• Tidak ada hasil yang ditemukan

The potential of Library 2.0 for research libraries in Kenya.

N/A
N/A
Protected

Academic year: 2023

Membagikan "The potential of Library 2.0 for research libraries in Kenya."

Copied!
323
0
0

Teks penuh

This study explored the potential of the Library 2.0 model of library services in enabling research libraries in Kenya to better respond to the emerging needs and expectations of users. His presentation allowed me to demonstrate to the head librarians that the Library 2.0 model is viable for research libraries in Kenya.

LIST OF TABLES

CPCI-SSH : Conference Proceedings Citation Index – Social Sciences and Humanities CTA : Technical Center for Agricultural and Rural Cooperation. IAALD : International Association of Agricultural Information Specialists ICIPE : International Center for Insect Physiology and Ecology.

CHAPTER ONE - INTRODUCTION

Introduction

Again, proponents of this view maintain that the essential functions of the library still remain much the same. She suggests that the new role could include 1) negotiating better (quality) sources of information (including databases) with publishers on behalf of users;

Statement of the problem

It enables access to information throughout society, the sharing of that information, and its use for the advancement of society (Albanese 2004; Miller 2006). Champions of change are also emerging, especially in libraries that are looking to adopt new service models and use them to meet new needs.14 Some libraries have recently evaluated their services and have received the clear signal to implement changes on several fronts. initiate.

Objectives of the study

How are the roles of research libraries in Kenya changing in the light of the information revolution. What is the action plan that should be taken by research libraries in Kenya seeking to become Research Library 2.0.

Theoretical framework

The first two elements of the Library 2.0 theory as advocated by Maness (2006) imply participatory user-centred conversation in the design and delivery of library services. This law was used by the researcher to demonstrate the power of library interoperability as proposed in the Library 2.0 model.

Fig 1.1- Library 2.0 ripples  Source: David Lee King (2007b)
Fig 1.1- Library 2.0 ripples Source: David Lee King (2007b)

Justification of the study

The library and the local library community are actively creating a digital community through the digital office. We observed only one such study on the use of the Library 2.0 model in African libraries, conducted by Drs. Heila Pienaar and Ms Ina Smith from the University of Pretoria in 2007.

Assumptions

Furthermore, given that Library 2.0 is a relatively new concept, very little academic research is being conducted in this area. This was, as at the time of writing this report, the only study to examine the potential of the Library 2.0 model for research libraries in sub-Saharan Africa.

Limitations of the study

The researcher had to borrow theories from other social science fields to guide the study. Indeed, perfect generalizability of the data collected to all research libraries in Kenya is not possible given the uniqueness of each of the institutions.

Dissemination of the study results

All in all, the researcher did what was possible and is sure that the findings of this study will stand up to rigorous research evaluation and be applied in real life. The ethical considerations that the researcher made during this study are discussed in Chapter Five (item 5.7) on page 150 of this thesis.

Dissertation outline

It also discusses the advantages of the methodology used and relates them to the research questions and objectives. It also contains the conclusion whether Library 2.0 is an option for the research libraries in Kenya or not.

Summary

It also presents a detailed strategy on how best to implement the Library 2.0 model in research libraries in Kenya. This study therefore sought to fill the knowledge gap regarding the application of Library 2.0 to research libraries in developing countries.

CHAPTER TWO – RESEARCH LIBRARIES IN KENYA

Introduction

Kent, Lancour, and Daily (1978) also explain that research libraries can exist as 1) reference libraries; 2) lending libraries; or 3) academic research libraries. Kent, Lancour and Daily (1978) are of the opinion that research libraries have been very unfriendly to the general public.

Fig. 2.1 – Library typology hierarchy  Source: Researcher
Fig. 2.1 – Library typology hierarchy Source: Researcher

Characteristics of research libraries

IL programs in research libraries are aimed at empowering researchers to make optimal use of information resources in libraries. Lougee (2002) and Hahn (2008a) also propose that research libraries should be actively involved in the publication of research findings.

Comparing research libraries with the other types of libraries

Research libraries in Kenya

There is no official list of research libraries or any other typology of libraries in Kenya. Grace Kamau42 that there used to be a directory of libraries in Kenya published by Kenyatta University43 in the 1980s, which has since gone out of print.

The Kenya Library and Information Services Consortium (KLISC) 44

Consortium members pooled resources and purchased country-wide subscriptions through INASP, which achieved huge discounts with publishers. Coordination of the consortium is also a challenge, as the consortium has yet to establish its secretariat.

Case research libraries

In addition to staff members, as well as undergraduate and graduate students50 at the foundation, library services are also open to all members of the public under certain terms of membership. The library also offers a question and answer service through the support of the Technical Center for Agriculture and Rural Cooperation (CTA).

Summary

Nevertheless, research libraries must devise publishing strategies that maximize benefits and minimize harms. Research libraries are still evolving and will likely acquire or discard certain features and practices.

