8,048 research outputs found

    BlogForever D3.3: Development of the Digital Rights Management Policy

    Get PDF
    This report presents a set of recommended practices and approaches that a future BlogForever repository can use to develop a digital rights management policy. The report outlines core legal aspects of digital rights that might need consideration in developing policies, and what the challenges are, in particular, in relation to web archives and blog archives. These issues are discussed in the context of the digital information life cycle and steps that might be taken within the workflow of the BlogForever platform to facilitate the gathering and management of digital rights information. Further, the reports on interviews with experts in the field highlight current perspectives on rights management and provide empirical support for the recommendations that have been put forward

    Curating E-Mails; A life-cycle approach to the management and preservation of e-mail messages

    Get PDF
    E-mail forms the backbone of communications in many modern institutions and organisations and is a valuable type of organisational, cultural, and historical record. Successful management and preservation of valuable e-mail messages and collections is therefore vital if organisational accountability is to be achieved and historical or cultural memory retained for the future. This requires attention by all stakeholders across the entire life-cycle of the e-mail records. This instalment of the Digital Curation Manual reports on the several issues involved in managing and curating e-mail messages for both current and future use. Although there is no 'one-size-fits-all' solution, this instalment outlines a generic framework for e-mail curation and preservation, provides a summary of current approaches, and addresses the technical, organisational and cultural challenges to successful e-mail management and longer-term curation.

    Report to the Childhood Development Initiative on Archiving of C.D.I. Data

    Get PDF
    This report presents the ethical and legal issues involved in depositing data-sets of research for secondary use in Ireland

    Secondary Analysis of Archived Data

    Get PDF

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    Recognizing Co-Creators in Four Configurations: Critical Questions for Web Archiving

    Get PDF
    Four categories of co-creator shape web archivists\u27 practice and influence the development of web archives: social forces, users and uses, subjects of web archives, and technical agents. This paper illustrates how these categories of co-creator overlap and interact in four specific web archiving contexts. It recommends that web archivists acknowledge this complex array of contributors as a way to imagine web archives differently. A critical approach to web archiving recognizes relationships and blended roles among stakeholders; seeks opportunities for non-extractive archival activity; and acknowledges the value of creative reuse as an important aspect of preservation

    Self-archiving and the Copyright Transfer Agreements of ISI-ranked library and information science journals

    Get PDF
    A study of Thomson-Scientific ISI ranked Library and Information Science (LIS) journals (n = 52) is reported. The study examined the stances of publishers as expressed in the Copyright Transfer Agreements (CTAs) of the journals toward self-archiving, the practice of depositing digital copies of one\u27s works in an Open Archives Initiative (OAI)-compliant open access repository. Sixty-two percent (32) do not make their CTAs available on the open Web; 38% (20) do. Of the 38% that do make CTAs available, two are open access journals. Of the 62% that do not have a publicly available CTA, 40% are silent about self-archiving. Even among the 20 journal CTAs publicly available there is a high level of ambiguity. Closer examination augmented by publisher policy documents on copyright, self-archiving, and instructions to authors reveals that only five, 10% of the ISI-ranked LIS journals in the study, actually prohibit self-archiving by publisher rule. Copyright is a moving target, but publishers appear to be acknowledging that copyright and open access can co-exist in scholarly journal publishing. The ambivalence of LIS journal publishers provides unique opportunities to members of the community. Authors can self-archive in open access archives. A society-led, global scholarly communication consortium can engage in the strategic building of the LIS information commons. Aggregating OAI-compliant archives and developing disciplinary-specific library services for an LIS commons has the potential to increase the field\u27s research impact and visibility. It may also ameliorate its own scholarly communication and publishing systems and serve as a model for others

    Length Of Cloud Application Use On Functionality Expectation, Usability, Privacy, And Security: A Case Of Google Docs

    Get PDF
    Background: Newcomers to cloud applications typically have to overcome concerns of privacy (confidentiality control) and security (safekeeping). On the one hand, end-users may be accustomed to cloud applications’ privacy and security (habituation). On the other hand, these applications quickly adapt to end-user needs on those concerns (reciprocal habituation). Does the old proverb “Custom makes all things easy” apply to privacy and security concerns about cloud application use? Method: This study focuses on Google Docs as an example of standardized, common cloud applications and collects data from 211 of its users. Results: The results show that length of use has significant associations with better usability perception and increased functionality expectation. In turn, improved usability perception leads to decreased security risk concern, while increased functionality expectation increases privacy concerns. Interestingly, usefulness perception is not influenced by privacy concern. Conclusions: Overall, the length of Google Docs use is associated with higher usefulness and increased adoption through greater usability and decreased security concern. Thus, when it comes to standardized, common cloud applications, the old proverb is valid with some exception. Also, “custom” is mutual between cloud applications and their users
    • …
    corecore