Evaluating the strategic plans of public libraries: An inspection-based approach

被引:13
|
作者
Buchanan, Steven [1 ]
Cousins, Fionnuala [1 ]
机构
[1] Univ Strathclyde, Dept Comp & Informat Sci, Glasgow G1 1XH, Lanark, Scotland
关键词
ACADEMIC-LIBRARIES; MANAGEMENT;
D O I
10.1016/j.lisr.2011.11.004
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
For public libraries, as with most organizations, effective strategic planning is critical to longevity, facilitating cohesive and coordinated responses to ever present and ever changing political, economic, social, and technological (PEST) forces which shape and influence direction. Strategic planning is widely recognized as a challenging activity, however, which can be both time consuming and unproductive, and there exists limited guidance regarding how to evaluate documented and disseminated strategic plans, particularly within the not-for-profit sector. In response, this research proposes and tests an inspection-based approach to the evaluation of strategic plans, based upon a rubric specifying the key attributes of each of the core components of a plan, combined with an appropriate assessment scale. The rubric provides a method to identify and assess completeness of strategic plan, extending to qualitative assessment of communication aspects such as specification and terminology, and synergistic aspects such as cohesion and integration. In the most comprehensive study of its kind to date, the method is successfully trialed across the devolved Scottish public library sector, with the strategic plans of 28 of the 32 regional networks evaluated. Of the 28 plans, 17, or 61%, were found to be incomplete and/or to contain contradictory or uncoordinated components. It is recommended that Scottish public libraries improve not only completeness of plans, but also their precision, specificity, explicitness, coordination, and consistency, and overall mapping to library services. Recommendations are made for further widespread application of the rubric. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:125 / 130
页数:6
相关论文
共 50 条
  • [1] Developing strategic marketing plans that really work: A toolkit for public libraries
    Calvert, Philip
    [J]. ELECTRONIC LIBRARY, 2007, 25 (01): : 114 - 115
  • [2] Developing Strategic Marketing Plans That Really Work: A Toolkit for Public Libraries
    Hannabuss, Stuart
    [J]. LIBRARY REVIEW, 2007, 56 (05) : 425 - +
  • [3] Comprehensive, inspection-based, maintenance database system
    Le Diouron, T
    Hovhanessian, G
    [J]. STRUCTURAL HEALTH MONITORING AND INTELLIGENT INFRASTRUCTURE, VOLS 1 AND 2, 2003, : 907 - 912
  • [4] Assessing the Impact on Road Safety of Automated Vehicles: An Infrastructure Inspection-Based Approach
    Paliotto, Andrea
    Alessandrini, Adriano
    Mazzia, Edoardo
    Tiberi, Paola
    Tripodi, Antonino
    [J]. FUTURE TRANSPORTATION, 2022, 2 (02): : 522 - 540
  • [5] Developing Strategic Marketing Plans That Really Work. A Toolkit for Public Libraries
    Goulding, Anne
    [J]. EDUCATION FOR INFORMATION, 2007, 25 (3-4) : 241 - 242
  • [6] Usevalia: Managing Inspection-Based Usability Audits
    Sobrino-Duque, Raimel
    Manuel Carrillo-de-Gea, Juan
    Jose Lopez-Jimenez, Juan
    Nicolas Ros, Joaquin
    Luis Fernandez-Aleman, Jose
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2024, 40 (03) : 719 - 743
  • [7] System dynamics modeling of an inspection-based process
    Madachy, RJ
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1996, : 376 - 386
  • [8] Libraries in the Strategic Plans of Spanish Universities
    Pacios, Ana R.
    Ortiz-Repiso, Virginia
    [J]. LIBRI, 2010, 60 (04): : 352 - 360
  • [9] Strategic Plans in University Libraries in Spain
    Arias Coello, Alicia
    Simon Martin, Jose
    [J]. DOCUMENTACION DE LAS CIENCIAS DE LA INFORMACION, 2005, 28 : 73 - 85
  • [10] A State Alteration and Inspection-based Interactive Debugger
    Wang, Yan
    Feng, Min
    Gupta, Rajiv
    Neamtiu, Iulian
    [J]. 2013 IEEE 13TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2013, : 84 - 93