{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:54:48Z","timestamp":1768344888307,"version":"3.49.0"},"reference-count":17,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2016,2,24]],"date-time":"2016-02-24T00:00:00Z","timestamp":1456272000000},"content-version":"vor","delay-in-days":419,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Proc. Assoc. Info. Sci. Tech."],"published-print":{"date-parts":[[2015,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Emerging technologies have offered libraries and librarians new ways and methods to collect and analyze data in the era of accountability to justify their value and contributions. For example, Gallagher, Bauer and Dollar () analyzed the paper and online journal usage from all possible data sources and discovered that users at the Yale Medical Library preferred the electronic format of articles to the print version. After this discovery, they were able to take necessary steps to adjust their journal subscriptions. Many library professionals advocate such data\u2010driven library management to strengthen and specify library budget proposals.<\/jats:p>","DOI":"10.1002\/pra2.2015.14505201002","type":"journal-article","created":{"date-parts":[[2016,2,27]],"date-time":"2016-02-27T05:56:50Z","timestamp":1456552610000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Library assessment and data analytics in the big data era: Practice and policies"],"prefix":"10.1002","volume":"52","author":[{"given":"Hsin\u2010liang","family":"Chen","sequence":"first","affiliation":[{"name":"Long Island University"}]},{"given":"Philip","family":"Doty","sequence":"additional","affiliation":[{"name":"University of Texas"}]},{"given":"Carol","family":"Mollman","sequence":"additional","affiliation":[{"name":"Washington University"}]},{"given":"Xi","family":"Niu","sequence":"additional","affiliation":[{"name":"IUPUI"}]},{"given":"Jen\u2010chien","family":"Yu","sequence":"additional","affiliation":[{"name":"UIUC"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"311","published-online":{"date-parts":[[2016,2,24]]},"reference":[{"key":"e_1_2_2_2_1","volume-title":"Value of academic libraries: A comprehensive research review and report","author":"Association of College and Research Libraries","year":"2010"},{"key":"e_1_2_2_3_1","volume-title":"The promise and peril of big data","author":"Bollier D.","year":"2010"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"e_1_2_2_5_1","unstructured":"Brantley P. Breeding M Hellman E. &Price G.(2014 December).Swords dragons and spells: Libraries and user privacy. Coalition for Networked Information Membership Meeting. Retrieved March 16 fromhttp:\/\/www.cni.org\/topics\/information-access-retrieval\/swords-dragons-and-spells-libraries-and-user-privacy\/"},{"key":"e_1_2_2_6_1","unstructured":"Conley D. Aber J. L. Brady H. Cutter S. Eckel C. Entwisle H. \u2026Scholz J.(2015 February 2).Big data big obstacles.Chronicle of Higher Education https:\/\/chronicle.com\/article\/Big-Data-Big-Obstacles\/151421"},{"key":"e_1_2_2_7_1","unstructured":"Cox B. &Jantti M.(2012).Discovering the impact of library use and student performance.EDUCAUSE Review Online. Retrieved February 27 2015 fromhttp:\/\/www.educause.edu\/ero\/article\/discovering-impact-library-use-and-student-performance"},{"key":"e_1_2_2_8_1","volume-title":"Say it with data: A concise guide to making your case and getting results","author":"Dando P.","year":"2014"},{"key":"e_1_2_2_9_1","unstructured":"Elsevier. Elsevier Research Intelligence. RetrievedMarch 3 2015 fromhttp:\/\/www.elsevier.com\/research-intelligence"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lcats.2005.04.004"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9302.001.0001"},{"key":"e_1_2_2_12_1","volume-title":"Descriptive statistical techniques for librarians","author":"Hafner A. W.","year":"1998"},{"key":"e_1_2_2_13_1","unstructured":"Hinchliffe L. J. &Asher A.(2014 December).Analytics and privacy: A proposed framework for negotiating service and value boundaries. Coalition for Networked Information Membership Meeting.http:\/\/www.cni.org\/news\/video-analytics-and-privacy\/"},{"key":"e_1_2_2_14_1","unstructured":"Lochner v. New York. (1905). 198 U.S. 45."},{"key":"e_1_2_2_15_1","volume-title":"The quality infrastructure: Measuring, analyzing, and improving library services","author":"Murphy S.","year":"2014"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2013.873281"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10805-012-9172-5"},{"key":"e_1_2_2_18_1","unstructured":"Uprichard E.(2014 October 13).Big\u2010data doubts.Chronicle of Higher Education https:\/\/chronicle.com\/article\/Big-Doubts-About-Big-Data-\/149267\/"}],"container-title":["Proceedings of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.14505201002","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.14505201002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.14505201002","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/pra2.2015.14505201002","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.14505201002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T18:06:23Z","timestamp":1761069983000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/pra2.2015.14505201002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1002\/pra2.2015.14505201002"],"URL":"https:\/\/doi.org\/10.1002\/pra2.2015.14505201002","archive":["Portico"],"relation":{},"ISSN":["2373-9231","2373-9231"],"issn-type":[{"value":"2373-9231","type":"print"},{"value":"2373-9231","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]},"assertion":[{"value":"2016-02-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}