CHAPTER THREE – LITERATURE REVIEW

Introduction

It was the researcher's wish to analyze a mixture of primary and secondary scientific publications. The basis, criticisms, advantages and disadvantages of each of the selected models were considered and presented below.

Library service model

  • Traditional model
  • Community library model
  • Embedded model
  • Bookstore model
  • Library Outpost model
  • Mobile library service models
  • Information Commons
  • Digital library model
  • Hybrid libraries

In the literature, there is often talk about the "library of the future", which is clearly more in demand now than in the past. Shumaker (2009) identifies some of the key features of the embedded library model as: 1) Location of the service between "clients".

Table 3.1 - Properties of Digital Libraries  Source: Harter 1996
Table 3.1 - Properties of Digital Libraries Source: Harter 1996

Summary

A full-cycle shift from free library services through fee-based environments and inevitably back to free service delivery;. Movement from less automation to more automation in the processing, organization and delivery of library services;.

Table 3.2 – Comparison of major library models  Source: Researcher
Table 3.2 – Comparison of major library models Source: Researcher

CHAPTER FOUR – LIBRARY 2.0 MODEL

Introduction

For example, they do not want to use the library only as a reading space or simply consume the library services and use the resources as provided without making any suggestions. Although a relatively new and controversial term, Library 2.0 is already well entrenched in the library lexicon (Cho 2008).

Web 2.0

The emergence of Web 2.0 may have been necessitated by a number of factors, including the need to replicate offline social networking on the Internet. For example, the web as a platform encapsulates what Web 2.0 really is: a platform where users meet, discover information, mix and share knowledge.

Fig. 4.1- The Web 2.0 meme map  Source:  O‟Reilly (2005b)
Fig. 4.1- The Web 2.0 meme map Source: O‟Reilly (2005b)

What is Library 2.0?

However, Habib (2006) is of the opinion that Library 2.0 brings together two discrete concepts – library and 2.0. However, it is through the combined implementation of all these that Library 2.0 can be achieved (Chad and Miller 2005; Casey 2007).

Principles of Library 2.0

With information and ideas flowing both ways—from library to user and from user to library—library services under the Library 2.0 model have the opportunity to continuously and rapidly evolve and improve. Libraries embrace user-centered content and services that enhance the library's online presence.

Library 2.0 meme map

Critically, it also shows that a 2.0 library is organic; which means it is sensitive, it recognizes its weaknesses and seeks help, and is constantly changing. It may also mean that it provides more freedoms to users and minimizes barriers to access and use of its services.

Library 2.0 cookbook

For example, it identifies the key characteristics of a Library 2.0 institution as a library that responds (adaptable), learns (does not know everything and can be "taught" by users), suggests (delegates some authority to users), collects (does not accumulate), aggregates (mixes and remixes content and experiences) and organizes resources and services to meet the dynamic needs of users. Library 2.0 also allows hinting to empower and allow users to serve themselves, reducing levels of intervention.

Library 1.0 versus 2.0

Although simple, Schneider (2006) explains the nature of new library users in this cookbook (Patron 2.0). Some researchers and practitioners are also of the opinion that Library 2.0 is not about change.

Library 2.0 and technology

Chabot (2007) and Klein (2007) further argue that these technological solutions, as suggested in the Library 2.0 model, are actually librarian-centered rather than user-centered. The heightened focus on technology in discussions of Library 2.0 can be attributed to (1) the emergence of many new technologies of potential value to libraries and users, as opposed to fewer new physical services; (2) a better understanding of how to serve users entering library buildings, less users of online sites/resources; and (3) opportunities to test or implement Library 2.0 technology at little or no cost.

Implementing Library 2.0

Opposition to the proposed or implemented changes by various members of the library community. Evaluation of the potential of the Library 2.0 model as a possible framework for enriching library services to meet the needs of borrowers.

Library 2.0 in Africa

It also held a Library 2.0 roadshow where the benefits of the model were demonstrated (Penzhorn 2009). The introduction of the Library 2.0 tools has put the library in a favorable position to provide ongoing quality service in support of research and teaching at the university (Penzhorn 2009).

Summary

CHAPTER FIVE – RESEARCH METHODOLOGY

Introduction

Type of research – qualitative research

Objectives aimed at providing an in-depth and interpreted understanding of the social world of research participants by learning about their social and material circumstances, their experiences, perspectives and histories; The answers to the research questions are sought and interpreted from the perspective of the subjects in the natural habitat.

Research paradigm - interpretivist

People's understanding of the world is based on their interpretations of what is happening around them and not only on their experience; and. Consequently, the evaluation of a research library takes into account the present manifestation of a complex set of processes that have occurred over a long period of time.

Research method – case study

Despite all these challenges, the case study is still one of the most common methods of qualitative research (Yin 2003). The advantages of the case study method for this project include: (1) its ability to provide an in-depth and richer view of the study problem (Kothari its ability to provide understanding and experience of research questions first-hand in a real-life context (Stark and Torrance its engagement with a wide range of respondents in data collection and generating results (Sommer and Sommer 2002; Yin 2003); and (4) its potential to provide data not yet available quantitatively (Yin 2003).

