Subject access to opac, Other Management

Assignment Help:

Subject Access to OPAC 

The typical OPAC interaction process requires the matching or crude translation of user vocabulary to system vocabulary. It became apparent that the amount of subject information included in standard MARC records is not adequate to meet the users' subject approach to the OPAC. Online capabilities offer many possibilities for improved subject access. Two important search devices used in OPACs are discussed below: 

Boolean Search 

Boolean search is the process of searching where the search terms are combined through Boolean Operators (AND, OR, NOT) 

Logical Product AND' Here two or more terms are combined by logical "AND" in order to formulate the search statement. If we formulate the search statement as A and B, we require that matching for both A and B in the index record to take place. Thus, a search for 'Electronic Scanner' seeks to formulate the search statement as 'Electronic AND Scanner'. 

Logical Sum 'OR':  Here two or more terms are  combined by logical 'OR'. Thus, a search for 'Electronic Scanner' or 'Electronic Searcher' seeks to formulate the search statement as 'Electronic AND (Scanner OR Searcher)'. 

Logical Difference 'NOT': Here, terms are combined by logical 'NOT'. If we formulate the search statement as A NOT B, we require that, for matching, A must be present in the index, record but B must be absent. Thus a search statement '(Automation AND Library) NOT Circulation' will retrieve all index records concerning 'Library automation' except 'Circulation'.

In this connection, it is to be noted that different OPACs have their own symbols used to indicate the Boolean operators (AND, OR, NOT) while formulating the search statement. The Boolean search method is also explained is BLIS - 06 and BLIS - 07 courses.

Truncation 

It is not necessary to specify complete  words. The system may allow for 'term truncation', where a fragment can be specified and the computer will pick up any term containing that fragment. This device is also known as 'Word fragment search'. Fragments may be truncated at either or both ends or at the middle. As for example: 

1452_types of truncation.png

The sign '*' is used to indicate truncation. The sign may vary from one system to another system. 


Related Discussions:- Subject access to opac

Organisational Change, Question 1. Demonstrate the use of analytical tools ...

Question 1. Demonstrate the use of analytical tools to monitor the progress and the effect of change Question 2. Assess monitoring and measurement techniques to change within an o

The computer misuses and cybercrimes that are punishable, QUESTION 1 Wh...

QUESTION 1 What are the principles that one should take into consideration when dealing with data protection? QUESTION 2 What are the institutions set up for the protec

Functional organisation - information centres, Functional Organisation: ...

Functional Organisation: The library is expected to take care of selection, acquisition and storage of documents. The documentation/information centre, in collaboration with t

History of project management, H i story of project management While ...

H i story of project management While quality management was developing, around the same time a number of events led to the need for better project management. In the 1950?s

Performing quality control, P e rforming Quality Control Quality cont...

P e rforming Quality Control Quality control uses techniques and performs activities to compare actual quality performance with requirements and define appropriate actions if

Library organisational structure -library management, LIBRARY ORGANISATION...

LIBRARY ORGANISATIONAL  STRUCTURE   OBJECTIVES  We have learnt in Unit 1 that an organisation has to be structured in order to achieve its goals and objectives. In this

Developing procedures to facilitate recording, Developing Procedures to Fac...

Developing Procedures to Facilitate Recording: In  order  to have adequate account-of what was observed  during observation  some procedurrecordings should be  followed, eithe

Explain how cryptography works, a) Differentiate between encryption and dec...

a) Differentiate between encryption and decryption. b) Explain how cryptography works. c) List down three examples of symmetric key algorithms and two examples of asymmetric

Explain steps involved in decision making, Question 1: (a) Decision mak...

Question 1: (a) Decision making is the essence of management, and every decision starts with a problem. (i) What is a decision? (ii) What is a problem? (b) Decision m

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd