The actual importance of RDA (Resource Description and Access) elements in supporting key user tasks

Philip Hider, Ying-Hsang Liu

Research output: Book chapter/Published conference paperConference paperpeer-review

95 Downloads (Pure)

Abstract

The Resource Description & Access (RDA) cataloguing standard stipulates sets of core elements for cataloguers to include in their description of information resources and in the resources' associated content and agents. The elements RDA deems core were selected according to their relative utility in meeting key user tasks, such as finding, selecting and identifying items and works, and finding and identifying persons and bodies associated with items and works. However, this selection was not based on empirical evidence, but on expert opinion.A study by Hider and Tan (2008) which investigated the relative value of various elements in catalogue records suggests that the RDA core elements may require revision. This new study examines the validity of the RDA core sets in more depth, employing think-aloud usability testing techniques and sets of typical bibliographic tasks, to gauge which of all the RDA elements are the most critical in a university library context.The results provide guidance on the adoption of the RDA standard and its elements, and on the value of fully implementing the Functional Requirements for Bibliographic Records (FRBR) and Functional Requirements for Authority Data (FRAD) models on which RDA is based.
Original languageEnglish
Title of host publication15th ALIA Information Online Conference & Exhibition
Place of PublicationAustralia
PublisherALIA
Pages1-11
Number of pages11
Publication statusPublished - 2011
EventALIA Information Online Conference and Exhibition Conference - Sydney, Australia, Australia
Duration: 01 Feb 201103 Feb 2011

Conference

ConferenceALIA Information Online Conference and Exhibition Conference
CountryAustralia
Period01/02/1103/02/11

Fingerprint Dive into the research topics of 'The actual importance of RDA (Resource Description and Access) elements in supporting key user tasks'. Together they form a unique fingerprint.

Cite this