42,068 research outputs found

    A model for digital preservation repository risk relationships

    Get PDF
    The paper introduces the Preserved Object and Repository Risk Ontology (PORRO), a model that relates preservation functionality with associated risks and opportunities for their mitigation. Building on work undertaken in a range of EU and UK funded research projects (including the Digital Curation Centre , DigitalPreservationEurope and DELOS ), this ontology illustrates relationships between fundamental digital library goals and their parameters; associated rights and responsibilities; practical activities and resources involved in their accomplishment; and risks facing digital libraries and their collections. Its purpose is to facilitate a comprehensive understanding of risk causality and to illustrate opportunities for mitigation and avoidance. The ontology reflects evidence accumulated from a series of institutional audits and evaluations, including a specific subset of digital libraries in the DELOS project which led to the definition of a digital library preservation risk profile. Its applicability is intended to be widespread, and its coverage expected to evolve to reflect developments within the community. Attendees will gain an understanding of the model and learn how they can utilize this online resource to inform their own risk management activities

    Digital libraries and information literacy issues within virtual learning environments : an e-learning impasse?

    Get PDF
    The DIDET digital library and VLE approach places much of the responsibility for managing the digital library work flow into the hands of students, as well as academics and librarians. Student responsibilities include the application of metadata, as well as conventional information literacy competencies such as ascertaining information resource provenance, investigating intellectual property rights and/or digital rights management implications, before depositing digital resources within the library. This has obviously laid bare numerous research issues relating to future digital library and VLE design, student information literacy, the use of ICT in education and design, and related pedagogical issues, all of which are worthy of further investigation within the UK HE community and will be elucidated in this paper. More importantly, this paper will argue that such a model signifies a definite impasse in the evolution of e-learning models and questions the degree to which current information literacy models are effective in specific e-learning contexts. The paper will conclude by further recognising that greater student information literacy skills are necessary to unlock the potential of such radical approaches to e-learning and digital library creation

    Towards improved performance and interoperability in distributed and physical union catalogues

    Get PDF
    Purpose of this paper: This paper details research undertaken to determine the key differences in the performance of certain centralised (physical) and distributed (virtual) bibliographic catalogue services, and to suggest strategies for improving interoperability and performance in, and between, physical and virtual models. Design/methodology/approach: Methodically defined searches of a centralised catalogue service and selected distributed catalogues were conducted using the Z39.50 information retrieval protocol, allowing search types to be semantically defined. The methodology also entailed the use of two workshops comprising systems librarians and cataloguers to inform suggested strategies for improving performance and interoperability within both environments. Findings: Technical interoperability was permitted easily between centralised and distributed models, however the various individual configurations permitted only limited semantic interoperability. Significant prescription in cataloguing and indexing guidelines, greater participation in the Program for Collaborative Cataloging (PCC), consideration of future 'FRBR' migration, and greater disclosure to end users are some of the suggested strategies to improve performance and semantic interoperability. Practical implications: This paper informs the LIS research community and union catalogue administrators, but also has numerous practical implications for those establishing distributed systems based on Z39.50 and SRW, as well as those establishing centralised systems. What is original/value of the paper?: The paper moves the discussion of Z39.50 based systems away from anecdotal evidence and provides recommendations based on testing and is intimately informed by the UK cataloguing and systems librarian community

    Developing STEM Identity of Nez Perce Students: Identifying Entry-Level Competencies for Forestry and Fire Management

    Full text link
    The purpose of this study was to identify the competencies that are required for entry-level forestry and fire management technicians. The strategy is a part of a larger goal to develop the STEM identity of Nez Perce students through the integration of relevant competencies in middle and high school curriculums. The DACUM process was used. Through this groupware process, nine experts from the Nez Perce Natural Resources produced a competency profile consisting of 12 duties and 79 tasks, along with general knowledge and skills, attitudes, tools, and future trends. Findings indicate that the experts view relevant cultural competencies as central to the function of the job and not as mere enablers. This has implications for how content is integrated, taught, and assessed in schools

    A Linked Data Approach to Sharing Workflows and Workflow Results

    No full text
    A bioinformatics analysis pipeline is often highly elaborate, due to the inherent complexity of biological systems and the variety and size of datasets. A digital equivalent of the ‘Materials and Methods’ section in wet laboratory publications would be highly beneficial to bioinformatics, for evaluating evidence and examining data across related experiments, while introducing the potential to find associated resources and integrate them as data and services. We present initial steps towards preserving bioinformatics ‘materials and methods’ by exploiting the workflow paradigm for capturing the design of a data analysis pipeline, and RDF to link the workflow, its component services, run-time provenance, and a personalized biological interpretation of the results. An example shows the reproduction of the unique graph of an analysis procedure, its results, provenance, and personal interpretation of a text mining experiment. It links data from Taverna, myExperiment.org, BioCatalogue.org, and ConceptWiki.org. The approach is relatively ‘light-weight’ and unobtrusive to bioinformatics users

    Rockefeller Foundation 2010 Annual Report

    Get PDF
    Contains president's letter; 2010 program highlights, including support for Africa's green revolution, sustainable and equitable transportation policy, and healthy communities; grants list; financial report; and lists of trustees and staff

    DTD level authorization in XML documents with usage control

    Get PDF
    [Summary]: In recent years an increasing amount of semi-structured data has become important to humans and programs. XML promoted by the World Wide Web Consortium (W3C) is rapidly emerging as the new standard language for semi-structured data representation and exchange on the Internet. XML documents may contain private information that cannot be shared by all user communities. So securing XML data is becoming increasingly important and several approaches have been designed to protect information in a website. However, these approaches typically are used at file system level, rather than for the data in XML documents. Usage control has been considered as the next generation access control model with distinguishing properties of decision continuity. Usage control enables finer-grained control over usage of digital objects than that of traditional access control policies and models. In this paper, we present a usage control model to protect information distributed on the web, which allows the access restrictions directly at DTD-level and XML document-level. Finally, comparisons with related works are analysed
    • …
    corecore