Course: Collection Development (5505) Semester:
Autumn, 2021
Level: MLIS
ASSIGNMENT No. 2
Q.1
How Collection evaluation is done? Explain methods of collection evaluation in
detail.
ANS
This method of
collection evaluation is the practice of checking a library collection
against a list of notable books or materials to see if the collection includes
these titles. This is the oldest method of collection
evaluation, and its first recorded use occurs in 1849 by Charles Coffin Jewett
at the Smithsonian Institution .
Collection Evaluation Viewer is one of
the Configuration Manager tools. Use it to
view and troubleshoot the collection evaluation process on the primary site
server.
Important
Starting
in Configuration Manager version 2103, this standalone tool isn't
supported. The tool is no longer included with the Configuration Manager
installation source. Starting in version 2010, its functionality is built-in to
the console. For more information, see, How to view collection evaluation.
The tool displays the following information:
·
Both historic and live information for full and
incremental collection evaluations
·
The evaluation queue status
·
The time for collection evaluations to complete
·
Which collections are currently being evaluated
·
The estimated time that a collection evaluation
will start and complete
About
collection evaluation
The collection evaluation process runs by
evaluating the membership rules of a collection to update its members. The site
places a collection that it's evaluating in one of four different queues:
·
Manual Queue: For collections that an administrator has
manually selected for evaluation from the console
·
New Queue: For newly created collections
·
Full Queue: For collections due for full evaluation
·
Incremental Queue: For
collections with incremental evaluation
There are four threads that run to evaluate the
collections in the above queues. Each queue includes a series of arrays, and
each array includes the collections to be evaluated. The thread that's running
for the queue selects a collection from the array and runs the evaluation. The
queue length indicates the number of arrays in the queue.
Requirements
·
Run the tool on the site server
·
Run the tool by an administrative user with at
least the Read-Only Analyst role
·
The user also requires Read permission
to the site database in SQL
·
SQL must be on the default port
Usage
Run CEViewer.exe. The main menu of
the tool contains the following tabs:
·
Connect: Establish the
initial connection to the primary site server and SQL Server
·
Full Evaluation: Lists the
detailed information about all past full evaluations
·
Incremental evaluation: Lists the
detailed information about all past incremental evaluations
·
All Queues: Summarizes
the current collection evaluations for all four queues
·
Manual Queue: Lists the
detailed information about the current collection evaluation in the manual
queue
·
New Queue: Lists the
detailed information about the current collection evaluation in the new queue
·
Full Queue: Lists the
detailed information about the current collection evaluation in the full queue
·
Incremental Queue: Lists the
detailed information about the current collection evaluation in the incremental
queue
Connect tab
This tab allows you to establish the initial
connection to the primary site server. The tool also establishes a connection
to the SQL Server that hosts the site database.
The connections to both primary site server and
SQL Servers use the current signed-in user credential. Connections to the
central administration site or a secondary site aren't supported. No collection
evaluation process runs on those sites.
Once the tool successfully establishes a
connection, see a notification at the bottom of the Collection Evaluation
Viewer that confirms the tool's connection to the SQL Server.
Full Evaluation
tab
Shows detailed information about past full
collection evaluations. There are eight columns:
·
Collection Name: Name of the
collection
·
Site ID: Site ID of the collection
·
Run Time: How long the last collection evaluation ran,
in seconds
·
Last Evaluation Completion Time: When the last
collection evaluation completed
·
Next Evaluation Time: When the next
full evaluation starts
·
Member Changes: The member
changes in the last collection evaluation. These changes are either plus
(members added) or minus (members removed).
·
Last Member Change Time: The most
recent time that there was a membership change in the collection evaluation
·
Percent: The percentage of evaluation time for this
collection over the total (all collections) evaluation time
Incremental
evaluation tab
Shows detailed information about past
incremental collection evaluations. There are seven columns:
·
Collection Name: Name of the
collection
·
Site ID: Site ID of the collection
·
Run Time: How long the last collection evaluation ran,
in seconds
·
Last Evaluation Completion Time: When the last
collection evaluation completed
·
Member Changes: The member
changes in the last collection evaluation. These changes are either plus
(members added) or minus (members removed).
·
Last Member Change Time: The most
recent time that there was a membership change in the collection evaluation
·
Percent: The percentage of evaluation time for this
collection over the total (all collections) evaluation time
All Queues tab
Summarizes the live collection evaluations for
all four queues. There are six sections:
·
Summary: Lists the total collection number and the
queue length for all collections in all four queues
·
Running Evaluation: Lists which
collection is currently being evaluated in each queue, and how long it has been
running
·
Manual Update: Shows a brief summary of the collections
being evaluated, the estimated completion time, and the order of the evaluation
in the manual queue
·
New Collection: Shows a brief
summary of the collections being evaluated, the estimated completion time, and
the order of the evaluation in the new collection queue
·
Full Evaluation: Shows a brief
summary of the collections being evaluated, the estimated completion time, and
the order of the evaluation in the full evaluation queue
·
Incremental Evaluation: Shows a brief
summary of the collections being evaluated, the estimated completion time, and
the order of the evaluation in the incremental evaluation queue
Q.2
In resource sharing helpful in collection development process, how? Discuss in
detail.
ANS
A collection
development process is that which permits the library to develop a collection of
materials responding to the information needs and service requirements of the
users. It has also been defined “as a process that allows for
the identification of the strengths and weaknesses of the materials collection
of a library in terms of the needs of the users and the resources of the
community.
Library materials are acquired through individual purchase,
approval plans, standing orders, deposit and donation. Cooperative purchases
through consortiums are increasingly common for the acquisition of electronic
resources. Electronic resources are also acquired from publishers as
"packages" (that is, sets of electronic resources, such as journals,
representing the complete output of the publisher).
Overall collection development and management
is the responsibility of the Collection Development and Analysis Team in
Research and Collections.
Selection is principally undertaken by academic
staff and discipline and liaison librarians to ensure that material is relevant
to the University's learning and research needs. Library staff in
the Collection Development and Analysis Team ensure that material is not
duplicated and that acquisitions are coordinated and managed in the most cost
effective manner across the entire Library system.
Requests for new journal subscriptions
generally emanate from academic staff. Because these are on-going commitments,
the Library negotiates with the relevant faculty or graduate school before new
journal titles are purchased to ensure that there are sufficient funds
available.
The first priority for the acquisitions budget
is the provision of access to texts prescribed for courses offered by the
university. Arrangements are in place to ensure reading list
material is comprehensively acquired in a timely fashion. Copies are supplied
according to a formula for multiple copies. Electronic texts are
purchased if available in acceptable models of use and formats.
Individual libraries develop collections
principally within the subject scope of their specific
disciplines. However, libraries may acquire material which falls
outside their main discipline(s) in teaching and/or
research. Collection individual development frameworks should define
collection boundaries, and seek to minimise duplication with other libraries,
particularly those on the Parkville campus.
Q.3
Define weeding, write-off and stock. How these processes support each other?
Discuss in detail.
ANS
Weeding is the systematic removal of resources from
a library based on selected criteria. It is the opposite of
selecting material, though the selection and de-selection of material often
involve the same thought process. Weeding is a vital process for an active
collection because it ensures the collection stays current, relevant, and in
good condition. Weeding should be done on a continuous, on-going basis.[1] Educating the staff with workshops and presentations on
collection quality, maintenance and the importance and positive benefits of
weeding the collection are important components for a library to consider.
A "well-maintained, well-pruned collection
is far more useful than one filled with out-of-date or unused materials."[2] Weeding a
physical collection has many benefits:[1]
·
Space is preserved to add relevant materials.
