Iranian Journal of Information Processing & Management (Dec 2023)

A proposed framework technical requirements copyright protection for information resources in NLAI information systems: with Fuzzy Delphi Technique

  • زینب پاپی

DOI
https://doi.org/10.22034/jipm.2023.706814
Journal volume & issue
Vol. 39, no. 2
pp. 503 – 533

Abstract

Read online

The current research is practical in terms of purpose. In present study used a qualitative approach to examine and analyze the status of the Information Systems of the National Library and Archives of Iran (NLAI). Documentary analysis, Tem analysis, and Fuzzy Delphi techniques were used to collect data. The research community includes the Information systems of the NLAI and experts in the field of information technology. The Information Systems consisted of Digital Library system, Iranian Newspaper System (SANA), National libraries network, National document center network, Iran Publications database, Manuscript database, Iranian Scientific Publications System. Also, 21 people (10 people to interview and 11 people to Delphi techniques) was selected experts in the fields of information systems, digital libraries, copyright and technology. For data analysis, coding and categorization of concepts were used in the form of open coding for documentary analysis and Tem analysis. Qualitative data analysis was done manually and using the MAXQDA 2020 software. Also, descriptive survey was used to analyze the indicators in fuzzy Delphi method and calculations were done using Excel. Tableau 2018 software was used to display and draw indicators better.Therefore, using Tem analysis method, 70 indicators of preventive technical requirements were identified, and then these indicators were given to 11 experts, and after two rounds of the fuzzy Delphi panel, 69 indicators identify. These indicators included 12 components was carried out. Finally, indicators “Adobe Reader and other tools” was removed from the checklist. The use of different methods to collect technical indicators and the use of triangulation method gives credibility to the research. Network Security; standards and frameworks; Authentication; digital reading tools; digital preservation; payment systems; rights metadata; access control; copy control; License; Digital repository and transfer have formed 12 components of preventive technical requirements. Also, the findings of the research showed that digital and bibliographic systems were at a weak level in terms of taking advantage of preventive technical requirements for copyright. This study offered technical framework. Also, the use of technical requirements such as: look inside, the copyright of policy, rights metadata, development and updating of systems and communication and interaction with the software support company, METS standard and use of digital repository offered in the studied information systems.

Keywords