SCHOLARLY USE OF E-BOOKS IN A VIRTUAL ACADEMIC ENVIRONMENT: A CASE STUDY

被引:13
作者
Ahmad, Pervaiz [1 ]
Brogan, Mark [1 ]
机构
[1] Edith Cowan Univ, Sch Comp & Secur Sci, Perth, WA 6050, Australia
关键词
INFORMATION-SEEKING BEHAVIOR;
D O I
10.1080/00048623.2012.10722277
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
From a fledgling technology with no proven business models, electronic books (e-books) have grown in importance usurping traditional formats as an acquisitions budget line in many academic library contexts. Business models include purchase, subscription, and pay per use. In academic and research libraries, web based e-book delivery is the dominant platform involving desktop, Netbook and iPad user agents. E-books are the hot property of today's academic library, forming the new wave in information services along with web scale discovery and institutional repositories. This paper reports the results of a preliminary analysis of transactional e-log data describing academic and student use of Ebook Library (EBL) titles at Edith Cowan University (ECU) Library, Perth, Western Australia. The data mined and analysed encompassing Semesters One and Two of the 2010 academic year. Analysis includes descriptive statistics and other metrics describing e-book usage patterns and user behaviour. The paper compares usage patterns observed with earlier studies and reports on the phenomenon of the 'power user'.
引用
收藏
页码:189 / 213
页数:25
相关论文
共 31 条
[1]  
Abdullah Noorhidawati, 2008, MALAYS J LIBR INF SC, V13, P1
[2]  
Al U., 2010, PROCEEDINGS OF THE 1, P315
[3]  
Allen P, 2010, PASW STATISTICS BY S
[4]  
Armstrong C., 2009, FINAL REPORT
[5]  
Armstrong C., 2009, HEADLINES REPORT
[6]   Ebooks in libraries: an overview of the current situation [J].
Ashcroft, Linda .
LIBRARY MANAGEMENT, 2011, 32 (5-6) :398-407
[7]  
Borchert M., 2009, STUDY STUDENT STAFF
[8]   Electronic or print books: Which are used? [J].
Christianson, M ;
Aucoin, M .
LIBRARY COLLECTIONS ACQUISITIONS & TECHNICAL SERVICES, 2005, 29 (01) :71-81
[9]  
CIBER, 2008, TEXTUAL ANALYSIS OF
[10]  
CIBER, 2009, FINAL REPORT