telecommunication fee.
The introduction of CD-ROM has led to the use of e-journal collections in the reference library
and an increase in the states of libraries (Oduwole, A.A, 2001). Besides this CD-ROM database
is of great value over conventional (print) information resources if the system is networked, as
library patrons at their respective terminals could access information without coming to the
library (Oduwole, A.A, 2001).

2.4 Collection Development and Collection Management.

2.4.1 Collection development


The Harrod’s Librarian’s Glossary (1984) defines the term collection development as “The
process of planning a stock acquisition program not simply to cater for immediate needs but to
build a coherent and reliable collection over a number of years, to meet the objectives of the
service”. The purpose of collection development is to find the users information needs,select,
8
acquire documents that are useful, adopt a systematic and judicious spending on document
collection, periodically review the collection and weed out unwanted materials from the
collections. It aimed to develop a balanced collection that meets the objectives of the university
library.

2.4.2 Collection management


According to (Nisonger, Thomas E, 2001) Collection management is the systematic, efficient
and economic stewardship of library resources. It is systematic because it is analytic and
programmatic. It deals with the functional program that follow institutional and library goals and
objectives. Collection management involves selection, order, acquisition, budgeting, fund
allocation, technical processing, storage access, maintenance. It also involves the management of
human resources in performing these operations.

2.5 Collection development policy


The goal of the Libraries is to provide an effective combination non-print and electronic
resource, and the integration of the use of these resources in support of teaching, learning and
research at the University. Electronic resources, however, pose challenges not encountered with
the acquisitions of traditional library materials, such as access, interface, and technical support
and licensing. The Libraries therefore need to formulate a separate Electronic Resources
Collection Development Policy to address these issues. The purpose of this policy is to provide
guidelines in choosing appropriate electronic resources and to establish consistency and priorities
in managing this important part of the Libraries' collection (Breaks, mickael, 1999).
Acquisition Program
Collection development and acquisition programmes have always been closely coordinated in
library and information centers. They depend on the objectives of the library and its parent
organization. The acquisition program consists of the following activities like electronic material
selection, electronic material ordering, acquisition, accessioning, technical processing, storage
and maintenance (Feather, j and p sturges, 1997).
Selection
The selection of electronic resources continues to be trouble shooting for many libraries.
Selection’s in today’s libraries covers a number of new technical and cost factors (Feather, j and
p sturges, 1997).
9
Access Vs Ownership

Vendors offer bundle or package a number of resources, titles, or images that have an impact on
the selection process from title by title selection to an aggregate approach (George, Vicki, 2000).
Licensing
One of the key issues that a library considers in acquiring any new electronic resource is about
the purchase of the resource or only obtaining the copyright and licensing issues to use it. Many
of the traditional fair use rights that libraries have enjoyed for print materials are no longer
assured in the new electronic age of information. Today dealing with licensing agreements for e-
resources have become unavoidable for acquisition librarians. As the number of available
databases rapidly increases the variety of licensing restrictions and special clauses applicable to
them seem to grow at a more rapid rate (Holden, Jesse, 2010).
Vendor Relationship
Librarians have to deal with vendors’ for Web accessible databases and journals, sign a license
agreement with a publisher or distributor before being able to access the resource. The basic
librarian/vendor relationship form is products and standards where librarians and vendors
collaborate to improve service to library patrons. These license agreements vary widely from
different vendors and are not standard and predictable. Vendors should invest a considerable
amount of time in establishing and maintain personal relationship with libraries. Decisions to
work with particular vendors and publishers should be made objectively, to ensure that the fairest
prices and best practices are obtained on behalf of the library’s users (Holden, Jesse, 2010).
Resource Sharing
Another important factor that influenced the library collection development is resource sharing.
This concept is old but gained momentum with computer network environment paying way for
consortia. Resource sharing is one of the components of cooperative collection development and
management. It began decades ago as a means to alleviate problems of lack of space, high costs
of periodicals, limited budgets and costly duplication especially for less used materials. .
Resource Sharing was adopted as no library can independently satisfy the needs of its users. It
links users with needed material and information regardless of where that material is located.
(Michael.k, Buckland, 1989) Writes that resource sharing has two uses they are collaborative
cooperation amongst libraries and effective utilization of technology.

10
In the emerging digital environment resource sharing has expanded to include consortia
agreements to purchase group access to electronic resources at discount prices. The objective of
these consortia is to share resources, mostly periodicals, followed by books, tutorials, reference
sources, thesis, dissertations that are available in electronic form. A consortium facilitates access
to full text databases, journals articles, research papers and other information resources in
electronic form. It was practiced as an agreement among libraries in the system leading to
cooperation (Michael.k, Buckland, 1989).

2.6 Technical Processing


The main goal of Technical services in the past and the present is its efficiency. According to
George Vicki (2000), libraries pass through five phases or levels of organization in implementing
access and organizing of electronic products from initial no formal organization to full MARC
cataloguing of the items. He described the five levels as follows: In the first level there is no
organization. The library simply offers users open web access. In level 2- Web-bibliographies
are complied by the library. These links are hyperlinked on a computer page to provide a method
of taking user directly to the recommended website. In level-3 Web-bibliographies are
supplemented with addition of metadata to selected web resources that are housed on a local
server to facilitate retrieval. These resources may be searched from the library website or from
the electronic catalog. In level-4 libraries catalog the physical items purchased but remotely
accessed resources are also linked through the library website. In level-5 libraries apply MARC
cataloguing to electronic or web resources. Libraries in level-5 follow one of these approaches.
Catalog all those electronic resources that are either owned by the library or maintained on its
local system. Catalog those significant resources that are anticipated to be heavily used by local
patrons or library staff Catalog all items identified by subject specialists that fit the collection
development policy of the library." Cataloguers have taken an active role in organizing and
providing pathways to electronic information.
Access
Metadata is more popularized to describe data elements in electronic format. Using e-resources
involves controlling access to licensed databases or resources. Controlled access involves a two
step process. First process involves the “authentication” of users to access e-resources. Once

11
users are authenticated they would be able to use all e-resources regardless of where they are
physically located.
Publishers have set up and developed a number of standardized ways of allowing remote access
to their users. These methods include:
 IP Access- Database and electronic journal vendors allow IP authentication for a specific
range of IP addresses.
 Generic Passwords based approach- Allows users to use numbers or codes that are
standardized for a particular organization. This approach is effective when resources are
licensed for use by a consortium.
 User account coupled with IP source detection.
 X.509 certification that gives a particular machine the right to use a particular name. The
name is verified by checking the ‘certificate authority’.
 Proxy Server: It is a computer that offers a computer network service to allow clients to
make indirect network connections to other network services.
 Virtual Private Network (VPN): A proxy server is capable to connect are mote user
with specified resources, but in some cases distant offices and remote users are required
accesses to the institutional network as if they are actually, physically on the institutional
intranet.
Providing access to e-resources facilitated easy retrieval to the library user but created many
challenges to the collection development librarian. They have to consider the various access
licenses that involved significant ongoing obligations like access given to anyone who access the
library through Internet, only to onsite user, only to anyone who comes into the library, access
permitted for offsite users, access provided at different access nodes located on the campus,
permission to print, copy or download from the resource, number of copies permissible,
permission to make copies of the e-resource for inter library loan purpose, right to archive the
material and termination of license agreements.
Therefore it would be observed that the nature of acquisition work would be changed
significantly from traditional to electronic environment. Electronic information resources that
have been selected by the library need to be organized for easy retrieval and access by users, for
which access management must be addressed from the user’s perspective.

