Crisis As A Result Of Introducing The First Electronic Database  Unknown patrons/customers  Negotiations with Vendors  Hardware/Software  Staff preparedness.

Slides:



Advertisements
Similar presentations
Capacity Building for Repositories Dr. Helena Asamoah-Hassan University Librarian, KNUST, Kumasi, Ghana at BioMed Open Access Africa Conference held at.
Advertisements

WCSWeb Hearing Link Data System and User Training Protocol Marcia Fort, Au.D., CCC-A Kathy Gajan, M.A., CCC-SLP Jason Guetgemann, M.S., CCC-SLP Jerry Ramsey,
Quality assurance Kari Kuulasmaa 1 st EHES Training Seminar, February 2010, Rome.
Practical Preparations Planning for Safety and Emergencies.
Cathy N. Hartman University of North Texas Libraries October 10, 1998 Cathy N. Hartman University of North Texas Libraries October 10, 1998.
Everything You Always Wanted to Know About Electronic Journals but Were Afraid to Ask! NASIG Pre-Conference June 2002 Stefanie Wittenbach Head of Acquisitions,
Standard 3: Educational leaders apply technology to enhance their professional practice and to increase their own productivity and that of others.
Enterprise Security A Framework For Tomorrow Christopher P. Buse, CPA, CISA, CISSP Chief Information Security Officer State of Minnesota.
Collaborative Technical Services Team Report GUGM May 15, 2014 Cathy Jeffrey.
System Implementation Dr. Dania Bilal IS 551 Fall 2005.
EuroCRIS Best Practices & Solutions Members Helping Members Move Forward.
ICASAS305A Provide Advice to Clients
Creating Tutorials for the Web: A Designer’s Challenge Module 1: Online learning considered.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Designing a library support infrastructure for the use of digital content for teaching Danuta A. Nitecki & Karen Reardon Yale University Library Digital.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Planning And Electronic Records Issues For Electronically Enhanced Courses Jeremy Rowe Nancy Tribbensee
The Subject Librarian's Role in Building Digital Collections: Where Information Management and Subject Expertise Meet Ruth Vondracek Oregon State University.
LS407 R EFERENCE AND I NFORMATION S ERVICES Spring 2010 Laura Saunders.
OHT 14.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Software quality infrastructure components The need for procedures and.
Teaching and learning with technology – the University of Akureyri’s approach Creating knowledge III Akureyri, Sept Sigrún Magnúsdóttir.
Mitun PatelMXP07U. Organisational structure Top management; this includes the organisation’s general manager and its executives Department managers; this.
Islamic Republic of Afghanistan Ministry of Education EMIS Directorate.
ACIOP Post Award Orientation Webinar October 9, 2014.
Library Automation: Planning and Implementation
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
Teachers directing the work of paraprofessionals
WICHE (Western Interstate Commission for Higher Education) WCET – Western Cooperative for Educational Telecommunications – A national leader in helping.
ILS & Technology Services Potential Budget Impacts.
SEC835 Database and Web application security Information Security Architecture.
CHAPTER 5 Infrastructure Components PART I. 2 ESGD5125 SEM II 2009/2010 Dr. Samy Abu Naser 2 Learning Objectives: To discuss: The need for SQA procedures.
Evergreen Indiana: Where is it now and where is it going? Shauna Borger Indiana State Library.
Principles for Staff Development Programming Laura E. Ray, MA, MLS Educational Programming Librarian Cleveland-Marshall College of Law
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Evaluating Educational Technology and Integration.
Standard III Jackie Cadena Sara Reibman Armandina Villarreal Oralia Altamirano Learner-Centered Technology and Information Access Strategies for Librarians.
ADOPTING OPEN SOURCE INTEGRATED LIBRARY SYSTEMS Best Practices Presented by Vandana Singh, PhD Assistant Professor, School of Information Sciences University.
Repository Requirements and Assessment August 1, 2013 Data Curation Course.
NCATE Standard 6 Governance and Resources: Debunking the Myths AACTE/NCATE Workshop Arlington, VA April 2008 Linda Bradley James Madison University
3.08 b Determine venture’s information technology.
24 March 2010Atlanta, Georgia Passing it on: Notes on digital initiative sustainability Marty Kurth HBCU Library Alliance – Cornell University Library.
Preparation is Key: Lessons Learned from an ERMS Implementation Todd Enoch Head, Serials and Electronic Resources University of North Texas Libraries.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
UNESCO ICTLIP Module 2. Lesson 21 Introduction to Integrated Library Systems Lesson 2. How do you determine your automation requirements?
Institutional Considerations
The Implementation of an ILS at the Library of Congress Presentation by Erik Delfino Assistant Implementation Coordinator ILS Program Office Library of.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
System Implementation Dr. Dania Bilal IS 592 Spring 2005.
Note1 (Admi1) Overview of administering security.
Student Support Services Standard II B & C. II.B. The institution recruits and admits diverse students who are able to benefit from its programs, consistent.
Archival Workshop on Ingest, Identification, and Certification Standards Certification (Best Practices) Checklist Does the archive have a written plan.
Chapter 5 Initiating and Planning Systems Development Projects Modern Systems Analysis and Design Sixth Edition Jeffrey A. Hoffer Joey F. George Joseph.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Endangered Species A Collaborative Teaching Unit.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Anmai University Library Reconstruction Project Team Three
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
California’s Flood Future Recommendations for Managing the State’s Flood Risk Flood Risk Management & Silver Jackets Workshop August 21, 2012.
Pakistan Center of the region, rich in resources yet to be explored, understood and shared Pakistan.
Chang, Wen-Hsi Division Director National Archives Administration, 2011/3/18/16:15-17: TELDAP International Conference.
CCSAS V2 Impacts on Business and Legal Processes October 4, 2006.
Support to Strengthening Devolved Structures’ Capacity for Emergency Preparedness and Response (EPR) 12 th October 2016 The 4 th National Symposium on.
Securing Information Systems
Elizabeth R. Peralejo EMC Coordinator Ateneo de Manila High School
Chapter 2 Introduction to Computer User Support
Securing Information Systems
Module 6: Preparing for RDA ...
Implementation and Introduction to Users
In-house Developed Library Solutions
Technology Maintenance
Presentation transcript:

Crisis As A Result Of Introducing The First Electronic Database  Unknown patrons/customers  Negotiations with Vendors  Hardware/Software  Staff preparedness  Advertisement/patrons’ awareness  Success and/or failure

Crisis While Implementing Integrated Online Catalog Systems  Data conversion  Bibliographic record  Patron record  System-wide policies  Circulation  Cataloging  Staff training  怀旧 — 太头痛

Crisis During Employing Serials Solutions (An Open URL Tool) n Too quick/too soon? n Hosting/not hosting  Investment on equipment  Daily maintenance n Systems incompatibility  Databases from different vendors  Browsers n Users’ satisfaction

Crisis When Digitizing Library Collections n What collection to start with? n Choices of hardware/software n Specific knowledge/skills  Computer skills vs data operations  Subject n Data storage

Education And Training n On-campus training  Mobilize all efforts  Apply all possible equipment n Outsourcing/contracting vendors  Some home-work  Demand a list of problems to be addressed n Off-campus training n Online demonstration (self-paced)  Webinar, Webex, Podcast, etc.

Written Instructions n General guidelines  Outline rudimentary  Formal appearance n Specific procedures  Simple, but yet illustrative  Try to be self-explanatory n Customized “Cheat Sheets”  Common sense

Mental Awareness n Online newsletter  Make it know to the public  Try to publish regularly n Site visits  Have a check-list  By small potato n Listservs, online discussions  Leading related questions/concerns n Leaping by leading  Exemplary figures  limelight

Lessons Learned—Potential Risks n Due to natural causes  Flood, thunder, etc. n Technical or mechanical difficulties  Technical challenges  Hardware wear and tear  Licensing n Human obstacles  Virus, worms, spam, etc  firewalls

Lessons Learned—Planning n Support and commitment  Assurance from the top  Obtain a pledge, if possible n Designate responsibilities to individuals  Be specific (people vs equipment) n Evaluating risks  Use a scale (1-5)  Formulating risk vs disaster n Written procedures n Test written procedure

Lessons Learned—Recovery Plan n Know where the helps are  Experts in the field  Necessary facilities  How to assess the damage  Prepare an written guide  Know degree of consequence  Be honest with the public  Reveal damages in cost  Long-term effect

Lessons Learned—Funding  Before/after cost  Grants  Potential sponsors