scispace - formally typeset
Search or ask a question

Showing papers in "Searcher-the Magazine for Database Professionals in 2009"








Journal Article
TL;DR: An examination of consortial negotiation should shed some light on when to join the team and when to go it alone.
Abstract: and Jill E. Grogg Electronic Resources Librarian The University of Alabama Libraries In the face of the rising costs and complex licenses that accompany electronic resources, librarians have taken a variety of different approaches to negotiating good deals with low bottom lines and a minimum of access restrictions. One of the ways in which librarians have been most successful in this pursuit is through the use of consortia. Consortial deals for resources electronic and otherwise offer a multitude of advantages, the nature and size of which often vary depending on the size and makeup of the consortium itself. As with any and all good solutions, there are also downsides to consortial negotiation. With the help of some of the top consortial negotiators at work today, this examination of consortial negotiation should shed some light on when to join the team and when to go it alone.

3 citations




Journal Article
TL;DR: The Oviatt Library at California State University-Northridge has not had an increase to its materials budget since 2001, nor is it likely the materials budget will get better any time soon as mentioned in this paper.
Abstract: to become nimble and responsive to changes in the fiscal realities facing libraries today, increase efficiencies, and streamline workflows in terms of selection of resources, acquisition processes, cataloging, and processing print material for the shelf. The deteriorating budget situation in the state of California certainly served as a major impetus for us to streamline processes! The Oviatt Library at California State University–Northridge has not had an increase to its materials budget since 2001, nor is it likely the materials budget will get better any time soon. As we write this article in 2009, we expect to face further cuts in next year’s budget. Although pricing increases for print books have remained low, our serials subscriptions have been rising sharply for the last decade.

2 citations











Journal Article
TL;DR: A request to find all publications and news items for an author, especially someone who has a fairly common name, is something reference librarians either look forward to as a challenge, face with dread, or both.
Abstract: A request to find all publications and news items for an author, especially someone who has a fairly common name, is something reference librarians either look forward to as a challenge, face with dread, or both. This type of question first gave us our name -- reference librarian -- and it never goes away. Finding a good, complete answer has taken on added difficulty with the advent of institutional repositories.








Journal Article
TL;DR: In this article, the authors present the first national effort addressing the nation's critical vulnerabilities, which led to the formation of the President's Commission on Critical Infrastructure Protection (PCCIP).
Abstract: 1982 National Security Telecommunications Advisory Committee (NSTAC) established. 1984 National Coordinating Center (NCC) established. 1988 Morris internet worm is an early example of a cyberattack. CERT Coordination Center (CERT/CC) established. 1995 Presidential Decision Directive (PPD) 39, U.S. Policy on Counterterrorism [http://www.fas.org/irp/offdocs/ pdd39.htm] Critical Infrastructure Working Group, headed by the attorney general, makes recommendations to the president. 1996 Executive Order 13010, Critical Infrastructure Protection [http://www.fas.org/irp/offdocs/eo13010.htm], is the first national effort addressing the nation’s critical vulnerabilities. It led to the formation of the President’s Commission on Critical Infrastructure Protection (PCCIP). 1997 President’s Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America’s Infrastructures [http://www.fas.org/sgp/library/pccip.pdf], identified five interconnected infrastructures and recommended a national strategy for protecting them from physical and cyberthreats. 1998 Presidential Decision Directive (PPD) 63, Critical Infrastructure Protection, [http://www.fas.org/irp/offdocs/pdd/pdd-63.htm], initiated a public-private partnership. 1999 General Accounting Office, Comprehensive Strategy Can Draw on Year 2000 Experiences [http://www.gao.gov/archive/2000/ai00001.pdf] 2000 National Plan for Information Systems Protection, Version 1.0 [http://www.fas.org/irp/offdocs/pdd/CIP-plan.pdf] 2001 “Report of the President of the United States on the Status of Federal Critical Infrastructure Protection Activities” [http://www.fas.org/irp/offdocs/pdd/ CIP_2001_CongRept.pdf] Terrorist attacks on the World Trade Center and Pentagon, September 11, 2001 Homeland Security Office established under Tom Ridge. Executive Order 13231, Critical Infrastructure Protection, 2001 [http://www.ncs.gov/library/policy_docs/eo_13231.pdf] Critical Infrastructure Protection Board established under Richard Clark. 2002 Critical Infrastructure Information Act of 2002, Sections 721-724 of HR 5005, the Homeland Security Act of 2002 [http://www.dhs.gov/xlibrary/assets/CII_Act.pdf] Cyber Security Research and Development Act of 2002 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets [http://www.whitehouse. gov/pcipb/physical_strategy.pdf] The National Strategy to Secure Cyberspace [http://www.whitehouse.gov/pcipb] Information Analysis and Infrastructure Protection (IAIP) directorate established. CAN-SPAM ACT: Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003, 15 U.S.C. § 7709 [http://uscode.house.gov/download/pls/15C103.txt] 2004 National Response Plan [http://www.dhs.gov/xlibrary/assets/NRPbaseplan.pdf] 2006 National Asset Database developed. Department of Homeland Security. Procedures for Handling Critical Infrastructure Information; Final Rule,