Library Automation and its Library Automation and its impact on Strategic impact on Strategic Planning:Planning:the DLSU Experiencethe DLSU Experience
Fe Angela M. VerzosaFe Angela M. Verzosa
Library DirectorLibrary Director
Strategic PlanningStrategic Planning
proactive than reactive
focus on desired outcomes
participative
Status of DLSUStatus of DLSU Student population of 14,000Student population of 14,000 Faculty of 700 Faculty of 700 Non-academic staff of 350Non-academic staff of 350 Four CampusesFour Campuses Book collection of 180,000 volumesBook collection of 180,000 volumes Regular Subscription to 450 journalsRegular Subscription to 450 journals Special CollectionsSpecial Collections Library personnel of 65Library personnel of 65
Stages in setting up a systemStages in setting up a system
planningplanning specifying specifying
requirementsrequirements selectionselection installationinstallation runningrunning evaluationevaluation
Needs Assessment SurveyNeeds Assessment Survey
RespondentsRespondents prioritiespriorities
access to holdingsaccess to holdings
availability availability identifying locationidentifying location
system design system design
hardwarehardware
softwaresoftware
COMPUTER APPLICATIONSCOMPUTER APPLICATIONS providing public access to catalogsproviding public access to catalogs managing circulation of materialsmanaging circulation of materials acquisition of new materialsacquisition of new materials controlling serial publicationscontrolling serial publications retrieval of information from retrieval of information from
databasesdatabases networking/linkages with other networking/linkages with other
librarieslibraries use of interlending/document supply use of interlending/document supply
servicesservices
COMPUTERIZATION GOALSCOMPUTERIZATION GOALS
access to nformation access to nformation and use of collectionsand use of collections
access to national and access to national and
international international bibliographic networksbibliographic networks
library networkinglibrary networking
computerization project’scomputerization project’sTIME LINETIME LINE 19861986 training of system librarian in Australia training of system librarian in Australia 19881988 IIC bookdatabase IIC bookdatabase 1988-891988-89 installation of computers installation of computers 19891989 training and application of CDS-ISIS training and application of CDS-ISIS
software to articlessoftware to articles 1990-19921990-1992 expansion of databases expansion of databases 19931993 OPAC, DIALOG, WILSONDISCS and OPAC, DIALOG, WILSONDISCS and
HERDINHERDIN
computerization project’scomputerization project’sTIME LINETIME LINE 1994 4 OPAC terminals, 7 286 PCs, 6 1994 4 OPAC terminals, 7 286 PCs, 6
databases, 12 CD titles, 2 multimedia databases, 12 CD titles, 2 multimedia computers, email facility, LAN, Internetcomputers, email facility, LAN, Internet
1995 launching of ESEP Network, 1995 launching of ESEP Network, installation of TINLIB OPAC, Bibliofile installation of TINLIB OPAC, Bibliofile conversion of backfiles, barcoding, FAX, conversion of backfiles, barcoding, FAX, Library WebpageLibrary Webpage
1996 upgraded computers (70), TINLIB 1996 upgraded computers (70), TINLIB cataloging, Cybernook, OCLC F Search cataloging, Cybernook, OCLC F Search
ONLINE PUBLIC ACCESSONLINE PUBLIC ACCESS
ACCOMPLISHMENTSACCOMPLISHMENTS first Library to provide online public first Library to provide online public
access via INTERNETaccess via INTERNET two OPACs (Tinlib & CDS-ISIS)two OPACs (Tinlib & CDS-ISIS) 11 Databases installed11 Databases installed
INTEGRATED SYSTEMSINTEGRATED SYSTEMS
AccomplishmentsAccomplishmentsCatalogingCataloging
CirculationCirculation Issues/Concerns/ Lessons learned Issues/Concerns/ Lessons learned
Hardware UpgradingHardware UpgradingAdditional licensesAdditional licenses
Software Software problemsproblems
Other AccomplishmentsOther Accomplishments
CD-ROM TechnologyCD-ROM Technology Interlending and Document-deliveryInterlending and Document-delivery Networking/LinkagesNetworking/Linkages
Lessons in SecurityLessons in Security crime crime includes theft, physical damage includes theft, physical damage
and computer misuse (requiring need for and computer misuse (requiring need for password, locks, alarms, anti-virus)password, locks, alarms, anti-virus)
natural hazardsnatural hazards (such as floods, fire, (such as floods, fire, earthquakes, lightning, power outages)earthquakes, lightning, power outages)
accidentsaccidents (from power overload, broken (from power overload, broken wires, trailing cables)wires, trailing cables)
malfunctionsmalfunctions (system or human failure) (system or human failure)
Post-implementation evaluationPost-implementation evaluation where the where the goalsgoals met by the system ? met by the system ? were the were the provisions in contractprovisions in contract fulfilled ? fulfilled ? is the system is the system fine-tuned fine-tuned ?? how well does the system how well does the system satisfy satisfy
demandsdemands placed on it by users ? placed on it by users ? what what complaints havecomplaints have not been solved ? not been solved ? was the was the moneymoney well-spent ? well-spent ? was it worth the was it worth the time and effort time and effort ??
Success factorsSuccess factors right productright product right peopleright people right timeright time right costright cost
THANK YOU AND ENJOY YOUR DAY HERE AT DLSU TODAY.