Claremont Colleges Library
Library building usage data are weak. Electronic resource usage data are weak. We conduct occasional headcounts and receive sketchy COUNTER reports. These data lack needed specificity and can’t be correlated to each other, e.g.; what resources do the early birds who sit in the north commons use? What if we knew to the minute and foot how many patrons occupied the building and where they sat? What if we also knew the electronic resources those same patrons used whether or not they were in the building? And what if we could perfectly protect their privacy? We can. This presentation will be most relevant for libraries with: Centralized wireless (if not, this will provide some justification) Centralized authentication, e.g. CAS, LDAP, Shibboleth EZProxy or other web proxy to electronic resources Patron type (Faculty, Undergraduate, etc) information either in the ILS or in the CAS/LDAP/Shibboleth
The author has contributed this work to the public domain.
This work is licensed under a Creative Commons Attribution 4.0 License.
Kome, Sam, "Patron Activity Monitoring and Privacy Protection" (2016). Library Staff Publications and Research. 51.
Business Administration, Management, and Operations Commons, Business Intelligence Commons, Business Law, Public Responsibility, and Ethics Commons, Management Sciences and Quantitative Methods Commons