Methods of assessing information needs, Other Management

Assignment Help:

Methods of Assessing Information Needs:

As mentioned above there are two sets of methods: One used in user studies for analysing verbal behaviour and the other in use studies for analysing actual behaviour. The most common methods for assessing information needs and evaluating adequacy of library support services to users are as follows: 

•  Survey through (a) questionnaire and (b) interview  

•  Observation 

•  Secondary analysis. 

A brief explanation of how these methods are used is worth mentioning here. A survey is conducted through a questionnaire or interview. Both these involve questioning techniques inviting users' responses for eliciting information on their expectations of or satisfaction from, library and information services. In other words, questionnaires and interviews offer the users an opportunity to express their opinions on the library support. Analysing and interpreting these responses amounts to investigating into their verbal or expressed behaviour. In user studies we employ a variety of questioning techniques both in the questionnaire and the interview methods.  


Related Discussions:- Methods of assessing information needs

What is an attitude, QUESTION 1 Personal attitudes can have a key beari...

QUESTION 1 Personal attitudes can have a key bearing on how individuals function within organizations. Attitudes may reflect in either positive or negative behaviours (a) Wh

Oral presentation, Oral Presentation It provides to spoken, rather than...

Oral Presentation It provides to spoken, rather than written communication where information is expressed to a group. The spoken word is frequently augmented by visual aids suc

Need for defining the problem - research topic, NEED FOR DEFINING THE PROBL...

NEED FOR DEFINING THE PROBLEM Problem clearly stated is a problem half solved. A proper definition of research problem will enable you as the researcher to be on the track whe

Hacker, Hacker Hacker is one who delights in having an intimate underst...

Hacker Hacker is one who delights in having an intimate understanding of the Internet workings of a system or computers and computer networks in particular.

Discuss the relevance of evaluation, Problem: Dressel (1986) defines ev...

Problem: Dressel (1986) defines evaluation as "the collection and interpretation, through systematic and formal means, of relevant information which serves the basis for ration

Documentary sources - source of data, Documentary Sources: Those  info...

Documentary Sources: Those  information which are contained  in  the published and unpublished documents, reports, statistics, manuscripts, letters, diaries  and so on, are gr

Outline the organisational and behavioural factors, Question 1: Describ...

Question 1: Describe what is meant by ‘skilled-based', ‘rule-based' and knowledge-based behaviour. Explain in each case how these operating levels can give rise to human error

What are corals and coral reefs, Question 1: (i) What are corals and c...

Question 1: (i) What are corals and coral reefs? (ii) Illustrate with the help of a diagram the schematic representation of a coral polyp. (iii) Marine tourism is growi

Porter''s five forces model, QUESTION 1 Implementation of selected stra...

QUESTION 1 Implementation of selected strategies is a phase in the strategic management process. Discuss the key issues that need to be considered in this phase. QUESTION 2

Ala rules - british museum cataloguing rules, ALA Rules : American Lib...

ALA Rules : American Library Association. ALA Catalog Rules: Author and Title Entries. - Prel 2nd ed. - Chicago: American Library Association, 1941.  Within two decades of

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd