Training Marian the Librarian
Monday, December 6, 2010
Reflection on the semester
My favorite blog post, and also my favorite time during the semester, was on 11/12/10 ("A little more with SFX"). Following my initial read-through of the syllabus, I expected to enjoy the first half of the semester because the second half consisted of concepts that were brand new to me and "scary" because they pertained to the technology side of ER management. However, I think this post shows a turning point in my attitude towards the link resolver, DOI, and OpenURL technology in libraries. I automatically assumed that I would have a difficult time understanding the material, but after I forced myself to present on Find It (about which I previously knew nothing), I gained a deeper understanding than I ever thought I would. Between my notes from class around this time (first two weeks of November) and my blog posts, I feel like I could stand in front of a group of people and teach these concepts. It's interesting how the topic I feared most ended up being my favorite.
My overall thoughts about ERM have drastically changed. The first half of the semester was filled with some personal challenges which slightly distracted me from my school work, but I also didn't feel connected to the material. I also went into this class with low confidence in my ability to understand some of the technology that ER librarians work with on a daily basis. I now know that work with electronic resources for future librarians is a necessary skill and there are so many different facets to it (just thinking back on all of our presenters) that there is bound to be a favorite work area. Some librarians may like the licensing and negotiating (the business side) of electronic resource management, whereas others may be more drawn to the various technologies that are used to keep everything running smoothy, like management systems and link resolvers.
Even though I struggled through parts of the class, the work (reading, presenting, writing, etc) made me feel like I have really added to my skills as a librarian and my ability to understand and work in a rapidly growing section of the industry.
Thursday, December 2, 2010
Reading Notes for Unit 13: ERM Librarian
Marian Through the Looking Glass...
- This is a newer position for the library profession meaning that directors/boards have to carefully design the ER position to make sure that all aspects of it are accomplished. This can be difficult because many librarians may not know much about the ER realm of librarianship.
- In a matter of five years, ER spending went from a reported 8.85% to 22.01%
- Description of the ER management position: "an increasing number of...position announcements, a greater diversity of functional areas involved, a wider variety of types of institutions placing advertisements, and the emergence of distinctions between 'electronic' and 'digital' positions in terms of job responsibilities."
- Three common position jobs: purchase management; renewals and cancellations; pricing negotiations; AND covering technical problems (additionally, ER librarians will work with link-resolver software, federated searching software, and managing usage data).
- All of the above areas of the position point to a tech services librarian instead of a service-focused librarian. However, the job of an ER librarian really differs from library to library depending on their needs and current staff.
How to Survive as a New Serialist
- This was more of an article that I would keep around for good references (websites, webinars, blogs, workshops, etc).
- One interesting fact: try to look at the job of the ER librarian from the ILS - what already exists and what will be needed for training? How can you improve the current system? What is going to be needed to make it run smoothly?
Friday, November 19, 2010
What is a handle system anyway?
Friday, November 12, 2010
A little more with SFX...
Saturday, November 6, 2010
Data Standards
"Library Standards and E-Resource Management: A Survey of Current Initiatives and Standards Efforts" by Oliver Pesch
J1a for subscription archives
JR2 - turnaways by month and journal (due to simultaneous user limit)
uncommon -
JR3 (optional) - number of successful item requests and turnaways by month, journal and page type.
JR4 (optional) - total searches run by month and service
JR5 - number of successful full-text article requests by year and journal
Database Reports:
DB1 total number of searches and sessions by month and database
DB2 turnaways by month and database
DB3 total number of searches and sessions by month and service (branded group of online info products)
Consortium Reports
CR1 # of successful full-text article/e--book requests by month
CR2 # of searches by database
report format compliance (manual review)
article request counting (test scripts)
database session/search counting (test scripts)
- Don’t account for: automated search filtering (bots, crawlers, LOCKSS, etc)
HTML vs PDF downloads - some services display HTML full-text along with abstract - is this a “download?”
“Library Standards and e-resource management”
- E-Journal lifecycle:
- 1. Acquire: titles, prices, subscriptions, license terms, etc.
- 2. Provide access: cataloging, holdings lists, proxy support, searching and linking
- 3. Administer: use rights and restrictions, holdings, title list changes
- 4. Support: contacts, trouble shooting
- 5. Evaluate: usage data, cost data
- 6. Renew: title lists, business terms, renewal orders, invoices (groups help create standards as management resources)
“Standards for the Management of ER”
- Promote interoperability, efficiency, and quality
- Another way to look at the lifecycle:
- 1. Selection
- 2. Acquisition
- 3. Administration
- 4. Access control
- 5. Assessment
“COUNTER: Current Developments and Future Plans”
- Usage statistics as part of the librarian’s toolkit
- Vendors have a practical standard for usage stats on their major product lines
- Standard usage stats Harvesting Initiative (SUSHI): automated retrieval of the COUNTER usage reports into local systems (part of the XML schema) will indicate the intensity of use of a database, popularity of a database.
