C5 model for the consortium management: SWOT analysis

Pages248-262
DOIhttps://doi.org/10.1108/LM-09-2016-0073
Date13 June 2017
Published date13 June 2017
AuthorY. Srinivasa Rao
Subject MatterLibrary & information science,Librarianship/library management,HR in libraries,Library strategy,Library promotion
C5 model for the consortium
management: SWOT analysis
Y. Srinivasa Rao
School of Planning and Architecture, Vijayawada, India
Abstract
Purpose This paper elicits information, an excess of information and the stakeholdersrole in the use of
information. The purpose of this paper is to create a C5 model(clients, connectivity, content, copyright
and cost) for the consortium management to support and improve its academic and administrative
decision-making skills and optimize returns.
Design/methodology/approach The methodology used for this study was strength, weakness,
opportunity and threat(SWOT) analysis. As a tool, it was used as one of the strategic analytical techniques
to evaluate various aspects of consortium management. The purpose of choosing this method was to derive a
set of strategies for comparing the internal (strengths/weaknesses) and external (opportunities/threats) forces
of the C5 modelof consortium management.
Findings From the SWOT analysis of the C5 model,it was observed that four combinations, maxi-maxi
(strengths/opportunities (SO), mini-maxi (weaknesses/opportunities (WO), maxi-mini (strengths/threats (ST))
and mini-mini (weaknesses/threats (WT)), were drawn to derive a set of strategies to benefit the consortium
management. The SO strategies such as building a client-centric resource management system, centralized
gateway, collaborative acquisition model, common copyright communication and clearance center and
cost-benefit analysis were built on the basis of the strengths and opportunities identified. Likewise, the WO
strategies such as organizational planning, equality in ICT infrastructure facilities, quality content, public
disclosure of copyright obligations and effective economic models were drawn to minimize the weaknesses of
each component by taking advantage of the identified opportunities. The ST strategies were worked out
using strengths of the model to possibly mitigate its threats. Similarly, the WT strategies were created to
minimize the weaknesses and avoid the threats as much as possible. However, these strategies would not only
help consortium management in the decision-making process, but also optimize returns and improve the
intellectual outcome of organizations.
Originality/value Not many research studies have been developed regarding the SWOT analysis of the
C5 modelfor consortium management. This study attempts to benefit a large community of library and
information science professionals, consortia and their clients.
Keywords SWOT, Publishers, Consortium, Academic library system, C5 model, Information overload
Paper type Viewpoint
Information
Information is vital. Different people define it in different ways. It has been defined
technically and measured in terms of units called bits(Toffler, 1970). According to Wiener
(1983), information is information, not matter or energy.But according to Rosinger (2012),
information is physical.The act of destroying information has tangible physical impact
based on the principle proposed by Physicist Rolf Landauer in 1961 (Conover, 2016). Despite
the different theoretical approaches, information is data that has been processed into a
form that is meaningful to the recipient(Davis and Olson, 1985). It communicates and
transforms the world more smartly than ever before.
The information (print and electronic) is nothing but a type of currency. It is the main source
of scholarly communication. Globally, information is beingproduced in greater quantity, greater
formats and greater frequency. Besides the scholarly communication, a large amount of
information or content, images and video posts are uploaded and shared online worldwide,
every second or every minute, through social media technologies such as Facebook, YouTube
and Twitter. According to Fineberg (2003), digital content born on the Internet more than
doubles every year, but much is lost as soon as it appears.It is available today, and gone
tomorrow. If information is not captured, it fades or gets lost. So the creation and production of
information and information overload (IO) have become a serious concern today.
Library Management
Vol. 38 No. 4/5, 2017
pp. 248-262
© Emerald PublishingLimited
0143-5124
DOI 10.1108/LM-09-2016-0073
Received 14 September 2016
Revised 7 February 2017
Accepted 13 February 2017
The current issue and full text archive of this journal is available on Emerald Insight at:
www.emeraldinsight.com/0143-5124.htm
248
LM
38,4/5

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT