Download presentation
Presentation is loading. Please wait.
Published byLizbeth Tyler Modified over 9 years ago
1
CS 502 Computing Methods for Digital Libraries Cornell University – Computer Science Herbert Van de Sompel herbertv@cs.cornell.edu Lecture 2: A Library Automation perspective on Digital Libraries? Based on lectures 1997-1999
2
Primary Sources: the content itself; an intellectual work a journal article, a journal, a book, a CD, a Web Page Types of Resources
3
Secondary Sources: contain data about content; metadata abstracting&indexing databases: per discipline for journal articles, conference proceedings, (books): Inspec, Medline, MLA, BIOSIS,... for books: Books in Print,... citation databases global coverage Types of Resources
6
Catalogue: also data about data; metadata descriptions at the level of a book, a journal, not the article level but: only about holdings of a certain library contains location information local coverage: a catalogue per library/institution OPAC system Types of Resources
10
Web? Primary Source: a web page Secondary Sources: databases behind search engines Catalogue: URLs associated with records in the databases behind search engines Search engines are a merger of secondary sources and a catalogue
11
Core goal of library automation Optimize the consultation chain Keywords => secondary sources => References References => catalogue => Locations Locations=> document delivery => Papersin primary sources
12
early library automation Automation of in-house procedures (acquisitions, serials control, loan, …) Technology: mainframe/minicomputers dedicated terminals Digital content: OPAC system (end-user) A&I dbases on online hosts (happy few)
13
conceptual: in-house procedures => information & information delivery technological: LAN, CD-ROM libraries: A&I databases, local storage 1985 - two reorientations in library automation FIRST WAVE from automated housekeeping of libraries & archives to automated information
14
from database networking to the digital library two reorientations in library automation SECOND WAVE
16
first wave CatalogueSecondary sources Primary sources CD-ROM LAN CD-ROM soft ILS OPACS CD-ROM LAN CD-ROM soft
17
second wave info A meta soft A info B cata soft B info Z prim soft Z info T soft T
18
two reorientations in library automation conceptual: database networking => integrated information environment technological: open systems, client-server, inter-application tools, global networking library: WWW, C/S CD-ROM, Z39.50, local and remote storage, full-content 1993 - SECOND WAVE from database networking to the digital library
19
THE HYBRID INFORMATION ENVIRONMENT THE INTERLINKED INFORMATION ENVIRONMENT THE ACCESSIBILITY second wave : characteristics
20
THE HYBRID INFORMATION ENVIRONMENT paper basedtraditional library+/- informationformalnon-formal digitalformal/digitalinformal/digital
21
DISCOVERY SELECTION LOCATION REQUEST USE PAPER FORMAL DIGITAL NON-FORMAL AUTOMATED TRADITIONAL LIBRARY SECONDARY TOOLS CATALOGUE BIBLIOGRAPHIC HOLDING DOC DEL REQ loan, ill, on-site show library card pay invoice read INFORMAL DIGITAL SEARCH ENGINES URL access FORMAL DIGITAL SECONDARY SERVICES HEADERS TOC URL authentication charging access
22
l FORMAL versus NON-Formal information – non-formal information is over-valued – formal information is neglected l ACTUAL INFORMATION ENVIRONMENT : – non formal information is better reachable than formal information “ Some users are naive enough to believe that information found only on the internet is adequate for a literature search “ (Saunders & Mitchell, The evolving virtual library)
23
second wave : characteristics THE INTERLINKED INFORMATION ENVIRONMENT
24
DISCOVERY SELECTION LOCATION REQUEST USE AUTOMATED TRADITIONAL LIBRARY INFORMAL DIGITAL FORMAL DIGITAL PAPER FORMAL DIGITAL NON-FORMAL SECONDARY TOOLS CATALOGUE BIBLIOGRAPHIC HOLDING DOC DEL REQ loan, ill, on-site show library card pay invoice read SEARCH ENGINES URL access SECONDARY SERVICES HEADERS TOC URL authentication charging access
25
2nd wave : characteristics THE ACCESSIBILITY location independent solutions platform independent solutions access via standard user-interfaces access control and accounting mechanisms go for the Web
26
N authentication session management menu system authorization ERL Z39.50 URL THIN interlinking
27
authentication session management menu system authorization ERL Z39.50 URL THIN interlinking N
28
information systems : Z39.50 NISO Z39.50 standard, client-server protocol for information retrieval user interface: –simultaneous access to multiple databases –simultaneous access to multiple servers –single user-interface for multiple resources –http, Z39.50 clients built around services such as: initialisation, search, retrieval, sort, browse, … many OPACs, A&I databases
29
information systems : http protocol of the Web –OPACs –full text at publishers’ sites –“aggregators”: ISI WoS, OCLC, Dialog, UMI –preprint archives –discipline oriented Internet portals –Internet search engines –information not typical to the library environment user-interface: –within the environment of an aggregator: single interface for multiple resources –some projects about searching multiple resources from a single interface : Virginia Tech, Old Dominion, Stanford
30
information systems : SilverPlatter ERL client-server solution for access to databases delivered on CD-ROM & tape & ftp 290+ scientific databases (Current Contents, Inspec, PsycLit, ERIC, MLA, Medline, …) local databases via partner publishing (Belgian Scientific Union Catalogue, Flemish Catalogue of Public Libraries, Belgian National Bibliography) user interface: –simultaneous access to multiple databases & servers –http & ERL clients & Z39.50 clients –single user interface for multiple databases
31
information systems: thin client technology traditional Windows CD-ROMs: no web- interface provide web-access via thin client technology
32
information systems face the reality: the ideal world does not exist live with multiple user interfaces
33
N authentication session management menu system ERL Z39.50 URL THIN authorizationinterlinking
34
authentication Coalition for Networked Information: – authentication : the right to use a name – authorization : the right to use a service why authentication? – personalized services – as a basis for authorization in distributed systems with licensed information provide single sign-on for environment cf. IT: file-server, e-mail, UNIX account, OPAC, …)
35
Athens e-Lib – http://www.athens.ac.uk/index.html – central user-database / decentral administration / central authentication / central authorization the Digital Library Federation Authentication and Authorization initiative – https://www1.columbia.edu/sec/acis/rad/xsamd/ – institutional user-database / institutional administration / institutional authentication / institutional authorization – based on standards: LDAP(s), HTTP(S), certificates (X509) – split between authentication and authorization auth : solutions/initiatives
36
authentication session management menu system ERL Z39.50 URL THIN N authorizationinterlinking
37
session management positive authentication => session-ID store identity & session-ID – in the browser (cookie) – at server side store other info in browser or server: from authentication : username, e-mail address,... from session: interface language, status of menu- system, session-ID in information sytems,... keep track of user actions in the environment
38
authentication session management menu system ERL Z39.50 URL THIN N authorizationinterlinking
39
menu system provide overall presentation of the environment search/browse the database of databases
40
authentication session management menu system ERL Z39.50 URL THIN N authorizationinterlinking
41
authorization status: user is authenticated in the environment user has a raw indication on authorization for resources next: use a resource requires extra identification authentication & authorization in the resource opposed to the single sing-on concept, privacy issues, … IP address based (!!off location, dynamic IP addressing!!) no real solutions: it is a mess! via an authorization module (proxy), in the background provide seamless access to the environment
42
authentication session management menu system authorization ERL Z39.50 URL THIN interlinking N
43
interlinking module tradition: fragmented and non-context- sensitive approach now: SFX/OpenURL
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.