12
Preservation: Preservation is an essential part of collection management in large academic
libraries. The advent of electronic information resources would be changed the nature in which
preservation strategies were carried and implemented (Nisonger, Thomas E, 2001).

13
Chapter Three
3.0 Methodology

3.1 Introduction
The purpose of this section was to present the methods and procedures that the researcher used in
carrying out the study. Attempt was made to describe step by step, the methods, procedures and
other devices was used to collect, analyze and interpret data. It also shows what steps was taken
to ascertain the validity and reliability of instruments was used.

3.2 Research design


A cross sectional survey was used for the study. The purpose of the study design was to find the
prevalence of the outcome of interest, for the population or subgroups within the population at a
given time point. Cross-sectional studies are sometimes carried out to investigate associations
between factors and the outcome of interest. They are limited, however, by the fact that they are
carried out at one time point and give no indication of the sequence of events whether exposure
occurred before, after or during the onset of the outcome. And this study design would have a lot
of advantages for this study, relatively inexpensive and takes up little time to conduct; can
estimate prevalence of outcome of interest because sample was usually taken from the whole
population; many outcomes and factors was assessed; and there was no loss to follow-up (Alive,
M & Leidner,D.E, 2001).

3.3 Study area


The researcher was focused on the collection management of electronic information resource in
jimma university library system. The researcher would be hope that the effective management of
electronic information resources was practiced in the jimma university library system. The
effective access, management of electronic information resources would be the result of this study.

3.4 Study Population


The study population was the staff workers of jimma university library system. The respondents
of the study were the staff workers of jimma university library system. The total number of the
population of the study was 336.From the total number of population 40 respondents have been
selected. The researcher was believed that those respondents would be well suited for the study

14
and would give in-depth information and provide better and comprehensive information on e-
resource used in their university. So, the intention of the researcher was to assess relevant
information from those population based on sample taking techniques.

3.5 Sampling Technique and Sample Size

Sample size of the staff workers of jimma university library system


For this study, the researcher was used simple random sampling technique. An appropriate
sample size is means of gaining high precision, accuracy and confidence with minimum cost. In
this study the researcher was used single population proportion to determine the sample size. The
overall sampled size was estimated based on the level of precision required in the estimated by
specifying the acceptance margin of error and the confidence level by using the following
formula:-

Sample Size Determination Formula:

2
z * p*q* N
n 2 2
……………… (Kothari, 2004)
E * ( N  1)  z * p * q
WHERE:-

 N= total population

 n = required sample size


 z = confidence level at 95% (standard value of 1.96)
 E = margin of error at 5% (standard value of 0.05)

 p =population proportion at which the sample size is maximum (at p=0.5 and q=0.5,
p*q=0.25)
 q=1-p
2
z * p*q*N
n 2 2
E * ( N  1)  z * p * q

Sample sizing of the staff workers of jimma university library system.

N= 336(The number of staff workers of the library system)

15
2

n 1.96 * 0.5 * 0.5 * 336


2
0.05 * (336  1)  1.96 * 0.5 * 0.5
2

3 .8416 * 0 .25 * 336


n
0 .0025 * (335 )  3 .8416 * 0 .25

322 . 6944
n
0 . 8375  0 . 9604

n=179

To check the finite population correction (FPC) the researcher divided the determined sampled
size to the population. If the result was greater than 5% (i.e. n/N>5%N), FPC would be used to
adjust the final sample size unless the required sample size can be accepted as it is (Kothari,
2004).

n
FPC formula: n 
f
1 c

Where c=n/N and, nf=final sample size

n 179
c   0.533
N 336

Since the value of c was greater than 5%, the researcher uses finite population correction (FPC)
to have the correct sample size.

n
FPC formula: n 
f
1 c

nf=179/ (1+0.533)=116

Therefore, the researcher identified that, sampled size of staff workers was 116.but for the limitation
of business and time researcher was took 40 numbers of respondents.
Sample size determination is the act of choosing the number of observations or replicates to
include in a statistical sample. The sample size was an important feature of any empirical study

16
in which the goal was to made inferences about a population from a sample. In practice, the
sample size used in a study was determined based on the expense of data collection, and the need
to have sufficient statistical power. In complicated studies there would be several different
sampled sizes involved in the study.

3.6 Data Collection instruments


The instruments for collecting data are questionnaires, interviews, observations and analysis of
the documents but for the purpose of this research, questionnaire was used to collect the data.
Questionnaires were formulated from the objectives; Fourty (40) questionnaires were distributed
to the library staff members. Respondents were given the chance to tick the most appropriate
response to an item and the questionnaire items included the vital issues to provide all the
necessary answers to the research questions. Structured questionnaire was administered
personally to reduce the risk of failure to respond or return the administered questionnaire and
also ensure that relevant and accurate information were obtained from the respondents. Such
designed question type could be viewed in the appendix. Again, personally administering the
questionnaires also enabled the collection to be easy and effective.

3.6.1 Questionnaire Design


Keeping in view the objectives, scope of the study and taking into consideration the massive shift
in the selection, management, dissemination and use of electronic resources by library
professionals and users, the questionnaire was devised and used to collect the data for the study.
Efforts was made in designing the questionnaire in such a way that accurate, valid and reliable
results was obtained. The questions was formulated to realize the extent of utilization of
electronic resource collections, the information seeking behavior of the users, their preferences
and expectations about the library collections and their satisfaction. While designing the
questionnaires, due care was taken to make it comprehensive by including all the essential
aspects without sacrificing its simplicity and objectivity. The length of the questionnaire was
reduced to increase the response rate. An effort was made to pretest and finalize the
questionnaire for distribution. For the study questionnaire was made for the university Library
staff works. A detail of the contents in the questionnaire was given in the subsequent sections.

17
3.7 Data analysis
The analysis of data was done at the end of the data collection. The responses were categorized
on the basis of information provided by respondents. Statistical Package for Social Sciences
(SPSS version 20.0) was used to analyze the data. The data was presented and interpreted using
frequency distribution tables, percentages, pie chart and bar charts. The SPSS version 20.0 has
the incredible capabilities and flexibilities of analyzing huge data within seconds and generating
an unlimited gamut of simple and sophisticated statistical results.

3.8 Data sources


Both primary and secondary sources of data were used in this study.

3.8.1 Primary Sources of Information


Primary data are the original data collected for a specific research goal or information that one
has acquired from questionnaire, interview or observations. A primary source of data was chosen
because there was the need to obtain information at first hand from the selected respondents
within the University library staff workers. Structured questionnaire were used to gather
information from respondents.

3.8.2 Secondary Sources of Information


Secondary data are data originally collected for a different study, used again for a new study or
purpose. The researcher used articles from the internet, journals, documented reports and
information from the internet.