·
Patrons are able to access useful material
quickly, and the librarian can direct them to information more easily.
·
The collection is more reputable because it is
current.
·
The librarian can easily see the strengths and
weaknesses of the collection.
·
Materials are of good quality and physical
condition.
With many collections having a digital
component, space is not an issue for concern. However, this does not mean
digital collections should not be weeded. "Clearing out unused materials
makes a patron’s searching experience better by reducing the number of old and
irrelevant records the patrons must wade through in their search results to
find what they really want."[2] The
digital collection, like the physical collection, should be kept current and
easily accessible.
Write-off
A write-off is
a reduction of the recognized value of something. In accounting, this is a recognition of the reduced or zero value of an
asset. In income tax statements, this is a reduction of taxable
income, as a recognition of certain expenses required to produce the income.
In income tax calculation,
a write-off is the itemized deduction of an item's value from a person's
taxable income. Thus, if a person in the United States has a taxable income of
$50,000 per year, a $100 telephone for business use would lower the taxable
income to $49,900. If that person is in a 25% tax bracket, the tax due
would be lowered by $25. Thus the net cost of the telephone is $75 instead of
$100.
In order for business owners to write-off
business expenses, the IRS states that purchases must be both ordinary and
necessary.[1] This means
that deductible items must be usual and required for the business owner's field
of work. For example, a telemarketer may deduct the purchase of a phone since
phones are used normally and necessarily in their work.
Stock
In finance, stock (also capital
stock) consists of all of the shares into
which ownership of a corporation or
company is divided.[1] (Especially
in American English, the word "stocks" is also used to refer to
shares.)[1][2] A single
share of the stock means fractional ownership of the corporation in proportion
to the total number of shares. This typically entitles the shareholder (stockholder)
to that fraction of the company's earnings, proceeds from liquidation of assets
(after discharge of all senior claims such as secured and unsecured debt),[3] or voting
power, often dividing these up in proportion to the amount of money each
stockholder has invested. Not all stock is necessarily equal, as certain
classes of stock may be issued for example without voting rights, with enhanced
voting rights, or with a certain priority to receive profits or liquidation
proceeds before or after other classes of shareholders.
Stock can be bought and sold privately or
on stock exchanges, and such transactions are typically heavily
regulated by governments to prevent fraud, protect investors, and benefit the
larger economy. The stocks are deposited with the depositories in the
electronic format also known as Demat account. As new shares are issued by a
company, the ownership and rights of existing shareholders are diluted in
return for cash to sustain or grow the business. Companies can also buy back stock, which often
lets investors recoup the initial investment plus capital gains from
subsequent rises in stock price. Stock options issued by many companies as part of
employee compensation do not represent ownership, but represent the right to
buy ownership at a future time at a specified price. This would represent a
windfall to the employees if the option is exercised when the market price is
higher than the promised price, since if they immediately sold the stock they
would keep the difference (minus taxes).
A person who owns a percentage of the stock has
the ownership of the corporation proportional to their share. The shares form
stock. The stock of a corporation is partitioned into shares, the total of
which are stated at the time of business formation. Additional shares may
subsequently be authorized by the existing shareholders and issued by the
company. In some jurisdictions, each share of stock has a certain
declared par value, which is a
nominal accounting value used to represent the equity on the balance sheet of the
corporation. In other jurisdictions, however, shares of stock may be issued without
associated par value.
Shares represent a fraction of ownership in a
business. A business may
declare different types (or classes) of shares, each having distinctive
ownership rules, privileges, or share values. Ownership of shares may be
documented by issuance of a stock certificate. A stock
certificate is a legal document that specifies the number of shares owned by
the shareholder, and other
specifics of the shares, such as the par value, if any, or the class of the
shares.
Q.4
Write short notes on the following:
a)
Vendor monitoring
b)
Out of print materials
c)
Price verification tools
d)
Out-of-print material
e)
Storage principles
ANS
Vendor Monitoring?
