Within the last year
Within the past 3 years
1 - 7 of 7 articles
Purpose – Professional cataloguers working in ten university libraries in Jordan, Malaysia, and United Arab Emirates were interviewed with the aim of investigating their perceptions on the new Library of Congress classification's Subclass KBP for Islamic law (IL). Design/methodology/approach...
Purpose – The purpose of this paper is to reflect on an editorial from an earlier issue, entitled “The librarian and the art of reading”. Design/methodology/approach – Critical review of the argument presented in the original editorial. Findings – The concept of the “art of reading”...
Purpose – Written in 1944, the purpose of this paper is to assess the librarian's increasing responsibilities and influences in the light of new educational plans. Design/methodology/approach – The paper presents a personal viewpoint on the subject of “the librarian and the art of...
Purpose – The main objective of this paper is to highlight and discuss issues, innovations and imperatives related to the management of professional library and information science (LIS) journals in Africa. Design/methodology/approach – The strategy adopted was to preface the concerns about...
Purpose – The purpose of this paper is to discuss the challenges involved in collecting and managing digital photographs and provide advice for librarians in appraising, formulating collection development policies, and negotiating gifts of digital photographs. Design/methodology/approach –...
Purpose – To discuss the importance of S.R. Ranganathan's teachings for librarians in the 21st century. Design/methodology/approach – The article is a reflective piece examining Ranganathan's five laws of library science in their modern context. Findings – That we owe as much of a debt to...
Purpose – To examine the system of electronic library service licences and authentication in the UK, and highlight its hybrid local – national approach. Design/methodology/approach – A narrative account of our national negotiating and network security practice, combined with brief...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.