8,312 research outputs found

    Knowledge Organization Systems (KOS) in the Semantic Web: A Multi-Dimensional Review

    Full text link
    Since the Simple Knowledge Organization System (SKOS) specification and its SKOS eXtension for Labels (SKOS-XL) became formal W3C recommendations in 2009 a significant number of conventional knowledge organization systems (KOS) (including thesauri, classification schemes, name authorities, and lists of codes and terms, produced before the arrival of the ontology-wave) have made their journeys to join the Semantic Web mainstream. This paper uses "LOD KOS" as an umbrella term to refer to all of the value vocabularies and lightweight ontologies within the Semantic Web framework. The paper provides an overview of what the LOD KOS movement has brought to various communities and users. These are not limited to the colonies of the value vocabulary constructors and providers, nor the catalogers and indexers who have a long history of applying the vocabularies to their products. The LOD dataset producers and LOD service providers, the information architects and interface designers, and researchers in sciences and humanities, are also direct beneficiaries of LOD KOS. The paper examines a set of the collected cases (experimental or in real applications) and aims to find the usages of LOD KOS in order to share the practices and ideas among communities and users. Through the viewpoints of a number of different user groups, the functions of LOD KOS are examined from multiple dimensions. This paper focuses on the LOD dataset producers, vocabulary producers, and researchers (as end-users of KOS).Comment: 31 pages, 12 figures, accepted paper in International Journal on Digital Librarie

    Special Libraries, December 1930

    Get PDF
    Volume 21, Issue 10https://scholarworks.sjsu.edu/sla_sl_1930/1009/thumbnail.jp

    Student-Centered Learning: Functional Requirements for Integrated Systems to Optimize Learning

    Get PDF
    The realities of the 21st-century learner require that schools and educators fundamentally change their practice. "Educators must produce college- and career-ready graduates that reflect the future these students will face. And, they must facilitate learning through means that align with the defining attributes of this generation of learners."Today, we know more than ever about how students learn, acknowledging that the process isn't the same for every student and doesn't remain the same for each individual, depending upon maturation and the content being learned. We know that students want to progress at a pace that allows them to master new concepts and skills, to access a variety of resources, to receive timely feedback on their progress, to demonstrate their knowledge in multiple ways and to get direction, support and feedback from—as well as collaborate with—experts, teachers, tutors and other students.The result is a growing demand for student-centered, transformative digital learning using competency education as an underpinning.iNACOL released this paper to illustrate the technical requirements and functionalities that learning management systems need to shift toward student-centered instructional models. This comprehensive framework will help districts and schools determine what systems to use and integrate as they being their journey toward student-centered learning, as well as how systems integration aligns with their organizational vision, educational goals and strategic plans.Educators can use this report to optimize student learning and promote innovation in their own student-centered learning environments. The report will help school leaders understand the complex technologies needed to optimize personalized learning and how to use data and analytics to improve practices, and can assist technology leaders in re-engineering systems to support the key nuances of student-centered learning

    Climate Justice and Women's Rights: A Guide to Supporting Grassroots Women's Action

    Get PDF
    This Guide emerged from a "Summit on Women and Climate" in Bali, Indonesia, and aims to increase timely and appropriate funding for worldwide climate action initiatives led by women and their communities. The Guide is not a comprehensive resource on climate change or women's rights. Instead, it addresses an urgent need within the funding community and offers concrete, practical guidance that: Orients grantmakers to the importance of funding at the intersection of climate justice and women's rights.Draws lessons from specific examples of funding for women's climate change initiatives.Provides guidance on how funders can collaborate to direct timely and appropriate funding to women and their communities.Advocates for bringing women's voices into climate change policy discussions.Highlights the strong impact that small (less than 10,000)tomedium−sized(10,000) to medium-sized (10,000-$50,000) grants can make in women-organized efforts to address climate change at the community level, across geographic boundaries and in global climate policy. Grassroots women's climate activism is becoming increasingly critical to women's collective and individual rights, freedom and survival