Vendor
monitoring, also known as ongoing monitoring, is a vital component of the
vendor management process that is often overlooked. After selecting a vendor
and signing a contract, it’s just as important to maintain visibility over the
vendor relationship. This includes monitoring the third party’s controls that
are put in place to mitigate risk, and its ability to meet service level
agreements and other contractual terms.
Risk mitigation is one of the core responsibilities of vendor monitoring.
Here are some areas of third-party risk to consider:
- Data breaches
- Litigation
- Changes in executive leadership
- Faulty security controls
- A lack of disaster recovery testing
- Poor financials
- And much more…
In addition
to mitigating risk, vendor monitoring also involves due diligence, or the
collection and assessment of various vendor documents. Here are 6 vendor items
that you should be reviewing on a regular basis:
- Financials
- Business continuity and disaster recovery
plans
- SOC reports
- Risk assessments
- Complaints
- Public news
Automate Vendor Monitoring
Vendor
monitoring can be a very cumbersome and time-consuming task. Fortunately, there
are some helpful industry tools to automate the process and ease the
burden.
Here are
two options that may be helpful:
- ArgosRisk -This system can identify early signs of
vendor risk and will alert you of any that may need your attention.
- Security Scorecard - Assists by monitoring your
vendor’s security posture which helps identify vulnerabilities, active
exploits and advanced threats.
- BitSight - Allows you to see a high level of
visibility into key risk factors and analyze data on a continuous basis to
spot security issues with your vendors.
Ongoing
vendor monitoring is often a forgotten step within vendor management, but it’s
an extremely important component of any program. When performed correctly, it
can protect your organization from unnecessary risk.
Ongoing
monitoring for vendors is important, as you just learned. Learn 6 ways you can
improve your processes. Download
the infographic.
b)
Out of print materials
An out-of-print (OOP)
or out-of-commerce item or work, is something that is no
longer being published. The term applies to all types of printed matter,
visual media, sound recordings, and video recordings
This resource searches the holdings of new and
out-of-print book databases and presents a combined result. Databases searched
include Advanced Book Exchange, Powell's Books, and others.
This multi vendor search engine is particularly
useful for non-North American imprints.
This site claims it is the world's largest
source of out-of-print books with over 13 million titles.
This reseller taps into the holdings of over a
thousand small out-of-print dealers and re-sells their titles directly and via
services such as Amazon.com.
Metasearch engine for rare and out of print
materials, including maps.
The ABAA Booknet specializes in rare and
antiquarian books, maps and prints.
This megabookstore, based in Portland, Oregon,
has a immense collection of technical books.
This website focuses on textbooks and provides
price quotes from multiple textbook retailers.
Based in Ohio, this company buys and sells used
scholarly books.
Price
Verification Tool
The Price
Verification Tool allows any user of the CMSC software to input an order string
and have the system return a price. This tool is named the Order String
Decoder. This tool can be used in one of three ways.
1.Input an order string code one at a time
directly into the interface.
2.Select an existing order and process all the
line items contained in the order.
3.Upload a CSV (comma separated values) file to
the system.
Options 2 and 3
also allow the user to download a CSV file that can be opened in Excel or any
program that supports CSV files for further processing.
To access the
Order String Decoder tool select Order String Decoder from the
Tools menu.
A screen
similar to the following figure will be displayed.
Principles of
storage. Principles of storage. 1. Control of respiration.
Respiration is a breakdown process; hence storage method should provide a means
to minimize this metabolic process. Cold storage, atmospheric modification, low
pressure storage are the methods used based on this principle.
storage
principles
INJURY
PREVENTION ADVICE
·
» Injury Prevention Information Sheets
·
» Lifting, pushing & pulling
·
» Manual tasks risk management
- Store heavy and
frequently used items in the ideal zone - between shoulder and mid thigh.
- Store smaller,
lightweight or infrequently used items in lower or higher areas.
