CHP 3 Mind Map Imd225

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

CHAPTER 3: INFORMATION SERVICES TECHNOLOGY

Impact IT in Library:
Types of documents
that can be kept in -Storage
microform including:
-Speed
-Newspaper -Political
paper -Ease of Use

-Letter books -Records -Integration Benefits RFID in Library:


-Rarebooks -Journal -Interoperability
 Fast check in / check out
of Library households.
 Increased security of
library
materials.

Microform Advantages 3.1  Long life of RFID tags in

 compact, with far Utilization of major comparison to Bar code


smaller storage costs technologies in
than paper library information
documents. service agencies
 It is cheaper to video, microforms,
distribute than paper RFID
copy.
 It is a stable archival IT made all of these
form when properly possible;
processed. This film  Information creation
has a life expectancy in digital format
of 500 years.  Online access and
file transfer
 Networking and
Microform Disadvantages sharing of
information
 The image is too small to
resources
read with the naked eye.
 When stored in the
highest-density drawers, it is
easy to misfile a fiche, which
is thereafter unavailable.
 A conventional
photocopier cannot
reproduce the images.
5 CRITERIA for selection of 5 CRITERIA when comparing equipment, media & electronic
electronic library resources resources

 Number and kinds of  TECHNOLOGY SUITABILITY


databases  TECHNOLOGY OBSOLESCENCE
 Special search features  TECHNOLOGY DURABILITY LIBRARY ENVIRONMENT
 Documentation and training  TRAINING IMPLICATION
 Costs  TECHNOLOGY MAINTENANCE
 Regional preference

EVALUATION
EVALUATION is any activity that 5 CRITERIA for selection of
3.2 Selection and library systems
throughout the planning and
evaluation of library
delivery of innovative  Product quality
technologies
programmes enables those  Cost
involved to learn and make
 Features
judgements about the starting
 Functions
assumptions, implementation
 Staff training
processes and outcomes of the
innovation concerned.

Steps in selecting an integrated library system


1. Analyze and identify your needs
2. Develop criteria for evaluation based on your needs.
3. Read relevant reviews of library automation systems and related
technologies and standards.
4. Prepare a short list of library software packages, their features,
functional modules available, and standards supported
5. Ask libraries for an honest evaluation of their library management
system.
6. Visit local libraries or institutions using a library management system.
7. Ask vendors for a demo version to try out, or if available download
from their site on the Net.
8. Determine and compare initial and total cost of each library system
Some problems and issues :
3.3
1. Software companies rush products to the consumer market
Security and 2. Market share is more important than security
protection 3. Interface design is more important than security
4. New feature designs are more important than security
5. Ease of use is more important than security

4 things a librarian can do to avoid virus attack :


 Set bookmarks to authoritative (antivirus pages,etc)
 Provide patrons with up-to-date information about viruses, etc.
 Confirm that desktops have the latest anti-virus updates
 Backup files and documents (Offline copies, online copies: Shared
network
 drive, do not back up a file on the same disc as the original)

3 action plan if machine is infected with virus:


1.Write down the error or alert message verbatim
-Inform your tech support team quarantine the machine
2.Look up the message in an authoritative antivirus site (demo)
-diagnose the problem
-take recommended remedial action
3.Reboot the machine
-Run a full system scan before placing the machine back in service

5 Library security and protection action plan


1. Designate security support staff (and fund them)
2. Make security awareness a corporate priority (and educate your staff)
3. Enable real-time protection
4. Update all vendor security patches
5. Subscribe to several security alert bulletins

2 Security Measures/ Methods


1. Method to secure equipment/media (hardware such as cable and computer)
2. Method to secure IT applications (software, application systems)

You might also like