The aim of this paper is to highlight the relationship between cataloging data and reference service and the importance of including reference librarians, in general resource…
Abstract
Purpose
The aim of this paper is to highlight the relationship between cataloging data and reference service and the importance of including reference librarians, in general resource description and access (RDA) training.
Design/methodology/approach
A literature review and the author’s experiences related to implementing RDA are presented with minimal cataloging jargon to help librarians better understand the effects of cataloging standards on reference service.
Findings
There is a noticeable lack of research and training related to RDA for audiences beyond technical services. More research is needed to determine how users are interacting with the catalog, how bibliographic data is supporting their discovery and access, what, if any, obstacles reference librarians encounter as a result of RDA and how future iterations of RDA may open bibliographic data to communities beyond the library.
Originality/value
This paper is one the few that discuss how RDA may affect reference service. It will be useful for providing librarians with a general understanding of the relationship between cataloging and reference and may serve as a starting point for further research.
Details
Keywords
The need for security for the business user is all important thesedays especially as the trend is to distribute computing power in theuser environment. Examines risk analysis of…
Abstract
The need for security for the business user is all important these days especially as the trend is to distribute computing power in the user environment. Examines risk analysis of information security and its aim of placing risk exposures into perspective and providing a basis for comparing the risk exposure with the cost of the solution. Views two different approaches, qualitative and quantitative, based on the mixed influences of Dr Jerry FitzGerald′s matrix approach and Bob Courteney′s approximation scales. Assesses the strengths and weaknesses of the analysis.
Details
Keywords
Discusses the change in business continuity planning whencentralized mainframe computing environments are replaced bydecentralized server/workstation/minicomputer…
Abstract
Discusses the change in business continuity planning when centralized mainframe computing environments are replaced by decentralized server/workstation/minicomputer environments. Telecommunications emerges as both the “soft spot” and the major challenge to strategy planners.
Details
Keywords
Proposes that for a business continuity strategy to be adjudgedeffective, it must be matched to the business′ true tolerance, beenterprise‐wide, get the basics right, develop a…
Abstract
Proposes that for a business continuity strategy to be adjudged effective, it must be matched to the business′ true tolerance, be enterprise‐wide, get the basics right, develop a business continuity ownership structure, establish a plan discipline and not over‐invest. Looks at each of these points in detail.
Details
Keywords
Deals with the dangers to computer systems from flooding and water‐related hazards which so far appear to have been underestimated, and offers preventive and remedial advice to…
Abstract
Deals with the dangers to computer systems from flooding and water‐related hazards which so far appear to have been underestimated, and offers preventive and remedial advice to companies which may find themselves in such a position.
Details
Keywords
Network disaster recovery plans (DRPs) are just emerging as a businessissue. The need to make contingency plans in case of a computerdisaster, or major disruptions to the network…
Abstract
Network disaster recovery plans (DRPs) are just emerging as a business issue. The need to make contingency plans in case of a computer disaster, or major disruptions to the network, is a vital part of corporate strategy. Discusses the roles that users, IT management and staff must play. Identifies users as responsible directly for the problem of security and for establishing the levels of security; whereas IT management staff must be responsible for the availability of IT. Highlights what measures can be taken to set up network DRPs, although advises against too complex strategies and plans, and emphasizes easy‐to‐maintain strategies. Concludes that a corporate policy must be developed to accommodate all the changes needed in selecting an appropriate DRP.
Details
Keywords
Describes a set of “baseline” threats and presents thereasoning behind the “baseline” security approach. Discussesan example of the acceptance of the security baseline approach…
Abstract
Describes a set of “baseline” threats and presents the reasoning behind the “baseline” security approach. Discusses an example of the acceptance of the security baseline approach and suggests the way in which it can be used. Describes the advantages and disadvantages of the approach and concludes that a baseline approach is worthy of consideration as a way forward.
Details
Keywords
In a distributed computing environment, ownership of the securityproblem is avoided by management and users alike. Not only integrity andconfidentiality, but also network (i.e…
Abstract
In a distributed computing environment, ownership of the security problem is avoided by management and users alike. Not only integrity and confidentiality, but also network (i.e. information, availability must be considered). Management has begun to realize that the security provided in the mainframe era has not been provided in the distributed environment. What must be considered now are the following issues: logical access controls access all platforms; improved network and platform reliability, and the ability to recover readily from disruption and disasters. Concludes that information security is absolutely vital to the survival of today′s enterprises and therefore should be given the emphasis it deserves at all enterprise levels.
Details
Keywords
Deals with the dangers to computer systems from flooding andwater‐related hazards which so far appear to have been underestimated,and offers preventive and remedial advice to…
Abstract
Deals with the dangers to computer systems from flooding and water‐related hazards which so far appear to have been underestimated, and offers preventive and remedial advice to companies which may find themselves in such a position.