- Organise cupboards and
storage areas to lessen clutter and allow easy access to shelves. Plan for
regular audits of storage areas. Assign responsibility within a work group
for maintenance of storage areas.
- Frequently handled
items should be within easy access and reach.
- A sturdy step or
stepladder should be easily available to access items stored above
shoulder height.
- If a ladder is
required an intermediate support point may be necessary to allow lifting
and lowering of items safely in stages.
- Keep a clear bench for
delivery of goods to avoid lifting from ground level (if applicable).
- Consider current and
likely future storage needs in any workspace redesign or before new
equipment is purchased.
Q.5
What is special collection? How these types of collections managed in libraries
and acquired? Discuss in detail.
ANS
Special collections (Spec.
Coll. or S.C.) are libraries or library units that house
materials requiring specialized security and user services.
Materials housed in special collections can be
in any format (including rare books, manuscripts, photographs, archives, ephemera, and digital
records), and are generally characterized by their artifactual or monetary value, physical format, uniqueness or rarity, and/or
an institutional commitment to long-term preservation and access.[1] They can
also include association with important figures or institutions in history,
culture, politics, sciences, or the arts.[2]
Individual libraries or archival institutions
determine for themselves what constitute their own special collections,[3] resulting
in a somewhat mutable definition.[4] For
research libraries, a special collections area or division can be a fundamental
part of their mission.[5] Some
special collections are standalone institutions that are privately funded, such
as the Newberry Library or the American Antiquarian Society while
others are part of a larger institution, such as the Beinecke
Library at Yale University. Many American university special
collections grew out of the merging of rare book rooms and manuscripts
departments in a university's library system.
In contrast to general (or circulating) libraries,
the uniqueness of special collections means that they are not easily replaced
(if at all) and therefore require a higher level of security and handling.[6] When such
security fails, it can be catastrophic. The Carnegie Library of Pittsburgh's
rare books and archives were silently breached from the inside by the manager
of the Oliver Room, Greg Priore.
Storage
Items in a special collection are usually
stored in closed stacks (not directly accessible to library patrons) which
contain noncirculating items, meaning that items cannot be loaned or otherwise
removed from the premises. Access to materials is usually under supervision.
Depending on the policies of an institution holding special collections,
researchers may be asked to present identification cards, letters of reference,
or other credentials to gain access.[2]
Most special collections are stored in areas in
which the temperature, humidity, illumination, and
other environmental conditions are carefully monitored to ensure the integrity
of materials, and adequate security is provided to protect the materials from
unauthorized access, theft, and vandalism.
Offsite storage facilities have become
increasingly popular among institutions holding special collections. Most
libraries consider it their mandate to maintain acquisition of new collections,
although the limitations of their physical plants may not be able to handle all
that is acquired. Storing materials offsite allows flexibility in how libraries
design and apportion their space and provides security for materials. The 2010
"Taking Our Pulse" report cites a survey in which 67% of responding
institutions use offsite facilities, with another 5% in planning stages.
Examples of
collections include lists, sets, multisets, trees and graphs.
Fixed-size arrays (or tables) are usually not considered a collection because
they hold a fixed number of data items, although they commonly play a role in
the implementation of collections. Variable-size arrays are generally
considered collections.
a collection is a grouping of
some variable number of data items (possibly zero) that have some shared
significance to the problem being solved and need to be operated upon together
in some controlled fashion. Generally, the data items will be of the same type
or, in languages supporting inheritance, derived from some common ancestor
type. A collection is a concept applicable to abstract data types, and does not prescribe a specific
implementation as a concrete data structure, though often
there is a conventional choice (see Container for type theory discussion).
Examples of collections include lists, sets, multisets, trees and graphs.
Fixed-size arrays (or tables) are usually not
considered a collection because they hold a fixed number of data items,
although they commonly play a role in the implementation of collections.
Variable-size arrays are generally considered collections.