- Journal usage factor: total usage (COUNTER JR1 Data)/total # of articles published online (within a specific date range)
- PIRUS: Publisher and Institutional Repository Usage Statistics: an invaluable tool in demonstrating the value of individual publications and entire online collections.
Thursday, November 4, 2010
Electronic Resource Management Systems
There are a few benefits and challenges that come with each product. A few of the benefits: ERM Systems improve overall management communication, there is auto population of data, and an ability to update information automatically/quite easily.
If you're working with EBSCONet, there is the added bonus of automatic management of all EBSCO materials. If you're library subscribes to many of EBSCO's databases, this might be a good option for you. However, for all other vendor products, ERM must be manually completed which is tedious and takes time. Any ERM system that requires manual data entry (and I'm not sure there's one that we went over that doesn't require at least some data entry) leaves room for error. Misspellings, typos, and entering in different license material occurs because usually a group of people will contribute to data entry, not just one person. This can throw an entire section off. This product was recommended for small - medium sized university libraries. One library (Kent State, I believe), even said this system would help them record and remember deadlines and contract deals. For them, it was better than working on a Google Calendar and Excel spreadsheets.
Innovated Interfaces Millenium and Serials Solution 360 can come as part of a package deal (link resolver software AND an ERM system all in one!) But once again, it depends on the type of library. At the University of Wisconsin, we use Ex Libris' link resolver software (SFX), but their ERM system (Verde) would never work for us due to the breadth and depth of our collection.
Each unit in this class adds one more corporation to the list of commercial services provided for libraries, specifically academic libraries. And with my Find It presentation this week, we'll be able to add yet another! Up to this point, the biggest lesson I have learned is to be patient and thoughtful with purchasing decisions - each product is slightly different and could potentially hinder certain areas of librarians' work.
Unit 9: Electronic Resource Management Systems
- Title by title management no longer works
- Homegrown systems became popular in the late 1990s/ early 2000s
- Strong focus on data standards, issues related to license expression and usage data
- Most companies now offer an ERM system as part of the ILS (interoperability is one advantage to working with one company’s product, but they are also at the mercy of the company for updates – could end up under supported)
- a few things to watch out for: does the system work well with what you already have?
- Is it reliable and sustainable?
- Cost?
- What is the cost of advancements vs the benefits to the user?
- Refer back to ERM checklist
- Implementation of a system: staffing (who should be involved, how they will be structured within the library, training, etc)
- Communication across library departments is key (especially with managing work flow)
- Questions to ask before selecting a certain system:
- 1. “What elements are important to include for you library?
- 2. “What elements are repetitive across license agreements and provide little value or are inconsequential in describing?”
- 3. “Who will be responsible for providing consistent interpretation of license language and meaning?”
- 4. “What tools or resources are available to assist individuals in the mapping process?”
Sunday, October 24, 2010
DRM to TPM
“Every Library’s Nightmare?”
- “TPM are configurations of hardware and software used to control access to, or use of, a digital work by restricting particular uses such as saving or printing.
- Hard restrictions: secure – container TPM where there is a physical limitation built into the hardware.
- ISSUES: user dissatisfaction, generate interoperability issues; block archival activities; increased staffing to handle these issues.
- Soft restrictions: discourage use, but not impossible to get around. Now almost accepted as part of e-resources (just the way things are). These change our expectations from vendors.
- Occurs in resources that are 1. Digital and 2. Licensed.
- These restrictions would be impossible on paper copies
- Soft restriction types: 1. Extent of use 2. Restriction by Frustration (often done with awkward chunking) 3. Obfuscation (poorly designed interfaces that do not properly show the capabilities) 4. Interface Omission (tasks only possible through browser or computer commands, left out of the interface) 5. Restriction by Decomposition (breaks down into files, makes it hard to save or e-mail) 6. Restriction by Warning (proclaims limitations and “misuse may result in...” language.
- Hard restriction types: 1. No copying or pasting of text 2. Secure container TPM (ex: only posting low resolution images)
“Technologies Employed to Control Access to or Use of Digital Cultural Collections”
- Digitized works are often harder to control and restrict access to, so that’s where TPM comes in (sits under the umbrella of DRM – “a broader set of concerns and practices associated with managing rights from both a licensor and a licensee perspective.”
- Usage controls manipulate the resource itself (same as a hard restriction?)
- Libraries are more likely than archives/museums to employ a system that restricts or controls access/use.
- Common systems are: authentication and authorization; IP range restrictions; network based ID systems
“Authentication and Authorization”
- Authentication: validating an assertion of identity (identity code and password)
- Other examples include:
1. 1. Shared secrets (like a shared password) 2. Public key encryption 3. Smart cards (not sure if I’ve ever seen this before, or if this method is even used anymore) 4. Biometric (personal physical characteristics) 5. Digital Signatures
- Authorization: access control or access management, or permitted to perform some kind of operation on a computer system.
- Divided into three categories: 1. “whether a subject may retrieve an object” 2. “whether a subject may create, change, or destroy an object; 3. The extent that the person can change the authorization rules.