18
Chapter Four

Results and discussion

4.0 Introduction
This chapter presents the analysis and data collected from sampled respondents. In all, Fourty
(40) questionnaires were distributed to both male and female staff member of the jimma
university library and Fourty (40) questionnaires were retrieved.
The analysis was done based on items in the questionnaire and organized in line with the
research questions and objectives stated in chapter one and they are presented in the form of
frequency distribution tables and pie charts and graphs to give better explanations and also make
the analysis easier. These modes of data presentations were generated from survey data with the
aid of Statistical Package for Social Science (SPSS) version 20.0.

4.1 Demographic Information


This is the first aspect of the analysis which deals with the basic data on the respondents (library
staff member). It was important to find out from the respondents their age, gender, educational
background and year of work experiences. These specific characteristics would affect their
participation in the study, because individual responses or perceptions on some issues may vary.
The data involves respondents’ gender, age, level of education and number of years worked with
the University which is presented as follows;

Table4.1Age Distribution of Respondents

Age range Frequency Percent

20-30 29 72.5

30-40 9 22.5

above 50 2 5.0

Total 40 100.0

As the above table 4.1 indicates that 29(72.5 %) of the respondents were age between20-30,
9(22.5 %) of the respondents said that the age were between30-40, 2(2 %) of the respondents
were age greater than 50 age. This implies that most of the respondents were between20-30,

19
which accounts about 29 respondents from the total of 40(100 %). Based on this clue researcher
concluded that most respondents lie in the age of 20-30 year, who are very energetic and can
help the institution to achieves its target or objectives.

Table4. 2 Gender distribution of respondents

Gender Frequency Percent

male 19 47.5

female 21 52.5

Total 40 100.0

As the above table 4.2 indicated that, 21 (52.5%) of respondents were female, and 19(47.5%)
respondents from total population 40(100%) were male. This table implies that most of the
respondents were female who were working in main library. This confirms the perception that
administrative duties is highly resides in the hands of female employees. Based on this table the
researcher concluded that male workers are not equally participated in the management of library
collection. This unequal participation of male and female workers in the management of
collection of library material indicates male workers has no more interest as female workers did.
Table4.3 Respondents education status

Education level Frequency Percent

Certificate 1 2.5

Diploma 7 17.5

Degree 28 70.0

Master 4 10.0

Total 40 100.0

As indicated in the above table 4.3, 1(2.5%) of respondents were certificate holder, 7 (17.5%) of
respondents were diploma holders, 28(70.0 %) respondents were degree holder and 4(10.0 %)
respondents were master education level holders. This table implies that most of the library staff
members are degree holders in their education level. Based on this information researcher

20
concluded that the library has well educated man power to achieve objective and goal of the
library which pave the way to provide the effective and up to dated information/ service for their
users.

Table4.4 Respondents work experiences

Year of work Frequency Percent

1-3 year 8 20.0

3-5 year 17 42.5

5 and 15 37.5
above

Total 40 100.0

As the above table4.4 indicates that 8 (20.0 %) of the respondents said their work experience was
1-3 Years, 17(42.5 %) of the respondents were said their work experience was 3-5 Years and 15
(37.5 %) respondents said their work experience was above 5 years from total population of
40(100.0%) respondents. This table implies that most of the respondents were 3-5 Years’
experience in main library staff members. Based on this output the researcher concluded that the
library has an experienced man power to launch good administration in management of library
resources and services for its researchers/users.

4. 2 Electronic resource subscriptions

Figure4. 1 Electronic resource subscriptions

21
As the above figure 4.1 indicates that 14(35.0%) respondents said that library staff uses
independent subscription, 7(17.5%) respondents said that library staff uses consortia for
subscription, and 19(47.5%) respondents of total population of 40(100.0%) said that library staff
use both independent and consortia subscription for electronic information resource in library.
This implies that the university library staff uses consortia and independent subscriptions for
electronic information material in their library. Based on this information, researcher concluded
that the library system uses both independently and consortia methods for the subscription of the
e-resources.

4. 3 whether culture library use independent subscriptions

Figure4. 2 whether culture library use independent subscriptions

As the above figure 4.2 indicates that 12(30.0%) respondents said that library staff use direct
from publisher subscription of independent subscription, 5(12.5%) respondents said that library
staff use vendor impendent subscription and 8(20%) respondents said that library staff use
aggregator independent subscription. But 15(37.5%) of respondents are refused with the
independent type of subscription of electronic information resources of the library. This implies
that, the library system did not use the independent type of subscription for their electronic
information resources within the library. E-subscriptions provide immediate access to each issue
of Monthly Review, annually via website–that is, on the first of the month, without any delay–
and offer an affordable way to support the work. E-subscribers receive access to the Monthly
Review Archives website which contains individually indexed PDF versions of every article
published in monthly review magazine, journal, newspapers, and research materials for the
collection development of the library materials. Stay up-to-date with the world’s largest
collection of research papers in optics and photonics. The SPIE (Society of Photographic

22
Instrumentation Engineers) Digital Library provides engineers and scientists with the latest
information on light-based technologies. Subscriptions are available for individuals (with limited
downloads) or for institutions (with limited downloads). Individual SPIE (Society of
Photographic Instrumentation Engineers) with more than 430,000 papers spanning biomedicine,
communications, sensors, defense and security, manufacturing, electronics, energy, and imaging,
the SPIE digital library is the most extensive research database available on optics and photonics
research. Digital Library subscriptions are available for personal use and are good for one year.
Downloads made by the individual Digital Library subscriber are for the sole use of the
subscriber. By engaging to the SPIE digital library, the library system provides the various
electronic information resources for the library collection by subscribing the agreement which
provided by the SPIE digital library. The subscription made by the library is may be, monthly,
weekly, or annually subscription based on the will of the library.

4.4 Access type licensor provide in subscription

Figure4.3 Access type licensor provide in subscription


As the above figure 4.3 indicates 12(30.0%) respondents said that licensor provide the archival
access, 15(37.5%) respondents indicated that licensors provide backup copy, and 13(32.5)
respondents said that licensors provide both archival and backup copy access of total population
40(100.0%). This implies that, licensor provide backup copy access during the library material
subscription. From this researcher concluded that the licensors provides the backup copy access
during the subscription of the electronic information resources for the library collection
development.

23
Table4.5 Features provided by the licensor

Features provided by licensor Frequency Percent

providing electronic links 8 20.0

Access to database 18 45.0

Archival/backup copy 3 7.5

providing electronic link and access to database 9 22.5

all 2 5.0

Total 40 100.0

As the above table 4.5 indicates 8(20.0%) respondents said licensor provide electronic link
feature, 18(45.0%) respondents said licensor provide access to database feature,3(7.5%)
respondents said that licensor provide archival/backup copy feature, and 9(22.5%) respondents
said that licensor provide electronic link and access to database feature of total population
40(100.0%.). This implies that the licensor provide database access feature in their license
(agreement) for electronic information resources for the library. Based on this information
researcher concluded that the licensors provide access to the database feature for the library and
followed by providing the electronic link for the library to connect the library to their database
server. As the results, users can access those databases and access through the link provided by
the licensor.
Table4.6 Major obstacles in dealing with the licensor

Major hindrances with licensor Frequency Percent

Disparity in the bargaining power 10 25.0

inflexibility on the part of vendor 19 47.5

fitting license agreements to the needs of library 8 20.0

not knowing what to look for 2 5.0

delay of supply 1 2.5

Total 40 100.0

As the above table 4.6 indicates 10(25.0%) respondents said, the major obstacles during dealing
with licensor was disparity in the bargaining power, 19(47.5) respondents said, the major

24
hindrances during dealing licensor for electronic information resources was inflexibility on the
part of vendor,8(20.0%) respondents said, the major problem during dealing with licensor was
fitting license agreements to the need of library, 1(1.5%) respondent replied, the most obstacle
during dealing with the licensor was delay of supply and 2(2.5%) respondents of total population
40(100.0%) said that the major problems was not known what to look for during dealing with the
licensor for material in collection. This implies that the major obstacle in the library during
dealing with the licensor was inflexibility on the part of vendor. From this the researcher
concluded that the major problems that occur when dealing with the licensor to have electronic
information resources for the library collection were inflexibility on the part of vendor.

