Subject access to opac, Other Management

Assignment Help:

Subject Access to OPAC 

The typical OPAC interaction process requires the matching or crude translation of user vocabulary to system vocabulary. It became apparent that the amount of subject information included in standard MARC records is not adequate to meet the users' subject approach to the OPAC. Online capabilities offer many possibilities for improved subject access. Two important search devices used in OPACs are discussed below: 

Boolean Search 

Boolean search is the process of searching where the search terms are combined through Boolean Operators (AND, OR, NOT) 

Logical Product AND' Here two or more terms are combined by logical "AND" in order to formulate the search statement. If we formulate the search statement as A and B, we require that matching for both A and B in the index record to take place. Thus, a search for 'Electronic Scanner' seeks to formulate the search statement as 'Electronic AND Scanner'. 

Logical Sum 'OR':  Here two or more terms are  combined by logical 'OR'. Thus, a search for 'Electronic Scanner' or 'Electronic Searcher' seeks to formulate the search statement as 'Electronic AND (Scanner OR Searcher)'. 

Logical Difference 'NOT': Here, terms are combined by logical 'NOT'. If we formulate the search statement as A NOT B, we require that, for matching, A must be present in the index, record but B must be absent. Thus a search statement '(Automation AND Library) NOT Circulation' will retrieve all index records concerning 'Library automation' except 'Circulation'.

In this connection, it is to be noted that different OPACs have their own symbols used to indicate the Boolean operators (AND, OR, NOT) while formulating the search statement. The Boolean search method is also explained is BLIS - 06 and BLIS - 07 courses.

Truncation 

It is not necessary to specify complete  words. The system may allow for 'term truncation', where a fragment can be specified and the computer will pick up any term containing that fragment. This device is also known as 'Word fragment search'. Fragments may be truncated at either or both ends or at the middle. As for example: 

1452_types of truncation.png

The sign '*' is used to indicate truncation. The sign may vary from one system to another system. 


Related Discussions:- Subject access to opac

Procedure for data collection, PROCEDURE FOR DATA COLLECTION: The plan...

PROCEDURE FOR DATA COLLECTION: The planning for research continues till a pilot study is conducted  to  see that the whole research design works. The next step is the stage of

Planning and design for a new property, Question 1: Show the importance...

Question 1: Show the importance of facilities planning and design with regards to: (i) Land (ii) Esthetics (iii) Space (iv) Buildings (v) Innovation (vi) Acces

Acquisition through exchange , Acquisition Through Exchange: Acquisiti...

Acquisition Through Exchange: Acquisition through exchange is another mechanism by which Collection Development can take place. Of course, it goes without saying that the libr

Disadvantages of the first past the post electoral system, QUESTION 1 O...

QUESTION 1 Outline the constitutional and political history of Mauritius from 1947 to 1959 with reference to (i) the right to vote (ii) the partial transfer of power through

Technical and operational performance of contracts, M onitoring  and  Co...

M onitoring  and  Controlling  Technical  and  Operational  Performance of Contracts (Contractors) Monitoring and controlling of a contract being executed by a contractor sho

Job enlargement, QUESTION The significance of work design is underscore...

QUESTION The significance of work design is underscored by an organisation's dependence on human efforts to accomplish its goals 1 Contrast the meaning of the terms job enla

reference section-staff activity area of library building, Reference Secti...

Reference Section-Staff Activity Area of library building in library management Reference activity is one of the most important activities of a library and very often it is th

Explain security risk management process, Question: a) Describe why the...

Question: a) Describe why the following security measures are important for e-banking and how are they implemented? (i) Data Confidentiality (ii) Data Integrity (iii) Aud

Ala rules - british museum cataloguing rules, ALA Rules : American Lib...

ALA Rules : American Library Association. ALA Catalog Rules: Author and Title Entries. - Prel 2nd ed. - Chicago: American Library Association, 1941.  Within two decades of

Retirement planning case, We have completed the review of the elements in t...

We have completed the review of the elements in the retirement planning process. We will conclude Part I with a case assignment, which require students to apply what they have lear

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd