Converting Your E-Resource Records to RDA

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Feasibility Study of Resource Description and Access (RDA) Implementation in Manuscripts’ Bibliographic Records in Iran

This study was conducted to investigate Feasibility of Resource Description and Access (RDA) implementation in manuscripts’ bibliographic records.Paper type: This research is a practical (applicable research)The present research is based on the Research and Development based on documentary and the comparative approach. Findings: The findings prove that out of the identified el...

متن کامل

RDA Element Sets and RDA Value Vocabularies: Vocabularies for Resource Description in the Semantic Web

Considering the need for metadata standards suitable for the Semantic Web, this paper describes the RDA Element Sets and the RDA Value Vocabularies that were created from attributes and relationships defined in Resource Description and Access (RDA). First, we present the vocabularies included in RDA Element Sets: the vocabularies of classes, of properties and of properties unconstrained by FRBR...

متن کامل

Testing Resource Description and Access (RDA) with Dublin Core

Resource Description and Access (RDA) is a new standard for describing all types of resources. Columbia University, the University of Chicago, and the University of Illinois at UrbanaChampaign evaluated the guidelines by means of the Dublin Core element set during the U.S. National Libraries RDA Test, held from October to December 2010. This paper speaks to the issues which emerged during the t...

متن کامل

Electronic Journal Forum E-Matrix—Choosing to Grow Your Own Electronic Resource Management System

Even with commercial options now available, the North Carolina State University (NCSU) Libraries has chosen to continue developing a homegrown electronic resource management (ERM) system, E-Matrix. This contributor provides a brief description of E-Matrix and outlines the reasons NCSU chose not to go with a commercial product. He also discusses changes to technical services workflows and presen...

متن کامل

Parasitic Authentication To Protect Your E-Wallet

T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia's 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Serials Librarian

سال: 2015

ISSN: 0361-526X,1541-1095

DOI: 10.1080/0361526x.2015.1025654