A proposed framework technical requirements copyright protection for information resources in NLAI information systems: with Fuzzy Delphi Technique

Author(s):
Message:
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:

The current research is practical in terms of purpose. In present study used a qualitative approach to examine and analyze the status of the Information Systems of the National Library and Archives of Iran (NLAI). Documentary analysis, Tem analysis, and Fuzzy Delphi techniques were used to collect data. The research community includes the Information systems of the NLAI and experts in the field of information technology. The Information Systems consisted of Digital Library system, Iranian Newspaper System (SANA), National libraries network, National document center network, Iran Publications database, Manuscript database, Iranian Scientific Publications System. Also, 21 people (10 people to interview and 11 people to Delphi techniques) was selected experts in the fields of information systems, digital libraries, copyright and technology. For data analysis, coding and categorization of concepts were used in the form of open coding for documentary analysis and Tem analysis. Qualitative data analysis was done manually and using the MAXQDA 2020 software. Also, descriptive survey was used to analyze the indicators in fuzzy Delphi method and calculations were done using Excel. Tableau 2018 software was used to display and draw indicators better.Therefore, using Tem analysis method, 70 indicators of preventive technical requirements were identified, and then these indicators were given to 11 experts, and after two rounds of the fuzzy Delphi panel, 69 indicators identify. These indicators included 12 components was carried out. Finally, indicators “Adobe Reader and other tools” was removed from the checklist. The use of different methods to collect technical indicators and the use of triangulation method gives credibility to the research. Network Security; standards and frameworks; Authentication; digital reading tools; digital preservation; payment systems; rights metadata; access control; copy control; License; Digital repository and transfer have formed 12 components of preventive technical requirements. Also, the findings of the research showed that digital and bibliographic systems were at a weak level in terms of taking advantage of preventive technical requirements for copyright. This study offered technical framework. Also, the use of technical requirements such as: look inside, the copyright of policy, rights metadata, development and updating of systems and communication and interaction with the software support company, METS standard and use of digital repository offered in the studied information systems.

Language:
Persian
Published:
Journal of Information Processing and Management, Volume:39 Issue: 2, 2023
Pages:
503 to 533
magiran.com/p2682829  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با عضویت و پرداخت آنلاین حق اشتراک یک‌ساله به مبلغ 1,390,000ريال می‌توانید 70 عنوان مطلب دانلود کنید!
اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!