2.5 Measures applied in library to control copyright in digital environment

Figure3.4 Measures applied in library to control copyright in digital environment


As the above figure 4.4 indicates 33(82.5%) respondents replied that, library system use special
security measure to control the copy right of electronic material, 3(7.5%) respondents said that
jimma university library system use an Ant plagiarism software to control the copyright of
materials, 2(5.0%) respondents said that library system use both special security measure and
anti-plagiarism software to control the copyright of electronic material, and 2(5.0%) respondents
said that jimma university library system did not use any mechanism to control the copy right of
material within library of total population 40(100.0%). This implies the Jimma University library
system use special security measure software to protect the copyright of electronic information
resources which is responded by 33(82.5%) respondents of total population 40(100.0%). Based
on this information, the researcher concluded that the library system uses special security

25
measure software to protect the copyright of electronic information resources in digital
environment.

Table4.7 Limitation imposed by library for copying portion of licensed materials

Alternatives Frequency Percent

stop access for a specific 27 67.5


period

cancel membership 2 5.0

file a case 6 15.0

nothing 5 12.5

Total 40 100.0

As the above table 4.7 indicates 27(67.5%) respondents were said the library system stop access
for a specific period of time for the material that was licensed during the access time in library,
2(5%) respondents were said that the library cancel the membership of the users who try to copy
some portion of licensed material during the access time in the library, 6(15.0%) respondents
were said the library file a case to prevent the copy of licensed material for the effective library
management and 5(12.5%) respondents were said that the library system has no any methods to
prevent the users from copying the portion of licensed material. This implies that the library
system stop to access for a specific period of time to prevent the users from copying some
portion of licensed materials without the permission of the library, which is responded by
27(67.0%) respondents of total population 40(100.0%). From this researcher concluded that the
library systems control the security of licensed material from copying some portion of it by
stopping the access of licensed materials for specific period of time.

4.6 Cataloguing standards of electronic materials.

26
Figure 4.5 cataloguing standards of electronic materials.
As the above figure 4.5 indicates 6(15%) respondents were said library system uses AACR2
standards for cataloguing the electronic information resources, 5(12.5%) respondents were
responded that library system use MARC standard to catalogue the electronic information
resources, 22(55.0%) respondents were said that the library use metadata (Dublin core) standard
to catalogue the electronic information resources, and 7(17.5%) respondents were said that the
library system use all three cataloguing standards(i.e. AACR2,MARC and metadata) for
cataloguing electronic information resources in digital environment of library system of total
population 40(100.0%). This implies that the library system uses metadata (Dublin core)
standard for the cataloguing of the electronic information resources which responded by
22(55.0%) respondents of total population 40(100.0%). The Dublin Core metadata standard is a
simple yet effective element set for describing a wide range of networked resources. The Dublin
Core standard comprises fifteen elements, the semantics of which have been established through
consensus by an international, cross- disciplinary group of professionals from the scholarly fields
of librarianship, computer science, text encoding, museum and archive management, among
others. Those Fifteen elements of Dublin core are used to identify the particular digital object
within the library (Quam, 2000). These elements of Dublin core are listed as follows.
Title: The name given to the resource by the creator or publisher.

Creator: The person(s) or organization(s) primarily responsible for the intellectual content of the
resource; the author.

27
Subject: The topic of the resource; also keywords, phrases or classification descriptors that
describe the subject or content of the resource.

Description: A textual description of the content of the resource, including abstracts in the case
of document-like objects; also may be a content description in the case of visual resources.

Publisher: The entity responsible for making the resource available in its present form, such as a
publisher, university department or corporate entity.

Contributors: Person(s) or organization(s) in addition to those specified in the creator element,


who have made significant intellectual contributions to the resource but on a secondary basis.

Date: The date the resource was made available in its present form.

Type: The resource type, such as home page, novel, poem, working paper, technical report,
essay or dictionary. It is expected that type will be chosen from an enumerated list of types.

Format: The data representation of the resource, such as text/html, ASCII, Postscript file,
executable application or JPG image. Format will be assigned from enumerated lists such as
registered Internet Media Types (MIME types). MIME types are defined according to the
RFC2046 standard.

Identifier: A string or number used to uniquely identify the resource. Examples from networked
resources include URLs and URNs (when implemented).

Source: The work, either print or electronic, from which the resource is delivered (if
applicable).

Language: The language(s) of the intellectual content of the resource.

Relation: The relationship to other resources. Formal specification of relation is currently under
development.

Coverage: The spatial locations and temporal duration characteristics of the resource. Formal
specification of coverage is also now being developed.

28
Rights management: - A link (URL or other suitable URI as appropriate) to a copyright notice,
a rights-management statement or perhaps a server that would provide such information in a
dynamic way (Quam, 2000).

4.7 Software used for inter library management

Figure4. 6 Software used for inter library management


As the above figure 4.6 indicates 4(10%) respondents said that Dspace software is used for inter
library management, 21(52.5%) respondents said ABCD software is used for inter library
management, and 15(37.5%) respondents said both Dspace and ABCD software were used for
interlibrary management. The result shows that ABCD software is used for interlibrary
management. The purpose of interlibrary loan as defined by the American Libraries Association
Interlibrary Loan Code and Explanatory Supplement (revised 2008) is the process by which a
library requests material from, or supplies materials to, another library. The ABCD software
delivery includes any service, locally or at a distance, that involves sharing a library's own
collection with its own patrons can access the resources available within the library through
OPAC (online public access catalogue). The ABCD software was the software that the library
uses for the creation of digital library which contains various modules such as Loan module,
acquisition module and circulation modules. The researchers or patrons could check the
materials availability remotely through the campus network by using the user interface OPAC.
This ABCD software was used for inter library loan systems to borrow the books to its patrons.
The second software ranked in this inter library management is Dspace which was used for the
integrated library management for the digital library purpose, which was preserves the

29
accommodation of the various electronic information resources, dissertation, thesis and various
researches for the further study. This software (i.e. Dspace) was used for interlibrary
management to have an archive of electronic information resources which their requirement is
high degree in values.
Table4.8 Culture of organizing electronic materials