Data collection techniques

  • General techniques
  • Target population
  • Pre-testing
  • Data collection

The results of the interviews were recorded by the researcher in the respective questionnaires during the interviews. The main points of the discussions were recorded by the researcher in a notebook dedicated to this purpose.

Data analysis

  • Content analysis
  • Conversation analysis
  • Descriptive/interpretive techniques
  • Computer Assisted Qualitative Data Analysis Software (CAQDAS)

Using this technique, the researcher analyzed primary documents related to the vision, mission, role and governance of the selected case study libraries. This approach recognizes that researcher-generated data merge with the researcher's experiences during the research.

Reliability and validity

  • Reliability
  • Validity

The researcher pre-tested the data collection instruments and techniques to ensure they were appropriate for the objectives of the study. The researcher also used the test-retest technique to evaluate the reliability of the findings, as previously described.

Ethical considerations

The level of consistency of responses was high, indicating high reliability (Mugenda and Mugenda 1999). Another threat may be due to the Halo Effect (Murphy, Jako, and Anhalt 1993), in which the researcher's observations may have been influenced by the researcher's impression of the subjects.

Summary

No researcher is allowed to collect data without ethical clearance from the relevant authorities. This research study received the necessary ethical clearance from the University.91 Further, all participants signed a participation declaration (see Appendix 5.1) indicating that they understood the nature of the research and their willingness to participate in the project.

CHAPTER SIX – RESEARCH FINDINGS

Introduction

Demographic profile of the two populations

One half (eight) of the interviewed librarians were men, while the other half were women. So far, none of the research librarians interviewed have a PhD, although some have enrolled in PhD studies.

Fig 6.1 - Distribution of the researchers by age  Source: Researcher
Fig 6.1 - Distribution of the researchers by age Source: Researcher

Membership of research libraries

Sixty-six (51%) of users surveyed said they will terminate their membership in the next three or more years. Three (2%) of the members are not sure if they will continue their membership or not.

Fig 6.5 - Distribution of respondents by membership  Source: Researcher
Fig 6.5 - Distribution of respondents by membership Source: Researcher

Operations of research libraries

Both librarians and users also agreed that there are still many areas of the libraries that need more improvement. However, most users and mid-level librarians felt that research libraries were not playing it.

Fig 6.9 below summarizes the major challenges facing research libraries as identified by the librarians  and how serious they were perceived to be (on a 1 to 5 Lickert scale in which 1 is very serious while  5 is not serious):
Fig 6.9 below summarizes the major challenges facing research libraries as identified by the librarians and how serious they were perceived to be (on a 1 to 5 Lickert scale in which 1 is very serious while 5 is not serious):

Library service models

Some librarians, however, wondered if it was really possible for the library to be everywhere, as one of the principles of Library 2.0 says. Librarians felt that a library using the Library 2.0 model was likely to be more important than a library not using it.

Research library services

Others also indicate that they value copy services and the library computers they use to analyze research data and process assignments. Eighty-three (51%), or more than half of respondents, indicate that these other information sources are complementary to library sources.

Fig 6.10 - Services offered by the libraries as rated by the librarians  Source: Researcher
Fig 6.10 - Services offered by the libraries as rated by the librarians Source: Researcher

Information resources

Library usage

The findings also reveal that most scholars use the library only when they are undertaking study programmes. With technology I won't have to come to the library as often - fiber optics”; and 5.

Fig 6.13 – Library usage by researchers  Source: Researcher
Fig 6.13 – Library usage by researchers Source: Researcher

Usability of the research libraries in Kenya

92 The researcher did not make arrangements for the research assistants to have access to the libraries as this would have compromised the objectivity of the data collected. Information obtained through observation and mystery shopping revealed that most research library spaces were not conducive to research.

Social Network Analysis

The sociogram also reveals that the University of Nairobi (UON) is a member of the KARI, ICRAF and ILRI network. Further analysis of the publication years of co-authored articles revealed that the collaboration between researchers at KEMRI and the AMREF network was mainly in the early 1990s with the most recent article published in 1998.

Fig 6.18 – Number of documents by organization  Source: Researcher
Fig 6.18 – Number of documents by organization Source: Researcher

Gambar

Fig 1.1- Library 2.0 ripples  Source: David Lee King (2007b)
Fig. 2.1 – Library typology hierarchy  Source: Researcher
Table 2.1 summarizes the similarities and differences between research libraries and the other library  typologies:
Table 3.1 - Properties of Digital Libraries  Source: Harter 1996
+7

Referensi

Dokumen terkait

Descriptive statistics Table 2 shows the summary statistics of per capita income PCGDP, total population POP, annual growth rate of population GRPOP, life expectancy LEX, fertility