    Digital Forensics Tool Interface Visualization

    Get PDF
    Recent trends show digital devices utilized with increasing frequency in most crimes committed. Investigating crime involving these devices is labor-intensive for the practitioner applying digital forensics tools that present possible evidence with results displayed in tabular lists for manual review. This research investigates how enhanced digital forensics tool interface visualization techniques can be shown to improve the investigator\u27s cognitive capacities to discover criminal evidence more efficiently. This paper presents visualization graphs and contrasts their properties with the outputs of The Sleuth Kit (TSK) digital forensic program. Exhibited is the textual-based interface proving the effectiveness of enhanced data presentation. Further demonstrated is the potential of the computer interface to present to the digital forensic practitioner an abstract, graphic view of an entire dataset of computer files. Enhanced interface design of digital forensic tools means more rapidly linking suspicious evidence to a perpetrator. Introduced in this study is a mixed methodology of ethnography and cognitive load measures. Ethnographically defined tasks developed from the interviews of digital forensics subject matter experts (SME) shape the context for cognitive measures. Cognitive load testing of digital forensics first-responders utilizing both a textual-based and visualized-based application established a quantitative mean of the mental workload during operation of the applications under test. A t-test correlating the dependent samples\u27 mean tested for the null hypothesis of less than a significant value between the applications\u27 comparative workloads of the operators. Results of the study indicate a significant value, affirming the hypothesis that a visualized application would reduce the cognitive workload of the first-responder analyst. With the supported hypothesis, this work contributes to the body of knowledge by validating a method of measurement and by providing empirical evidence that the use of the visualized digital forensics interface will provide a more efficient performance by the analyst, saving labor costs and compressing time required for the discovery phase of a digital investigation

    Business Intelligence Competencies: Making Healthcare Data Come Alive

    Get PDF
    Business Intelligence Competencies: Making Healthcare Data Come Alive While a wealth of healthcare related data exists, nurse leaders (NL) have yet to understand its implications and adopt analytical skills to lead in the transformation of care delivery. Information science is at a new frontier for nursing to embrace. It is critical for nursing leadership to advance and support business intelligence (BI) and interactive data visualization (IDV) skills across the organization and advocate for greater engagement of nurses in health system decision making. With these new tools and competencies, nursing and other health professions can innovate best practices, providing enhanced quality, safety, and value in healthcare. The aim of this Doctor of Nursing evidence-based project was to engage NL’s to improve and extend competencies in BI and IDV. A survey was administered to NL’s to assess their knowledge and use of these analytic tools and then guide a process for skill development via two workshops presenting an overview of BI and IDV to NL’s. The use of BI is still in its’ infancy, dashboards tools are beginning to be deployed across healthcare organization, however, data in real time is not readily available, nor is the ability to interact and conduct data discovery. The effectiveness of the education program was evaluated by the attendees’ willingness to participate in workshops covering the basic uses of BI and IDV and understanding of the opportunities to incorporate them into their current leadership role

    Efficient Generation of Social Network Data from Computer-Mediated Communication Logs

    Get PDF
    The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization\u27s leadership can intervene and prevent the attack. Previous studies have shown that the person\u27s behavior will generally change, and it is possible that social network analysis could be used to observe those changes. Unfortunately, generation of social network data can be a time consuming and manually intensive process. This research discusses the automatic generation of such data from computer-mediated communication records. Using the tools developed in this research, raw social network data can be gathered from communication logs quickly and cheaply. Ideas on further analysis of this data for insider threat mitigation are then presented

    Special Libraries, July-August 1977

    Get PDF
    Volume 68, Issue 7-8https://scholarworks.sjsu.edu/sla_sl_1977/1005/thumbnail.jp

    Sonic branding: a framework for understanding sound branding and an overview of its most noticeable practices across industries

    Get PDF
    This thesis presents the importance and relevance of sound in branding, as very few studies on sonic branding have been conducted so far. The aim of this thesis is to lay out a framework for understanding sonic branding as a phenomenon and for getting an overview of the most notable practices of sonic branding across various industries. The study is commissioned by the advertising agency Wondergarden for who a workshop was also created. Additionally this thesis hopefully can inspire others to pursue further research regarding the business related aspects of sound. The study makes use of literature review, desktop research, and a qualitative interview, and attempts to answer the following research questions: 1. What is sonic branding as a phenomenon? 2. Why do certain sound patterns become “earworms” and how could they support a brand? 3. What is the process behind creating assets of sonic branding? Before introducing sonic branding, the elements that constitute the term are analyzed. The physical and biological properties of sound are explored: what sound is, the impact of sound on the brain, and earworms. Sonic branding and its practices are introduced and the traditional approach practiced by marketing agencies and the research on hit song prediction by Tom Bergmans are reviewed to explore how to create recognizable sonic properties. The theoretical framework is supported by a short benchmarking of three large international businesses that successfully incorporate sonic branding: The Coca Cola Company, The McDonald’s Corporation, and Mercedes-Benz. The data collected, the workshop, the conclusions, the suggestions, and the learning outcomes are all presented in detail. The summary also presents the findings that are most valuable to the commissioner. The thesis argues that sonic branding deserves to be seen as a highly valued and powerful tool
    • 

    corecore