Subject access to opac, Other Management

Assignment Help:

Subject Access to OPAC 

The typical OPAC interaction process requires the matching or crude translation of user vocabulary to system vocabulary. It became apparent that the amount of subject information included in standard MARC records is not adequate to meet the users' subject approach to the OPAC. Online capabilities offer many possibilities for improved subject access. Two important search devices used in OPACs are discussed below: 

Boolean Search 

Boolean search is the process of searching where the search terms are combined through Boolean Operators (AND, OR, NOT) 

Logical Product AND' Here two or more terms are combined by logical "AND" in order to formulate the search statement. If we formulate the search statement as A and B, we require that matching for both A and B in the index record to take place. Thus, a search for 'Electronic Scanner' seeks to formulate the search statement as 'Electronic AND Scanner'. 

Logical Sum 'OR':  Here two or more terms are  combined by logical 'OR'. Thus, a search for 'Electronic Scanner' or 'Electronic Searcher' seeks to formulate the search statement as 'Electronic AND (Scanner OR Searcher)'. 

Logical Difference 'NOT': Here, terms are combined by logical 'NOT'. If we formulate the search statement as A NOT B, we require that, for matching, A must be present in the index, record but B must be absent. Thus a search statement '(Automation AND Library) NOT Circulation' will retrieve all index records concerning 'Library automation' except 'Circulation'.

In this connection, it is to be noted that different OPACs have their own symbols used to indicate the Boolean operators (AND, OR, NOT) while formulating the search statement. The Boolean search method is also explained is BLIS - 06 and BLIS - 07 courses.

Truncation 

It is not necessary to specify complete  words. The system may allow for 'term truncation', where a fragment can be specified and the computer will pick up any term containing that fragment. This device is also known as 'Word fragment search'. Fragments may be truncated at either or both ends or at the middle. As for example: 

1452_types of truncation.png

The sign '*' is used to indicate truncation. The sign may vary from one system to another system. 


Related Discussions:- Subject access to opac

Government activities - information generation process, Government Activiti...

Government Activities  Information is also generated as a by-product from the activities undertaken by different governmental and non-governmental organisations. The most impo

Hospitality facilities management, Make yourself aware of the range of issu...

Make yourself aware of the range of issues involved in the "Greening of Hotels" phenomenon by reading widely on the topic. Become conversant with the full range of current and e

Applying six sigma strategy to project management processes, A pplying Six...

A pplying Six Sigma business strategy to project management processes When an organisation would like to introduce the Six Sigma for the new management strategy, the following

Investment management, You are a manager in the investment industry, whose ...

You are a manager in the investment industry, whose role is to provide investment portfolio advice and managementto a client, who is your investorprincipal. You should identify t

Illustrate the concept of news worthiness, a) Define "news" and illustrate...

a) Define "news" and illustrate the concept of "news worthiness" in the field of PR. b) Describe how PR is distinguished from i. Advertising ii. Marketing iii. Sales pr

Information demand , Information Demand  Information services are need...

Information Demand  Information services are needed to provide information not only on demand but also in anticipation of its use. Often it will be necessary to repackage the

Write a long note on the various kinds of listening, Question 1 Write a...

Question 1 Write a long note on the various kinds of listening 2 Write a note on non-verbal communication and the categories of non-verbal communication

Differentiate between malicious and non-malicious threats, Problem: a) ...

Problem: a) Authentication is the mechanism whereby a system securely identifies their users. Authentication system provides answers to the following questions: - Who is t

Organizational Behaviour, Case let 1 M/s. ABC Ltd is a medium-sized enginee...

Case let 1 M/s. ABC Ltd is a medium-sized engineering company producing a large-range of product lines according to customer requirements. It has earned a good reputation as a quic

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd