7 research outputs found

    Broadband Center of Excellence Newsletter, April 2017

    Get PDF

    Analysis of Digital Preservation Course Offerings in ALA Accredited Graduate Programs

    Get PDF
    This study seeks to determine which ALA-accredited institutions offer digital preservation courses and analyze the syllabi to identify what is being taught about digital preservation, whether there are any commonalities, and evaluate the curriculum according to the five areas of digital preservation as outlined by the National Digital Stewardship Alliance (NDSA)

    SLIS Connecting Volume 6, Issue 2

    Get PDF
    SLIS Connecting Volume 6, Issue 2 (Fall/Winter 2017

    SLIS Connecting Volume 6, Issue 2

    Get PDF
    SLIS Connecting Volume 6, Issue 2 (Fall/Winter 2017

    Secure software development practice selection model

    Get PDF
    Developing secure software is critical for organizations as highly-sensitive and confidential data are transacted through online applications. Insecure software can lead to loss of revenue and damage to business reputation. Although numerous methods, models and standards in regards to secure software development have been established, implementation of the whole model is quite challenging as it involves cost, skill, and time. Moreover, lack of knowledge and guidance on selection of suitable secure development practices becomes a challenge for project managers. On that account, this thesis developed a model which aims to guide the project managers to select secure software development practices based on the factors fulfilled by the project. Initially, a systematic literature review (SLR) was conducted, and as a result 18 influential factors were identified. To strengthen and enhance these findings, semistructured interviews were conducted with 21 software development experts from eight IT departments in Malaysian public sector, and 18 influential factors emerged from the interviews. The findings from both the SLR and interviews were consolidated, and analysed using the grounded theory techniques. As a result, 20 influential factors were finalized and grouped into four main categories that influenced software development outcomes: institutional context, software project content, people and action, and development processes. To assess the fulfilment of each factor, assessment criteria to determine the fulfilment of the factors were identified using secondary data analysis method. Subsequently, secure development practices which were suitable for the Malaysian public sector were identified through a survey, and as a result 24 practices were identified. The identified factors, assessment criteria, and practices were validated using the Delphi method, involving ten experts. In addition, the experts mapped the influential factors to each secure software development practice. As a result of the Delphi method which involved three phases, the lists of validated factors and assessment criteria were produced. Additionally, a list of practices mapped with the related influential factors was produced. The validated elements were used to formulate the Secure Software Development Practice Selection Model. The proposed model was finally evaluated using a multiple case study method that involved four software development projects in the Malaysian public sector. The project managers were provided with questionnaire to assess the fulfilment of factors, and identify practices that can be incorporated in their software development project. Thus, with the proposed Secure Software Development Practice Selection Model, suitable secure software development practices can be effectively identified by assessing the influential factors fulfilled by the software project. Furthermore, the average System Usability Scale score obtained for all agencies was 70.7; thus Secure Software Development Practice Selection Model was perceived to have ‘good’ usability which corresponds to the adjective scale. In sum, there are four significant contributions of this research: a validated list of factors influencing secure software development, a list of assessment criteria for the factors, mapping of secure software development practices with the influential factors, and evaluated Secure Software Development Practice Selection Model

    Forging Our Cultural Commonwealth: The Importance of Digital Curation in the Digital Humanities

    Get PDF
    New forms of digital data and tools or methods, for instance those that cross academic disciplines and domains, those that feature teams of scholars instead of single scholars, and those that involve individuals from outside the academy, can enable new forms of scholarship and teaching in the digital humanities. Such scholarship can promote reuse of digital data, provoke new research questions, and cultivate new audiences. Digital curation, the process of managing a trusted body of information for current and future use, can help maximize the value of research in the digital humanities. This exploratory qualitative study centered on the salience of digital curation to the digital humanities. A case study predicated upon semi-structured interviews, it explored the creation, use, storage, and planned reuse of data by 45 interviewees involved with nineteen Office of Digital Humanities Start-Up Grant (SUG) projects. Similarly, the study sought to determine what digital curation skills had been employed in these projects and what digital curation skills project personnel felt were most important in doing such work. Interviewees grappled with challenges surrounding data, collaboration and communication, planning and project management, awareness and outreach, resources, and technology. This study sought to understand the existing practices and needs of those engaged in digital humanities work and how closely these practices and needs align with the digital curation literature. It established a baseline for future research in this area and suggested key skills for digital curation work in the digital humanities. Finally, it provided a learning model for guiding such education.Doctor of Philosoph

    Privacy and security in a networked world

    No full text
    corecore