ICT and Information

Library Database Management System

What is a Database?

A database is an organized collection of data for one or more purposes. Data used by an information system on individual files. A file of information arranged as a set of logically & orderly manner to facilitate the access by computer application programs. This concept does not imply that all data relating to a library business should be contained on a single database, but simply that all records in a database should be related and that redundant data should be minimized.

General Objectives of Establishing Database:

The elimination of irrelevant data is only one of many reasons for establishing a database. Others include: Database

➢ Integrate existing data files.

➢ Share data among all library users.

➢ Incorporate changes easily and quickly.

➢ Simplify the use of data files.

➢ Lower the cost of storing and retrieving data.

➢ Improve accuracy and consistency.

➢ Protect data security from unauthorized use.

➢ Exercise central control over a standard.

Library Database Management System:

In addition to the library database itself, a set of programs is necessary to facilitate adding new data as well as modifying and retrieving existing data within a library database. This set of programs is referred to as a library database management system (DBMS).

The design of a DBMS involves three considerations:

➢ Library users needs or application programs

➢ Library database processing system

➢ Library database itself

Data Maintenance:

Data maintenance is the adding, deleting, changing and updating of binary and high-level files, and the real-world data associated with those files. Data can be maintained manually and/or through an automated program, but at the originating point and translation/delivery point must be translated into a binary representation for storage. Data is usually edited at a slightly higher level in a format relevant to the contents of the data (such as text, images, or scientific or financial information, etc.). It is also the backing up, storage and general upkeep of all this data in the long term.

Library Database Information Dissemination:

If the campus is well networked, then without much investment from the library side, the contents may be made accessible on the Intranet. It is easier to host the borrowed external contents also in this mode. However, access restrictions are to be put on these contents either with login/password or and IP filtering when access is provided over the Internet: The library is always free to host its internal contents on the Internet. The Internet infrastructure required for hosting the digital library” depends on different parameters such as the quantum of contents to be hosted, a number of simultaneous users expected, over and above the bandwidth constraints on the national level. 1 Mbps bandwidth will play videos in real-time and internal LAN technology has already crossed the 1 Gbit barrier. Thus institutions with a functional Intranet and leased line connection from VSNL or other Internet Service Providers (ISPs) s will not face many hindrances for content delivery.

In this fast-changing world, information technology and information management are going to play an important role. The information has already been recognized as one of the basic resources for the socio-economic development of a country. The information has now rather acquired the status of the most sought after resource of the resources. The newly emerging ‘high tech’ disciplines such as computers, telecommunications, biotechnology, etc. are given importance because they store, generate, manipulate, communicate information. Now let us have a cursory look at the advantages, which can be accrued from the computerization. The application of computers in libraries has enormous advantages. The various functions of a library can be extended further for the benefit of the users. Not that computerization will solve all the library problems with which it is infested today, but certainly, it has a great many potentialities as we have just seen above. If the librarian will be able to improve over the existing set of library services the image of the library and that of the librarian will definitely go up.

The main problem is the unauthorized use of equipment for personal purposes and financial gain. Therefore, security efforts to be directed at premise security, access control, and supervision of the use of equipment. The average campus security department should not be expected to have a knowledge of computer technology and, therefore, persons in charge of computer operation should be mainly responsible for monitoring the use of computers and programs to ensure they are not compromised. The security department should be involved in the access-control and premise-protection process.43 The problem of one employee’s opening the door and several other individuals piggybacking is a common weakness. This is primarily supervision rather than a security department problem. Close supervision and a firm administrative regarding violations is the answer. Library computerization saves time in storing information, information handling, and information processing information retrieval, etc. because all these functions are done at enormous speed. As a result, the time lag between the acquisition of documents and their availability to the user will be reduced to a minimum, and computer networking will further help in saving time of the library personal and the users.

For citing this article use:

  • Farid, B. (2012). Developing security measures and risk management policies for libraries to face challenges and prevent cyber threats. Retrieved from: http://hdl.handle.net/10603/134961


Declaration: Articles shared in this blog are collected from different sources available on the internet to help students of Library and Information Science. Sources are mentioned in the reference section of the article. If you have any objections about the content of this blog, feel free to contact the site admin at media24xnew@gmail.com

Leave a Reply

Your email address will not be published. Required fields are marked *