Academic libraries and open access strategies

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

3 Scopus citations

Abstract

With the rise of alternate discovery services, such as Google Scholar, in conjunction with the increase in open access content, researchers have the option to bypass academic libraries when they search for and retrieve scholarly information. This state of affairs implies that academic libraries exist in competition with these alternate services and with the patrons who use them, and as a result, may be disintermediated from the scholarly information seeking and retrieval process. Drawing from decision and game theory, bounded rationality, information seeking theory, citation theory, and social computing theory, this study investigates how academic librarians are responding as competitors to changing scholarly information seeking and collecting practices. Bibliographic data was collected in 2010 from a systematic random sample of references on CiteULike.org and analyzed with three years of bibliometric data collected from Google Scholar. Findings suggest that although scholars may choose to bypass libraries when they seek scholarly information, academic libraries continue to provide a majority of scholarly documentation needs through open access and institutional repositories. Overall, the results indicate that academic librarians are playing the scholarly communication game competitively.

Original languageEnglish
Title of host publicationAdvances in Library Administration and Organization
Pages147-211
Number of pages65
DOIs
StatePublished - 2014

Publication series

NameAdvances in Library Administration and Organization
Volume32
ISSN (Print)0732-0671

Keywords

  • Bibliometrics
  • Bounded rationality
  • Collection management
  • Decision and game theory
  • Open access
  • Principle of least effort

ASJC Scopus subject areas

  • Public Administration
  • Library and Information Sciences

Fingerprint

Dive into the research topics of 'Academic libraries and open access strategies'. Together they form a unique fingerprint.

Cite this