Alternatives Frequency Percent

yes 37 92.5

No 3 7.5

Total 40 100.0

As the above table 4.8 shows 37(92.5%) respondents were agree with the organization of the
electronic information material, and 3(7.5%) respondents of total population 40(100.0% ) were
not agree with the organization of the electronic information materials in the library. This table
indicates that almost all respondents were agreeing with the organization of electronic material in
the library.
Table 4.9 Culture to show if library use an integrated OPAC for e-resources

Alternatives Frequency Percent

No response 1 2.5

Yes 28 70.0

No 11 27.5

Total 40 100.0

As the above table 4.9 indicates 28(70.0%) respondents were said that the library system use an
integrated OPAC for the management of e-resources, 11(27.5) respondents said that the library
system did not use an integrated OPAC for the management of e-resources and 1(2.5%)
respondent of total population 40(100.0%) was not aware about the integrated OPAC for the e-
resources. This results concluded that the library system use an integrated OPAC for the material
of e-resources management. The library system uses this OPAC user interface which was the
interface that the librarians developed for the end users to access the materials that they included

30
for the library collection within the help of ABCD software to have the digital library for the
modernized or effective management of library services to provide the information of materials
in the form of electronic form than providing in the form of hard copy which can consume the
assets of the library. Through this OPAC user interfaces, the library users can search the
materials which exist in the library by using subject, title and author of the publication.

Table4.10 methods to organize the e-resources

Choices Frequency Percent

No organize 17 42.5

Classified 7 17.5

DOI(digital 1 2.5
object identifier)

Alphabetical 12 30.0

all 3 7.5

Total 40 100.0

Table 4.10 indicates 7(17.5%) respondents said that library system use classification method to
organize the e-resources, 1(2.5%) respondent said that library system use DOI (digital object
identifier) to organize the e-resources, 12(30%) respondents said that the library system use the
alphabetical arrangement to organize the e-resources, and 3(7.5%) respondents replied the library
system use classified, DOI and alphabetical to manage the e-resources.but17(42.5%) respondents
of total population 40(100.0%) said the library system did not organize the e-resources. The
result indicates that the library system did not organize the e-resources. By the above information
researchers concluded that the library system did not use any organization method to organize its
e-resources for the management purpose.

Table4. 11 Weather library systems have separate data security policy or not

31
Alternatives Frequency Percent
Yes 24 60.0
No 16 40.0
Total 40 100.0

As the above table 4.11 indicated 24(60%) respondents indicated that the library system has its
own separate data security policy, but 16(40%) respondents’ of total population 40(100.0%) said
the library system did not has its own separate data security policy. This table implies that the
library system has its own separate data security policy. The library system uses the security the
special security software like anti-plagiarism software to protect the special security of electronic
information resources within the library.

Table4.12 Data security manager if library has separate data security policy

Alternatives Frequency Percent

No responses 12 30.0

Computer professional 9 22.5

LIS professional 13 32.5

Technician 6 15.0

Total 40 100.0

As the above table 4.12 indicated 9(22.5%) respondents said computer professionals manage the
data security, 13(32.5%) respondents said LIS professionals manage the data security and
6(15%) respondents said technicians manage the data security. This table implies that LIS
professional manages the data security. But 12(30%) respondents from total population
40(100.0%) said the library system did not has separate data security policy as incited under
table 4.11. Based on this clue, the researcher concluded that the library system has the separated
data security policy which was protected by the LIS professionals.

32
4.8 Whether the library has weeding policy

Figure 4.7 whether the library has weeding policy


As the above Figure 4.7 indicated 30(75%) respondents rebelled that the library has the weeding
policy, contrary 10(25%) respondents of total population 40(100.0%) said the library did not
have the weeding policy. This Figure indicates that the library has its own weeding policy. By
above information the researcher concluded that library system has its own weeding policy for
the effective management of electronic information resources for the good output of research.

4.7 Years the e-resources remain in collection before weeding.

Figure4.8 Years the e-resources remain in collection before weeding.


As the figure 4.8 illustrates that 5(12.5%) respondents were said materials remains in the
collection for 2 years, 2(5%) respondents replied materials remain in the collection for 3 years,
1(2.5%) respondent said material remain in collection for 4 years, and 16(40%) respondents said
the material remain in collection for 5 years before weeded from the collection. But, 16(40%)
respondents from total population 40(100%) said that the library system did not have a well
defined period of times that the electronic materials remain in the circulation before it was
weeded from the library collection. This result implies the library system did not have well

33
defined life time electronic materials remain in the collection before weeding. Based on this
information, the researcher concluded that the library system did not clearly defined the year that
one particular electronic information resources live in the collection before it would be weeded
from the library collection. From this the researcher concluded that some library system was
familiar with the weeding policy of the electronic materials which was performed by every 5
years. But some of the library staff members were not aware the life cycle of electronic
information resources were weeded from the library collection.
Table 4.13 Body responsible for the selection of e-recourses selection

Alternatives Frequency Percent

Faculty 2 5.0

Scholars/Students 4 10.0

Library staff 28 70.0

Faculty and 4 10.0


scholars/students

all 2 5.0

Total 40 100.0

As the above table 4.13 indicated that 2(5%) respondents said that faculty staff is responsible for
the selection of e-resources, 4(10%) respondents said scholars/students responsible for the
selection of e-resources, 28(70%) respondents said the library staff responsible for the selection
of e-resources, 4(10%) respondents said Faculty and scholarly/students were responsible the
selection of e-resources and 2(5%) respondents of total population 40(100%) said the all
presented part have equal responsibility to select e-resources for the library collection
development. This implies that library staffs were responsible to select e-resources for the library
collection development. From this the researcher concluded that the library staff was responsible
for the selection e-resources for the library collection development.

34
Table4.14 Access method of e-resources

Alternatives Frequency Percent

Access in the library 12 30.0

Remote access through campus network 14 35.0

internet 12 30.0

access in library and remote access in campus network 2 5.0

Total 40 100.0

As the above table 4.14 implies 12(30) respondents answer showed that library allow the users to
access e-resources in the library, 14(35%) respondents were said users can access the e-resources
remotely through campus network, 12(30%) respondents said users access the e-resources
through internet, and 2(5%) respondents of total population 40(100%) said users can access e-
resources through campus network and in library. This implies that the users can access e-
recourses remotely through campus network. So based on this clue, the researcher concluded that
the users can access the library resources remotely through campus network.

4.9 Access technology applied in library

Figure 4.9 Access technology applied in library


As the above Figure 4.9 indicates that 21(52.5%) respondents were said IP address based
technology used to access e-resources, 17(42.5%) respondents were said proxy server based
technology used to access the e-resources and 2(5%) respondents of total population 40(100%)
said library use both IP address based and proxy server based technology to access e-resources.

35
This Figure confirms that IP address based was access technology used in library. Based on this
information, the researcher concluded that the library system provides the users to access the e-
resources by using the Ip address technology for the research purpose.

