Novel Library Innovations and Advancements After the COVID-19 Pandemic Era

Novel Library Innovations and Advancements After the COVID-19 Pandemic Era

DOI: 10.4018/978-1-6684-7693-2.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter investigates and reviews novel library innovations and advancements after the COVID-19 pandemic era. It draws attention to several ways that the pandemic is forcing libraries to embrace new technology. Doing so gives libraries a new setting in which to operate. Additionally, it provides a SWOT (strengths, weaknesses, opportunities, threats) analysis after the COVID-19 pandemic libraries, emphasizing the rapid, thorough adoption of technical innovations that have been underutilized for some time. Without a question, libraries and other organizations were at the forefront of innovations for service delivery during the global lockdown. It also evaluates the SWOT of the invention for novel library innovations and advancements after the COVID-19 pandemic era. This study also emphasizes the existing problems and difficulties as well as the upcoming developments and orientations in libraries.
Chapter Preview
Top

Introduction

The Covid 19 hit most areas of learning, and library services are one of the most sacrificed services. Various research is carried out worldwide, investigating public library services and issues arising from the pandemic (Amankwah-Amoah, 2018). The larger perspective of impact includes societal, racial, economic, and saleable aspects. Before the Covid 19 pandemic, library services were offered in print manual format. Due to the lockdown and other restrictions imposed after the pandemic, it becomes a vast challenge for library services to upgrade their functioning to meet the current industry demands (Amankwah-Amoah et al., 2020). The impact of online services has resulted in to upgrade of e-learning for all the compromising students. The research must focus on how universities and colleges elevate themselves to deliver continuous learning remotely (Araz et al., 2019). Libraries assemble, organize, supply, recover, and allocate information to students and researchers so that they utilize this for their betterment (Barry, 2015). Libraries assist as knowledge centers powered by the scientific revolution and progression.

New technological inventions lead to massive changes, and libraries must update themselves as needed. The constant extension of global information dissemination leads to a quick response and adaptive system (Mandal and Dasgupta, 2019). The role of artificial intelligence and machine learning becomes quite vital for improvement in library services. Innovative solutions have come up to overcome the problems of distance and pandemic limitations. Libraries have arrived in a new age and an advanced environment for enhanced services (Black & Pepper, 2012).

Every new technology development should serve as a wake-up call for librarians and libraries since it can broaden the reach of libraries and improve their services through various applications (Hiremath and Bankapur, 2019). The COVID-19 pandemic, which struck unexpectedly and crippled most of the world’s economies and from which many nations are still recovering, is one of the main driving forces for this study (Owusu-Ansah et al., 2019). Its emergence introduces the world and libraries to new ways of living and providing services previously deemed impractical. Libraries use a variety of innovations for best worldwide practice. Libraries are organizations that gather information resources and preserve them to offer services to information seekers. Said innovation is changing something that already exists or is established (Samanta, 2020).

Modern libraries are implementing several innovations to improve the delivery of library services. Particularly in the COVID-19 period and today’s complicated world with a high need for accurate information to address issues, they play a crucial role in satisfying the information demands of library users. Current library services encompass areas like collection development, circulation, public service, reference, and document delivery services, that use modern innovations to provide services to users. Libraries in different regions of the globe are using these technological advancements to offer library services to customers. Implementing new ideas, subject to refinement and review of the current system as necessary, is the most crucial part of this concept. It applies to every facet of human endeavor. In the context of this study, innovation may be considered as a library improving or modifying how they serve services to customers by utilizing cutting-edge technology. The various applications of Novel Library Innovations are depicted in Figure 1 to show the diverse field of research needed to perform reassurance in the digital library.

Figure 1.

Applications of novel library innovations

978-1-6684-7693-2.ch010.f01

Key Terms in this Chapter

Cybersecurity: Cybersecurity refers to the protection of computer systems, networks, and data from unauthorized access, theft, damage, or disruption. Cybersecurity includes various technologies, processes, and practices that aim to prevent, detect, and respond to cyber threats, such as malware, phishing, ransomware, or cyber espionage. Cybersecurity is crucial for protecting personal and financial information, intellectual property, critical infrastructure, and national security.

Digital Libraries: Digital libraries are collections of electronic resources, such as books, journals, articles, images, and videos, that are organized and accessible through a digital interface. Digital libraries enable remote access, fast search and retrieval, and preservation of cultural heritage, but also require copyright compliance, metadata management, and user authentication.

Cloud Computing: Cloud computing refers to the delivery of on-demand computing resources, such as servers, storage, applications, and services, over the Internet. Instead of hosting and maintaining their own infrastructure, organizations can rely on cloud providers to access and use these resources as needed. Cloud computing enables cost savings, scalability, flexibility, and improved collaboration, but also introduces new security and privacy challenges.

Virtual Shared Space: Virtual shared space refers to a digital environment that allows users to interact and collaborate in real time regardless of their physical location. Virtual shared spaces can take many forms, such as virtual meeting rooms, shared workspaces, or online gaming environments. These spaces can foster teamwork, knowledge sharing, and socialization, but also require effective communication, trust, and privacy protection.

Virtual Environments: Virtual environments refer to computer-generated simulations that mimic real-world environments or create entirely new ones. Virtual environments can be used for training, education, entertainment, or scientific research. Virtual environments require immersive technologies, such as virtual reality, augmented reality, or mixed reality, and can offer realistic and engaging experiences, but also require careful design, evaluation, and ethical considerations.

Financial Information: Financial information refers to any data that relates to an individual's financial status, such as bank account numbers, credit card numbers, income, or investments. Financial information is particularly sensitive and attractive to cybercriminals and therefore requires strict security and compliance measures, such as data encryption, tokenization, or regular auditing.

Personal Information: Personal information refers to any data that identifies or relates to an individual, such as name, address, phone number, email, social security number, or biometric data. Personal information is valuable and sensitive and therefore requires appropriate privacy and security safeguards, such as encryption, access controls, or data minimization.

Authentication Protocols: Authentication protocols refer to the methods and standards used to verify the identity of users or devices accessing a system or network. Authentication protocols can include passwords, biometrics, smart cards, or two-factor authentication. Authentication protocols are crucial for ensuring security and privacy but also require usability, scalability, and interoperability.

Complete Chapter List

Search this Book:
Reset