ICT and Information

Library Database Management System

What is a Database?

A database is an organized collection of data for one or more purposes. Data used by an information system on individual files. A file of information arranged as set of logically & orderly manner to facilitate access by computer application programs. This concept does not imply that all data relating to a library business should be contained on a single database, but simply that all records in a database should be related and that redundant data should be minimized.

General Objectives of Establishing Database:

The elimination of irrelevant data is only one of many reasons for establishing a database. Others include:

➢ Integrate existing data files.

➢ Share data among all library’s users.

➢ Incorporate changes easily and quickly.

➢ Simplify the use of data files.

➢ Lower the cost of storing and retrieving data.

➢ Improve accuracy and consistency.

➢ Protect data security from unauthorized use.

➢ Exercise central control over standard.

Library Database Management System:

In addition to the library database itself, a set of programs is necessary to facilitate adding new data as well as modifying and retrieving of existing data within a library database. This set of programs is referred to as a library database management system (DBMS).

The design of a DBMS involves three considerations:

➢ Library users needs or application programs

➢ Library database processing system

➢ Library database itself

Data Maintenance:

Data maintenance is the adding, deleting, changing and updating of binary and high level files, and the real world data associated with those files. Data can be maintained manually and/or through an automated program, but at originate point and translation/delivery point must be translated into a binary representation for storage. Data is usually edited at a slightly higher level in a format relevant to the contents of the data (such as text, images, or scientific or  financial information etc.). It is also the backing up, storage and general up keep of all this data in the long term.

Library Database Information Dissemination:

If the campus is well networked, then without much investment from the library side, the contents may be made accessible on the Intranet. It is easier to host the borrowed external contents also in this mode. However access restrictions are to be put on these contents either with login/password or and IP filtering when access is provided over Internet: The library is always free to host its internal contents on the Internet. The Internet infrastructure required for hosting the digital library” depends on different parameters such as the quantum of contents to be hosted, number of simultaneous users expected, over and above the bandwidth constraints on the national level. 1 Mbps bandwidth will play videos in real time and internal LAN technology has already crossed the 1 Gbit barrier. Thus institutions with a functional Intranet and leased line connection from VSNL or other Internet Service Providers (ISPs) s will not face many hindrances for content delivery.

In this fast changing world information technology and information management are going to play an important role. Information has already been recognised as one of the basic resources for the socio-economic development of a country. Information has now rather acquired the status of the most sought after resource of the resources. The newly emerging ‘high tech’ disciplines such as computers, tele-communications, biotechnology, etc. are given importance because they store, generate, manipulate, communicate information. Now let us have a cursory look at the advantages, which can be accrued from the computerization. The application of computer in libraries has enormous advantages. The various functions of a library can be extended further for the benefit of the users. Not that computerization will solve all the library problems with which it is infested today, but certainly it has great many potentialities as we have just seen above. If the librarian will be able to improve over the existing set of library services the image of the library and that of the librarian will definitely go up.

The main problem is unauthorized use of equipment for personal purpose and financial gain. Therefore, security efforts to be directed at premise security, access control, and supervision of the use of equipment. The average campus security department should not be expected to have a knowledge of computer technology and, therefore, persons in charge of computer operation should be mainly responsible for monitoring the use of computers and programs to ensure they are not compromised. The security department should be involved in the access-control and premise-protection process.43 The problem of one employee’s opening the door and several other individuals piggybacking is a common weakness. This is primarily a supervision rather a security department problem. Close supervision and a firm administrative regarding violations is the answer. Library computerization saves time in storing the information, information handling and information processing information retrieval etc. because all these functions are done at enormous speed. As a result the time lag between the acquisition of documents and their availability to the user will be reduce to minimum, and computer networking will further help in saving time of the library personal and the users.

Reference Article:

  • Farid, B. (2012). Developing security measures and risk management policies for libraries to face challenges and prevent cyber threats.

Md. Ashikuzzaman

Work at North South University Library, Bangladesh.

Leave a Reply

Your email address will not be published. Required fields are marked *