Table4.15 Authorization and authentication of users to use e-resources

Alternatives Frequency Percent

Ip address 22 55.0

Login password 10 25.0

Public keys/Certificate 6 15.0

library webpage 1 2.5

IP address and password 1 2.5

Total 40 100.0

As the above Table 4.15 indicates 22(55%) respondents were replied users authenticated and
authorized by the IP address, 10(25%) respondents said users authenticated and authorized by
login password, 6(15%) respondents said users were authenticated and authorized by public
keys/certificate, 1(2.5%) respondent said users authenticated and authorized by browsing the
library webpage, and 1(2.5%) respondent of total population 40(100%) said users were
authenticated and authorized by using IP address and login password to access the e-
resoures.This implies that users were authenticated and authorized by using an IP address to
access the e-resources in library. From this the researcher concluded that the users were
authenticated and authorized by using the IP address and followed by using login password to
access the e-resources in the library.

36
Chapter Five

5.0 Discussions of findings

5.1 Findings
The important issues were found in the data collection on collection management of electronic
information resources in jimma university library system. The data was collected from Jimma
university main library staff members. From the study findings it was noted that various factors
affected the collection management of electronic information resources in jimma university
library system. The major challenges identified were inflexibility on the part of vendor during
the license dealing for the selection of electronic information resources of the library collection
development, stop the access of licensed electronic information resources from copying the
portion of it for the specified period of time which is not prove the effective protection of the
copyright, the limitation of ABCD software that used for the integrated interlibrary management
due to its absence of link to access the electronic information resources which is available within
the library, not all respondents were oriented about the methods to organize the electronic
information resources in the library, some respondents were not informed the separate data
security policy in the library, some of the respondents know only the existence of the weeding
policy of the library but they were not oriented the life cycle of electronic materials remain in the
collection before weeding from the library, lack of students did not considered as the responsible
body to select the electronic information resources for the library collection development, and
the access methods that the users use to access the electronic information resources only through
the campus network which is not accessed somewhere else without the campus network.

5.1.1 Mechanism used to manage electronic information resources


For the management of Digital library, the library system requires the collection of electronic
information resources. In order to develop the collection of electronic information resources the
library system need the license agreement from the publisher, vendor or from the aggregator. By
taking these concepts in to consideration the researcher prepared the question related with the
license methods and the result obtained from the 19(47.5%) respondents of total population
40(100%) indicates the library system used both independent and consortia subscription for the
collection development of electronic information resources in library. taking in to consideration

37
about the independent types of subscription the researcher propose the question and the result
obtained from the 12(30.0%) respondents of total population 40(100.0%) indicates the library
system apply the independent types of subscription to develop the collection of electronic
information resources in the library. The independent type of subscription provides the library to
sign the agreement to access the particular electronic information resources for specified period
of times. The subscription agreement may be monthly subscription or annual subscription
according to the library requirements. But the result obtained from 15(37.5%) respondents of
total population indicates the library system did not use the independent subscription for the
development of electronic information resources in the library. Through the subscription the
licensor provides the various applications for the library system. As the result obtained from the
15(37.5%) respondents of total population 40(100.0%) indicates the licensors provide the backup
copy for the library system. In this archival backup copy the librarians can down load and
reserve the material for the feature use. The result obtained from the 13(32.5%) respondents of
total population 40(100.0%) indicates the licensor provides both archival access and backup
copy access during the license conducted. It implies the licensor provides the backup copy for
the library during the license agreement between librarian and the resource owner.

When the librarians sign the license agreement within the consortia/direct from the publishers
they provides the certain features. As the result obtained from the 18(45.5%) respondents of total
populations 40(100.0%) indicates (Table 4.5) the licensors proves the access to database features
and result obtained from 9(22.5%) respondents indicates the licensor provides the electronic link
feature for the digital library. The result obtained implies that the licensors provide the database
access for the library system.

The resource provided from the licensors was protected from the users to prevent to copy some
of its portion by using the various methods. The result obtained from the 33(82.5%) respondents
(Figure 4.4) indicates the library system uses the special security measures for the first rank and
the result obtained from the 3(7.5%) respondents of total population 40(100%) the library system
uses the anti-plagiarism software to protect the security of the licensed materials for the digital
library. This implies the library system uses the special security measures to protect the data
security of the digital library.

38
To protect the copyright of electronic information resources in the library the library system
imposes some limitation to the users. As the result obtained from the 27(67.5%) respondents
indicates (Table 4.7) the library systems stop the access of electronic information resources from
the users, the result obtained from the 6(15%) respondents indicates the library system file case
to protect the security of the licensed materials. But the result obtained from the 5(12.5%)
respondents of total population 40(100%) indicates the library system did not control the security
of electronic information resources in the digital environment. These show the library systems
stop the access of electronic information resources for some specified period of time.

For the effective management of electronic information resources the library system should have
to organize the electronic information resources within the library. As the result from the
37(92.5%) respondents indicates (Table 4.13) the library staff members were aware the
organization of electronic information resources in the library, but the result obtained from
3(7.5%) respondents indicates some library staff members were not aware the organization of
electronic information resources in the library. This implication implies the library staff members
were aware the organization of electronic information resources in the library. In the
organization of electronic information resources in the library the library systems use an
integrate interfaces to access the e-resources from the library. As the result obtained from the
table 4.8 shows 37(92.5%) respondents were agree with the organization of the electronic
information material, and 3(7.5%) respondents of total population 40(100.0% ) were not agree
with the organization of the electronic information materials in the library. This result indicates
that almost all respondents were agreeing with the organization of electronic material in the
library.

In the management of electronic information resources, the library system uses the data security
policy within the library. The data security policy of electronic information resources were
protected by certain profession. As the result from the 28(70%) respondents the library system
uses an integrated OPAC interface for the interlibrary management purpose.

The management of electronic information needs the data security policy to protect it from the
damage. To protect the data security library system responsible the body who protect the data
security from the damage. As the result indicates from 13(32.5%) the LIS professionals were
responsible to protect the data security from the damage, the value obtained from the 12(30%)

39
indicates the library system did not have the separated data security policy. This indicates the
data security in the library was protected by the LIS professionals and some respondents did not
aware data security policy and body responsible for. For the effective library managements in
digital environment the library systems use the interlibrary software. As the from the 21(52.5%)
respondents indicates (Figure 4.6) the library system use the ABCD software for the interlibrary
management, the result obtained from the 15(37.5%) respondents indicates the library system
uses both Dspace and ABCD software for the interlibrary management purpose, and the result
from the library system uses Dspace for the interlibrary management of electronic information
resources. This implication indicates the library system uses ABCD software and followed by
Dspace for interlibrary management purpose. The purpose of interlibrary loan as defined by the
American Libraries Association Interlibrary Loan Code and Explanatory Supplement (revised
2008) is the process by which a library requests material from, or supplies materials to, another
library. The ABCD software delivery includes any service, locally or at a distance, that involves
sharing a library's own collection with its own patrons can access the resources available within
the library through OPAC (online public access catalogue). The ABCD software was the
software that the library uses for the creation of digital library which contains various modules
such as Loan module, acquisition module and circulation modules. The researchers or patrons
could check the materials availability remotely through the campus network by using the user
interface OPAC. This ABCD software was used for inter library loan systems to borrow the
books to its patrons. The second software ranked in this inter library management is Dspace
which was used for the integrated library management for the digital library purpose, which was
preserves the accommodation of the various electronic information resources, dissertation, thesis
and various researches for the further study. This software (i.e. Dspace) was used for interlibrary
management to have an archive of electronic information resources which their requirement is
high degree in values.

5.1.2 Evaluation methods of electronic information resources


The evaluation methods of electronic information resources were very crucial to prolong the
effective good services delivered by the digital library. In order to evaluate the collection of
electronic information resources, it is mandatory for the library system to have the weeding
policy of electronic information resources within the library. As the result indicates from the
24(60%) respondents indicates (Figure4.7) most respondents aware the weeding policy, but the
40
result from the 16(40%) respondents indicates the some staff members did not aware the
weeding policy of electronic information resources for the effective regular evaluation of
electronic information resources in the digital library. This implies the most library staff
members aware the weeding policy of electronic information resources in the collection
management of electronic information resources in the library.

The evaluation /weeding of the collection of electronic information resources conducted in


certain interval of years. As the result obtained from the 16(40%) respondents indicates (Figure
4.8) the library system weed/evaluate the collection of electronic information resources in each 5
years, Results from 5(12.5%) respondents indicates the library system weed or evaluates the
collection of electronic information resources in each 2 years, and results from the 16(40%)
respondents indicates the library staff did not aware the evaluation/weeding policy of collection
management of electronic information resources in the library. This indicates some library staff
members did not aware the weeding/evaluation time of electronic information resources within
the library and only few number of staff works aware about the weeding policy of electronic
information resources in the library. For the collection development of electronic information
resources the in the library, the library systems assign the body who responsible for the selection
of electronic information resources for the digital library. As the result obtained from the
28(70%) respondents indicates (Table 4.13) the library staff play the great to select the electronic
information resources for the collection development, the information retrieved from the 4(10%)
indicates the scholars/students and Faculty/students play the great role in the selection of
electronic information resources in the library. This implication implies the library staff plays the
great role to select the collection of electronic information resources for digital library collection
development.

5.1.3 Factors affecting the management of electronic information resources


There are some factors which can affect the management of electronic information resources in
the digital library. As the result obtained from the 19(47.5%) respondents indicates the (Table
4.6) first problem the library face during dealing with the licensing was the inflexibility on the
part of vendor, the result obtained from the 10(25%) respondents the second problem the library
face during dealing with licensor was the disparity in the bargaining power, the information
obtained from the 8(20%) respondents the third problem that the library face during the licensor

41
was the fitting the license agreement to the need of library. This result indicates the major
obstacles/factories in effective and efficiency management of electronic information resources in
the digital environment was the inflexibility on the part of vendor. This means that the licensor
take the agreement and remain without providing the required services for the library.

5.1.4 Possibility/ways to access the electronic information resources


In the management of electronic information resources in the digital library, the library systems
provide the access methods of electronic information resources in the various ways. To access
the electronic information resources from the library, electronic information should have to be
catalogued in proper manner. As the result from the 22(55%) respondents indicates (Figure 4.5)
the library system use the metadata (Dublin core) to catalogue the electronic information
resources, the information obtained from the respondents 7(17.5%) respondents indicated the
library system use AACR2, MARC, and Metadata, and the result obtained from the 6(15%)
respondents indicated the library system use AACR2 method to catalogue the electronic
information resources in the library. This implies that the library system uses metadata (Dublin
core) to catalogue the e-resources. The metadata is the data that is uniquely identify the
electronic information resources in the library collection in the digital environment. The
metadata has 15 sets of elements as listed below:

Title: The name given to the resource by the creator or publisher.

Creator: The person(s) or organization(s) primarily responsible for the intellectual content of the
resource; the author.

Subject: The topic of the resource; also keywords, phrases or classification descriptors that
describe the subject or content of the resource.

Description: A textual description of the content of the resource, including abstracts in the case
of document-like objects; also may be a content description in the case of visual resources.

Publisher: The entity responsible for making the resource available in its present form, such as a
publisher, university department or corporate entity.

Contributors: Person(s) or organization(s) in addition to those specified in the creator element,


who have made significant intellectual contributions to the resource but on a secondary basis.

42
Date: The date the resource was made available in its present form.

Type: The resource type, such as home page, novel, poem, working paper, technical report,
essay or dictionary. It is expected that type will be chosen from an enumerated list of types.

Format: The data representation of the resource, such as text/html, ASCII, Postscript file,
executable application or JPG image. Format will be assigned from enumerated lists such as
registered Internet Media Types (MIME types). MIME types are defined according to the
RFC2046 standard.

Identifier: A string or number used to uniquely identify the resource. Examples from networked
resources include URLs and URNs (when implemented).

Source: The work, either print or electronic, from which the resource is delivered (if
applicable).

Language: The language(s) of the intellectual content of the resource.

Relation: The relationship to other resources. Formal specification of relation is currently under
development.

Coverage: The spatial locations and temporal duration characteristics of the resource. Formal
specification of coverage is also now being developed.

Rights management: - A link (URL or other suitable URI as appropriate) to a copyright notice,
a rights-management statement or perhaps a server that would provide such information in a
dynamic way (Quam, 2000).

The electronic information resources that catalogued can be accessed by the library users. To
allow the users to access the electronic information resources, the library systems have to
determine the venue to access. As the result obtained from the 14(35%) respondents indicates
(Table 4.12) the library system allow the users to access the electronic information resources
through the campus network, the result from 12(30%) respondents indicates the library system
allow the users to access the electronic information resources in the library and the result from
the 12(30%) respondents of total population 40(100%) indicates the library systems allow the
users to access the electronic information resources through the internet. This indicates the

43
library system allow the uses to access the electronic information resources through campus
network, internet and also in the library.

The digital library uses the various access method technologies to deliver the services of
electronic information resources within the library. As the result from the 21(52.5%) respondents
indicates (Figure4.9), the library system provides the e–resources access by the IP address based
technology, the information obtained from the 17(42.5%) respondents of total population
40(100.0%) indicates the library system proves the services of electronic information resources
by proxy server based technology. This implies that the library system provide the services of
electronic information resources by IP based technology. To access the electronic information
resources through Ip based technology, the users must be authorized and authenticated from the
library management. As the result from 22(55%) respondents indicates (Table 4.15) the library
system authenticate and authorized the users by introducing the Ip address of the digital library,
the result from the 10(25%) indicates the users of digital library authenticated and authorized by
login password to access the electronic information resources from the library. This implies the
digital library authenticated and authorized by the IP address of digital library system to access
the resources within the library.

44
Chapter Six

6.0 Conclusions and recommendations

6.1 Conclusions
The study was aimed at assessing the collection management of electronic information resources
in jimma university library system and classification in case of Jimma University staff library.
The qualitative-quantitative and descriptive methods of research were used to conduct the study.
The researcher has gathered information by distributing questionnaires, then analyzing data from
the Jimma university staff library.

The effective management of electronic information resources plays the great role to provide the
effective services to the library users. The need of the digital information materials has been
increased from time to time instead of the using the hard copy of the library materials. To satisfy
the users’ interest the library systems was trying to shift the traditional physical library to the
digital library to avoid the large expenses of the hard copy of materials in the library which needs
high budget and high physical storage space in the library.

Based on the finding of the study, the researcher drawn following conclusions:

 The library system develops the collection management of the electronic information
resources by licensing the agreement within the consortia. Through the subscription of
the electronics information resources the vendors provides the features like link to
electronic and the access to the data base for the specified period of time through
independent types of subscription. The data security policy was protected by special
security measure.
 The result obtained indicates the library system did not have the determined evaluation
period of the time for the evaluation of the electronic information resources in the library.
 In the management of the electronics information resources the major factors affecting
the management of the electronic information resources was the inflexibility on the part
of vendor at the time license agreement.
 The library systems allow the users to access the electronic information resources through
the Ip address based technology to access the resources from the distance remotely and in

45
the library. The library users were authenticated and authorized through Ip address of the
digital library. These enable the users to login to the systems by username and the
password to access the electronic information resources of the library.

6.2 Recommendations
Based on conclusions drawn from the results of the study to maximize the quality of collection
management of electronic information resources in jimma university library system, the
following recommendations are made.

 The library system administrator should have to clearly orient the weeding policy of
electronic resources and its life cycle starting from the creation to weeding/disposition.
 The library collection developer/administrator should have to introduce and avoid the
inflexibility from the part of vendor during the subscription of electronic information
resources for the efficient and effective services.
 The librarian of the library system should have to try to organize the collection of
electronic information resources for the effective management of the library services like
the printed materials.
 The library administration should take into account the scholars/students during the
selection of the electronic information resources for the library collection development.

46
References
Alive, M & Leidner,D.E. (2001). Knowledge management and knowledge Management system.
Conceptual foundation and research issue.

Bozimo. (2007). paper presented at the elFL.Net work shop on capacity building. Nigeria
university,october 15.

Breaks, mickael. (1999). management of electronic information resources. heriot-watt university.

Corria, A.M.R and Neto,M.D. (2002). The role of e-print archieves in access to and
dissemination of scientific grey literature. lisa-a case study of national library of portugal.

Ellis, D.& oldman ,H. (2005). the english literature researcher in the age of internet,in.

Feather, j and p sturges. (1997). international encyclopedia of information and library


science. london: routledge.

George, Vicki. (2000). develpoing electronic Resources library collection.

Haridason, S. a. (2009). Impact and Use of E-resources by social scientists in national social
science Documentation Center(NASSDOC),india.

Holden, Jesse. (2010). Acquisition in the New information Universe. Nwe York: Neal schuman
publishers.

jimma university. (2013). library.

Johnson, p. (2004). Fundamental of collection Development and Management. Chicago:


American Library association.

JU. (2013). JU historical background.

Kothari, C. (2004). Research Methodology. (2. ed., Ed.) india: New Age International(p)LTD
,publisher.

Michael.k, Buckland. (1989). The role of collection and the scope of collection development
(Vol. vol 45). journal of documentation.

47
Nisonger, Thomas E. (2001). the internet nad Collection management in academic libraries.

Oduwole, A.A. (2001). Use of CD_ROM databases in Nigeria academic libraries,20(1),39-


42.

Quam, E. (2000). MINNESOTA METADATA GUIDELINES FOR DUBLIN CORE METADATA


(2 ed.). Minnesota Department of Natural Resources.

Rajyalakshim, .. information professionals-knowledge and skills,for information management.

Sivaraj, D. &. (2007). Use of internet by students ,faculty member s and research scholaris in
Banner Amman institute of technology (Vol. 13). An Analysis.

48
APPENDIX A
JIMMA UNIVERSITY
COLLEGE OF NATURAL SCIENCES
DEPARTMENT OF INFORMATION SCIENCE

COLLECTION MANAGEMENT OF ELECTRONIC INFORMATION RESOURCES IN


JIMMA UNIVERSITY LIBRARY SYSTEM.
Questionnaire for library staff workers
Dear Sir / Madam
I am Obsa Gelchu undertaking a Bachelor’s degree in Information Science, in order to fulfill the
degree requirements this research questionnaire seeks to collect data on collection management
of electronic information resources in jimma university library system. In this context I
seek your kind cooperation in filling this questionnaire. This would help in dealing with the
future of Collection management in the academic library environment in an efficient, effective
and systematic manner.The data provided by you will be used only for research purpose.
Please tick mark your answers in an appropriate box provided against each question.
Section one. General Information

1. Name of library_____________
2. Age range a) 20-30 b) 30-40 c) 40-50 d) 50 and above
3. Gender a. male b. Female
4. Work experience_______________
5. Educational level
a) Diploma b) degree c) other (please specify) ______________
Section two. Questions for specific objectives

2.1 How do you subscribe to e-resources?


a) Independently
b) Consortia
c) Both
If independent how does your library subscribe?
a) Direct from publisher

49
b) Vendor
c) Aggregator
Any other (Please Specify) ___________________

2.2. What type of access your licensor provides?


a) Archival access
b) Back up copy
c) Both
2.3. Does your licensor provide the following features?
a) Providing electronic links
b) Access to databases
c) Archival/ back up copy
d) Electronic reserves
Other (please specify) _________________
2.4. What are the major obstacles you face while dealing with the licensor?
a) Disparity in the bargaining power
b) Inflexibility on the part of the vendor
c) Fitting license agreements to the needs of the library
d) Not knowing what to look for
Any other (please specify) ____________

2.5. What measures are applied to control the copyright/ digital rights of e-resources?
a) Special security measures
b) Anti plagiarism software
Any other (please specify) __________________

2.6. What limitations are imposed by the library for copying portions of licensed materials that
has been forbidden?
a) Stop access for a specific period
b) Cancel membership
c) File a case
Any other (Please specify) _______

50
2.7. What standards are used to catalogue electronic resources in your library?
a) AACR2
b) MA RC
c) Metadata (Dublin core)
2.8. Which software is used for inter library management?

a) Greenstone
b) dspace
c) Koha
d) Abcd
Any other (Please specify) _______

2.9. Do you organize electronic resources? a.Yes b.No

If yes do you follow an integrated OPAC for print and e-resources? a.Yes b. No

2.10. If no do you follow any of the following methods?


a) Classified
b) DOI (digital object identifier)
c) Alphabetical
Any other (please specify) _______________________

2.11. How do you organize CD ROM collection? _________________

2.12. Does your library have a digital library of e-collections a.Yes b.No

If yes which digital library software is used?


a) Greenstone
b) Dspace
c) LS Digital
Any other (Please specify) ________________

2.13. Do you have separate data security policies? a.Yes b.No

If yes who manages the data security?


a) Computer professional

51
b) LIS professional
c) Technician
Any other (Please specify) _____________

2.14. Does your library have weeding policy? a.Yes b. No

If yes, how many years the material remain in collection?

a) 2 years c) 4 years
b) 3 years d) 5 years
Other (please specify) __________
2.15. Who plays the major role in the selection of library collection?
a) Faculty
b) Scholars / Students
c) Library Staff
Any other (Please specify) ________

2.16. How do you provide access to e-resources?

a) Access in the library


b) Remote access through campus network
c) Internet
2.17. Please give details of access technologies.
a) IP address based
b) Proxy Server Based
Any other (Please specify) ___________

2.18. How are authorized users identified and authenticated to use e-resources in your library?
a) IP address
b) Login passwords
c) Public keys/certificate
d) Developing protocols
Any other method please specify________

Thank you very much for your kind cooperation.

52

You might also like